File Security and Backup Protection for Small Business

Created By:

Unlimited

Basic

Server

FILE AND FOLDER BACKUP
AUDIT LOG
REMOTE WIPE
COLABORATION
FILE ENCRYPTION
SHARE DOCUMENT
PERMITION ACCESS LEVELS
99.999% BACKED UP UPTIME
ENTERPICE DATA CENTER
UNLIMITED STORAGE

FILE AND FOLDER BACKUP
AUDIT LOG
REMOTE WIPE
COLABORATION
FILE ENCRYPTION
SHARE DOCUMENT
PERMITION ACCESS LEVELS
99.999% BACKED UP UPTIME
ENTERPICE DATA CENTER
10 MB STORAGE
  

FILE AND FOLDER BACKUP
AUDIT LOG
REMOTE WIPE
COLABORATION
FILE ENCRYPTION
SHARE DOCUMENT
PERMITION ACCESS LEVELS
99.999% BACKED UP UPTIME
ENTERPICE DATA CENTER
UNLIMITED STORAGE  

Contact Us
Contact Us
Contact Us
One Click Support
File Security and Backup Protection 
Enterprise-class file sync and share service for Small Business across multiple platform. Protect customers proactively and reactively by combining security and backup solutions.

Much like how small business owners buy both insurance and a security system to safeguard their physical buildings, they need both types of protection for their business-critical data as well.

Our comprehensive coverage of data protection and email security use cases lets you satisfy the IT enablement needs of your diverse business customers while streamlining procurement, standardizing support, and managing operations more efficiently.
  
File Security and Backup Protection  Features
  1. Quick and Easy Restoration
    Quick and Easy Restoration
    Easy search and retrieval of backup data from the Barracuda cloud Point-in-time recovery of mailbox, folder, file, and email data Flexible restoration to original or different user accounts
  2. Secure and Compliant Cloud Backup
    Secure and Compliant Cloud Backup
    128-bit SSL encryption for data in transit 256-bit AES encryption for data at rest SSAE 16 Type II certification Redundant storage within and across distributed data centers
  3. User Control
    User Control
    Whenever files or folders are added, updated, shared, or deleted, the event is logged and available for tracking and auditing purposes, providing a greater level of administrative control
  4. ENCRYPTION
    ENCRYPTION
    Data is encrypted both when it’s at rest as well as when it’s in transit. At-rest data is encrypted with 256-bit AES encryption, while in-transit data is encrypted using 256-bit SSL/HTTPS encryption.
  5. PASSWORD PROTECTION
    PASSWORD PROTECTION
    Each time a user activates a new device or accesses from the web, they must login using their username and password.
  6. REMOTE WIPE
    REMOTE WIPE
    In case of a lost or stolen laptop, tablet, or mobile phone, or when facing a personnel issue, corporate data can generally be quickly removed, helping to minimize potential data leakage.
  7. AUDIT LOG
    AUDIT LOG
    Whenever files or folders are added, updated, shared, or deleted, the event is logged and available for tracking and auditing purposes, providing a greater level of administrative control
  8. ADMIN FILE MANAGEMENT
    ADMIN FILE MANAGEMENT
    Admin File Management increases the ability for administrators to monitor and manage end user content. Using Admin File Management, account owners can: - Adjust sharing permissions - Add, delete and restore files •- Search across the folder and file structure.
  9. SHARING PERMISSIONS
    SHARING PERMISSIONS
    Permissions can be set differently for each collaborator. And sub-folders can be shared with different collaborators. Permission levels can be changed or revoked at any time.

Have a question about our service or need help? Contact Us

WE'D LOVE TO HEAR FROM YOU

Call Us:
1-888-665-2207
407-545-2207 Local

info@officeinabox.biz