Vancouver, BC – August 25, 2009 – Eloquent Systems has completed a full cycle of testing for the new automated database backup facilities from eSecure Managed Services for the Software-as-a-Service (SaaS) customers – a much higher level of security than most institutions would get from their own IT departments. Everything is in place to ensure 24/7 availability, data integrity, and emergency disaster recovery. All customers and all potential problems are covered, no matter how large or small:
|What could go wrong?||Backup procedure|
|The server hard-drive crashes.||The mirrored hard-drive continues uninterrupted service, while a "hot" 3rd drive becomes the mirrored drive.|
|The faulty drive requires replacement.||It can be replaced without taking down the server because two other drives are acting as primary and mirrored drives.|
|The CPU of the primary server fails.||A 2nd server is brought into action while the primary server is repaired. This 2nd computer is a live mirror of the first and is being updated every 15 minutes.|
|The power for the host building is cut off.||The co-location facility has an independent generator-driven power backup.|
|The Internet backbone is down.||The second Internet backbone automatically takes over. This redundancy ensures 99.99% core network uptime.|
|The entire building is destroyed by a catastrophe such as an earthquake.||The data is recovered from a copy located on the opposite side of the continent. This off-site copy is automatically updated on a weekly basis.|
|The customer still feels insecure about not having the data onsite.||The customer has the option to install a single-user copy of the application software and downloading a copy of the live databases to it as frequently as they wish for verification and safekeeping.|
|The database may be attacked by a virus or other malware.||In order to create the greatest impact around the world most such malware is designed to exploit vulnerabilities in abundant software such as that from Microsoft. Eloquent&rsqup;s proprietary WebGENCAT™ is not vulnerable to such malware. However, it is still protection by a firewall and by ESET NOD32 Antivirus™ and other software for each server.|
|The Internet transmission between the user and Eloquent may be intercepted.||All communication utilizes a 256-bit SSL Web server encryption certificate from Thawte, a leading certificate authority. This new certificate provides the highest level of encryption available by law. The customer ensures security by using HTTPS rather than HTTP to access the database.|
|The customer accidentally deleted or otherwise damaged the database.||The Eloquent Application only flag data as deleted. It is maintained in the system until it is either restored or permanently deletion by an administrative user only. Failing that, a snapshot of the database may be recovered for any day of the last 7 and then for any week for four months.|
|The customer still feels that their own IT department could do a better job of security!||They may purchase the software and move it to their own server and give end users a new domain name. The transfer can be done in less than two hours.|
Mr. Merv Richter, President & CEO of Eloquent Systems Inc., confidently reports: "In the past 7 years of hosting our Web-based software for customers we have never experienced downtime because or viruses or other malware attacking our software. Nor have we been unable to recover backup copies of customer’s data when requested." There primary factors for the high level of security are:
- The robust quality of Eloquent Applications and the WebGENCAT™ platform.
- The dedicated consulting services of Compunet Computer Group for network management.
- The reliability of our server co-location provider, Navigata.
- The thorough protection for backup and recovery by eSecure Managed Services.
"At Eloquent our mission is to give customer the most advanced software tools for the job and to remove all technical obstacles that take their focus off their core business," says Richter. "We understand that our customers, whether they are using the library, museum, archives, or records application, consider their database and digital content a major asset demanding the highest level of security."