A Checklist for Selecting the Right Backup Software and Backup Service Provider

In the business world, your data is crucial. Therefore, it’s vital that you backup all your data and be able to restore it in the case of accidents or disasters. However, bear in mind that it’s also vital that you choose the right backup software for the process mentioned earlier so it’s best to have a helpful checklist.

When choosing the right backup software, you’ll need to consider a few points, which are:

  • Whether the software is capable of handling heterogeneous platform;
  • If the implementation process is complicated;
  • Whether your backed-up data can be successfully restored according to your backup strategy;
  • Whether you’ll get the right help during emergency situations.

Hence, you will need to really put the points mentioned above into consideration when selecting the right backup software. You may also consider outsourcing this task to a backup service provider who can help you anytime, even during an event of a crisis. To assist you in making the best decision, read our checklist for backup software.

Making the Right Choice

Today’s article is all about helping you choose the right backup service provider and backup software which meets your backup needs. Read on to know what the key points are in choosing one:

Understand your backup service provider well
  • Ensure that your backup service provider has a good reputation, with years of proven success in providing backup solution to customers.
  • Ensure that your backup service provider has a wide range of clientele.
    • With over a decade of cloud backup and disaster recovery experience, Aegis has garnered more than 200 over cloud backup & DR customers nationwide.
  • Ensure that your backup service provider complies with recognised industry standards and adherence to industry best practices.
    • Aegis has obtained the Disaster Recovery Certified Expert (DRCE) certification in 2012. Aegis is also ISO 27001 Information Security Management Systems (ISMS) certified since 2019.
Backup Service Provider
Understand the backup service provider’s technology and offerings

Before deciding on any backup software to use for your company; you should:

  • Be aware of the kind of technology that your backup service provider uses.
    • Aegis includes all the technologies used on our official website such as Veeam, Asigra, Carbonite, Commvault, ShadowProtect and will continue to explore other available backup software in the market.
  • Choose backup software that works with your applications, operating systems and fulfilling your Recovery Point Objective (RPO) and Recovery Time Objective (RTO).
    • Aegis has the flexibility and scalability you need. Aegis has the best mix of backup technologies for different RPO and RTO requirements.  By engaging Aegis’ services, you are not required to purchase or invest in multiple backup technologies to cater to different needs.
  • Select backup software that is capable of adapting to a heterogeneous environment. 
    • Aegis can accommodate your business needs by guaranteeing workability of backup software towards any systems, applications and databases.
    • Aegis provides the ability to use any latest technology at any time with no investment impact.
  • Consider backup software that allows integration with endpoint devices such as smartphones, laptops and desktops that includes administration and monitoring tools.
  • Decide on backup software that allows encryption of your backup data.
    • Aegis’ backup software serves data protection for its users. All data will be securely encrypted with AES-256 encryption before backing up to the cloud.
Understand the backup service provider’s implementation, support and managed services
  • Ensure that the backup software is easy to set up and manage.
    • Aegis provides fully managed backup and disaster recovery services. Aegis undertakes tasks such as operations, maintenance and support of backup and disaster recovery operations. With more than 10 years of experience, Aegis guarantees smooth implementation, successful restore rates and proactive monitoring.
  • Many prefer a backup service provider that provides support 24/7
    • Aegis provides unlimited onsite, phone and email support either from 8 to 5 or 24/7
    • Aegis’ disaster recovery call centre is available 24/7

Well, that concludes the checklist for backup software for today. The points, as mentioned earlier, are what you should always keep in mind when choosing a backup service provider and backup software. Remember, it’s not just about backing up and restoring your data, there’s so much more to it!

Interested in finding a cloud backup provider who checks all the above boxes and makes your job easier? Aegis provides quality service and support, incentivised reseller programmes, highly secure data centres and more. Feel free to learn more about Aegis’ extensive offerings.


What can Aegis Cloud Disaster Recovery (CDR) Do for You?

The usage of Cloud in business has now become a vital part of the New Normal. Accelerated by the COVID-19 pandemic, the Cloud is one business tool that has become an essential infrastructure. Being smart about the usage of cloud platforms and services can mean a significant deal, creating a difference between gaining a competitive edge and falling behind. However, businesses that do not possess a business continuity plan will face even greater business continuity risks. This includes business failure, tarnished reputation, and lost productivity which would ultimately lead to financial loss. Therefore, it is undeniably crucial for any business to implement a business continuity plan. Hence, the need for a Cloud Disaster Recovery solution.

What is Cloud Disaster Recovery (CDR)?

Put in simple terms, Cloud Disaster Recovery is akin to having insurance for your servers, against malware attack, data loss and any kinds of disaster. Cloud Disaster Recovery is a service that enables the backup and recovery of a cloud-based platform on remote servers. It stores and backs up selected files and data on a remote, third-party server so that the data can be recovered in cases where the files were to be lost or damaged.

Though most companies may have an off-site disaster recovery plan, a Cloud-based Disaster Recovery plan provides a more economical and efficient provider-managed platform. One of the most prominent Cloud Disaster Recovery Service Provider is Aegis.

Why Aegis Cloud Disaster Recovery (CDR)?

Although there are other cloud disaster recovery services available in the market, Aegis CDR is the most preferred as it combines cloud backup/restore service that caters for on-premise or cloud bundled with complimentary unlimited DR resources.

With Aegis CDR, you never have to worry about having no “Plan B” in the case where your business were to face with disaster. Aegis CDR equips you with Disaster Recovery Virtual Machines located remotely at Aegis CDR’s data centre, which consists of snapshots of your production servers. Therefore, if a disaster were to strike, you can activate DR Virtual Machines in minutes, allowing the business to resume its operations without any loss. As an added protective measure, Aegis CDR even provides dual Disaster Recovery sites to ensure DR infrastructure redundancy—the primary Disaster Recovery Centre (DRC1) being in Cyberjaya, while the secondary Disaster Recovery Centre (DRC2) being in Kuala Lumpur. With that said, that’s not all that makes Aegis CDR outstanding. Mentioned below are 3 key differentiators of Aegis’ CDR:

  1. Aegis 1Price-Any-Technologies (1PAT): A cloud backup service that licenses customers to utilise any backup technologies at a fixed price.
  2. Aegis Disaster Recovery As-A-Service (DRaaS): A disaster recovery service that is equipped with unlimited DR resources ready to be utilised by customers during DR declaration.
  3. Aegis Managed Service: A service that undertakes tasks such as operations, maintenance and support of customers’ backup and DR operations.
Server to Cloud

What can Aegis Cloud Disaster Recovery Do for You?

Now that you have an idea of the key differentiators of Aegis CDR, you may be wondering what exactly it can do for you. Below are the benefits of Aegis CDR’s key differentiators:

1.   Aegis 1PAT (A cloud system that licenses clients to utilise any backup technologies at a fixed priced). The features and benefits of this cloud backup service are as follows: 

  • Aegis 1PAT provides the best mix of technologies that caters to different RTO and RPO requirements, which saves you from the need to purchase multiple different Backup Software. 
  • Aegis 1PAT guarantees the workability of your backup needs, 1PAT, which eliminates the need for you to commit to a Backup Software. 
  • Aegis 1PAT offers you only the latest technology without any limitations on only having a few options of Backup Software as Aegis 1PAT continuously explores for better technology. 

2.   Aegis DR as-a-Service (DRaaS) (A disaster recovery service that is equipped with unlimited DR resources ready to be utilised by clients during DR declaration). The features and benefits of this disaster recovery service are as follows: 

  • Aegis DRaaS is complete with several unlimited services such as DR VM, DR vCPU, DR vRAM, DR Security, DR Drill, DR Bandwidth and DRIB, which would allow you to save cost on DR Software and Hardware. 
  • For Disaster Recovery drills, Aegis’ dedicated DR professionals offer full assistance, allowing you to save time and workforce as the DR drills provided by Aegis are a guaranteed success, which saves you from many hassles. 
  • You would also be able to save cost on the rental of DR seats as up to 30 pax of complimentary DR seats are hosted at Empire Tower, which also comes with the convenience of performing DR Drills in an office space equipped with office facilities.  

3.   Aegis Managed Service (A service that undertakes tasks such as operations, maintenance and support of client’s backup and DR operations). The features and benefits of this service are as follows: 

  • Aegis Managed Service provides a fully managed Backup and Disaster Recovery service by outsourcing the Backup and Disaster Recovery operations tasks, which allows IT personnel to be more productive and efficient. 
  • Having more than ten years of experience in Cloud DR, Aegis Managed Service undertakes the operational backup and DR tasks that are infrequently performed by IT personnel while guaranteeing successful high data restore rates, which would ease your burden. 

Features of Aegis Cloud Disaster Recovery

In addition to that, Aegis Cloud Disaster Recovery also comes with unique features.

  • ISO 27001 Information Security Management System (ISMS) certification: Aegis CDR is the first cloud disaster recovery service provider in Malaysia to be certified. Aegis CDR protects the confidentiality, integrity and availability of backup data.
  • Disaster Recovery Certified Expert (DRCE) certification: Aegis CDR has obtained the highest level of certification in disaster recovery since 2012, with more than a decade of experience in Cloud Disaster Recovery.
  • Dual Disaster Recovery Site: Aegis CDR has two Disaster Recovery sites, where the secondary site is complimentary.
  • Aegis CDR Portal: A portal that consolidates all cloud backup software & storage in a centralised control centre which can be viewed and monitored at anytime, anywhere.
  • Unlimited DR Drills in a year: Unlimited drills are provided with the assistance of the dedicated Aegis DR drill team, and after the completion of the drill, the updated drill documentation will be provided for you too.
  • Proactive Monitoring: As Aegis’ systems monitor your data 24/7, you would not have to worry about the security and state of your data.

Aegis Cloud Disaster Recovery is a solution that simplifies your cloud backup and disaster recovery needs, from Ransomware recovery, complete data protection, minimize server downtime to DR cost saving and business continuity.

With that, we have covered most of what Aegis Cloud Disaster Recovery has got to offer. For more information, do visit the official Aegis website and check out our DR solutions today!


Protecting Remote Office 365 User Data is Critical

Especially now when remote working has become the new norm of working, business transactions and communication are becoming increasingly prominent on online platforms. Out of all available platforms, the one that stands a head above the rest would without a doubt, be Microsoft Office 365, thus the need to protect Office 365 data.

With the emergence of Microsoft Office 365 in the digital market, it has since revolutionised the concept of working and running a business—allowing for more flexibility, no longer needing to set up VPNs and remote connections in order to access your data when you need it. Due to the mobility offered, this platform is viable for remote working, providing access to work from anywhere and also between devices.

Even with how appealing Office 365 seems, it does come with a weakness, which is the safety of your data. The ease of access to your data is akin to a double-edged sword; this convenience often accompanied with the risk of your information being exposed to endpoints and threats.

Contrary to common misconception, the threats are not only limited to external cyber-attacks such as ransomware but are also caused by misguided users updating the wrong section of a shared resource or deleting the data by accident or on purpose. This shows how susceptible your data is to harm. Due to this, protecting remote Office 365 user data is a critical issue to consider. 

Why the Need to Protect Remote Office 365 Data?

With how the concept of Office 365 revolves around the idea increasing access points to your data, you might be wondering shouldn’t Office 365 already have security protocols to protect your data? The answer to this is that it’s not that they do not have any security protocols, but it’s that there are too many types of attacks to counter. If you are someone who often makes use of public WiFi, just the act of connecting to the public internet connection already makes your device vulnerable to cyber-attacks, as it is a notorious breeding ground for attackers.

As for those of you who are working from home and are making use of a home router, you are not entirely safe from a threat either—many routers are not hooked up with a physical firewall and are often configured with less-than-optimal security settings. Aside from that, your home WiFi may even be sending out your network information using the hashtag algorithm that was cracked three years ago, making it easy for any third parties to get a hold of your data. The worst part is, this is merely a few out of the many threats your data can be exposed to, which is why using remote Office 365 may put your data at risk. 

What Microsoft Office 365 Does and Doesn’t Protect Against

To put it simply, Office 365 protects the hardware the data sits on but not the data itself and works around the Shared Responsibility Model, which details that the responsibility is shared between both Office 365, as well as the user. Below is an outlook of what Office 365 is and isn’t responsible for:

  1. Responsibility always retained by user: Information and data, devices, accounts and identities.
  2. Responsibility varies by service type: Identity and directory infrastructure, applications, network controls, operating system.
  3. Responsibility transfers to cloud provider: Physical hosts, physical network, physical datacentre

In short, you are responsible for not only the accounts and devices connecting to the service but the data you are storing on the service. Hence, Microsoft is not responsible for providing an archived copy of your pre-attack data if your data were ever to be damaged by a virus of any sort. Decisive acts regarding when, and how to save your data is your call to make. Even in terms of email retention policies, Office 365 only retains emails for a maximum of 93 days after deletion. This limited retainment period means that you cannot restore any emails that you have accidentally deleted if it has gone past the retention period.

What Remote Office 365 User Data Should You Protect?

The broad answer to what data you should protect would quite simply be everything. Even so, amongst the various services provided by Office 365, there are a few applications that you should place further emphasis on, in terms of user data protection. The applications in question would be those that play a crucial role in enabling remote working, which are the following:

  • Exchange Online: this application offers flexibility in accessing your emails, enabling you to access them from not only Outlook on your computer, but also on your phone or any web browser.
  • SharePoint Online: this application is a documents manager which allows multiple users to connect and collaborate on a document—providing seamless business interactions.
  • OneDrive for Business: an application which allows you to access your files from a web interface, and also map those files as a local drive for quick access and upload.
  • Microsoft Teams: a prominent virtual meeting platform which allows users to communicate instantly, share files, and orchestrate meetings with both internal and external users.

As these services and application play a vital role in the shift of work environment to home and remote environments, backing up the data in these platforms would be a necessary security measure to take to ensure that your data is not under threat.

Protect Office 365 Endpoint Security
How to Protect Remote Office 365 User Data?

With all that’s said, it does not mean that you shouldn’t use Microsoft Office 365 at all. Having so many convenient services and applications in its arsenal, it would be such a waste not to make use of Office 365. Therefore, instead of avoiding the use of Office 365, you should focus on educating users of the potential risks and threats of losing Office 365 data. For starters, ensure that your security patches and devices are up to date, and to use a VPN whenever necessary (especially when using a public WiFi). Last but not least, practise backup of your Office 365 data.

From what we have discussed above regarding the responsibility of Office 365, it is clear that Office 365 is designed to be a cloud-based productivity suite—not a data backup and recovery solution. Therefore, on top of educating Office 365 users, it would be wise to back up your Office 365 data in an external cloud or platform as insurance, so that you can still retrieve your data when it is damaged or corrupted in the Office 365 storage.

Although the Microsoft Services Agreement covering all Office 365 products runs more than a staggering 15,000 words, the issue of backup is only discussed in about three instances—all of which suggest setting up your own data backup solution with a third-party provider. If you have no idea which third-party provider to seek out, you could engage the services of Aegis, a pioneer Cloud Disaster Recovery service provider in Malaysia. Offering various cloud products, we believe that Cloud Office 365 Backup (COB) would be of significant use in ensuring the safety of your Office 365 data. Below is a short overview of what Cloud Office 365 Backup (COB) provides:

  • A backup service specifically catered to backup and restore Microsoft 365 data, which includes Microsoft Exchange, Microsoft SharePoint, and Microsoft OneDrive from Office 365 cloud to Aegis cloud.
  • Peace of mind knowing that you have a backup outside of Microsoft.
  • Convenience of easily finding and restoring as many files as you need, or even restore an entire user’s data or folder to a point in time.

For more information on Aegis’ products, check out our industry-leading cloud solutions.


Ensuring Your Disaster Recovery (DR) Strategy Doesn’t Fail

To protect organisations from unforeseen risks such as human errors, cybercrimes, and natural disasters, many owners have begun to implement solutions such as a disaster recovery strategy. While it is advisable to do so, most backup and disaster recovery vendors and their clients tend to assume that the proposed solutions are effective. As a result, they overlook the importance of running disaster recovery drills. In this article, we will outline the significance of disaster recovery drills, followed by Aegis’ disaster recovery strategies. 

Disaster Recovery (DR) Drills

A Disaster Recovery (DR) drill is a simulation of an organisation’s DR recovery plans and solutions. It involves testing, examining, and evaluating the DR plans to ensure that the organisation can recover data, continue operations, and restore business-critical applications during times of disaster. Some common focus of a DR drill includes application recovery, data recovery, communications, recovery point objective (RPO), and Recovery Time Objective (RTO). 

While it is common to have organisations involving DR plans, many fail to invest time and resources into simulating their policies. This scenario can be caused by the restrictions and expenditures of running DR drills. However, without simulation and evaluation of DR plans, organisations risk having ineffective and unsuccessful recoveries in times of real disaster. This is because there is no evidence that the DR plans can execute as expected when disaster strikes.

Besides ensuring the effectiveness of DR plans, DR drills also aim to guide enterprises in reviewing, updating and testing their DR plans. Should any unforeseen disaster arise, the DR plans should meet the organisation’s RPO/RTO requirements. It is also vital to run DR drills whenever there are new and upgraded products. This is because very few business operations remain stagnant. Any change in business growth or expansion could knock your DR plan out of alignment.  

Aegis Disaster Recovery As-A-Service (DRaaS)

Aegis Disaster Recovery As-A-Service (DRaaS) is the best model for businesses that require disaster recovery services that bundles with unlimited DR drills. With more than 10 years of proven workability track record, Aegis DRaaS proves to be a solution that empowers businesses to roll out the most workable and cost-effective disaster recovery plan. That being said, Aegis DRaaS promises business continuity during an emergency, minimising if not eliminating the outages and downtime caused. 

To protect different organisations’ data and systems across heterogeneous platforms, Aegis launched two products that come with Aegis DRaaS: 

1. Aegis Cloud Disaster Recovery (CDR)

Powered by Aegis 1PAT, this cloud backup/restore solution is made for both cloud and on-premise users. The Cloud infrastructure of this solution provides scalable back and front-end architectures. Besides, one of the fundamental features of this solution is to increase capacity and performance on-demand. Hence, with Aegis CDR, rest assured that you could enjoy maximum admin productivity and manageability while minimising expenditures and complexity.

Key features of Aegis CDR:

  • Dual DR Site:
    • To ensure infrastructure redundancy, Aegis offers two DR sites with the secondary site being complimentary. The primary Disaster Recovery Centre (DRC1) is in Cyberjaya, while the secondary Disaster Recovery Centre (DRC2) is based in Kuala Lumpur.
  • 1Price-Any-Technologies (1PAT)
    • To ease the complexity of selecting the right backup software for your business needs, Aegis CDR provides 1PAT – a cloud backup service that license client to utilise any backup technologies at a fixed recurring price.
  • Complimentary DR-In-A-Box (DRIB)
    • To ensure fast recovery, a DRIB box will be put at client’s production site. DRIB is a consolidated appliance designed to cater for disaster recovery service equipped with built-in 1PAT and limited Aegis DRaaS.
  • 100% Managed Services
    • To ensures smooth manageability of backup and DR, Aegis CDR provides fully managed services include patch management, on-demand backup, restore, and replicate, as well as DR declaration.
  • ISO 27001 ISMS certification
    • Aegis CDR is the first and only Cloud Disaster Recovery service in Malaysia to receive this certification. This assures clients that Aegis CDR’s practises and processes are governed by strict data security and integrity protocols
2. Aegis Cloud Veeam Backup (CVB)

Aegis Cloud Veeam Backup (CVB) fully integrates with Veeam to provide the best cloud backup services that cater to on-premise clients. This solution comes with complimentary and unlimited DR resources. Besides, Aegis CVB promises fast and secure backup services that replicate any on-premise data and store them in Aegis’ Cloud. Veeam on-premise users can also leverage on Aegis cloud’s disaster recovery services and privileges.

Key Features of Aegis CVB:

  • Offsite Backup
    • Existing on premise Veeam clients are eligible to backup to Aegis Cloud to enjoy free and unlimited access to Aegis DR resources.

What’s in Aegis DRaaS?

Now that we have discovered the Aegis solutions that are accompanied by Aegis DRaaS, it’s time to unpack and outline what Aegis DRaaS offers.

1. Complimentary & Unlimited Cloud DR Resources

Aegis DRaaS contains Cloud DR Resources that are completely free. Such resources include:

  • DR Virtual Machine (VM)
  • DR Virtual Central Processing Unit (vCPU) and Virtual RAM (vRAM) 
  • DR Security
  • DR Bandwidth
  • DR Drill
  • DR-In-A-Box (DRIB)
  • Aegis Managed Service

A feature worth mentioning is that clients are entitled to free and unlimited DR drills in a year. This ensures the effectiveness of Aegis solutions. 

2. Complimentary DR Seats

Aegis DRaaS offers up to 30 complimentary DR Seats for clients to perform their DR drills. 

3. Dedicated Aegis DR Drill Team

With Aegis DRaaS service, you will enjoy full assistance from the professional and dedicated Aegis DR drill personnel. The team will aid in ensuring successful DR drills. 

4. Complimentary Unlimited DR Drills

Clients can enjoy complimentary unlimited DR Drills in a year. This allows clients to ensure the effectiveness of their DR strategies.

Specialising in Cloud Disaster Recovery (CDR) services since 2009, Aegis is one of the pioneers in Malaysia’s cloud disaster recovery industry. The secure data backups and effective disaster recoveries make Aegis the best choice for organisations of all sizes and industries. These are all the key highlights about DR drills as well as Aegis DRaaS service offering. Find out more information regarding Aegis’ Cloud services and solutions.  


How Aegis Cloud Disaster Recovery’s 4-3-2 Backup Rule Helps You Fight Ransomware

The advancement of technology has benefited our lives with innumerable convenience. However, this also opens the doors for cybercriminals to commit crimes via multiple malware, including ransomware. Backing up data is a key part of Ransomware protection and defending against other malware. Having known the threats of cybercrimes, Aegis seeks to protect the data and files of our clients by using cost-effective delivery systems. In this article, we will be exploring how Aegis Cloud Disaster Recovery (CDR) and its 4-3-2 Backup Rule helps you in fighting Ransomware. 

What is Ransomware?

Ransomware is one of the malwares that encrypts and attacks a victim’s files. As suggested by the name of this malware, victims are directed to make payments and obtain the decryption key. In other words, ransomware prevents victims from accessing and restoring their files until they make their payments. The amount of ransoms varies greatly. 

There are several ways in which Ransomware uses to access the victims’ computers. The most common delivery system being the phishing spam, which are the email attachments in victims’ mailboxes. These emails usually masquerade as trustable sources so that victims are more likely to download and open the files. Upon downloading or opening the files, victims will have Ransomware taking over their computers. Hence, protection against Ransomware is necessary for the security of your data.

Common Targets of Ransomware Attacks

Anyone who has essential and attractive data can be the target of a ransomware attack. Recently, educational institutions such as private schools, colleges, and universities are one of the top ransomware targets. This is because educational institutions often carry a vast amount of essential data, such as research, financial data, medical records, and intellectual properties.

Furthermore, governmental agencies are also an easy target for ransomware attacks. These agencies often carry crucial and time-sensitive data, which makes them more likely to recover their data as soon as possible by paying the ransom. That said, healthcare departments are vulnerable to ransomware attacks due to a similar reason. They are more likely to pay ransom due to the urgency of recovering their patients’ data, especially those who are in critical stages of life.

Lastly, firms that carry a massive amount of data are also the targets of ransomware attacks. Some examples include retail, finance, HR, energy, and utility departments. It is of utmost importance to have reliable and effective ransomware protection strategies. To do so, you will require reliable services from cloud disaster recovery professionals, such as Aegis. Before understanding how Aegis protects your data, it is helpful to understand the common backup practices in today’s market.

The Backup Rule

The usual backup practice in the market is following the 3-2-1 Backup Rule. The 3-2-1 Rule is an effective defence system against Ransomware. It can be broken down into three different parts, as shown below:

  • (3) Copies of Data

This backup method has three copies of your data or files stored in multiple underlying storages. Having at least two backups for your primary data prevents you from losing all your data at once during incidents such as fire, theft, and vandalism.

  •  (2) Different Storage Media

This step ensures that your data is stored in two different media types. Some common examples include storing copies in the cloud, tape, or hard drive.

  • (1) Off-Site Copy:

This rule means that at least one copy of your data should be stored remotely. Ransomware attacks destroy the data stored in the same location quickly. Thus, this rule suggests having one copy of your data stored in a different location, city, state, or country. It usually involves storing your data in an off-site cloud storage.  

Different from the basic backup rule, Aegis Cloud Disaster Recovery (CDR) levels up the data protection game by provisioning the 4-3-2 Backup Rule instead!

  • (4) Copies of Data:
    • a. Client’s primary server
    • b. Aegis DR Appliance at Client’s production site
    • c. Aegis Disaster Recovery Centre @ Cyberjaya
    • d. Aegis Disaster Recovery Centre @ Kuala Lumpur
  • (3) Different Storage Media:
    • a. Aegis DR Appliance at Client’s production site
    • b. Cloud Storage @ Aegis Disaster Recovery Centre @ Cyberjaya
    • c. Cloud Storage @ Aegis Disaster Recovery Centre @ Kuala Lumpur
  • (2) Off-Site Locations:
    • a. Aegis Disaster Recovery Centre @ Cyberjaya
    • b. Aegis Disaster Recovery Centre @ Kuala Lumpur
Cloud Backup and Recovery

Aegis, More Than Just Recovery

Aegis provides multiple cloud backup and disaster recovery services that suit the needs of different clients. By incorporating the 4-3-2 Backup Rule, these services are effective in protecting your files and data against many cybercrimes, including protection from Ransomware attacks.

1. Aegis Cloud Disaster Recovery (CDR)

Aegis CDR provides cloud backup and disaster recovery services that are powered by Aegis 1PAT. The Cloud infrastructure of this service enables scalable back and front-end architectures. It is applicable for both on-premise and cloud users, offering complimentary and unlimited DR resources to all clients.

2. Aegis Cloud Veeam Backup (CVB)

Aegis CVB offers cloud backup services that entirely integrate with Veeam. Clients can enjoy complimentary and unlimited DR resources while having their on-premise data replicated to Aegis cloud. Besides, Veeam’s on-premise clients can also leverage on Aegis CVB services and privileges.

3. Aegis Cloud Office 365 Backup (COB)

This package is a comprehensive business solution that offers backup and restore services for all data of Microsoft 365. This service caters to Microsoft SharePoint, Microsoft OneDrive, and Microsoft Exchange. Aegis COB aims to protect and recover data from threats that are beyond Microsoft’s retention and backup policies. Some examples of threats include Ransomware, overwriting, and accidental deletions. The files and data of Microsoft 365 will be securely replicated to Aegis cloud.  

4. Aegis Cloud Endpoint Backup (CEB)

This automated and comprehensive backup solution focuses on the clients’ endpoint devices and the data stored in those devices. Aegis CEB aims to protect and reduce the risk of data loss from endpoint devices.

Since 2009, Aegis has been specialising in Cloud Disaster Recovery (CDR) Services. With over a decade of CDR experience, Aegis is the pioneer in cloud disaster recovery services in Malaysia. This sums up the Aegis 4-3-2 Backup Rule and Aegis’ services that help to combat Ransomware. Protecting your data from Ransomware is as easy as 4-3-2!

For more information regarding our services and solutions, visit Aegis’ official website.  

Evolutionary Journey


Aegis expended globally, with its first success story in Myanmar.

Aegis obtained Disaster Recovery International Certification (DRI).

Protecting over 3000 systems with 36 Aegis headcounts.

Aegis Cloud Universal Backup (CUB) was launched.

Evolutionary Journey


Aegis Cloud Office 365 Backup (COB) was launched.

Aegis simplified charging method from 16 subscription items to only 1 item.

Obtained ISO 27001 ISMS certification.

Evolutionary Journey


Aegis Cloud Production Environment (CPE) was launched.

Recognised as Veeam’s 1st Platinum Cloud Service Provider in Malaysia.

Provided free unlimited DR resources under Aegis CDR.

Evolutionary Journey


Aegis 1Price-Any-Technologies (1PAT) was launched.

Aegis Cloud Veeam Backup (CVB) was launched.

Evolutionary Journey


Aegis Cloud Endpoint Backup (CEB) was launched.

Aegis provided complimentary unlimited DR appliance at client’s site as Local DR solution.

Need help?