Executive Summary Reports - Additional Information

Additional Information includes concise description and relevant supporting data for the various KPIs being leveraged in the Executive Summary Report.

Cyber resilience and storage

  • Off-site cloud storage: All backup data is securely stored off the local network within a private, globally distributed network of data centers.

  • End-to-end encryption: A secure communication method where the data is encrypted at its source device and stays encrypted during transfer, storage, and backup. It is only decrypted at its final destination by an authorized party with the appropriate encryption keys.

  • Immutable backups: The read-only copies of backup data that are fully isolated and cannot be altered or deleted thereby providing recoverability from ransomware and malicious deletion.

  • Role-based access control: The security mechanism that assigns permissions based on predefined user roles thereby allowing limited access to backups as needed.

  • Secure ISO certified data center: All backup data is stored in a global network of certified data centers that meets international standards for security, reliability, and quality management, ensuring best practices in data handling and infrastructure operations.

  • Separate backup credentials: A dedicated set of login details (username and password) different from the main system or user account credentials specifically for accessing or managing backup data to limit unauthorized access.

  • SOC2 compliant: The stringent security standards and controls across devices to secure backup data, including availability and confidentiality.

  • Long-term retention: The robust long-term retention policies to ensure your data is securely stored and easily retrievable when required.

  • Two- factor authentication (2FA): A security process that requires users to provide two different forms of identification before accessing an application, thereby adding an extra layer of verification to protect against unauthorized access.

  • Data isolation & segmentation: All backup data are stored in isolation ensuring protection from local attacks and ransomware. Furthermore, the backup data is divided into smaller segments or blocks for more efficient backup and recovery.

  • Private & generated keys: Refers to the Encryption Key/Security Codes that are set by a user, however, cannot be changed or retrieved afterwards. This key offers full control but data is unrecoverable if lost.

Servers and workstations

Backup

  • Backup Success Rate formula: (No. of completed backups/ Total number of backups attempted) * 100

  • Data backed up:

    • The total data being backed up indicating the volume of data being protected.

    • Formula: Sum of data size of all backup jobs for the period.

  • Average backup time:

    • The average time to complete a backup operation to assess backup efficiency.

    • Formula: Total backup duration / Total backups completed.

  • Devices: The overall count of devices.

  • Used Storage: The total used storage from data backed up.

Restore

  • Restore Success Rateformula: (No. of successful restores / Total number of restores attempted) * 100
  • Data restored

    • The total data being restored.

    • Formula: Sum of all restore jobs attempted for the period.

  • Average restore time

    • The average time to complete a restore operation to evaluate recovery performance.

    • Formula: Total restore duration / Total restores completed.

  • Restores: The overall count of restores.

  • Recovery tested devices: Display devices with Recovery Testing vs Total device count, For example: 4/10.

M365

  • Saas backup success rate formula: (No. of completed backups/ Total number of backups attempted) * 100

  • Used storage: Refers to the amount of storage space that has been consumed by your data across various M365 services.

  • M365 Billable users: Refers to the users for whom your organization is billed based on the M365 services licenses assigned to them.

  • Tenants: Refers to the dedicated instance of M365 services for your organization.

  • Retention: Specifies how long you can retain data across M365 services.