At HYCU, our primary focus is on developing and offering purpose-built backup solutions for strategic partners. We aim to ensure that deploying, managing, and supporting backups and recovery on-premises and in the cloud can be achieved without a ton of engineering and administrative support. Our primary goal is to make doing a very critical task or protecting essential VM and application data less complex and more automatic.
Meanwhile, there is a lot more that goes on behind the scenes at HYCU with respect to securing our solution for general availability, determining the right storage fits for customer scenarios/budgets/requirements, and making sure that we can effectively demo the product, onboard new customers, and support them appropriately, before/after they have decided to move forward with us.
To that end, security topics come up regularly (particularly ransomware, hardening supporting platforms and applications, and providing encryption capabilities). Also, we have to be mindful of an array of existing partner storage, replication, and archival options that make good sense for safeguarding customer data before, during, and after their backups are processed. Not only do we make sure that we are offering and delivering a secure backup platform and virtual appliance with a rather small footprint, we actively work to establish and maintain key partnerships with compute, NAS, and Object Storage vendors who offer great capabilities for storing backup data and aide in eliminating the chance for data corruption and exfiltration. The collective goal we and our partners share is keeping data intact and the hard-earned profits in the pockets of our clientele.
Going forward, in this series we will walk you through some of the best practices you need to follow to lock down your data and infrastructure and prevent the potential for unexpected security breaches. To give you insight on a few upcoming topics and best practices on what you need to consider for your data protection and management environments;
- Protecting Backup Targets and Data
- Protecting Sources
- Process Enhancements
- Network Considerations
We look forward to sharing our thoughts and best practices. As always we are looking for your feedback and suggestions to make all of us more secure. Stay tuned!