CopyAssure Explained in 5 Easy Steps
Protect and Recover your Data with CopyAssure
Verified backups in just 20 minutes
We’re here to help Get in touch
Why Choose CopyAssure
20 MinuteBackup Recovery
CopyAssure provides you with a backup in just 20 minutes - so you can carry on as usual
ValidatedImmutable Copies
CopyAssure validates your immutable copies ensuring they're not corrupted
AutomatedValidation
CopyAssure automates the process of validating copies and confirms the data is good
CopyAssure Explained
1. Immutable Copies
Immutable means unchangeable. In technology terms an immutable copy is a backup of your data that cannot be changed, hacked or corrupted. This ‘clean’ copy can be used in the event of a cyberattack.
2. Speed of Recovery
Recovering from a cyberattack can take hours,
days and in some cases months. Our CopyAssure solution can
recover a verified backup in as little as 20 minutes.
3. Validation
Restoring a backup of your data will get your business
up and running after an attack. However, you need to confirm
that the backup is not corrupted. CopyAssure tests and verifies
whether the data is clean and safe to use.
4. Automation
Verifying the validity of your backups can be costly
and time consuming. CopyAssure automates the process
eliminating the need to perform manual checks.
5. Planning
The worst time to come up with a plan is after the event.
CopyAssure is the safety net which ensures your business
recovers quickly in the event of an attack.
The Techie Explanation
How does it work?
CopyAssure is a service that leverages the IBM Virtualize feature, FlashCopy. Via the Copy Services Manager, a backup policy schedule manages periodic FlashCopy snapshots which are immutable. This secures the data to prevent it from being compromised.
CopyAssure automates the process of validating this copy allowing tests to confirm the data is good and that the copy could be used to revert in the eventuality of a ransomware attack. It also provides for additional services to assist your IT department should an attack be found.