We live in an age of tremendous shifts and accelerated digital transformation, driving organizations to adopt more and more of the new cloud-based technologies and services which provide great flexibility and scalability. However, they come with their own challenges.
According to IDC, worldwide spending on public cloud services is forecast to reach $160 billion in 2018, an increase of 23.2% over 2017 — with SaaS being the largest cloud computing category, capturing nearly two thirds of all public cloud spending in 2018.
Forrester also expects the global public cloud services market to grow at a compound annual growth rate (CAGR) of 22% over the 2015-to-2020 period.
When we speak with customers, there seem to be a number of myths, particularly on the Software as a Service (SaaS) side.
Myth #1: The service provider, take Google as an example, provides data protection as part of the SaaS offering.
While it is clearly stated in the service level agreement that the service provider is responsible for the uptime, power, network connectivity etc., the service provider also mentions that the customer is ultimately responsible for the actual data and their user administration.
Myth #2: SaaS applications are not vulnerable to cyber-attacks
Cloud applications can get attacked like any other servers on your premises. Just because the server is not in your data center, doesn’t mean it is invulnerable to threats. As mentioned above, the customer is responsible for the data when an attack takes place.
Myth #3: The backup functionality comes out of the box
Typically, service providers provide a basic rollback capability with limited retention (several months). If you look at Office 365 as an example, the search process is very difficult and time consuming. Then, once you find the email or file you think you want to restore, you cannot preview it or validate that it is the right file. If this is not enough, once you initiate a retrieval request, it can take days or even a week to get your data back. In short, it is a time consuming, difficult process, with a poor user experience. Bottom line: we need backup for SaaS applications.
Veritas SaaS Backup is an end-to-end web based platform that provides data protection linked to your entire suite of SaaS workloads:
Veritas SaaS Backup is a platform built to protect multiple SaaS workloads and is administered from a single console, unlike other SaaS backup applications. At the moment, VSB supports 3 major workloads and more workloads will be added shortly. The key point is that no software or hardware is required on premise and it can be managed from any web browser.
With VSB, you can find your emails and files easily and quickly without the need to search specific devices or folders. The VSB search functionality shows your data independently of where it was originally stored. Once you find the file, you can preview it to ensure it is the right file and then restore it using multiple restore options as mentioned below.
Multiple Restore Options
VSB provides the ability to restore data in 3 different ways:
Minimal ongoing administration
As soon as the initial configuration is completed, backups will run every 4 hours. New users will automatically be added to backups, users that left the company will automatically stop being backed up. In summary, there is very little administrative work needed to maintain VSB. Errors are very rare and when they occur, insightful alerts are generated on the dashboard and sent via email.
While service providers are accountable for keeping the SaaS application up and running, the responsibility for the actual data, users and compliance is with the end-customer.
With multiple responsible parties, there is a greater chance that you will experience a gap in your SaaS data protection. Moreover, keeping all of your data stored in a single location, can put your business at risk if you are unable to locate it or restore it.
Veritas SaaS Backup helps bridge the gap by providing secure, cloud-to-cloud data protection across your entire Office 365, G Suite, or Salesforce.com environment and beyond. The following are some of the key differentiators: