wonderfully unique software solutions

Axcient launches virtual office recovery software for MSPs

Axcient has unveiled an addition to its x360 business availability lineup aimed at helping managed services providers deliver business continuity and disaster recovery services via the cloud.

Axcient x360Recover Virtual Office promises “easy to use and always-on self-managed cloud disaster recovery” for appliance-based or direct-to-cloud systems, the company said in its announcement.

Ben Nowacky, senior vice president of product at Axcient, said the solution offers MSPs “insurance they need” in the event of server outage, local disaster or cyberattack such as ransomware.

The software aims to allow instant recovery of production servers and workstations in the Axcient cloud and incorporates regular full-office recovery test functionality. Each virtual office instance can be configured via VPN, site-to-site OpenVPN, and port forwarding.

Data is encrypted in transit and at rest, and role-based authentication is also featured.

The vendor was a finalist in CRN Magazine’s 2020 Tech Innovator Awards, for its MSP-focused AirGap technology, and named to CRN‘s Edge Computing Top 100 List for 2020.

“Axcient AirGap is a unique security offering that we created to eliminate the threat of ransomware for our partners,” Nowacky said.

“AirGap provides a multi-layered security approach to protect partners from data deletion, and is fully integrated into Axcient’s x360 platform.”

David Bennett, chief executive at Axcient, said: “Axcient offers partners an innovative, unified platform to cure data loss for their clients and a dedicated support team to address any concerns quickly. Our goal is to keep businesses up and running with our technology.”

Blaine Raddon, chief executive at CRN‘s publisher, The Channel Company, said: “Increasing data collection and processing power at the edge is the foundation needed to create intelligent systems, enabling companies to improve efficiency and productivity and work smarter.”

Recent Articles

Why storing all your enterprise data enables ROT at the core

Data is everywhere -- and increasingly difficult to track and manage. Worse still -- as Lepide's Philip Robinson notes -- much of...

Diverse file exploits isolated in HP-Bromium threat report for Q4

Hackers and other malicious actors could be increasingly targeting diverse files and applications, according to HP-Bromium's threat intelligence report.

‘Zero trust’ cybersecurity approach is misunderstood: Stormshield

Trusting nothing and no one when it comes to network access is impractical if not completely impossible, endpoint security vendor Stormshield has...

Firmware hackers target embedded systems and IoT apps

Microsoft's report of a a rise in firmware attacks partly reflects the rise of embedded systems and the Internet of Things (IoT),...

Netsparker and Acunetix web scanning apps get design and brand revamp

Invicti Security - the parent brand of web scanners Acunetix and Netsparker - has flagged changes to its product design and user...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox