• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • UCG Launches VAULT400 Reports

    July 30, 2013 Alex Woodie

    United Computer Group this month launched VAULT400 Reports, a new offering that will give VAULT400 customers access to reports that detail the state of their backups and storage utilization on the VAULT400 cloud.

    UCG last week mailed out notices to its VAULT400 customers to let them know about the new service and to provide them with security credentials to log onto the VAULT400 Web portal. The reports will be available to VAULT400 customers at any time, and the company will email the reports every quarter.

    UCG is making three sets of reports available to its customers. The Backup Status report provides a simple, at-a-glance view of the overall health of the backup solution. It provides a list of successful, failed, or missed backups that occurred over the past 24 hours, the past three days, and the past seven days.

    The Grouped Storage Details report provides a breakdown of storage information for each job, and also groups the jobs by computer, by customer, and by vault. The Storage Totals report includes a customizable graph that lets the user see how storage utilization on the VAULT400 cloud has changed over time.

    Together, the three reports give VAULT400 customers useful information and helps them answer pertinent questions about their VAULT400 environments, such as: Are my backups occurring when they need to? How much storage is used by my backups? How much storage are backup sessions adding? What platforms and VAULT400 agent versions are being utilized? Are backups and restores succeeding? When and how much data was backed up? How often are backups or restores occurring?

    VAULT400 is a cloud-based backup and recovery service that uses a combination of EVault‘s online backup technology and UCG’s cloud recovery center. UCG gives VAULT400 customers several options when it comes to recovery time objectives (RTO), including 12-hour, 24-hour, and 48-hour services. The company also offers high availability hosting services.

    There is no additional cost for VAULT400 Reports. UCG decided to begin issuing the reports as a value-added service to its customers. Earlier this year, Jim Kandrac, the founder and president of the Cleveland, Ohio-based company, told IT Jungle that the company had about 100 IBM i customers using VAULT400.

    Despite its name, the solution can also be used to protect data residing on other systems, including Windows, Linux, and Unix. For more information, see www.vault400.com.

    RELATED STORY

    UCG Lauded for Test Work by VAULT400 Customer

    VAULT400 to Protect Food Service Company

    Manufacturer Taps VAULT400 for Cloud Backup

    VAULT400 Now Available As IBM i Solution Edition

    Anatomy of a (Successful) Cloud DR Test

    IBM i Solution Edition Program Picks Up Steam

    IBM Adds Smaller Power 720 i Solution Edition

    IBM Makes i Solution Editions From Power 720 and 740 Servers



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ASNA:  ASNA Wings® brings the world of mobile devices to your RPG applications.
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.
    NGS:  On Demand NGS-IQ demo. Watch and get a $5 Starbucks gift card.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Automatically Answering IBM i Unable To Allocate Record Messages IBM Dresses Up The Power 750+ In A Linux-Only Tuxedo

    Leave a Reply Cancel reply

Volume 13, Number 21 -- July 30, 2013
THIS ISSUE SPONSORED BY:

PowerTech
Cybernetics
Abacus Solutions
Profound Logic Software
Shield Advanced Solutions

Table of Contents

  • BlueFountain Delivers a Modern Looking WMS for IBM i
  • Computer Keyes Launches Automated Two-Way Communications from IFS
  • Infor M3 13.1–the Last Big Release for Some Time
  • HiT Software Feeds IBM i Data into Microsoft LightSwitch
  • PowerTech Delivers IBM i Security Data to HP ArcSight SIEM
  • Halcyon Bolsters IBM i Process Automation Solution
  • ASNA Touts Customer’s Success with RPG-to-.NET Conversion Tool
  • UCG Launches VAULT400 Reports
  • Maxava Customer Installs HA Software Just In Time
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The IBM i Power10 Upgrade Cycle Forecast Looks Favorable
  • White Hats Completely Dismantle Menu-Based Security
  • Cloud Software To Drive Enterprise Application Growth
  • How Do You Stay In Touch With The IBM i Community?
  • IBM i PTF Guide, Volume 25, Number 6
  • Security Still Top Concern, IBM i Marketplace Study Says
  • Bob Langieri Shares IBM i Career Trends Outlook for 2023
  • Kisco Brings Native SMS Messaging to IBM i
  • Four Hundred Monitor, February 1
  • 2023 IBM i Predictions, Part 4

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.