Docstoc

Redstor Protector - Integrated Data Needs

Document Sample
Redstor Protector - Integrated Data Needs Powered By Docstoc
					                                                 Protector
 Redstor                                         Redstor Protector is a unique service that secures and
                                                                                            Edu
                                                 protects confidential and sensitive informationcheld
                                                                                                  atio

 Protector
                                                                                                       n
                                                                                             Edititheft.
           Redstor Protector                     on PCs and Laptops in the event of data loss or o
                                                                                                                                                    n
                                           School's Challenge
                                           The way you work and teach has evolved as                      Features:
 Redstor Protector is a unique service that secures and
                                           Redstor Protector is a unique service                                            protects
                                           computers have proliferated in schools. Curriculum that secures andPC backup and recov
                                                                                                          •	 Automatic
                                                                                                             all of your devices the
                                           confidential and sensitive information held on PCs and Laptops inare backed up
                                           and administration data about each pupil and how
 protects confidential and sensitive information held
                                           the school functions is confidential and the consequences
                                           event of data loss or theft.
                                           of losing this can result in embarrassing headlines.
                                                                                                             automatically in the background
                                                                                                             data recovery at the touch of a b
 on PCs and Laptops in the event of data loss or theft.                    School’s Challenge
                                           The Information Commissioners Office recommends
                                                                                                          •	 Anywhere backup and recovery
                                                                                                             online backup account, all your
                                           that you must have appropriate security to prevent                can be recovered from anywher
                                           personal data being compromised. This means that if               in the event of data loss (provide
                                                                                                              have proliferated in
                                           The way you work and teach has evolved as computersconnected to the internet).
                                           the information held on a portable device could be used
                                                                                                          •	 Remote and how the
                                           schools. Curriculum and administration data about each pupil data deletion – If a devic
                                           to cause an individual damage or distress it should be
 School's Challenge                                                                                          losing needing result
                                           encrypted and if the data is accidentally the consequences of without this can the device to co
                                           school functions is confidential and lost, altered or
 The way you work and teach has evolved as destroyed, it can be recovered. It is a legal requirement
                                                                          Features:                          data can be remotely deleted by
                                           in embarrassing headlines.
                                           of the Data Protection Act 1998 to protect and secure             provider. Rest assured that you h
 computers have proliferated in schools. Curriculum                       •	 Automatic PC backup and recovery – Ensure that
                                                                                                             backup of any files deleted stored
                                           personal data.
 and administration data about each pupil and how                            all of your devices are backed you must have
                                                                                                             secure remotely
                                           The Information Commissioners Office recommends thatup data centre. and
 the school functions is confidential and the consequences most comprehensive way indata background, enablingThis
                                           Redstor Protector is the                                           compromised. fast
                                                                             automatically to the being Automated record keeping – Elim
                                           appropriate security to prevent personal
                                                                                                          •	

  Client System
 of losing this can result in embarrassing protect and recover your PC and Laptop data, comply touch of a button. last backup occu
                                            headlines.
                                           with the
                                           means law and the information as safeguarding the device could be useddetailed rep
                                                     that if guidelines as data recovery portable
                                                                                  held on a at
                                                                             well
                                                                                                             recall when the
                                                                                                             encrypted thanks to to
                                                                          •	 Anywhere backup and recovery – With a 5GB 1

  Requirements                                                                                             encrypted and if the
                                           cause an individual damage or distress it should be •	 Deploy state-of-the-art encryption
                                           your reputation!
 The Information Commissioners Office recommends                             online backup account, all your valuable data the Be
                                                                                                             Protector meets or lost,
                                                                                                       data is accidentally exceeds
 that you must have appropriate security to prevent                          can be recovered from anywhere at any time Data is sec
                                                                                                             for security standards.
                                                                                                             AES or destroyed,
                                                                                                       altered encryption using
 personal data being compromised. This means that if                         in the event of data loss (provided the device randomly g
                                                                                                                                     is
                                                                                                       it can be recovered. Ittotal priv
                                                                                                             maximum security and
 the information held on a portable device could be used                                connected to the internet).
Computer: individual damage or distress it should be                                 •	 Remote
                                                                                                                 is a legal requirement
                                                                                                 data deletion – If a device is lost or stolen,
 to cause an
                                                                                                                 of Benefits: yourProtection
                                                                                                                        to Data data at all
                                                                                        without needing the devicethe come online, thetimes – M
 encrypted and if the III,
Processor Pentium® data is accidentally lost, altered or                                                             •	 Protect
                                                                                                                 Act products protect and
                                                                                                                        1998 your service
                                                                                        data can be remotely deleted by toun-encrypt your data to
 destroyed, it can
1GHz minimum be recovered. It is a legal requirement                                                             secure personal data.
                                                                                                                        compression or deduplication. En
                                                                                        provider. Rest assured that you have a recent
 of the Data Protection Act 1998 to protect and secure                                                                  on during the backup and restore
 personal data.                                                                         backup of any files deleted stored offsite in a
                                                                                                                        while data is at rest.
Memory:                                                                                 secure data centre.      Redstor Protector is the simple
                                                                                                                     •	 Simple management – A
                                                                                                                 most         comprehensive
                                                                                     •	 Automated record keeping – Eliminate select files for prote
                                                                                                                        allows you to the need to
  GB RAM minimum
1 Redstor Protector is the most comprehensive way to
 protect and recover your PC and Laptop data, comply                                                                        to protect file
                                                                                                                 way occurred or recovery.
                                                                                        recall when the last backupencryption and if aand was
                                                                                                                 recover cost of ownership – Encrypti
                                                                                                                     •	 Low
 with the law and guidelines as well as safeguarding                                                                          your capabilities.
                                                                                        encrypted thanks to detailed reporting PC and trace p
                                                                                                                        backup, remote wipe and
Hard Disk Space:
 your reputation!                                                                                                Laptop data, comply
                                                                                     •	 Deploy state-of-the-art encryption – Redstor with one pri
                                                                                                                        maintenance included in
1 GB free space available                                                                                                law and overhead –
                                                                                                                 thethe Becta guidelines
                                                                                        Protector meets or exceeds •	 Low supportguidelines Enjoy lo
                                                                                                                 as support safeguarding
                                                                                        for security standards. Datawell as overhead by dealing wit
                                                                                                                        is secured with 256-bit
                                                                                                                        integrated solution designed from
                                                                                                                          reputation!
                                                                                                                 yourup for Education.
                                                                                        AES encryption using randomly generated keys for
Operating Systems:                                                                      maximum security and total privacy.
Windows® XP with Service                                                                                                   1 Can be upgraded to a larger account siz

Pack 3 (SP3)                                                                Benefits:
                                                                                    Features
                                                                            •	 Protect your data at all times – Many PC backup
Windows Server 2003
                                                                               products un-encrypt your data to facilitate data
Windows Vista®                                   • Automatic PC backup and recovery – Ensure that all of your devices are
                                                                               compression or deduplication. Encryption is always
                                                                               on during in backup and restore number: 3556110
                                                                                                         Redstor enabling fast 99-105 Kings Road,
                                                                                                                         James’ Wharf, data
                                                 backed up remotely and automaticallythe the background,Limited, St process andVAT number: Re
Windows Vista 64bit                                                                                      Registered company                       64
                                                 recovery at the touch of a button. data is at rest.
                                                                               while
Windows Server 2008
                                                                            •	 Simple management – A simple user interface
Windows Server 2008 64bit                                                      allows you to a 5GB online backup account, all
                                                 • Anywhere backup and recovery – With select files for protection,
                                                                                                     1

Windows 7                                        your valuable data can be recovered from anywhere at any time in the event
                                                                               encryption and recovery.
Windows 7 64bit framework                                                    device is connected to the internet).
                                                 of data loss (provided the•	 Low cost of ownership – Encryption, storage,
                                                                               backup, remote wipe and trace plus
(version 3.5)                                    • Remote data deletion – If a device is lost or stolen, without needing the
                                                                               maintenance included in one price.
                                                                            •	 Low support overhead deleted by ongoing
                                                 device to come online, the data can be remotely – Enjoy low your service
                                                                               support overhead by dealing any files deleted
                                                 provider. Rest assured that you have a recent backup ofwith one single
                                                 stored offsite in a secure data centre. solution designed from the ground
                                                                               integrated
                                                                               up for Education.
                                                 • Automated record keeping – Eliminate the need to recall when the last backup
                                                                              1 Can be upgraded to a larger account size
                                                 occurred or if a file was encrypted thanks to detailed reporting capabilities.

                                                 • Deploy state-of-the-art encryption – Redstor Protector meets or exceeds
                                                 the Becta guidelines for security standards. Data is secured with 256-bit
                                                 AES encryption using randomly generated keys for maximum security and
                                                 total privacy.        Redstor Limited, St James’ Wharf, 99-105 Kings Road, Reading, Berkshire, RG1 3DD
                                                                                 Registered company number: 3556110 VAT number: 642 5659 24
                                                 1
                                                     Can be upgraded to a larger account size



Integrated Data Needs Limited, Unit 1 & 2 Creech Mills Business Park, Creech St Michael, Somerset, TA3 5PX
Company Registration Number: 4512331 Tel: 08449 80 80 08 Fax: 08449 80 81 12 Email: sales@idnonline.co.uk
                                     All prices exclude VAT, E&OE. Standard terms and condition apply.
                                                                                                           Protector
                                                                                                           Redstor Protector is a unique
                 Policy driven control
                                         Benefits:
                 Automatic PC Backup and Recovery
                                                                                                           protects confidential and sen
                 Control what files are backed up and when.
                 Document retentionat all times – Many PC backup products
                 • Protect your data                                                                       on PCs and Laptops in the e
                    un-encrypt your data to facilitate data compression or
                 Store all document version changes for up to 180 days.
                    deduplication. Encryption is always on during the backup
                 Easy and fast recovery
                    and restore process and a button is at the
                 Restore data at the click ofwhile data from rest.Redstor
                 Storage Cloud.                                                                            School's Challenge
                 • Simple management – A simple user interface allows you to                               The way you work and teach has evolved as
                    Rest files for protection, encryption and recovery.
                 AtselectEncryption                                                                        computers have proliferated in schools. Curriculu
                 Policy driven control                                                                     and administration data about each pupil and h
                 • Low that files are encrypted through a powerful
                 Ensurecost of ownership – Encryption, storage, backup, remote                             the school functions is confidential and the conse
                    wipe and trace
                 policy engine. plus maintenance included in one price.                                    of losing this can result in embarrassing headline
                 Automatic, hassle-free protection
                 Files selected for backup can be automatically
                 • Low support overhead – Enjoy low ongoing support overhead
                 encrypted without the needintegrated solution designed from                            The Information Commissioners Office recommen
                    by dealing with one single for further configuration.
                 Protection that won’t slow you down                                                    that you must have appropriate security to preve
                    the ground up for Education.
                 Unlike some full disk encryption solutions, Redstor                                    personal data being compromised. This means th
                 Protector’s solution runs transparently in the                                         the information held on a portable device could b
                 background and requires minimal resources.                                             to cause an individual damage or distress it shou
                 FIPS mode support                                                                      encrypted and if the data is accidentally lost, alt
                 Redstor Protector supports FIPS mode with                                              destroyed, it can be recovered. It is a legal requir
                 Windows® XP, Vista and Windows 7.
                 Automatic PC Backup and Recovery                                      Remote           of Deletion
                                                                                                      Data the Data Protection Act 1998 to protect and sec
                                                                                                        personal data.
                 Remote Data Deletion
                 Policy driven control                                                 Centralised policy driven control
                 Centralised policy driven control
                 Choose what files files backed up and when. remotely
                 Control to delete are in the backup dataset
                                                                                                        Redstor the backup dataset remotely if a device
                                                                                       Choose to delete files in Protector is the most comprehensive way
                 Document retention
                 if a device is lost or stolen without needing the device                                without needing the device PC and Laptop
                                                                                       is lost or stolenprotect and recover your to come online. data, co
                                                                                       Peace of mind    with the law and guidelines as well as safeguard
                 Store all document version changes for up to 180 days.
                 to come online.
                 Easy of mind
                 Peaceand fast recovery                                                                 your reputation!
                                                                                       Rest assured that you have a recent backup of any files deleted
                 Rest assured that you have a recent backup of any Redstor
                 Restore data at the click of a button from the files                  accessible through the Redstor Storage Cloud.
                 deleted accessible through the Redstor Storage Cloud.
                 Storage Cloud.
                                                                                       Port Access Control
180 days.        PortRest Encryption
                 At Access Control
                 Policy driven control                                                 Policy driven control
Redstor          Prevent unauthorised USB use-control access through                   Prevent unauthorised USB use-control access through any
                 Policy driven control
                 any port or media including CD/DVDs, USB, serial,                     port or media including CD/DVDs, USB, serial, Bluetooth and
                 Ensure that files are encrypted through a powerful policy engine.
                 Bluetooth and wireless ports.                                         wireless ports.
                 Automatic, hassle-free protection
                 Granular control
                 Files selected for backup can be automatically encrypted              Granular control
                 Depending on the port type, you can choose to enable
                                                                                       Depending on the port type, you can choose to enable read
 erful           without write access or lock down a port
                 read or the need for further configuration. completely                   Where to Buy
                 Protection that won’t slow you down                                   or write access or lock down a port completely on a user-by-
                 on a user-by-user basis.                                                 The Service is available from value added service
                 Unlike some full disk encryption solutions, Redstor Protector’s       user basis.
                                                                                         providers and Local Authorities and is empowered
y                solution runs
                 Device Trace transparently in the background and requires               by Redstor, the company behind the successful
uration.         minimal resources.
                 Policy driven control                                                 Device Trace Service for Schools (RBUSS) which
                                                                                         Redstor Backup
                 FIPS mode support
                 Turn on device trace via Redstor Protector’s policy                     is used by over 80 Education Partners and 12,000
dstor            Redstor Protector location of a mode with Windows®
                 engine to track thesupports FIPSlaptop or desktop if it XP,           Policy driven control in the UK.
                                                                                         addressable schools
                 Vista and Windows 7.
                 connects to the Internet after it has been lost or stolen.            Turn on device trace via Redstor Protector’s policy engine to
                 Deter theft                                                              Please contact Redstor to or desktop if it connects to
                                                                                       track the location of a laptoplocate your nearest service the
                 Apply security labels to devices advertising Redstor                     provider on 0118 951 lost or stolen.
                                                                                       Internet after it has been 5200 or email sales@redstor.com
                 Protector and deter thieves-they will think twice about               Deter theft
                 stealing a device knowing that it can be traced.                      Apply security labels to devices advertising Redstor Protector
                                                                                          www.redstor.com
                                                                                       and deter thieves-they will think twice about stealing a device
                 Client System Requirements                                            knowing that it can be traced.
                 Computer: Processor Pentium® III, 1 GHz minimum
 motely          Memory: 1 GB RAM minimum
e device         Hard Disk Space: 1 GB free space available
                 Operating Systems: Windows® XP with Service Pack 3
                 (SP3), Windows Server 2003, Windows Vista®, Windows
of any files     Vista 64bit, Windows Server 2008, Windows Server 2008
e Cloud.         64bit, Windows 7, Windows 7 64bit framework version 3.5

                                                                                                        Authorised REDSTOR provider
                                                                                                     Contact Integrated Data Needs Ltd
hrough
erial,                                                                                                today on 0844 980 8008 or email
                                                                                                       rhys.gwillym@idnonline.co.uk
                                                                                       Redstor Limited, St James’ Wharf, 99-105 Kings Road, Reading, Berkshire, RG1 3DD
                                                                                       Registered company number: 3556110 VAT number: 642 5659 24
to enable
pletely             Where to Buy
                    The Service is available from value added service
                    providers and Local Limited, and 1 & 2 Creech
               Integrated Data NeedsAuthorities Unit is empowered Mills Business Park, Creech St Michael, Somerset, TA3 5PX
                    by Redstor, the company behind the successful
               Company Registration Number: 4512331 Tel: 08449 80 80 08 Fax: 08449 80 81 12 Email: sales@idnonline.co.uk
                    Redstor Backup Service for Schools (RBUSS) which
olicy
                                                  All prices
                    is used by over 80 Education Partners exclude VAT, E&OE. Standard terms and condition apply.
                                                             and 12,000
ktop if it          addressable schools in the UK.

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:5
posted:8/18/2012
language:English
pages:2