[{"_id":"project-settings","settings":{"translateMetaTags":true,"translateAriaLabels":true,"translateTitle":true,"showWidget":false,"isFeedbackEnabled":false,"fv":1,"customWidget":{"theme":"custom","font":"rgb(0, 0, 0)","header":"rgb(255, 255, 255)","background":"rgba(255, 255, 255,0.8)","position":"left","positionVertical":"top","border":"rgb(204, 204, 204)","borderRequired":false,"widgetCompact":true,"isWidgetPositionRelative":false},"widgetLanguages":[{"code":"da","name":"Dansk"},{"code":"de","name":"Deutsch"},{"code":"es-LA","name":"Español"},{"code":"fr","name":"Français"},{"code":"nl","name":"Nederlands"},{"code":"sv","name":"Svenska"}],"activeLanguages":{"de":"Deutsch","sv":"Svenska","nl":"Nederlands","fr":"Français","da":"Dansk","es-LA":"Español (América Latina)","pt-BR":"Português (Brasil)","en":"English"},"enabledLanguages":["da","de","en","es-LA","fr","nl","pt-BR","sv"],"debugInfo":false,"displayBranding":false,"displayBrandingName":false,"localizeImages":false,"localizeUrls":false,"localizeImagesLimit":false,"localizeUrlsLimit":false,"localizeAudio":false,"localizeAudioLimit":false,"localizeDates":true,"disabledPages":[],"regexPhrases":[],"allowComplexCssSelectors":false,"blockedClasses":false,"blockedIds":["sidebar-root"],"phraseDetection":false,"customDomainSettings":[{"domain":"dattodev.wpengine.com","detectPhrase":false},{"domain":"datto.com","detectPhrase":true},{"domain":"www.datto.com","detectPhrase":true}],"seoSetting":[],"translateSource":false,"overage":false,"detectPhraseFromAllLanguage":false,"googleAnalytics":false,"mixpanel":false,"heap":false,"disableDateLocalization":false,"ignoreCurrencyInTranslation":false,"blockedComplexSelectors":[]},"version":49756},{"_id":"en","source":"en","pluralFn":"return n != 1 ? 1 : 0;","pluralForm":2,"dictionary":{},"version":49756},{"_id":"outdated","outdated":{"#Endpoint Detection & Response (EDR)-platforme":1,"#Backup & Recovery Archives | Page 16 of 17 | Datto":1,"#Resources and Blogs related to Backup & Recovery | Page 16 of 17":1,"#Resources and Blogs related to Cybersecurity | Page 2 of 19":1,"#Cybersecurity Archives | Page 2 of 19 | Datto":1,"#Socios: Obtenga más información sobre nuestro Programa Global de Socios.":1,"#Acerca de: conozca la empresa y al equipo directivo.":1,"#Blog Descubra el liderazgo intelectual que impulsa el crecimiento de las empresas MSP.":1,"#Integrations Archive | Page 25 of 37 | Datto":1,"#Call: 0031-(0)88 78 78 010":1,"#SaaS backup software is designed to store and protect data created by SaaS products. SaaS backup software is provided by a third-party vendor that creates an independent copy of that data. If a cloud application":1,"#GET A DEMO O":1,"#SaaS Protection + de Datto offre une sauvegarde tout-en-un de Microsoft 365 (officiellement la sauvegarde de Microsoft Office 365), la recherche, la restauration et l'exportation. Cela inclut les fonctionnalités pour Microsoft Exchange, Tasks, SharePoint, Microsoft Teams et OneDrive Backup.":1,"#Videos Archives | Page 8 of 13 | Datto":1,"#i IT Glue":1,"#Sammenkædet dokumentation":1,"#Workflow-regler":1,"#Ajouter à l’extension Photoshop":1,"#The future of RMM: AI-powered automation":1,"#December 10, 2025, 2:00 pm ET":1,"#Boost operational efficiency with Datto’s automation tools designed to streamline IT workflows and increase service delivery speed.":1,"#Integrate AgileBlue with Datto for advanced threat detection and SOC automation to enhance your cybersecurity stack.":1,"#Resources and Blogs related to Cybersecurity | Page 4 of 19":1,"#Cybersecurity Archives | Page 4 of 19 | Datto":1,"#Join Datto’s developer community to access APIs, build integrations, and extend the power of Datto solutions.":1,"#Combine MobileRMM with Datto for endpoint monitoring, real-time security, and efficient mobile device management.":1,"#Don’t just take it from us, hear why Datto RMM has been the choice for thousands of MSPs:":1,"#Don’t let your business get bulldozed by N-Able’s surprise costs and unreliable support. It’s time to make the leap to Datto RMM. See a full demo of our solution today.":1,"#Trusted and reliable provider: With Datto RMM gain access to 24/7/365 access to our experts so a fix is only a phone call away.":1,"#Efficient service delivery: Manage all your clients’ endpoints, including those hosted on cloud platforms to improve your efficiency.":1,"#No hidden costs or surprises: Take charge of your business operations and have complete understanding of what you are paying for your RMM solution.":1,"#At Datto, we prioritize our partners’ success and understand the security imperatives for MSPs. With our cost-effective RMM solution, we cater directly to your unique needs. Consider these three reasons to switch to Datto RMM:":1,"#Caught off-guard by N-Able’s recent price increases? You should be focusing on what matters most – growing your business and keeping your client’s data secure – not waiting for the next pricing increase email from your RMM provider.":1,"#Break Free from N-Able's Price Increases with Datto RMM | Datto":1,"#Datto RMM puts your business first with transparent pricing and unmatched support":1,"#Break Free from N-Able's Price Increases with Datto RMM":1,"#Resources and Blogs related to IT Management | Page 7 of 10":1,"#IT Management Archives | Page 7 of 10 | Datto":1,"#Connect Datto with TD SYNNEX Digital Bridge to streamline procurement, automate quoting, and scale service delivery.":1,"#Unify quoting, procurement, and automation workflows with Datto and VARCommerce integration.":1,"#Integrations Archive | Page 13 of 37 | Datto":1,"#Двухфакторная аутентификация (2FA) для ограничения доступа":1,"#шифрование AES-256 для данных в состоянии покоя и на ходу":1,"#Облако Datto создано для обеспечения устойчивости":1,"#Так Datto делает это возможным:":1,"#Datto BCDR помогает MSP и ИТ-командам делать именно это. Он предоставляет проверенные, неизменяемые и мгновенно восстанавливаемые резервные копии - и все это в рамках одной платформы - поэтому вы не только храните данные, но и остаетесь работоспособными, несмотря ни на что.":1,"#© Датто, ООО. Все права защищены.":1,"#Традиционные стратегии резервного копирования предназначены для создания копий данных. Но сегодня истинная устойчивость означает движение вперед и обеспечение того, чтобы компания могла вернуться быстро, безопасно и без компромиссов. Именно здесь резервное копирование должно превратиться в полную непрерывность бизнеса.":1,"#Уведомление Google API":1,"#Условия использования веб-сайта":1,"#Заявление о конфиденциальности":1,"#Веттелийк":1,"#Союзники":1,"#Вертрувенсцентрум":1,"#БЕДРИЙФ":1,"#Агент-загрузки":1,"#Программа воор онтвиккелаарс":1,"#Документация":1,"#Перейдите от резервного копирования к устойчивости с Datto BCDR":1,"#ТЕХНИШ":1,"#РММ":1,"#Автозадача PSA":1,"#Геинтегреерде резервное копирование":1,"#СааС Бешерминг":1,"#Кибервербаархайд":1,"#Время простоя berekenen":1,"#Прийзен":1,"#Популяр":1,"#Стал партнером":1,"#Теперь ожидается постоянная защита данных. Решения BCDR поддерживают жесткие RTO и RPO, сокращают время простоя, минимизируют потерю данных и поддерживают доступность критически важных систем в случае сбоя. Благодаря высокочастотному автоматизированному резервному копированию и прямой виртуализации компании могут вернуться в Интернет через несколько минут после сбоя.":1,"#21 ноября 2025 г. | Адам Маргет":1,"#24 ноября 2025 г. | Адам Маргет":1,"#То такое плалан восовления? Токе, элементы, шаги луччие практики":1,"#26 ноября 2025 г. | Датто":1,"#Это поддерживает ваш бизнес даже во время серьезных перерывов.":1,"#Никаких догадок. Никаких сюрпризов. Вы знаете, что ваши резервные копии работают, потому что Datto это доказывает.":1,"#Такое сочетание инвариантности и обнаружения угроз укрепляет вашу способность восстанавливаться без введения повторно инфицированных данных.":1,"#Вместе эти возможности гарантируют, что резервные копии останутся безопасными, совместимыми и готовыми к восстановлению.":1,"#Географически распределенная защита от резервирования и соответствия":1,"#Неизменяемое хранилище, блокирующее несанкционированные операции или удаления":1,"#Частые резервные копии с прямым восстановлением":1,"#Процесс автоматизирован, поэтому требуется меньше ручных усилий, а резервирование всегда актуально.":1,"#Рис. 2: Резервная стратегия En 3-2-1-1-0":1,"#Блог Lees onze о резервном копировании 3-2-1-1-0":1,"#Уил дже Дипер Гаан?":1,"#Вариант Deze zorgt ervoor dat elke kopie werkt wanneer dat het belangrijkst есть. Это идеальная организация waar betrouwbaarheid, nauwkeurigheid en herstelsnelheid cruciaal zijn.":1,"#Het 3-2-1-1-0 модель gaat nog een stap verder. Naast een onveranderlijke offline kopie, legt het de nadruk op nul back-upfouten. De \"0\" staat voor geautomatiseerde verificatie en testen om ervoor te zorgen dat uw резервные копии нетронуты в Herstelbaar zijn.":1,"#Это означает, что добавленную резервную копию нельзя изменить или удалить, даже если злоумышленники войдут в ваши системы. Независимо от того, хранится ли он на оборудовании с воздушным интервалом или в неизменяемом облачном хранилище, этот уровень защищает ваши резервные копии от шифрования программ-вымогателей или угроз изнутри. Это простое, но мощное усовершенствование, которое делает восстановление более надежным против современных кибератак.":1,"#Теперь кибербедрайгинген рулит gerichter worden en de infrastructure meer gedistribueerd - это традиционная модель 3-2-1 geëvolueerd om de gaten op te vullen die het ooit open liet. Deze modern backupstrategieën gaan verder dan de kernideeën van recoverantie en geografische scheiding en voegen onveranderlijkheid, verificatie en gelaagde veerkracht toe om aan de hedendaagse IT- en beveiligingseisen te voldoen.":1,"#Хоэ хит запасной стратегии 3-2-1 zich ontwikkeld?":1,"#Эта стратегия поддерживает строгую нормативно-правовую базу и критически важные системы, в которых простои или потеря данных невозможны. Хотя управлять им сложнее, он обеспечивает надежную защиту для компаний, которые не могут позволить себе какой-либо риск.":1,"#Модель 4-3-2 предназначена для сред с высоким уровнем соответствия требованиям и высокой временем безотказной работы и добавляет еще большую избыточность. Он содержит четыре копии ваших данных, хранящихся в трех отдельных местах, две из которых находятся за пределами объекта.":1,"#Рис. 1. Полная стагнация рациона":1,"#Таки современных программ-вымогателей не ограничей предвидениями. Злоумышленики отдают из-за того, что они использовали резервные копии, что заставило их сделать все возможное. Если изервные копии хранятся онлайна, в одной сети или неизолированы, они итакже уязвимыкаки предвидя серёдаю серёдаю серёдаа.":1,"#Хранение в своих очередях копейки одном и том жё носите приднем отце. Использование разного рода в рахралио, тактика в нешнем стиле и облячненькое резервное, поповышайте уточность. Если из них выходитов из строи из-за проблема с оборудованием в своей истории.":1,"#Мейн Кёзес Бевестиген":1,"#Защищайте данные клиентов, где бы они ни находились, с помощью Datto Unified Backup - интегрированной платформы, созданной для MSP для повышения эффективности, прибыльности и киберустойчивости.":1,"#Краткое описание продукта Datto Unified Backup":1,"#В технологической компании MSP - это не работает, это Datto.":1,"#Все афвейзен":1,"#Беен.ренте":1,"#Sales: www.keenondots.com, [email protected] +31 88 82 82 100":1,"#Resources and Blogs related to Backup & Recovery | Page 2 of 17":1,"#Backup & Recovery Archives | Page 2 of 17 | Datto":1,"#English Archives | Page 24 of 50 | Datto":1,"#Integrations Archive | Page 20 of 37 | Datto":1,"#VD, Relia-Tech, Inc.":1,"#English Archives | Page 29 of 50 | Datto":1,"#Integrations Archive | Page 8 of 37 | Datto":1,"#överväganden innan du köper ett säkerhetsverktyg eller en lösning för Endpoint Detection & Response (EDR)":1,"#Videos Archives | Page 12 of 13 | Datto":1,"#Jag har räddat företag från ransomware, stulna datorer, naturkatastrofer och förlorade data. Det handlar inte bara om katastrofåterställning utan också om kontinuitet i verksamheten. Datto BCDR ger dig den sinnesfriden":1,"#Jag älskar hastigheten med vilken jag kan virtualisera och vara online igen, till och med innan min trasiga dator har bytts ut. När jag får ett maskinvarufel kan jag vara igång igen på några minuter i stället för dagar":1,"#Verifierad användare inom IT-tjänster":1,"#\"Effektiviteten i lokal säkerhetskopiering, till molnbackup, till skärmdumpverifieringar, till testning, till återställning är oöverträffad.\"":1,"#Användargränssnittet är enkelt att använda. Snabb installation. Jag litar på Datto mot en katastrof. Jag återhämtade mig från ransomware och allt var ganska enkelt":1,"#“MCS Services Guide” or the “Guide” means the current version of the Guide published by Kaseya that describes various details about the Services, including a list of in-scope and out-of-scope activities, MCS procedures, and supported equipment and applications.":1,"#“Device” means an endpoint device, such as a server, laptop, or virtual Device as set forth on the Services Description.":1,"#“Covered Backup” means a Device or application that you have enrolled in MCS and for which there is an active MCS License.":1,"#“Business Impact Assessment” or “BIA” means a document created during Onboarding only for Datto BCDR Devices, that identifies critical workloads, evaluates the financial impact of downtime, and establishes Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) for each Datto BCDR Device. The BIA may also include exceptions to the standard Services as described in the MCS Services Guide.":1,"#These Datto Managed Continuity Services (“MCS”) Terms of Use (“Terms”) govern your organization’s (“you” or “Customer”) use of Datto MCS Services, delivered by the Kaseya NOC Team (“MCS” or the “Services”).":1,"#Datto Managed Continuity Services Terms of Use | Datto":1,"#Limitations of Liability. Kaseya does not guarantee: (i) backup integrity, recovery success or any specific outcome, or; (ii) that all failures of Covered Backups will be detected. The monitoring, management and resolution of issues depends on systems and services outside Kaseya’s control (including customer infrastructure, configurations, networks, power, Customer Cooperation, third-party platforms, and data quality). Except as explicitly agreed to by Kaseya in its authorized documentation (emails or other electronic messaging not included), to the maximum extent permitted by law, Kaseya, its suppliers and other related entities and individuals are not liable for damages arising from or related to the Services, including those stemming from data loss, corruption, unavailability, or delays in recovery. Additional limits on liability and warranties are found in the Kaseya Master Agreement and apply to the Services.":1,"#Retention of MCS Information. During a Services Subscription term, Kaseya will retain MCS information for six (6) months after the creation of an MCS ticket. Thereafter, Kaseya reserves the right to delete such information. MCS information is not available for export to you":1,"#“Alerts” means automated notifications sent to the Kaseya NOC Team when a Covered Backup experiences a critical event, such as a service outage or defect.":1,"#Service Level Objectives. MCS response times vary depending on many factors including your environment and expected volume of Alerts. The Service Level Objectives (“SLO”) that apply to your Services are set forth in the Services Description. Please remember, SLOs are objectives and are not hard commitments.":1,"#Modification of the Services. Kaseya may remove or modify types of Covered Backup, Supported Applications or any other aspect of MCS from time to time based on reasonable grounds such as, for example, a manufacturer’s end-of-support, known bugs, malicious code or vulnerabilities. Where such modification materially decreases the scope of your Services, the parties will work together to re-Scope the Services in a reasonable manner.":1,"#Details of Service and Limitation of Liability":1,"#Alert Contacts. You must properly input and update the name, telephone number and email address of Alert Contacts in the MCS platform. It is your responsibility to ensure that such contacts are correct and current.":1,"#Customer Cooperation. Successful Services requires your prompt participation and response, and potentially that of your end users. Delays in response can cause risk and the inability of Kaseya to perform the Services. You agree to provide the cooperation and information that Kaseya needs to deliver the Services and to undertake activities as described in the Services Description (collectively, “Customer Cooperation”). Should you fail to take required action within fourteen (14) days with respect to a particular Covered Backup asset, and should such inaction lead to recurring Alerts, Kaseya reserves the right to exclude such Covered Backup from the Services until the issue has been resolved. Kaseya is not responsible for delay or failure in Services where your organization does not meet the Customer Cooperation guidelines.":1,"#Customer Responsibility and Cooperation.":1,"#Moving MCS Licenses from one Covered Backup Asset to Another. You may move an MCS License from one Covered Backup Asset to another provided that the both Covered Backup Assets use the same type of MCS License. For example, you cannot move a License for Datto SaaS Protection to a Datt BCDR Device. To have such transfer performed, contact your MCS Services Delivery Manager. Please note that it can take up to forty-eight (48) business hours after acknowledgement of your assignment request for Kaseya to authenticate and begin Services on the newly-Licensed Covered Backup asset.":1,"#Should the number of Covered Backup assets exceed the number of active Licenses in a Subscription, you must purchase additional Licenses as needed, either by contacting your Kaseya account manager or, if and when available, purchasing through a Kaseya Portal. Once the necessary Licenses are purchased, you must then contact your Kaseya service delivery manager to request onboarding of those newly-Licensed Covered Backups. Kaseya has the right to invoice for past periods during which the number of Covered Backup assets exceeded purchased Licenses.":1,"#Should the number of Covered Backup assets fall below the number of active Licenses in a Subscription, you must continue to pay for all Licenses through the Committed Service Term of the Subscription.":1,"#Under Use and Over Use of Licenses.":1,"#The following Definitions shall apply to the Services and the Agreement:":1,"#Fees are paid either monthly or annually in advance unless otherwise agreed to by the Customer and Kaseya.":1,"#Every Agent on a Covered Backup machine must have an MCS Endpoint License assigned to it.":1,"#MCS Endpoint":1,"#Every Agent on a Covered Backup asset must have an MCS BCDR License assigned to it.":1,"#Datto BCDR Devices, Datto Endpoint Backup for Servers, or Datto Backup for Microsoft Azure":1,"#Every SaaS Protection User in a Microsoft or Google Tenant for the same Organization must have an MCS User License assigned to it.":1,"#Per User":1,"#MCS User":1,"#License Requirements":1,"#License Unit":1,"#Type of Covered Backup":1,"#Name of License":1,"#Licenses and Fees. MCS is provided in exchange for Service fees as set forth on the applicable Order. Onboarding fees also apply, and will be set forth on the Order. Following are the three types of MCS Service Licenses, each with a different Fee structure and License unit type:":1,"#MCS Service Fees and Licenses.":1,"#Scope of Standard Services and Exceptions. The MCS Services Guide describes the scope of standard Services. Where your Services require exceptions to standard Services, such exceptions will be captured in the BIA or Onboarding Summary. Any activities that are not specifically described as in-scope will be escalated back to your organization for resolution. Out-of-scope activities include, but are not limited to: (i) any activity that must be performed on-site; (ii) any issue that requires the help of a third-party supplier and (iii) any issue that cannot be remedied by the Kaseya NOC Team. You are responsible for promptly addressing out-of-scope items.":1,"#Remote Services and RMM Application Suggestions.MCS is provided remotely. As further described in the Services Description, with respect to certain types of Covered Backup, a fully functioning RMM solution that is supported by Kaseya is required for Kaseya to provide certain types of resolution or triage. Each party agrees to notify the other of service outages or other issues that could impact remote access to Covered Backup. Kaseya is not liable for failure to provide Services due to its inability to access the Covered Endpoints remotely. Should the RMM solution fail to function for any reason other than Kaseya’s uncured breach, you must pay for the Services even where the Services cannot be delivered due to the absence of remote access. The level of integration between the Services and RMM solutions varies depending on the RMM Solution, and it is your responsibility to choose among the Supported RMM Solutions based on the level of integration you require.":1,"#Datto BCDR Devices (hardware and virtual)":1,"#These Datto Managed Continuity Services (“MCS”) Terms of Use (“Terms”) govern your organization’s (“you” or “Customer”) use of Datto MCS Services, delivered by the Kaseya NOC Team (“MCS” or the “Services”). These Terms are made a part of, and governed by, the Kaseya Master Agreement accessible here or such other Kaseya master agreement entered into by you and Kaseya (the “Master Agreement”). Kaseya refers to Kaseya US, LLC or the affiliate from which you purchase MCS (“Kaseya,” “us” or “we”). The Master Agreement (along with its referenced documents), these Terms, and all referenced documents therein collectively are referred to as the “Agreement.” Capitalized terms not defined in these Terms have the meaning given to them in the Master Agreement or the MCS Services Guide. By purchasing or using MCS, you agree to be bound by the Agreement.":1,"#MSC is delivered by the Kaseya NOC Team, and designed to provide managed backup and disaster recovery services for the following Datto backup products:":1,"#General Description.":1,"#General":1,"#“Supported Application” means an RMM, backup or other such application that is of a type and version that Kaseya supports and that is set forth in the Services Description.":1,"#“Services Description” means, collectively, the BIA, the Onboarding Summary, the MCS Service Guide, and any other mutually agreed upon, authorized and signed document that describes the Services to be provided to you.":1,"#“Scoping” means the process engaged in by the Customer and Kaseya prior to execution of an MCS Order during which the parties review the scope of the Services as described in the MCS Services Guide, and discuss any potential exceptions to the Guide.":1,"#“Onboarding Summary” means a document that summarizes certain decisions and agreements made mutually by you and Kaseya during Onboarding. The Onboarding Summary may also include exceptions to the standard Services as described in the MCS Services Guide.":1,"#“Onboarding” means the process (typically accomplished in multiple sessions) engaged in by the parties to commence the Services.":1,"#Updated as of November 10, 2025":1,"#Datto Managed Continuity Services Terms of Use":1,"#Integrations Archive | Page 12 of 37 | Datto":1,"#Resources and Blogs related to Backup & Recovery | Page 3 of 17":1,"#Backup & Recovery Archives | Page 3 of 17 | Datto":1,"#Your team will easily provide secure":1,"#support@validize.com":1,"#hello@validize.com":1,"#Learn how MSPs can choose between public, private, or hybrid clouds for optimal BCDR strategies.":1,"#https://support.usehudu.com/hc/nl-us/articles/360049892193-Setting-up-the-Datto RMM-integratie":1,"#Autotask Professional Services Automation (PSA) Archives | Page 11 of 33 | Datto":1,"#How to Meet FIPS Requirements with Confidence | Datto":1,"#The future of RMM: AI-powered automationET":1,"#Datto RMM@thijsoft.nl":1,"#Thijsoft ICT Professionals":1,"#Ransomware-Task Force":1,"#Datto Unified Backup product brief | Datto":1,"#Integrations Archive | Page 24 of 37 | Datto":1,"#Gaining the shift to SaaS security: a user-centric strategy for MSPs":1,"#Backup for Microsoft Enter ID":1,"#Data protection for Microsoft Enter ID":1,"#Coming Soon! Join the beta program.":1,"#Backup of terminals with disaster recovery":1,"#BACKUP, DATA RESTORATION AND PROTECTION":1,"#Get to know the company and the management team":1,"#We reinvent the way MSPs work in network":1,"#Cybercriminals know that most organizations back up their data, so they are now attacking those backup solutions, ensuring that an organization has no way to recover from such an attack. One of those organizations, ransomware band Conti, has launched an attack on one of the world’s leading IT management software companies, Kaseya, and has gotten the company’s software infected with its malware.":1,"#Explore our content and discover the latest industry tips for MSP":1,"#Master the Datto solutions and make sure with the Datto Academy":1,"#Contact data experts":1,"#Discover the intellectual leadership that grows MSP business":1,"#Learn about Datto’s free and unlimited support for our MSP partners.":1,"#Secures, protects and restores SaaS applications.":1,"#Learn how to integrate your tools with the Datto API":1,"#Datto BCDR: Immutable backup and recovery from continuous threats":1,"#Remote management, monitor and assist":1,"#In the MSP technology company - It's not work, it's Datto.":1,"#Watch Datto on the news and catch up with our press releases":1,"#Backup of terminals":1,"#Backup, restore and data protection of endpoints":1,"#22 November 2021":1,"#Simplify quotes and boost revenue growth":1,"#that are in the same local area network as the Datto BCDR device (physical or virtual) cannot access or manipulate backups. Recovery can be done in the secure Datto cloud in case a system or location is compromised or no longer available. The Datto cloud is not connected to customer systems, as it resides in a separate and secure data center. However, once a system has been recovered, it can be accessed through other client systems once it has been connected to the client network.":1,"#Isolated recovery: Systems":1,"#snapshots: Datto BCDR leverages the Zettabyte file system (ZFS) so that all on-premises and cloud backups are in read-only format. This means they are immune to any kind of change, including ransomware infection. All backups are saved in a private and secure cloud, and can optionally use agent-based encryption, allowing the client to control the keys.":1,"#Immutability of backup":1,"#, complete replication for U.S. locations. U.S., UK and Canada, local cloud-replicated backups designed specifically using AES 256 encryption.":1,"#data centers that meet SOC 2 type II and ISO 27001":1,"#cloud: specifically designed backup and recovery cloud, full-time security equipment, internal RBAC controls to protect customer data, Cloud Deletion DefenseTM to “recover” backup files accidentally or maliciously deleted, supported data encrypted at rest, geographically dispersed,":1,"#Immutable":1,"#: SSO integration, mandatory two-factor authentication (2FA), user management access reports, blacklists and IP whites for access to the backup portal, management and monitoring of active sessions and blocking of TOR nodes.":1,"#Upcoming recommended readings":1,"#Cloud, are an example of security integration at all levels of backup. The security features listed below demonstrate Datto’s leadership in backup security.":1,"#, along with":1,"#Datto’s flagship solution,":1,"#(BCDR), were designed with these security requirements in mind. Security encompasses access to the solution itself, which requires multi-factor authentication to eliminate all back-end administrative requirements, by offering the solution as Software as a Service (SaaS). It can be argued that SaaS-based backup solutions are inherently more secure because all software is maintained by the vendor, from operating system patches to new versions of the software.":1,"#Datto Business Continuity and Disaster Recovery":1,"#Modern data protection solutions, such as":1,"#for more information.":1,"#Start session":1,"#offers MSPs the ability to manage from tens to thousands of customers from a single interface, while providing their customers with enterprise-class data protection and disaster recovery.":1,"#Datto Cloud,":1,"#Datto BCDR has been at the forefront of integrating security in data protection for years. The Datto BCDR multitenant architecture, which spans SIRIS and the immutable":1,"#The best in MSP assistance":1,"#protect a network against intrusions, which usually involves isolating it from the Internet. When it comes to backups and recovery, some providers refer to this as keeping data offline or separate from the main data. Since isolation is more related to networks, “isolation” is a more suitable term for data protection. This can also encompass isolated recovery, in which data can be retrieved in a separate location from where the main data was located. This is important, for example, if one or all of the servers have been infected with ransomware and the infection has not been isolated or mitigated.":1,"#Your goal is":1,"#Physical separation defense/isolation:":1,"#Complete systems can be recovered in minutes with instant virtualization in the Datto cloud, designed specifically for the exabyte class. The granularity of the backup offers recovery point targets (RPOs) of as little as 5 minutes.":1,"#Recovery speed:":1,"#to privileged access, which in the case of backups is related to the management of the product. Since the management of backup solutions is so delicate, protocols such as SSO, 2FA and RBAC should be used.":1,"#Access control: related":1,"#More information":1,"#An immutable backup protects the data by making it fixed and unalterable. This type of backup prevents data deletion and allows you to recover it at any time. As a result, immutable backups protect data against accidental or intentional deletion or ransomware attacks.":1,"#Immutable:":1,"#As organizations increasingly rely on backups and recovery to protect themselves from ransomware attacks, the standard security methodologies described below, which are not normally associated with backups, are becoming more important.":1,"#Want to know how Datto can help you with Datto SIRIS?":1,"#with a reinforced Linux-based operating system and role-based access controls (RBACs) throughout the entire development process.":1,"#methodology":1,"#Contact with sales":1,"#(SSDLC)":1,"#Secure Software Development Life Cycle":1,"#safety: Datto has engineering teams based in the US. U.S. that includes security specialists. The solution is based on the":1,"#Designed for":1,"#reliability: SIRIS offers two levels of patented backup verification. Level 1 verification ensures that the system can boot, while Level 2 verification ensures that specific systems can be accessed. Additional reliability is given by integrated and patented ransomware scanning on backups and reverse chain backup with checksum.":1,"#Backup verification to ensure data recovery":1,"#providing services to independent cybercriminals who infiltrate the server or network of an organization.":1,"#BlackMatter ransomware group":1,"#), with operations such as those of the":1},"version":49756}]