Security is a fast evolving topic. Atempo's Data Protection solution enables you to adopt the best practices in Data Protection and security.
Respecting industry best practices and company user defined security rules
There are several industry backup strategy or good practices like the 3-2-1. A 3-2-1 backup strategy states that you should have 3 copies of your data on two different media (disk and tape for example) with one copy off-site for disaster recovery. We see in the backup strategy the importance of the application of Air-Gapped Protection.
Include your backup solution in your DR strategy
Atempo Data Protection should be part of your disaster recovery and incident response plans. Data backups can be compromised or destroyed in situations such as a ransomware outbreak, employee break-in or something environmental including a flood or hurricane. Otherwise, good backups can be adversely affected. You must have a plan outlining what you are going to do if that time comes. Configure your Atempo Data Protection secondary server to prevent risks of disaster recovery enabling the continuity of your backup service.
Backup solution should care about being able to define precise Role Based Access Control (RBAC) for user access the solution to respect the Principle Of Least Privilege (POLP). This principle states that a user should have a minimum set of privileges required to perform a specific task. Atempo Data Protection Solution provide multi-factor authentication (MFA) to increase control on accessing the data by the user.
Respecting Vendor Standards
Atempo technology ensures data respects vendor standards guaranteeing protection and recovery. We respect Microsoft recommendations by using the latest recommended APIs to back up and restore data from the Microsoft 365 Tenant. Atempo Data Protection only uses Microsoft Graph APIs and not Exchange Web Services APIs (EWS). Microsoft strongly urges partners to use Microsoft Graph APIs when accessing Exchange Online data. It is frequent to find solutions on the market still using EWS APIs for backup and recovery.
Atempo Data Protection Zero trust adoption has accelerated its response to the rapid rise of mobile and remote workers. While these trends benefited users and brought new levels of flexibility to IT, they also reduced the ability of the organization to control and secure access to data and network resources. Zero trust brings this control back, tightening up security in the face of permeable network perimeters. The flexibility of the solution enables a continuous security improvement process and comes with constant innovation to protect and monitor your data.