stonefly.com Open in urlscan Pro
13.57.119.83  Public Scan

Submitted URL: https://ejyazl.clicks.mlsend2.com/te/cl/eyJ2Ijoie1wiYVwiOjEwOTEyMSxcImxcIjo3NDM5NzMxNjI2MzQ0NjMwMSxcInJcIjo3NDM5NzUwODc5NjY3OTQyMn...
Effective URL: https://stonefly.com/blog/what-to-consider-when-implementing-draas-for-ransomware-protection?utm_source=SDR+Newslette...
Submission: On December 16 via manual from PH — Scanned from NL

Form analysis 5 forms found in the DOM

GET https://stonefly.com/

<form role="search" method="get" class="et-search-form" action="https://stonefly.com/"> <input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:"> </form>

GET https://stonefly.com/

<form role="search" method="get" class="et_pb_searchform" action="https://stonefly.com/">
  <div> <label class="screen-reader-text" for="s">Search for:</label> <input type="text" name="s" placeholder="Search" class="et_pb_s"> <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess"> <input type="hidden"
      name="et_pb_search_cat" value="84,87,208,10,86,90,93,207,1,85,89,91,72"> <input type="hidden" name="et_pb_include_posts" value="yes"> <input type="hidden" name="et_pb_include_pages" value="yes"> <input type="submit" value="Search"
      class="et_pb_searchsubmit"> </div>
</form>

POST

<form method="post" class="clearfix">
  <div class="et_bloom_fields">
    <p class="et_bloom_popup_input et_bloom_subscribe_name et_bloom_fullwidth_field"> <input placeholder="Name" maxlength="50"> </p>
    <p class="et_bloom_popup_input et_bloom_subscribe_email et_bloom_fullwidth_field"> <input placeholder="Email"> </p>
    <p class="et_bloom_custom_field et_bloom_fullwidth_field et_bloom_popup_input"><input type="text" name="et_bloom_custom_field_optin_14_phone" data-id="phone" placeholder="Phone" data-field_type="input" data-required_mark="required"
        pattern="[0-9]{5,20}" title="Only numbers allowed.Minimum length: 5 characters. Maximum length: 20 characters." maxlength="20"></p>
    <p class="et_bloom_custom_field et_bloom_fullwidth_field et_bloom_popup_input"><input type="text" name="et_bloom_custom_field_optin_14_company" data-id="company" placeholder="Company" data-field_type="input" data-required_mark="not_required"
        pattern="[A-Z|a-z|0-9]{5,50}" title="Only letters and numbers allowed.Minimum length: 5 characters. Maximum length: 50 characters." maxlength="50"></p> <button data-optin_id="optin_14" data-service="mailerlite" data-list_id="8672706"
      data-page_id="255205" data-account="qnoori" data-ip_address="true" class="et_bloom_submit_subscription"> <span class="et_bloom_subscribe_loader"></span> <span class="et_bloom_button_text et_bloom_button_text_color_light">Send</span> </button>
  </div>
</form>

POST /blog/what-to-consider-when-implementing-draas-for-ransomware-protection#wpcf7-f4052-o1

<form action="/blog/what-to-consider-when-implementing-draas-for-ransomware-protection#wpcf7-f4052-o1" method="post" class="wpcf7-form init" novalidate="novalidate" data-status="init">
  <div style="display:none;"> <input type="hidden" name="_wpcf7" value="4052"> <input type="hidden" name="_wpcf7_version" value="5.5.6"> <input type="hidden" name="_wpcf7_locale" value="en_US"> <input type="hidden" name="_wpcf7_unit_tag"
      value="wpcf7-f4052-o1"> <input type="hidden" name="_wpcf7_container_post" value="0"> <input type="hidden" name="_wpcf7_posted_data_hash" value=""> <input type="hidden" name="_wpcf7_recaptcha_response" value=""> </div>
  <p><label> Contact Name* <span class="wpcf7-form-control-wrap ContactName"><input type="text" name="ContactName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
    </label></p>
  <p><label> Company* <span class="wpcf7-form-control-wrap Company"><input type="text" name="Company" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span> </label></p>
  <p><label> Phone* (extensions can be entered in the "Message" field) <span class="wpcf7-form-control-wrap Phone"><input type="tel" name="Phone" value="" size="40"
          class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false"></span> </label></p>
  <p><label> Email Address* <span class="wpcf7-form-control-wrap Email"><input type="email" name="Email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true"
          aria-invalid="false"></span> </label></p>
  <p><label> Message <span class="wpcf7-form-control-wrap Message"><textarea name="Message" cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea" aria-invalid="false"></textarea></span> </label><br> *All fields with an asterisk are
    required.<br> <span id="wpcf7-639be19757813-wrapper" class="wpcf7-form-control-wrap last-name-wrap" style="display:none !important;visibility:hidden !important;"><input type="hidden" name="last-name-time-start" value="1671160215"><input
        type="hidden" name="last-name-time-check" value="4"><label for="wpcf7-639be19757813-field" class="hp-message">Please leave this field empty.</label><input id="wpcf7-639be19757813-field" class="wpcf7-form-control wpcf7-text" type="text"
        name="last-name" value="" size="40" tabindex="-1" autocomplete="new-password"></span><br> <input type="submit" value="Send" class="wpcf7-form-control has-spinner wpcf7-submit"></p>
  <p style="display:none !important;"><label>Δ<textarea name="_wpcf7_ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="_wpcf7_ak_js" value="116"><template
      data-nitro-marker-id="f7c77ab2022772e17edd517dfab38298-1"></template></p>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST

<form method="post" class="clearfix">
  <div class="et_bloom_fields">
    <p class="et_bloom_popup_input et_bloom_subscribe_name"> <input placeholder="Name" maxlength="50"> </p>
    <p class="et_bloom_popup_input et_bloom_subscribe_email"> <input placeholder="Email"> </p> <button data-optin_id="optin_1" data-service="mailerlite" data-list_id="8672706" data-page_id="255205" data-account="qnoori" data-ip_address="true"
      class="et_bloom_submit_subscription"> <span class="et_bloom_subscribe_loader"></span> <span class="et_bloom_button_text et_bloom_button_text_color_light">SUBSCRIBE!</span> </button>
  </div>
</form>

Text Content

 * StoneFly Technical Support
 * 510-265-1616
 * My Account

0 Items
Menu.Menu
 * Products
   * Storage
     * Storage Appliances
       * SSO NAS Storage Appliances
       * SAN Storage Appliances
       * S3 Object Storage Appliances
       * Unified NAS + SAN + S3 Object Storage Appliances
     * Storage Operating System
       * StoneFusion
     * Cloud | Storage as a Service ( STaaS )
       * NAS in the Cloud
       * SAN in the Cloud
       * Unified NAS + SAN + Object in the Cloud
       * Cloud Storage in Azure
       * Cloud Storage in AWS
       * Cloud Storage in StoneFly Private Cloud
     * 
     * 
   * Hyperconverged (HCI)
     * HCI Appliances
       * Unified Storage & Server (USS) HCI Appliance
       * High Availability TwinHCI Systems
     * Virtual Storage Appliance
       * Virtual SAN (vSAN)
       * Storage Concentrator Virtual Machine (SCVM)
     * 
     * 
   * Backup & DR Solutions
     * Backup and Disaster Recovery Appliances
       * Veeam Ready Backup & DR Appliance (DR365V)
       * DR Site in a Box (DR365)
       * Universal Backup & DR Appliance (DR365U)
       * DR365 Veeam-Immutable Veeam-Air-Gapped (VIVA)
       * StoneFly miniBackup™ appliance
     * Backup Software + Cloud
       * Backup and DR as a Service (BDRaaS)
       * Veeam Cloud Connect to Azure
       * Veeam Cloud Connect to AWS
       * Veeam Cloud Connect to StoneFly Private Cloud
       * CDR365 - Online Backup Solution
       * Veeam Backup for Office 365
     * Services
       * Free Premium Veeam Support
       * Smart Protect
     * 
     * 
   * Software
     * Storage Operating System
       * StoneFusion for Bare-Metal
       * Storage Concentrator Virtual Machine (SCVM)
       * StoneFusion OEM
     * MSP Solution
       * StoneFusion MSP Edition
     * WAN Accelerator
       * StoneWAN
     * 
     * 
   * Cloud
     * Cloud Storage
       * Veeam Cloud Backups
       * Cloud Storage in Azure
       * Cloud Storage in AWS
       * Cloud Storage in StoneFly Private Cloud
     * Cloud Storage + Gateway
       * BG365 Backup Gateway
       * Smart Cloud Gateway
       * USC SAN Gateway
     * 
     * 
   * Data Migration Services
     * Migration DTDs + Plugin
       * StoneFly Live VM Migration
     * Data Migration Software
       * StoneFly Migrate
     * 
     * 
   * Media & Broadcast
     * Media Center Always On-Air®
       * Media Center Always On-Air®
     * Production and Post-Production MAM
       * Production and Post-Production MAM
     * End-To-End Newsroom System
       * End-To-End Newsroom System
     * Disk Library
       * Disk Library
     * 
   * Archiving
     * Archive Appliance
       * Green Petabyte Archive (GPA) 4.0
       * PACS Storage
   * Video Surveillance Storage
     * Video Management Engine
       * Video Management Engine
     * IP Video Surveillance
       * IP Video Surveillance
     * Clients and Video Workstations
       * Clients and Video Workstations
     * Fanless PC Servers
       * Fanless PC Servers
     * 
 * Solutions
   * * 
     * * Application
         * StoneFly Ransomware Protection Solutions
         * Storage Consolidation
         * Virtual Servers & Hosting
         * Disaster Recovery as a Service (DRaaS)
         * Managed Service Provider
         * Cloud Archiving
     * * Industry
         * Media and Entertainment
         * Oil & Gas
         * Legal and Governance
         * Manufacturing
         * Higher Education
         * Healthcare
     * 
 * Company
   * Company Overview
   * Press Release
   * Media Coverage
   * Employment
   * Our Customers
   * Policies and Agreements
 * Resources
   * Technical Education
   * Podcasts
   * White Papers
   * Recorded Webinars
   * Case Studies
   * Technical Videos
   * Weekly Ransomware Newsletter
   * News and Events
   * Datacenter
   * StoneFly GUI Gallery
     * DR365 Gallery
     * SCVM Gallery
 * Downloads
   * SCVM Downloads
   * Product Manuals
   * CDR365 Downloads
 * Blog
 * Partners
 * Contact Us
   * Contact Us
   * Tech Support/ Professional Services
 * Shop
   * Storage Appliance Subscriptions
   * Cloud Storage
   * Veeam Cloud Subscriptions
   * Veeam On-Premise Subscriptions
   * CDR365 Cloud Backup
   * Data Migration Software
   * Professional Services & Support

Select Page

×

PLEASE ADD THE VARIFICATION CODE WHICH SENT TO YOU ON YOU EMAIL ADDRESS

Submit


WHAT TO CONSIDER WHEN IMPLEMENTING DRAAS FOR RANSOMWARE PROTECTION

 1.  Understand Your Current Risk Factor
 2.  What is the Current State of Your DR and Backup Infrastructure?
 3.  Backup and Disaster Recovery Performance
 4.  Determining the Backup Quality
 5.  Assessing Restore Capabilities
 6.  What will be the Financial Ramifications of an Outage During a Disaster?
 7.  Understanding the Impact of a Disaster on Your Customers
 8.  Choosing Your Disaster Recovery as a Service (DRaaS) Solution
 9.  Does it include isolation (or air-gap)?
 10. Are backups immutable?
 11. Is admin access protected via multi-factor authentication?
 12. What management options does the DRaaS provider offer?
 13. Who is responsible for what?
 14. Conclusion

Contact
REQUEST
DEMO

According to Gartner, downtime costs more than $5,600 a minute; therefore, every
business needs a reliable means of backup and disaster recovery.

Disaster Recovery as a service (DRaaS) provides recovery in the cloud and is a
cost-effective and highly efficient enterprise data protection solution to
tackle downtime, data security, and improve data availability.

In this blog, we’ll share what backup administrators need to ask themselves in
order to choose and set up a DRaaS solution that works for their organization.


UNDERSTAND YOUR CURRENT RISK FACTOR

The number of ransomware attacks is increasing yearly, and every organization is
at risk. However, every organization’s risk level will be different. Your
organization might be at a higher risk level if your company belongs to a highly
targeted industry such as manufacturing, finance or healthcare.

Moreover, compliance regulations, such as FISMA, FedRAMP, CJIS, HIPAA, SOX,
FINRA,  require service providers to implement data security and protection
measures to prevent data loss, limit downtime, and ensure employee/customer data
privacy. While these regulations have improved data access and security for the
customer, they have also increased the responsibility of organizations to
protect the data against misuse, theft, or loss. Failing to comply with these
regulations can result in fines and increase your organization’s risk factor.

On the other hand, in order to comply with these regulations, organizations need
to invest in cybersecurity, and backup and disaster recovery solutions; which
can be unnecessarily expensive, if not done right.

The best way to ascertain your risk is through a full security assessment to
expose the underlining issues and gaps in your current infrastructure and then
document those areas which need improvement. This document will help guide the
service license agreement conversation with the disaster recovery as a service
(DRaaS) provider, leaving little room for surprises and unplanned downtime.

Here are some things that you need to consider for a thorough risk assessment:

 * Identify mission-critical applications.
 * What will be the impact if one or more critical application becomes
   unavailable?
 * Identify the financial impact of each application becoming unavailable.
 * Document and assess the procedures for the protection of mission-critical
   applications.
 * Determine the required recovery times for each critical application and what
   RTPOs you can achieve with remote Disaster Recovery versus local DR site.
   This will then help decide which DR setup works for which application /
   workload.


WHAT IS THE CURRENT STATE OF YOUR DR AND BACKUP INFRASTRUCTURE?

If your organization is using a disaster recovery solution and you want to
switch to or complement your existing solution with DRaaS, these questions can
help simplify the process:

 * How fast can your systems recover? (recovery time and point objectives RTPOs)
 * Can data be restored in the event the primary copy (or copies) is/are
   unavailable, corrupted, or encrypted?
 * Are backup copies protected, and isolated, from malicious encryption/deletion
   in the event a hacker/ransomware gains access to the production network?
 * If a hacker, or ransomware, were to gain access to the backup server, are
   they immutable and safe from modification, or are they at risk of malicious
   encryption/deletion?
 * Is backup and recovery regularly tested, and updated? Preferably in an
   isolated environment without impacting production.

Assess the performance and efficiency of the backup and recovery system to
determine its capabilities and to learn what improvements you need via a DRaaS
solution.

The following should be taken into account to ascertain the current state of
your backup and DR infrastructure:


BACKUP AND DISASTER RECOVERY PERFORMANCE

 * Is data being backed up within the expected time frame?
 * Is the organization meeting its expected service level agreements?
 * Is the DR system capable of meeting set RTPOs in the event of a disaster?


DETERMINING THE BACKUP QUALITY

 * What is the backup success to failure ratio?
 * Is the infrastructure capable of tracking and resolving failed backup jobs?
 * Are backups regularly tested to ensure that they are recoverable?
 * Is backup data protected at rest and in transit?


ASSESSING RESTORE CAPABILITIES

 * Can data be restored if primary backup copy is encrypted or deleted by
   ransomware?
 * How quickly can the primary system failover in the event production is
   unavailable?
 * How often are backups tested to ensure they are not corrupted and are
   available for data recovery when needed?
 * Does the IT team perform exposure and gap analysis between recovery goals and
   actual capabilities?
 * Is redundancy built into recovery systems (RAID, erasure coding, 3-2-1
   strategy, etc.)?

These questions will set realistic expectations and will inform the DRaaS
provider about your backup and recovery needs.


WHAT WILL BE THE FINANCIAL RAMIFICATIONS OF AN OUTAGE DURING A DISASTER?

While quantifying the financial impact of a disaster is one part of the
equation, you also need to consider the loss of reputation and goodwill, fines,
legal implications, and other costs that add to the total cost of unplanned
downtime.

Not only do you want to calculate the apparent cost of data loss but also the
legal ramifications and the actual impact of the lost information when going for
a DRaaS solution. But it is difficult to ascertain exactly how much money you
will lose if your critical infrastructure goes down.

For more information, read how to calculate the cost of downtime.

With cloud disaster recovery services, organizations can get reliable offsite
recovery without having to invest in hardware. Moreover, organizations can rely
on the expertise of the DRaaS service provider which allows them to invest
sparingly in hiring professionals with relevant expertise.

Furthermore, cloud DR is a necessary step in building an infrastructure capable
of surviving a ransomware attack because it allows administrators to store
offsite copies; and secure them with data security features such as immutability
and air-gap.


UNDERSTANDING THE IMPACT OF A DISASTER ON YOUR CUSTOMERS

What happens to your customer after your business is affected by a disaster?
Today’s businesses demand instant fulfilment of commitments. Even a small amount
of downtime can result in loss of customer loyalty, and a minute of downtime can
cause a well-built business reputation to collapse.

Additionally, there are numerous cases where a compromise of a service
provider’s network led to disruption and losses for their customers. These types
of attacks, where a system/network compromise impacts the company’s customers,
are called supply chain attacks. An apt example is the Kaseya breach.

Service License Agreements (SLAs) must also take into account the customer
experience in the event of a disaster.

By determining which application(s) affect customers the most allows backup
administrators to plan RTOs and RPOs and define SLAs accordingly.


CHOOSING YOUR DISASTER RECOVERY AS A SERVICE (DRAAS) SOLUTION

When choosing a DRaaS solution, it’s important to bear in mind that what works
for one, may not work for the other. That’s because production infrastructure is
unique to each organization. As a result, the data protection solutions must be
designed to complement it which is why they too are unique.

To help you find the right DRaaS for your needs, here are some questions you
need to ask when analyzing a solution:


DOES IT INCLUDE ISOLATION (OR AIR-GAP)?

If backup copies are not isolated and air-gapped, then they are as vulnerable as
production. If a hacker or ransomware gains access to the network, then the
backup server(s) can end up encrypted which will prevent data recovery.


ARE BACKUPS IMMUTABLE?

In the event the hacker or ransomware is to gain access to the backup(s), are
they protected from changes/modifications/deletion? If not, then the malicious
actors can prevent data recovery by encrypting or deleting the backups.

Furthermore, immutability also helps compliance with industry regulations such
as HIPAA, FedRAMP, FISMA, CJIS, and helps organizations get cyber-insurance for
their critical applications.

For more on cyber-insurance and immutability, read meet cyber insurance
requirements with immutable backups.


IS ADMIN ACCESS PROTECTED VIA MULTI-FACTOR AUTHENTICATION?

Analysis of multiple successful ransomware attacks reveal that hackers gained
access to the network via a compromised admin account. Therefore, it’s necessary
to control admin access to critical systems, production and backup, using
multi-factor authentication (MFA).

Preferably, MFA should be implemented for each endpoint in the system including
storage, backup servers, network controllers, etc.


WHAT MANAGEMENT OPTIONS DOES THE DRAAS PROVIDER OFFER?

While it varies based on the vendor, DRaaS is often available with three
management options:

 1. Self-Managed DRaaS: The option where the responsibility of configuration,
    management, monitoring, and restore is taken care of by your in-house IT
    team. While the service provider provides the backup software, and the
    secure infrastructure for the backup copies.
 2. Partially Managed DRaaS: In this management option, part of the
    responsibility of disaster recovery lies with your in-house IT team while
    the rest is managed by the service provider’s experts. The specifics vary
    depending on the arrangement between the service provider and the customer.
 3. Fully Managed DRaaS: As the name implies, in this case, all of the
    responsibility lies with the service provider from installation,
    configuration, management, monitoring, testing, and to restore; everything’s
    included.


WHO IS RESPONSIBLE FOR WHAT?

Considering the specificity and requirements of most data protection and data
privacy regulations, it’s necessary to clarify the responsibilities of the
service provider versus the data owner.

Depending on the chosen DRaaS management option, the scope of the responsibility
may vary. However, it’s important to note that regardless of who manages what,
while DRaaS provide the backup tools and management, it’s the responsibility of
the data owner (the customer), to ensure effective data security and data
protection. This includes any liability that may incur in the event of a
disaster.


CONCLUSION

Disaster Recovery as a Service (DRaaS) provides the necessary tools to
organizations to protect employee/customer data from cyber-threats such as
ransomware, hackers, malicious employees, etc.

The primary benefit of DRaaS is that businesses gain access to professional data
protection capabilities without having to invest in hardware or spending time
training IT personnel. Moreover, the organization remains protected even if an
in-house expert is unavailable which is a fix to situations where employees are
sick, on leave/vacation, or when they leave the company.

Furthermore, with capabilities such as cloud air-gapped backups and
immutability, DRaaS can be the difference between complete disruption and data
loss, and a minor inconvenience; in the event of a ransomware attack.

Looking to protect your critical applications using disaster recovery as a
service (DRaaS)? We can help!

Check out our backup and disaster recovery as a service (BDRaaS) solution for
more details. Got questions? Fill out the form on our contact us page to talk to
our experts for demos, quotes, and more information.


Search for:



RECENT POSTS


 * Recent
 * Popular

DOWNTIME COST: HOW TO CALCULATE AND MINIMIZE IT

Downtime is bad for business. When applications, data and services are
unavailable, business is disrupted, customers and stakeholders are unhappy, and
regulatory authorities fine you. The true cost of unplanned downtime goes beyond
lost revenue. How does one calculate...

DISASTER RECOVERY AS A SERVICE (DRAAS) OR ON-SITE DR APPLIANCE?

Disaster Recovery-as-a-Service (DRaaS) delivers serverless recovery capabilities
while disaster recovery (DR) appliances provide the on-prem secondary site that
facilitates quick recovery. Which of the two is the best fit for you? Both
deployment options have their...

FC SAN VS ISCSI SAN: WHAT’S THE DIFFERENCE?

Storage area networks (SANs) are a permanent fixture in corporate data centers
used to host high-performance block-level structured workloads such as
databases, applications, etc. If you’re familiar with SAN systems, then you’ve
heard of Fibre Channel (FC) and iSCSI...

WHAT IS BCDR – A GUIDE TO BUSINESS CONTINUITY AND DISASTER RECOVERY

Business continuity and disaster recovery aim to keep an organization
operational. These are interrelated practices focusing on creating resilient
data infrastructures for businesses. Since every organization, whether a small
operating business or a large enterprise,...

NAS SECURITY: WHAT TO EXPECT AND HOW TO SECURE YOUR NAS

Network attached storage (NAS) systems are a permanent fixture in a corporate
data center. Whether it’s setting up a file storage and sharing environment for
your remote workforce, storing surveillance videos, financial records, and
patient information, or running 4K...




CONTACT US:



Send



YOU HAVE SUCCESSFULLY SUBSCRIBED!


YOU MAY ALSO LIKE


DOWNTIME COST: HOW TO CALCULATE AND MINIMIZE IT

by StoneFly Inc | Sep 8, 2022 | Blog

Downtime costs are more than lost revenue. It includes reputational damage, SLA
fines, recovery, and PR costs. Learn how to calculate IT downtime costs, and the
best practices to minimize it.

read more


DISASTER RECOVERY AS A SERVICE (DRAAS) OR ON-SITE DR APPLIANCE?

by StoneFly Inc | Aug 10, 2022 | Blog

Disaster Recovery-as-a-Service (DRaaS) vs On-Site DR Appliance: Serverless
recovery where service provider is responsible for management versus a secondary
site that delivers faster recovery and helps with compliance. Which one do you
need?

read more


FC SAN VS ISCSI SAN: WHAT’S THE DIFFERENCE?

by StoneFly Inc | Jul 20, 2022 | Blog

Differentiate between Fibre Channel (FC) SAN vs iSCSI SAN: which is suitable for
which use-case, and what are the pros and cons of each.

read more

GET IN TOUCH WITH US

Contact Name*

Company*

Phone* (extensions can be entered in the "Message" field)

Email Address*

Message
*All fields with an asterisk are required.
Please leave this field empty.


Δ



ABOUT STONEFLY

Founded in 1996 and headquartered in Castro Valley – StoneFly, Inc. was
established with the vision to simplify, optimize and deliver high performance
budget-friendly data center solutions for SMBs, SMEs, and large enterprises.
Beginning with its registration of the iSCSI.com Internet domain name in March
1996, StoneFly has made iSCSI into a standard which is now used by IT
professionals around the world.

With over 24 years of innovation in data storage, hyperconverged infrastructure
(HCI), and backup and disaster recovery (DR) industries and technology
partnerships with market leaders like VMware, Veeam, Microsoft Azure, and AWS
cloud, StoneFly’s range of ever-growing data management products continue to
grow and include physical, virtual, and cloud solutions such as NAS, SAN, S3,
unified NAS + SAN + S3 appliances, storage gateways, backup gateways, complete
backup and DR systems, RAID systems, IP video surveillance storage systems, data
migration software and more – powered by StoneFly’s patented 8th generation
storage virtualization software StoneFusion™ and integrated with enterprise
features and data services.

Learn More
 * Facebook
 * Twitter
 * Instagram
 * LinkedIn

© 2022 StoneFly | All Rights Reserved


SUBSCRIBE TO OUR NEWSLETTER

Join our mailing list to receive the latest news, updates, and promotions from
StoneFly.



SUBSCRIBE!



PLEASE CONFIRM YOUR SUBSCRIPTION FROM THE EMAIL