Cloud Backup

Cloud Backup

Description
 

Cloud Backup, powered by N2WS Cloud Protection Manager (CPM), enables customers to easily restore and secure data, as well as define backup policies that balance application needs with cost considerations. Cloud Backup utilizes secure cloud based storage (AWS S3) for lower cost and improved durability.

The Cloud Backup offering is an evolution of the HUIT Backup Service that extends data protection services to AWS-hosted workloads – reducing costs, increasing flexibility, and improving recoverability.
 

Key Features and Benefits
 

  • Easily access and restore point-in-time backups
  • Keep your data safe with cross-region DR capability and encryption
  • Simplify your Cloud portfolio with the ability to centrally manage backup/restore across multiple AWS accounts​
  • Gain visibility into how assets are being backed up​ though basic audit/usage reporting
  • Manage costs by:
    • using standard backup policies and tag propagation
    • defining your own backup schedules and retention policies if standard policies do not meet your specific needs ​
    • configuring automatic snapshot removal
  • Get started quickly - CPM uses cloud-native and AWS-native technologies, eliminating the need to learn new conventions or worry about translation issues
     

Available to
 

  • Anyone who manages EC2 (instances, snapshots, AMIs, or volumes) or RDS instances in HUIT's AWS Cloud

 

Requirements and Limitations
 

Customers must: 

  • Meet specific technical requirements as established as part of service initiation/service level agreement process 
  • Provide sufficient AWS privileges to the account(s) for the backup platform 
  • Provide and maintain currency of accurate primary and secondary contact information 
  • Subscribe to email notification for network-related announcements (e.g., new services, upgrades, changes, outages) 
  • Be sufficiently trained/knowledgeable in AWS EC2 storage services (volumes, snapshots and AMIs) to understand how to utilize the CPM backup platform 
  • Comply with Service Use Policies 
  • Adhere to University Information Technology Policies and the Harvard Enterprise Information Security Policy 

Request backup Support now