Title: Data Backup Security - One2backup (1)
1One2Backup
Data Backup Security
https//one2backup.com/
2Strong Encryption
- Your files are protected using 448 bit Blowfish
Encryption before they leave your PC. This
extremely secure "bank grade" encryption
algorithm has never been cracked. Your files are
then stored in this encrypted state at our secure
data centre.
https//one2backup.com/Security.aspx
3Individual Data Security
- With One2backup, each user gets their own
individual account and password. This means that
each user also gets a unique encryption key. This
encryption key ensures that while your data
backup is securely stored at our data centre,
only you have access to your data storage. In
fact, even our most privileged systems
administrators do not have the ability to decrypt
your data.
https//one2backup.com/Security.aspxundefined2
4Password Security
- Great lengths are taken in our system to ensure
your password remains a secret. Our password
security practices have been modeled after
premier online banking web sites.Your password is
encrypted before it is stored in our database. At
no point is an administrator able to retrieve
your password. Nor does an administrator have the
ability to set your password to a known value.
https//one2backup.com/Security.aspxundefined3
5Secure Data Centre
- Your data is securely stored in our Carrier Grade
data centre. Our all Cisco based switched network
employs redundant Internet providers, redundant
routers, and redundant firewalls. We use BGP and
HSRP protocols to implement fail-over and
redundancy. Our data centre was up and running
throughout the big blackout of August 2003.
https//one2backup.com/Security.aspxundefined4
6End to End Verification
- As each file is transferred to our data centre,
we carefully verify its integrity against a known
CRC signature. Files are re-verified each time
they are written to disk. If any file fails
verification, it is retransmitted from your PC or
recovered from the replica server. This ensures
that the data stored on our servers is the same
data that was stored on your PC.
https//one2backup.com/Security.aspxundefined5
7Secure Protocol
- The One2backup client communicates with our
servers over a proprietary protocol that was
designed specifically for Internet data backup.
Other Internet backup products that use popular
web protocols like HTTP, FTP, or WebDav can be
vulnerable to hacker and virus attacks. The
extreme popularity of these protocols makes them
a target. It is extremely unlikely that a hacker
is going to invest the time and effort to go
after a proprietary protocol. Even if they did,
the 448 bit Blowfish Encryption has never been
broken.
https//one2backup.com/Security.aspxundefined6
8Firewalls
- To maximize compatibility with home and corporate
firewalls, the protocol used by our Backup Client
was designed to look to a firewall just like the
SSL protocol used in web browsers. This means
that if you are able to surf to our web site, you
will be able to connect with our backup software.
https//one2backup.com/Security.aspxundefined7
9Corporate Remote Access Policy
- Many organizations have a policy to control
access to their data from outside of the
organization. VPNs and Firewalls are generally
used to control this, but become ineffective when
the data is stored off-site. The same features
that empower a laptop user to backup and restore
his data while on the road may violate corporate
information policy.
https//one2backup.com/Security.aspxundefined8
10One2Backup
CONTACT US
12 Blair Road, Pinetown, Kwazulu Natal, South
Africa
Call Us 0861 727283
Fax Us 0866 476382
info_at_One2backup.com
https//one2backup.com/ContactUs.aspx