What are the RTO and RPO SLAs that Vaultastic assures?
Vaultastic ensures a near-zero Recovery Point Objective (RPO) and a Recovery Time Objective (RTO) of just a few hours, thanks to its built-in redundancy.
With an in-built DR site, where data is simultaneously written to multiple data centers (availability zones), Vaultastic provides an exceptional level of data durability, delivering 11 9s of reliability. This robust infrastructure guarantees that your data remains highly secure and recoverable even in the case of a major outage on one of the availability zones of our cloud platform.
Once I archive emails to Vaultastic, can I delete aging emails from my primary mailboxes? Do I need to maintain another backup?
Yes, once your information is securely archived in Vaultastic, you can safely delete aging emails from your primary mailboxes.
Vaultastic provides robust data durability and availability, with a disaster recovery site that stores multiple redundant copies of your emails.
Vaultastic’s cloud storage offers 11 9’s of durability, ensuring an extremely low risk of data loss (near zero RPO). With this level of protection, there is no need to maintain another backup.
Who owns the data on the cloud?
You retain full ownership of your data. Vaultastic acts as the custodian, securely safeguarding your information on the cloud.
While we ensure its protection, the information always remains yours. Vaultastic also provides data compatibility and portability, with tools and options for mass data extraction whenever needed, ensuring you can access and move your data freely.
How is customer data privacy ensured?
Vaultastic ensures customer data privacy with multiple layers of security built on the cloud-shared security model. Key protection controls include encryption of data both at rest and in transit, as well as robust identity, access management, and authorization controls.
This ensures that your data is accessible only to authorized individuals, safeguarding your information from unauthorized access and maintaining strict privacy standards.
How is cloud data storage better than deploying our servers?
Cloud data storage offers several advantages over deploying your own servers and storage. It eliminates the need for costly hardware investments and ongoing maintenance while providing scalable, durable and on-demand storage.
Cloud enterprise information archiving solutions, like Vaultastic, also offer enhanced security, data redundancy, and built-in disaster recovery, ensuring your information is always protected and accessible.
With cloud storage, you benefit from automatic updates and improvements, along with the flexibility to scale as your data grows, all without the operational overhead of managing on-premises infrastructure.
In addition, cloud solutions like Vaultastic offer a 30% lower TCO compared to comparable on-premises setups.
How does Vaultastic deliver such high data durability?
Vaultastic ensures exceptional data durability by storing immutable copies of your email data across multiple geographically separated availability zones (data centers) within AWS’s cloud infrastructure.
Data is written simultaneously to both data centers, which guarantees near-zero Recovery Point Objective (RPO) and provides an impressive data durability rating of 11 9’s. This robust design safeguards your data, ensuring its long-term availability and protection against loss or corruption.
How secure is my data in the Vaultastic cloud?
Vaultastic ensures the highest level of security with a comprehensive security checklist that goes beyond basic cloud security configurations. The solution continuously monitors for potential threats and provides closed-loop feedback to mitigate risks effectively.
Built on the industry-leading AWS cloud infrastructure, Vaultastic builds on the cloud’s shared security model. AWS offers security OF the cloud, while Vaultastic ensures security IN the cloud.
Vaultastic enhances protection at every component level, including network, data, and applications. Key security features include role-based access management (IAM), encryption at rest and in transit, DDOS protection, and multi-factor authentication.
In addition, Vaultastic is designed to meet stringent cybersecurity guidelines from industry regulators such as RBI, SEBI, and IRDAI. The platform undergoes regular vulnerability assessments, penetration testing, and an annual Foundational Technical Review (FTR) by AWS to ensure its security infrastructure remains robust and compliant with industry standards.
What security measures does Vaultastic use to protect my data?
Vaultastic employs a robust, multi-layered security framework based on the cloud’s shared security model to safeguard your data.
It adheres to cybersecurity guidelines from several industry regulatory bodies, ensuring compliance and protection. Vaultastic leverages a public cloud platform that guarantees 11 9’s of data durability, with an in-built disaster recovery (DR) site, alleviating concerns about Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
Additionally, strong end-to-end encryption ensures that your data remains visible only to you, further enhancing security and privacy.
Is Vaultastic tested, audited and certified by an independent body?
Yes, Vaultastic is thoroughly tested, audited, and certified by independent bodies. As a cloud-native solution running entirely on the AWS public cloud, Vaultastic leverages AWS’s shared security model.
Mithi’s solutions undergo an annual audit by AWS as part of their Foundational Technical Review (FTR) program, ensuring adherence to strict security, performance and reliability standards.
Additionally, many of Vaultastic’s large, regulated customers conduct independent Vulnerability Assessments and Penetration Testing (VAPT) periodically to verify the security of the platform across all layers. We are proud to note that in over a decade of deploying our solutions across hundreds of servers, no intrusions have been reported.
Does Vaultastic support role-based access?
Yes, Vaultastic supports role-based access as part of its robust security framework. This ensures that only authorized personnel can access specific data or perform certain actions based on their roles.
Besides role-based access, Vaultastic’s security management practices include continuous monitoring, automated threat detection, frequent audits, and ongoing system upgrades. Additionally, regular training on security best practices and continuous improvements help to build strong cyber resilience, safeguarding your data against evolving threats.