Backup

Uncompromising data security.
Untouchable backup always secure and ready for restoration in 2 data centers in Poland.

Veeam

safety

Why is backup protection critical?

Backup systems are one of the most popular vectors for ransomware attacks. The motivation of cyber criminals is logical - the lack of backups is a guaranteed bargain in the event of a successful ransomware attack on production repositories. Only the right backup system architecture and the implementation of backup and restoration best practices, including the 3-2-1-1-0 rule, guarantees the preservation of backups from which data can be restored.
75% In 2023, as many as 75% of organisations fell victim to a ransomware attack, and the number of attacks increased compared to 2022. At the same time, as many as two-thirds of these organisations were attacked more than once.
45% In the case of ransomware, an average of 45% of data is affected by an attack, meaning that nearly half of data and systems need to be recovered.
93% The majority, 93%, of attacks target local backup repositories. More than 76% of attacks on backup systems were successful.

protection

What is the 3-2-1-1-0 rule?

3

Independent copies

2

Different media

1

Copy off-site

1

Immutable or offline

0

Free of errors
The 3-2-1-1-0 rule is a specific methodology to minimise the chances of data loss. It involves keeping three copies of the data, i.e. the primary data and two backups, stored on different media or devices. In addition, at least one backup should be stored off-site or in a remote location. The idea is that in the event of a disruptive event to the IT infrastructure, other backups will still be retained. To ensure worst-case scenario data protection, it is also a good idea to have a backup that is temporarily protected against deletion or overwriting (immutable) and a mechanism that automatically verifies whether data can be recovered from the backup (SureBackup).
"This method safeguards the organisation for a number of situations, including protection against human error or deliberate action to delete the backup. In the face of known cyber attack vectors, the 3-2-1-1-0 rule is a prerequisite to ensure the full protection and integrity of a company's data." Tomasz Magda - anty.expert

Veeam Cloud Connect

Try now for 14 days

overview

How to protect backup from ransomware?

Phase 1
Off-site Backup
Encrypted backups from the local backup server are sent on a specified schedule to a cloud repository in the Cloud Service Provider's data centre (Veeam Cloud Connect technology compatible with Veeam applications). Both data transmission and credentials to the service are encrypted with SSL.
Phase 2
Insider Protection
The client's encrypted backups are stored in the service's primary repository, on which Insider Protection is enabled by default for 14 days. This means that even if the client deletes a backup (the entire backup job or individual files), we can recover the backup from the hidden system recycle bin.
Phase 3
Object Storage
For additional data protection, backups from the primary repository are copied to object storage which is an independent repository. As a result, customers of the service get FOUR places of data occurrence: 1) Production systems, 2) Backup system, 3) Service Provider, 4) SP - Object Storage.
Protection and mobility of processed data
The use of Veeam applications offers very broad possibilities for both data protection and data mobility. The number of supported technologies that can be backed up is extensive and includes not only the most popular virtualisers such as VMware vSphere, Microsoft Hyper-V, Nutanix AHV or Proxmox, but also physical servers, applications and cloud workloads at the largest hyperscalers such as AWS, Azure and Google Cloud. Data mobility also gives a very high degree of flexibility in disaster recovery planning. For example, it is possible to restore a vSphere (on-premises) virtual machine from a backup to Microsoft Azure or to Hyper-V. It is also possible to restore a backup made with Veeam Agent to Amazon EC2 or Hyper-V, and there are many more possible combinations.

partners

Our technology partners

security pillars

Pillars of backup security

3
Independent repositories for backups
The separation of storage systems and a proper retention policy achieves a very high level of confidence that backups will survive even the worst contingency scenarios.
2
Data centers located 250 km apart
The significant distance between the primary and backup data centers is designed to protect backups in the event of regional-scale disasters or catastrophic events.
1
Active protection against backup deletion
We retain the client’s backup in our repository for 14 days after its deletion. This way, we protect clients from losing backups due to human error or hacker attacks.

Veeam Cloud Connect

Try now for 14 days

positive

Why do we recommend Veeam?

Global market share in data replication and protection

Secure replication 5x faster

IDC

Magic Quadrant, ability to execute

Gartner

Kubernetes backup and recovery

Kubernetes

Multi-cloud & Hybrid

Amazon Web Services Microsoft Azure Google Cloud
Veeam Software is recognised as a leader in the backup and recovery space according to International Data Corporation (IDC), Gartner, and many others. Veeam is a global player with offices in more than 30 countries, protecting more than 450,000 customers worldwide, including 74% of Global 2000 companies who believe Veeam technology is a guarantee of business continuity for their enterprises. Veeam has a year-on-year growth rate of 15.9% and is growing faster than other vendors and faster than the overall market average in the second half of 2023. Veeam also enjoys a very good reputation among its customers. The Net Promoter Score in 2023 reached 75, which is very high for the industry (Apple scored 61). More than 90% of Veeam customers are completely satisfied with the software and would recommend Veeam solutions to their friends and colleagues. As many as 91% of customers are completely satisfied with the functionality of Veeam's products and plan to renew their contract when their current support ends.
"Our data is safe, and we have the peace of mind that we will recover it even if the storage of the backup system is encrypted." Jakub Wolert, Director of IT at Zysk i Spółka Publishing House

FAQ

Check out the frequently asked questions

How much space do I need for off-site backup?

An off-site backup is an identical copy of a locally stored backup. Depending on the backup policy you adopt, you can either assume that every backup made will be sent to a remote repository or limit the backup copy task to the most important data. In summary, the space needed will be equal to the size of the local backup or some percentage of the repository depending on the decision of the customer's CIO.

How often do you need to perform an off-site backup?

The frequency of sending a backup to a remote location, i.e. off-site backup, should be closely related to the schedule of the backup job. Best practice is to execute a ‘backup copy job’ as soon as the backup job on the local repository is completed. It is also assumed that incremental backups should be executed at least once a day. This approach makes it easy to predict the RPO for different restore scenarios.

Where will our backups be stored?

We currently provide two repositories for off-site backup and both are in Poland. The primary repository and object storage is located in the Korbank Data Centre in Wrocław at 16K Fabryczna Street. The second centre, where we provide an IMMEDIATE cloud repository, is located in Radom.

Can a ransomware attack on a company's backup corrupt off-site backups?

The malicious code operates within the authentication domain to which it has gained access. It therefore encrypts repositories within a specific domain, including backups. However, there is no way for the attack to extend its reach into the Service Provider's environment. In the event of a targeted hack attack on the backup system in which administrative credentials are taken over, the hostile actor will be able to delete the backup jobs. However, the deleted backups will still remain in the service provider's system trash for 14 days. This ironclad reserve can be recovered manually by our admin team.

What does recovery from an off-site backup look like?

Recovery can take place using the local Veeam client, i.e. either the Veeam Backup & Replication or Veeam Agent level. The repository with backups on the Service Provider side is visible in the Veeam application. In the event that local resources are unavailable or have been encrypted by ransomware, restoration can be carried out using the Service Portal (VSCP), from which both files and entire images can be restored.

free trial

Test how to regularly perform off-site backups

Fill out the form to receive a free 14-day trial account

  1. After you have sent your application, you will receive an e-mail verifying the correctness of the data you have entered. It is essential that you confirm that everything is correct, otherwise by law we cannot continue communication by email.
  2. Positive verification will result in a test account credentials being sent to you and instructions on how to set up your first backup job.

The test account has certain limitations. We limit the number of systems to 10 VM/Server/PC within one or multiple backup jobs. The total capacity of the repository for backups is 2TB. NOTE, you will need to have Veeam Backup & Replication or Veeam Agent to test the service. If you do not yet have an application from Veeam, you can download and install a trial version by registering on the manufacturer's website.

Contact form