Hot Site - a complete data recovery solution

June 2004 Security Services & Risk Management

Internet Solutions (IS), together with Attix5 and Dell, have launched Hot Site, a new service aimed at providing users with a complete storage and data recovery solution, which allows them to backup and recover data from multiple sites to multiple sites.

This offering, combining Dell hardware, Attix5 Backup Professional software and IS infrastructure, aims to provide users with a full service, including reliable software backup and storage, from onsite storage to offsite disk-to-disk and online backup, as well as tape-based archiving for older data.

Hot Site features include a process of intelligent data filtering and selection, which prioritises backups and, after the initial backup of all data, only backs up changes in data, thereby decreasing the backup window dramatically. For decreased down time and increased security, redundant off-site storage is also available through a secondary mirror included at IS data centres. In addition, a trickle transfer system, which reduces bandwidth usage by up to 98%, has been adopted to alleviate strain on bandwidth.

Hot Site is versatile in that it supports multiple operating systems, open systems and the databases running on them.

Security in any backup and storage system is crucial, according to IS, which is why Hot Site incorporates two-factor user authentication and is protected by 'bank-level plus' security. This includes 448-bit blowfish encryption, SSL, RSA KEON - PKI and SecurID plug-in, intelligent file selection and version control.

According to Leon Labuschagne, IS general manager, the solution enables companies to leverage their existing connectivity by using this bandwidth to transfer data for storage and backup. This ensures better protection of corporate information, while reducing support costs and relieving ICT personnel of time-consuming backup and recovery activities. Hot Site is based on the IS backup service and has been expanded to include backup-only lines, disaster recovery (DR) hosting space, onsite hardware and project management.

Ian van Reenen, Attix5
Ian van Reenen, Attix5

Operating seamlessly

Ian van Reenen, CTO at Attix5, adds that Hot Site aims to provide companies with the required data protection services that will enable them to continue operations seamlessly after the occurrence of an event that has impacted their operations. "This could range from something as mundane as someone deleting a file to a major disaster such as a building burning down. Hot Site has been designed to facilitate the retrieval of data as quickly as possible after a loss has occurred, while ensuring that critical data has been backed up securely.

Leon Labuschagne, Internet Solutions
Leon Labuschagne, Internet Solutions

"A small Java client is remotely deployed to user devices, which automates the secure backup of data according to customisable file filters and scheduler settings. Data transfer is reduced by as much as 98% by a proprietary patching technique that compresses and transfers only the changed bytes within the user data set. Secure encryption of all data ensures confidentiality, while an intuitive user interface allows users to recover data immediately and from any point in time," he says. "The service includes centralised deployment and monitoring tools that allow ICT managers to customise departmental file filtering and backup schedules, as well as manage and track individual account usage."

"There are many technical challenges associated with data management," adds Brendan McAravey, head of Enterprise Solutions at Dell. "These include the very large file sizes on open databases, bandwidth limitations in terms of cost, quantity and management, as well as the complex network environment and storage architectures in companies today, which require ICT departments to manage file systems without having to shut down critical systems."

Brendan McAravey, Dell
Brendan McAravey, Dell

Notes Van Reenen, "People and information are the two most important assets of any organisation. Protecting information is becoming more important to the viability of the business than ever before. There are three main elements of disaster recovery. These are systems recovery or the recovery of mission-critical technology, applications and data; business recovery or the recovery of business processes and workspace; and contingency planning or the management of an external event that has far-reaching impact on the business."

More corporate data

As the amount of corporate data being generated and stored on multiple devices throughout many organisations is growing at an exponential rate, the complexities of managing this growth have increased in an environment where data loss can be fatal. Research reports estimate as many as two out of five (40%) of business today do not survive a critical blow to their data and information systems. According to Anton Sinovich, of the Menlo Park Europe team at PricewaterhouseCoopers, many companies are entering a crucial phase of the data age without full control or knowledge of the one asset most fundamental to their success - their data. "The value of your business will increasingly depend on the successful management of this asset. Data management is critical to the future of business of all types, and is being addressed at the wrong level, in the wrong place, and in the wrong way across too many corporate organisations. As a result, poor data quality is threatening to undermine massive investment being made elsewhere, in areas from customer relationship management systems to basic systems infrastructure," he says.

"As protection of data and information play an increasingly important role in the sustainability of many of today's businesses, corporate governance reports like the King II (SA) and Turnbull (UK), as well as savvy shareholders, are increasingly calling for the responsibility of data protection to be elevated to that of a board level for these businesses," Sinovich continues. This sentiment has been further echoed in recent legislation ranging from the Interception Act (RICPIC), ECT Act and Promotion of Access to Information Act - that advocate data protection and availability in affected South African companies as a legislative requirement. "Companies that handle data that is critical to their own, as well as other companies in their value chain's sustainability, must adopt a more responsible approach to the precautions they take surrounding the protection of this data or they are going to find themselves liable for its mismanagement."

"Due to continuing falling prices of hard disk storage, performing high volume disk-to-disk backups has become increasingly affordable. This, coupled with falling bandwidth costs, means it has become possible to provide cost-effective and instantaneous data recovery solutions. Companies can now store critical data on disk storage and use tape archives for non-critical data. When compared with traditional tape backup systems, Hot Site can be 30% cheaper and, due to the fact that the data is readily available, restores are now 92% faster that tape backups, which is critical in the case of disaster," Labuschagne concludes.

For more information contact Ian van Reenen, Attix5, 021 880 2323;

Leon Labuschagne, Internet Solutions, 011 575 1000, [email protected]; Brendan McAravey, Dell, 011 709 7700, [email protected]; Anton Sinovich, PricewaterhouseCoopers, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Don’t Miss the Exclusive Launch of the AirXpress 3 SCBA
Security Services & Risk Management
Be the first to experience the all-new AirXpress 3 Self-Contained Breathing Apparatus (SCBA), designed and manufactured by MSA, and brought to you by PSA Africa.

Read more...
Transform WhatsApp chaos into real-time security intelligence
Security Services & Risk Management
The HYDRA AI security intelligence software plugs into existing guard chat groups to automatically convert voice notes, photos, and texts into structured, real-time security data and insights.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Health, safety, and environmental eLearning
Training & Education Security Services & Risk Management
SHEilds is a global leader in health, safety, and environmental eLearning, delivering internationally recognised qualifications such as NEBOSH, IOSH, IEMA, and ProQual NVQs.

Read more...
See crime stopped in seconds
Products & Solutions Security Services & Risk Management
Fog Bandit, a leader in security fog, is bringing its instant crime-stopping technology to Securex Cape Town 2025. Experience the innovation trusted worldwide to protect retailers, warehouses, and high-value sites.

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Vetting people in security estates
iFacts Security Services & Risk Management Residential Estate (Industry)
In today’s security-conscious South Africa, estate management’s responsibility extends beyond gates and patrols; it involves ensuring that every resident, staff member, and service provider upholds the community’s safety standards.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.