One question we’re frequently asked is, “Do I really need Advanced Cloud Backup?” It’s often followed with another question, “Doesn’t Microsoft, Google, and Salesforce have backups?”
The answer to both questions is a resounding YES. Here’s the scoop:
“The cloud” is not a perfect solution to all of your computing needs- it’s simply another tool in your arsenal, because at the end of the day, the cloud is nothing more than someone else’s computer. This is true for all cloud providers, including Microsoft, Google, Salesforce.
Because it’s so popular, let’s take Microsoft as an example. Like other providers, Microsoft operates under a Shared Responsibility Model. Essentially, that means Microsoft is only responsible for the availability of the service itself and not the recoverability of the data contained within the platform. As clearly identified on that page, your information and data are your responsibility.
Now with that said, Microsoft and several other providers have an excellent reputation and stellar reliability. However, even the best service availability cannot give you the quickest recovery from problems with:
- Accidents: Deletion, unintentional saves, mistaken merges, formula deletion, etc.
- Malicious activity: Disgruntled employee, angry ex-employee, virus, ransomware, etc.
- Synchronization problems: Corruption and removal of data because of 3rd-party apps, mobile devices, plug-ins, etc.
- Changes that occurred over 30 days ago: Backups are held for a maximum of one month
Granular, point-in-time restores are not built into Microsoft 365. Advanced Cloud Backup adds this critical feature and permits recovery of data stored in Exchange (Mail, Calendar, Contacts, Tasks, Public Folders, Exchange Online Archive), SharePoint, OneDrive, Groups and Teams. Other key features include:
- Point-in-time recovery from any hierarchical level with unlimited storage and unlimited retention
- Fully indexed metadata, contents and attachment names for powerful search and the fastest restores
- Granular control of destructive or non-destructive restores
- Daily reporting, notifications and audit logs
- Permission-based admin management
- Periodic “backup of the backups” from a secondary to a tertiary cloud storage network, all of which are geographically diversified and insulated from ransomware infection