Feeds

Asigra's Google Apps backup calms paranoid CIOs

We always thought the cloud meant you didn't need to back up...

Beginner's guide to SSL certificates

Backup specialist Asigra has added support for Google Apps so it can provide detailed backup and recovery services for cloudy, risk-averse organizations.

The upgrade was announced at the Asigra Summit in Toronto on Tuesday as a key component of Asigra Cloud Backup 12.2.

We always thought the point of outsourcing services such as mail to cloud providers was to save money, rather than having to spend on additional solutions. But it turns out that although clouds promise to save companies from spending on IT infrastructure, they also introduce new costs in the form of measures needed to be taken to maintain compliance.

For example, if an organization has recently Gone Google [Drunk the chocolate?—Ed.] a user deleting an important email could cause an IT bod a headache. It's unlikely that Google will be able to help you, and the same goes for Amazon and Microsoft, because these companies state in many of their cloud contracts that their job is to provide a service, not to clean up after the mistakes made by the techno-illiterate types that permeate any organization.

For this reason, companies such as Asigra, SysCloudSoft, Backupify, and others are developing tools that let you back up data from Google Apps and even restore back into the products, in case of problems introduced by users.

Asigra's tech is agentless, and also incorporates deduplication prior to backup and continuous data protection, though this comes at a price that some attendees of the company's partner summit in Toronto described to us as "very expensive".

The tool lets companies back up and restore data from Google Apps email, calendars, contracts, documents, and sites, and Asigra has made it possible to schedule and automate the backup activities, along with defining retention rules and backup frequencies. It allows for backup within the domain level, account level, and down to specific files and emails.

The Google backup technology is available within Asigra 12.2, which became generally available on Tuesday. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Cray-cray Met Office spaffs £97m on VERY AVERAGE HPC box
Only 250th most powerful in the world? Bring back Michael Fish
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
Cisco and friends chase WiFi's searing speeds with new cable standard
Cat 5e and Cat 6 are bottlenecks for WLAN access points
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.