Skip to main content

Related pages on "Synology backup":

 

  1. All backup data is encrypted using strong AES 256-bit encryption before it is transferred over the internet. The data remains encrypted even when at rest.

  2. For immutable backups the data files cannot be encrypted, deleted, or modified. Therefore, it preserves your data from human error, ransomware, or hackers.

  3. A backup schedule enables organizations to easy implement regular and consistent backups across unlimited endpoints requiring little or no human intervention.

  4. Real time network monitor delivers up to the second information on your backup server network performance.

  5. Multi-destinations backup helps to maximize data protection and recovery. Aligns your backup strategy with the industry best practice 3-2-1 backup rule.

  6. Data retention policy regulates the length of time older versions of deleted files/folders and updated files are kept before they are permanently removed.

  7. Define a command or a script such as a .bat file on Windows or a .sh file on Linux/FreeBSD, which will be executed before and or after a backup job.

  8. Deploying backups but overlooking the need to make sure that backup actually work is a common error.

  9. The compression of data reduces the volume of data that needs to be transferred therefore it will improve backup performance and reduce data storage size.

  10. With Ahsay Restore Drill feature you can fully automate regular testing of your backup data to ensure complete dara integrity