Data protection
Undoubtedly the most important element of informatics
GRINIT is a certified GOLD partner of leading data security solutions ACRONIS.
Our award-winning security technologies are based on the integration of machine learning and AI – artificial intelligence.
Multi-layer protection
Comprehensive data integrity preservation
Disaster Recovery (Online)
In the event of a critical production outage, you can be back up and running in minutes by transferring your production workloads to virtual servers in a cloud-based data centre.
There are three different ways to store business-critical data:
- in a local data centre,
- in the cloud,
- with a hybrid approach.
In a data centre, your critical data is stored off-site in a physical location, but disaster recovery can take days or weeks (recall the high-profile case in Slovenia).
Although this option is considered the most secure storage, it is also the most expensive, as it requires premises and additional systems and staff.
Cloud-based disaster recovery is the most cost-effective and scalable option.
This option uses a cloud data centre to store critical systems (physical or virtual), data and applications. Cloud disaster recovery allows you to have entire virtual environments on standby, reducing disaster or business downtime recovery to minutes or even seconds.
The hybrid cloud disaster recovery method uses a public cloud and a private data centre (physical or cloud).
This provides a high degree of flexibility, keeps costs low while meeting any regulatory and compliance requirements that may arise.
Disaster Recovery is mainly used to get business-critical systems back into production immediately or to recover from a disaster.
as soon as possible, giving us time to restore the primary production environment in peace.
3-2-1 methodology
The 3-2-1 rule is a pioneering data backup strategy.
You may be surprised to learn how many small businesses fail to back up their data and how many more do not survive a data disaster.
By following the 3-2-1 rule when backing up, we prevent your organisation from becoming a statistical case of a data disaster.
Rule 3-2-1 complies with the following requirements:
- Make 3 copies of the data , the original data on the primary device and at least two copies.
- We use two different storage media, i.e.
The choice of media is arbitrary.
GRINIT uses only reliable, industrial servers. - One backup copy is kept off-site. By storing copies of data at a remote location, we prevent data loss due to a local disaster or a myriad of other failure scenarios at the primary site.
Continuous Data Protection
CDP is known as continuous backup, real-time backup or continuous data protection.
It is a process whereby any change a user makes to data automatically triggers a backup of that data, essentially overwriting any version that the user saves. The real power of this method comes from your ability to restore customer data to any point in time without losing data on critical assets.
It is officially defined as “a backup system in which a copy of every change made to a storage medium is recorded when the change occurs”.
Simply put, CDP ensures that end-users do not lose track of their current work by capturing changes in real time.
Immutable backup
Data stored in an Immutable backup solution is tamper-proof, meaning it cannot be modified, deleted or overwritten.
The data is stored in a read-only format with write privileges disabled to ensure that the data cannot be altered.
Immutable backups can be replicated to different storage media and multiple copies of data can be kept for auditing and version control. They can also use advanced security mechanisms such as encryption and multi-factor authentication to provide extremely secure data protection.
Audit & forensic trails
Malicious activity on your computer can be carried out by viruses, malware and ransomware.
Another example that may require investigation is the theft or modification of data on a computer by various programmes.
Such activities may need to be investigated, but this is only possible if you keep digital evidence on your computer to investigate.
Unfortunately, the evidence (files, traces, etc.) may be deleted or the computer may become inaccessible.
The forensic data backup option allows you to collect digital evidence that can be used in forensic investigations. You can use the following items as digital evidence:
- a snapshot of unused disk space,
- memory dump,
- a snapshot of the processes at work.
The forensic data feature is available on request and is only available as part of a full computer backup.
WORM storage
In the world of data protection and compliance (SEC, FINRA), WORM (write once, read many) backup technology plays a key role.
WORM backup technology allows data to be written once to a storage medium and, after this initial write, cannot be modified or deleted after a predefined period of time.
Understanding WORM backup is essential for organisations to ensure data integrity and compliance with regulatory standards, in industries where maintaining unaltered records is essential.
Main characteristics of the WORM method:
- Immutable storage, once data is written it becomes immutable, meaning it cannot be changed or deleted.
- Time-limited data retention. Data stored using WORM technology has a predefined retention period during which it cannot be modified.
- Audit trails: WORM security solutions include audit trails to ensure transparency and traceability of data access and changes.
Immutable backup
5 reasons why Immutable Backup is so important and how it works
5 reasons for Immutable Backup
- Write Once, Ready Many (WORM), creating a backup copy of your data that cannot be removed.
The data is written once, then made read-only.
WORM is mainly used for long-term archiving of sensitive data such as medical, financial, legal and regulatory records. - Continuous Data Protection (CDP) backs up data continuously and consistently and ensures granular recovery of data changes at any time.
Changes to data in the primary repository are automatically copied to the backup repository, ensuring that the data is always available in the most up-to-date state.
CDP backup solutions back up data at intervals of seconds or minutes. - Time-based Snapshots. Time-based snapshots are taken at specific intervals using the delta algorithm.
Each snapshot includes only the changes that have occurred since the last backup.
Time-based snapshots are ideal for storage systems shared by many virtual machines.
Snapshots are performed frequently to facilitate data recovery with the last snapshot always at hand. - Versioned Backups. The versioned backup solution allows you to create multiple versions of the same data.
Backups preserve each copy of the data, ensuring that previous versions are available and can be restored at any time.
Data versions provide an audit trail of changes to the data, allowing companies to compare and restore the previous version if necessary.
Versioned backup solutions are typically used for business-critical data such as financial records, source code and software projects where files are frequently updated. - Cloud storage-based immutable backup. This backup solution uses remote cloud servers to store your backups, ensuring that your data is accessible from anywhere.
Organisations can also scale up and down cloud backups as their data storage requirements change.
Most fixed cloud backups offer a pay-as-you-go pricing model and robust security features such as encryption and multi-factor authentication.
How it works
The solutions create a read-only copy of the data so that no one can change or overwrite it.
This is achieved through encryption, where users must be authorised and authenticated to access the data.
Immutable data is also stored in compressed form to reduce storage requirements and ensure faster recoveries.
The immutability of blockchain technology is increasingly being used in immutable backup solutions . This allows each event, such as a backup creation or a restore from a backup, to be stored in a “block”, which is cryptographically linked to a well-defined block sequence.
This improves data authenticity – especially for internal data recovery specialists.
Fixed backup solutions also provide a chain-of-custody tracking solution, registering every data transaction and creating an audit trail that can help identify the source of any unauthorised change or breach. This provides an extra layer of security against cyber criminals.
Questions? We are at your disposal.
Call +386 40 777 107 to speak to a sales engineer.