Culture

What We Believe About Disaster Recovery

Who is Global Data Vault

Global Data Vault (GDV) is a cloud based Disaster Recovery as a Service (DRaaS) provider. Our culture is built around the belief that as to Disaster Recovery and your systems, it’s always our problem.

We know that providing fast, efficient restores and recoveries is critical to our customers. We know that the technology behind all this is complex. We know that unless someone “owns” this area of responsibility, the results are likely to fall short.

It's always our problem. That's our culture.

We see no point in doing just part of the job. So while many parts of the equation lie outside our immediate purview, we focus on results and seek to own the entire process.

Of course our customers’ environments must consist of supported systems and meet minimum technical specs. Their connectivity needs to work. Configuration changes need to be managed. But unlike other providers, GDV continuously monitors the expected result.

What is the difference? Some other providers may monitor activity. That’s not enough. By continuously monitoring expected results we know and you know what is your state of readiness at any time. and when that falls below expectations, we contact you, because, “It’s always our problem.”

 

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

Counting down the worst cyber security breaches of 2018 – #4

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Global Data Vault’s Mid-Year Count-Down of the Worst Cybersecurity Breaches

Number 5: VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers,...