Onsite backup increases storage, infrastructure, and maintenance costs.
For on-premise backups, you are responsible for installation, upgrades, maintenance and support of the backup servers.
The 3-2-1 rule of backup recommends that backups are not co-located.
CloudAlly Difference:
CloudAlly backs up on industry-leading AWS servers. Unlimited storage, maintenance and support are included.
If you have a specific requirement for an on-premises option, CloudAlly supports BYOS with an option to backup to your own AWS compatible storage
Backup Frequency
Barracuda Datto
Impact
Some competitors may backup thrice a day, but check the fine print – only one of the three backups is stored after 30 days, and then it’s down to one weekly backup after 90 days. Considering that the average time to detect a breach is 280 days, you would actually get a far better RPO and RTO with CloudAlly.
Also, we do provide up to 3xday backups at an additional charge.
Azure Backup
Most Competitors
Impact
As a backup service we want to maintain separation of the backup from the source system (Azure in the case of Microsoft (Office) 365). Hence AWS has always been the logical choice from a best practices standpoint.
Not heard of CloudAlly
Most Competitors
Impact
CloudAlly pioneered SaaS backup more than a decade ago in 2011. Consequently, our solutions are proven, robust, mature, and top-rated. We have been consistently top-rated by GetApp, G2, and Capterra, and were ranked as a leading backup solution by Newsweek by over 10,000 IT pros.
Provide SOC-1, SOC-2
Most Competitors
Impact
The SOC2 audit work has been halted as at present the ISO-27001 certification appears to be sufficient.
CloudAlly’s cloud-to-cloud backup service runs on AWS’s infrastructure and the AWS data center and infrastructure we use have SOC-1, SOC-2, ISO-27001 and ISO-27017 certifications.
Provide local offices in my region (UK, USA etc.)
Most Competitors
Impact
We provide highly responsive, 365x24X7, Tier-1, real-person support by phone, chat, email.
If required, we can provide our partners’ contact details working in your region.
Provide FINRA
Most Competitors
Impact
We can’t be FINRA certified since we are not a financial services firm.
Self-service user restoration
Most Competitors
Impact
We provide ability to add new users and give them custom or admin access to services and operations
Provide daily full copies of the backup (In case of a ransomware attack or disaster point wherein you need to restore the data at given date and time.)
Most Competitors
Impact
We don’t currently backup all the versions as versions are complete copies of the file, not just delta changes, so multiple versions can substantially increase storage size and, therefore, user cost and provides little value from a practical standpoint. As a result, there is only one file version available per day in your backed up data. We provide daily backups / snapshots of the current documents, and provide the ability to recover the data from any point-in-time back right to the first CloudAlly backup.
Provide BYOK (Bring Your Own Key)
Most Competitors
Impact
ANY SaaS backup provider needs to have access to prod environment in order to provide better support and system maintenance. Therefore the BYOK requirement can be achieved only by using On Premises software solution.
All CloudAlly backups are encrypted with AES-256 bit encryption at rest and SSL (HTTPS) in transit. Encryption keys are managed using AWS Key Management Service (KMS). Therefore even if the keys are leaked it is almost impossible to decrypt it in a reasonable amount of time.
Keys that Cloudally uses are never exposed to the internet, as opposed to the process of sending keys over the internet.
In the case of breach to the system it does NOT make it more secure if the key is generated by the SaaS provider or sent to the provider by the customer. The attacker can use both and erase traces – with the customer’s BYOK offering no resistance.
Internal CloudAlly staff do not have access to customer’s backup data. Only a limited number of core team members have access to production keys based on a “need to know” policy for problem resolution and all access is logged in the audit log. These accounts are protected by a variety of controls such as certificate, private VPN, 2FA and other methods.