Telephone: (844) 344 6919

Cloud Backup

The cloud backup advantage

Seamlessly manage backup, sync, and mobile access for multi-user and server environments from a single web-based console.

Your data is safe with military grade encryption, world-class data centers, and EMC—a company built to last.

Keep costs low with no hardware to purchase and minimal overhead required.

Cloud Backup

10 Reasons You Need Cloud Backup

  1. You do not have a consistent strategy for backing up your company’s computers and servers.
    • Not backing up your computer and server systems opens the door to liabilities and huge losses of time, information, revenue, and reputation.
  2. You want a reliable offsite backup solution that works.
    • Our online backup service combines market leadership in storage solutions with an award-winning service so you enjoy worry-free backup.
  3. You don’t have weeks or months to roll out a backup solution.
    • We can deploy our service to hundreds of users in a fraction of the time it takes to build traditional backup solutions, saving you time and resources.
  4. You aren’t willing to compromise security for convenience.
    • Our service uses the highest security standards and offers customers the option of added privacy and security by choosing a personal encryption key. All files are transferred using an SSL encryption.
  5. You want a set-and-forget backup solution that you don’t have to constantly monitor.
    • We can schedule your backups to run daily, weekly, or monthly, or as frequently as every two hours for automatic backup.
  6. Your staff is already overextended.
    • Stop wasting time and money with hardware, stacks of CDs, and traditional tape backup systems. Our service frees up your in-house resources for productive use in core revenue-generating activities.
  7. You don’t want to pay for software you aren’t using.
    • Our online backup service is flexible. We’ll help you determine the best solution for your business and eliminate excessive costs.
  8. You want a complete data protection solution without the hassle.
    • Today’s data protection needs to include not only backup, but also the ability to securely access your files from anywhere. That’s why our solution includes backup, sync, and mobile access.
  9. You’re tired of the headaches associated with backing up remote and branch offices.
    • We manage multi-user environments easily and efficiently so you don’t have to.
  10. You have a limited budget to spend on backup and prefer a simple payment plan.
    • Our backup solutions are affordable, with no hardware to purchase and little management required by you.

HIPAA Security and Cloud Backup

We can help you comply with the HIPAA Security and Privacy Rules

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. Any company that stores protected health information must ensure that all of the required physical, network, and process security measures are in place and followed. As a provider of HIPAA-compliant backup services that safeguard protected health information, we ensure that your data is protected in a way that complies with HIPAA regulations.

We incorporate a combination of technical, administrative, and physical controls to safeguard personal information consistent with the industry standards and laws that are applicable to our customers.

We ensure that the requirements in the HIPAA Security Rule—including those for encryption, password restrictions, and data storage—are in place.


Encryption key: We require you set up a corporate encryption key (c-key) or personal encryption key, which is known only by you.
Encryption of data during backup: During the backup process, all files are first secured with a personal 256-bit AES key encryption key and then transferred to our data center via a secure SSL connection.
Encryption of data at rest: HIPAA requires that personal health information must be encrypted while at rest. Your backed up data remains encrypted while stored at rest in our data center.

Offsite backup

Physical security: Our data centers are protected by gated perimeter access, 24x7x365 onsite staffed security and technicians, electronic card key access, and strategically placed security cameras inside and outside the building.
Remote/offsite backup: Our service provides an automated remote or offsite backup and is a key component in any disaster recovery plan as protection against hardware failure, theft, virus attack, deletion, and natural disaster.
U.S. data centers only: As required by HIPAA, we send and store all data from a HIPAA-compliant account to our U.S. data centers only.

Other items

Logical access: Backed up data may be accessed via the password-protected, web-based administrative console by
supplying a valid encryption key.
Written contingency plan: The HIPAA Security Rule requires that covered entities have a written contingency
plan for responding to system emergencies, including a detailed plan concerning the data backup and recovery
process in the event of a disaster.

Note: There is no standard HIPAA certificate of compliance for backup software and services. For more information
about HIPAA and HIPAA compliance, contact your legal counsel or refer to the HIPAA section of the U.S. Department
of Health and Human Services’ website.

Cloud Backup Datasheet

Worry-free cloud backup made easy
As a business professional, you know the importance of keeping your company data, financial records, and administrative materials safe. You don’t have time for backup solutions that take months to set up, require thousands of dollars in hardware
costs, and force you to hire someone to oversee it all. And when it comes to being more productive, you’re looking for every advantage you can get in a competitive marketplace.

Our cloud data protection for desktops and servers saves your business time and money while boosting workplace productivity with a simple, secure, and affordable backup solutions for your computers and servers. We can get you up and running in virtually no time so you can focus on growing your business. And backups can be configured to run at specific times of day, including after business hours, to eliminate resource strain and costly manual oversight.

Available wherever you are
Our service includes file synchronization and mobile access through our mobile app. How many times have you emailed a file to yourself, copied work to a USB drive to take home, or hauled away your laptop to work on files away from the office? Our file
synchronization makes working from anywhere easy. Just save your most active files to the folder that’s synced and they’re automatically copied and updated across all of your devices and the cloud, so you can get the job done anywhere. And files stored using file synchronization or that are backed up to the cloud are available via our mobile app for your iOS or Android devices. Your files are always protected and always available to you.

Back up locally and online
A sound backup strategy involves both a local and an offsite copy of your data. Windows users can take advantage of local backup in addition to online backup for faster backup and restore capabilities.

Our service backs up server specific applications, including:
• Network shares
• All versions of SQL and Exchange
• SharePoint
• Active Directory
• Com+ services
• SYSVOL directory share
• Windows Registry database

Cloud backup feature set
• Data seeding: Move 200 GB or more to the cloud quickly with data seeding.
• File scanning: Back up millions of files effortlessly with advanced file scanning.
• Incremental backups: After the initial backup, our service only backs up new or changed portions of files, saving bandwidth and ensuring future backups are lightning fast.

• Automatic or scheduled backups: We’ll set the service to back up automatically or to a schedule you choose.
• Custom configurations: We’ll help you set policies on bandwidth usage and backup speeds, create custom backup sets or define what file types should be backed up.
• Reliable data restores: Browse and search your backed up files, then restore file versions up to 30 days in the past. Files may be restored on the web, via the software client, or by ordering a DVD restore.
• Local backup: Windows users can back up locally to an external device as well as online for double protection.

• Encryption: All user data is encrypted locally with military grade encryption prior to transfer. Choose a managed encryption key or a personal key for added security.
• World-class data centers: Data is stored in state-of-the-art data centers, which employ the highest security standards.
• Audits and certifications: Our service has successfully completed an SSAE 16 audit and is ISO 27001 certified.
• Automatic data protection: Our service automatically detects and backs up new and changed files.

• Mobile access: Use our free mobile app for iOS and Android to access backup data
• SQL, Exchange, SharePoint, and network drive support: Our service backs up all open and locked files as well as common business applications running on Windows servers.
• Windows, Mac, and Linux support: Our service supports Windows 7, 2008, Vista, XP and 2003, 2012 (desktop/server); Mac OS X 10.8, 10.7, 10.6, 10.5 and 10.4 (desktop/server); and Linux distributions CentOS, Debian, Red Hat, and Ubuntu.
• Open and locked file support: Our service backs up all open and locked files (including Outlook PST files), even if the file is changing, the backup is paused, or the machine is rebooted, ensuring faster initial backup times and bandwidth efficiency.

Cloud Backup Security Overview

Powered by Mozy

Our cloud backup service is powered by Mozy. This section details Mozy’s security overview.

Serious about security

At Mozy, the security of your data is our highest priority. We use strict security policies, military-grade encryption, and world-class data centers to protect your personal information from unauthorized access, disclosure, alteration, and destruction.

Privacy commitment

• Your information is your information, not our information.
• We never sell your information to anyone, nor do we sell information about you.
• We never share your information with anyone unless you explicitly tell us to.
• We never sift through your information in order to create a profile of you or target advertising.
• You can always get your information back. We have no rights to your information if you leave the service.

For more information on data privacy, see the Mozy Privacy Commitment and Privacy Policy.

Data transfer security

All user data is encrypted locally with military-grade encryption prior to transfer via an SSL connection. Users can choose a managed encryption key or a personal key for added security.

The encrypted data is uploaded to the Mozy backup service over a mutually authenticated SSL connection to further preserve confidentiality. All users are authenticated using username and password credentials.

Data center security

Mozy servers are located in world-class data centers across the globe. Mozy is SOC 1 SSAE 16 Type 2 audited and ISO 27001 certified and, where applicable, adheres to European Union Safe Harbor Privacy Principles.

Onsite monitoring and security
All data centers are surrounded by a secure perimeter and staffed 24/7/365 with technology professionals who maintain the highest standards in data protection. Both card and biometric security authentication are required to enter the facilities and access the Mozy server area.

Fire detection and suppression system
EMC-managed data centers utilize a gas fire suppression system to extinguish fires in the event of an emergency without jeopardizing server functionality.

Redundant power and networks
Power is conditioned and protected by redundant systems and guaranteed by generators supplied by diesel fuel storage. In addition, multiple network providers service each data center to ensure operation in the event a network carrier fails.

Temperature control
All sites have cooling mechanisms in place to ensure the servers are kept at optimal operating temperatures.

Maintaining Regulatory Compliance with Cloud Backup

Let us help you maintain compliance

At Mozy we focus on making our products simple, automatic, and secure.

We respect the privacy rights of our customers and are committed to protecting our customers’ personal information. Within our Information Security Management System (ISMS) we incorporate a combination of technical, administrative, and physical controls to safeguard personal information consistent with the industry standards and laws that are applicable to our customers and our company. We view compliance as critical and also take steps to protect against anticipated threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information.

We recognize that information security requires an appreciation and understanding of how people, processes, technology, and organizational structure all interact to create a complex mix of elements and issues. We protect the interests of our customers and business by operating a holistic program focused on the confidentiality, availability, and integrity of company and customer systems and data.

Our customers and prospects often ask if we meet industry-leading standards. Mozy meets or complies with or is audited under the following standards or regulation:

• Payment Card Industry Data Security Standard (PCI DSS)*
• International Organization for Standardization/International Electrotechnical Commission (ISO/IEC 27001)
• Statements on Standards for Attestation Engagements (SSAE 16)

* As required by the PCI Security Standards Council, Mozy meets all PCI DSS requirements for payment processing. In addition, by using Mozy encryption keys, customers further safeguard their data, including stored payment card information

United States:
• Sarbanes-Oxley Act (SOX)
• Health Insurance Portability and Accountability Act (HIPAA)
• Gramm-Leach-Bliley Act (GLBA)
• Any state-mandated privacy laws; for example, Massachusetts 201 CMR 17

• Directive 95/46/EC
• Directive 2002/58 on Privacy and Electronic Communications
• Safe Harbor Listed (

Our customers often want to know if they can remain compliant while using our backup solutions. The principles behind each of these standards are for the data owner to retain control of sensitive data and ensure that only authorized parties can view that data. When you back up information to Mozy, you remain in control of the data through the authentication schemes and encryption the system uses. Each file stored within the Mozy infrastructure is encrypted prior to transmission to our infrastructure, meaning that private and sensitive information remains private while we store it for you. We do not compromise the internal security controls our customers maintain to meet compliance with various regulations.

As we state in the Mozy Privacy Commitment at, our job is to help you protect your personal information. In order to do that, we operate our business on the following principles:

• Your information is your information, not our information.
• We never sell your information to anyone, nor do we sell information about you.
• We never share your information with anyone unless you explicitly tell us to.
• We never sift through your information in order to create a profile of you or target advertising.
• You can always get your information back. We have no rights to your information if you leave the service.

We use strict security policies, industry-leading encryption, and world-class data centers to protect your information,

  • Encryption: Your information is always encrypted during the backup process and while stored in our data centers.
    • SSL: The same technology used by banks secures your data during the backup process.
    • AES/Blowfish: Choose Mozy’s encryption key using 448- bit Blowfish or manage your own key using 256-bit AES
      to secure your data during storage.
  • World-class data centers: All data centers employ state-of-the-art physical and technical security and are either ISO certified or issued a SOC audit report based on the SSAE 16 standard/Trust Criteria.
  • Backed by EMC: EMC stores and protects more information for the Fortune 500 than any other company. For a detailed look at our privacy practices, review our full Privacy Policy at