Glossary

DR:

Disaster recovery

End Point Backup:

Backup for end point products are usually intended for end users

Failback:

The process of reverting back from disaster state

Firewall:

Firewall

DRC:

Disaster Recovery Center

Hypervisor:

A software enabling multiple operating systems on the same hardware, Hypervisor enables to set up multiple operating systems on the physical server.


ISO 14001:

A management system developed to systematically reduce the environmental damages that are being or will be inflicted by the companies and eliminate these damages where possible.

ISO 22301:

Indicates the requirements for preparing, applying, operating, monitoring, reviewing, maintaining, protecting the necessary plans; getting prepared for reducing risks, and developing a documented method for recovering from catastrophic events for companies to enable business continuity.

ISO 27001:

Information Security Management System; it is a management system that is supported by the senior management, and it covers people, processes and information systems to ensure corporate information security. Designed to ensure sufficient and proportionate security checks and protects information assets and provides reliability to relevant parties. ISO 27001 Information Security Management System includes the corporate structure, policies, planning, liabilities, applications, procedures, processes and resources.

ISO 27031:

ISO/IEC 27031 is a standard specified in ISO 27001 Information Security Management and a guide for information and information technologies management and providing business continuity. It is aimed to sustain the service continuity over the information and communication infrastructure provided to the Business Units by the IT department tasked with the management of information and communication at standard private and government institutions.

ISO 9001:

Quality Management System: It is a world-wide accepted quality management system set out for increasing the customer satisfaction by fulfilling the customer expectations, needs and regulation requirements.

ITIL:

It is Information Technology Infrastructure Library utilized to ensure application of IT Service Management.

Level 2 Support:

Support level that provides solutions by analyzing the problems

Local cache:

It is the server that is built on the location where the current systems are. It maintains and routes the data before transferring to another location.

MBP:

Managed Backup Program

(MDRP):

Managed Disaster Recovery Program

MIP:

Managed Infrastructure Program

MNP:

Managed Network (Communication Infrastructure) Program

MSP:

Managed Security Program

OS:

Operating System

Quickcaches:

Before the data on the current environment are replicated to another environment, they are temporarily stored on a different server that is located where the data are being kept. This server sends the data to the destination location based on the bandwidth.

Regulation:

Official and exclusive legislations for IT Systems

Replication:

Data Synchronization

Respore Point:

The return point in backup and replication processes.

RPO:

Recovery Point Objective

RTO:

Recovery Time Objective

SAS 70 Type II:

It is a third party audit, report and verification standard prepared by American Institute of Certified Public Accountants (AICPA) for service organizations.

Cyber-Attack:

Attacks on the information technology systems of the companies, Internet activities of Companies/Individuals over the Internet with an intent to destroy and/or seize Personal/corporate data.

SLA Service Level Agreement:

An agreement defining the issues such as the quality, amount and delivery period of the services provided to the company by the Service Provider and issues such as delivery time, intervention and problem solving periods.

SSAE 16

SAS 70 Standard is revised on June 15th, 2011 and became SSAE 16 standard.

AES:

Advanced Encryption Standard

SSL (Secure Sockets Layer):

SSL is a communication protocol developed in 1994. It allows encrypted sensitive data transfer between two computers over the Internet by using 128 or 256 bit encryption based on the utilized version.

 

Packages

Clonera provides packages based on your business
needs and expectations.

End Point Backup
per month 10 $
3 devicePC, telephone, tablet
200 GBtotal storage
AES 256encryption method
/products/integrated-business-continuity/
Enterprise
per month 129 $
0data loss
15 minutessystem access in
3 Daysability to failback
/products/integrated-business-continuity/
Managed Dısaster RecoveryProgram To get maximum service, here is the detailed information.

Demo Request Form

Formunuz başarıyla gönderilmiştir.
Teşekkür ederiz.