Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Backupify – Securely Backing up the Cloud from the Inside Out

Given the necessity of backups, because lets face it – hardware fails, users make mistakes, and hackers have no issue wiping the server after they’re done with it, organizations make it a key part of their business continuity and incident response plans. What about the data stored in that mythical cloud? How is it protected?

SecurityWeek recently spoke with a company that wanted to answer that question.

Given the necessity of backups, because lets face it – hardware fails, users make mistakes, and hackers have no issue wiping the server after they’re done with it, organizations make it a key part of their business continuity and incident response plans. What about the data stored in that mythical cloud? How is it protected?

SecurityWeek recently spoke with a company that wanted to answer that question.

BackupifyThe company in question is Backupify. Founded in Kentucky in 2008 and now headquartered in Cambridge, Mass., the company isn’t a giant by any means, but they’ve grown quite a bit over the past few years, and demand for their offering is rising. Why has the demand grown? It’s driven by the need to retain an ever-increasing amount of data. In addition, backups have expanded form an onsite enterprise need, to one that touches hosted environments as well.

Unlike other SaaS backup vendors, Backupify is a little different. I’m not going to lie, I’m always skeptical of any company that claims to be unique when they’re in a market with scores of vendors that do the same thing. Yet, they’ve got something good going on, and what got my attention the most was the level of transparency showed on our first meeting.

Last month, during the RSA Conference, SecurityWeek spoke with Ben Thomas, the VP of product development and security. He’s energetic and extremely proud of the company, and it’s clear that he has a large amount of personal investment it. We met with Thomas because of some news that came out shortly before the conference started. Backupify had just completed a penetration test performed by Rapid7, and they were willing to talk about it.

Testing performed by Rapid7 isn’t cheap. An audit from them can be quite pricy, but it’s worth it if the goals of the test align with a given organization’s security needs. Thomas selected Rapid7 because he preferred a local vendor, and he wanted to form a relationship based on trust and hands on testing, not a general website scan. Backupify passed the penetration test. We confirmed the results with Rapid7, and as an additional check, we spoke to the Rapid7 employee who performed Backupify’s test himself to confirm the data we were shown.

(Note: After talking to both sides, we can report that Backupify did indeed pass and no major security problems were reported, however we cannot reproduce or cite the report for confidentiality reasons.)

At the same time, the penetration test was just one part of their security enhancement plans. They also bucket level versioning on Amazon S3, giving them multiple copies of a given file that has been backed up the moment the original is altered, and AWS multi-factor authentication delete capability, to harden the deletion process.

This is on top of the practices within the company itself, the stuff their customers never see. Secure development and design are a core part of the engineering process. The reason for the baked-in security approach is two fold; for one Thomas is a security guy himself, so it comes as a habit and it just makes sense in order for their customers to trust them. Backupify was founded on the principal of trust after all.

Advertisement. Scroll to continue reading.

So while the company was built with a security mindset, and it is baked-in to the product, what exactly do they do? They make backups of all of your cloud data, and their most popular service is focused on Google Apps. You may not know it, but in January, 94% of the seats used by Google Apps belonged to just 15% of the companies that use the service.

As it turns out, when a company starts their free trial, Google’s API reports the total number of seats that organization uses. This offers some interesting data, such as the fact that of the organizations with 1,000 or more users, 40% of them are educational domains. Another tidbit is that the average amount of space stored in a Google Apps account is 2GB, and of that 97% of it comes form GMail. With that said, it should surprise no one that the number one reason for data loss in Google Apps is human error, and that’s exactly what Backupify wants cut down on.

Again, backups are something that just happens in IT, a long standing process that will never go away. The ability to backup and restore single items or entire users with a click of a button, for about $3 per user, is a huge deal for some organizations. Backupify had just over 3,000 customers when we talked to them, but that’s bound to change now that they offer backup solutions for Salesforce (It’s called Snapshot and it’s a one-time backup and download service for an entire Salesforce CRM).

In addition to Salesforce and Google Apps, Backupify also allows customers to save social media accounts, including Flickr, Twitter, Facebook, LinkedIn, and Blogger. At the same time, demand is leading them to develop offerings for other services too.

When it comes to archives, not only is the data stored in the cloud by Backupify, but customers can download those backups and keep them internally. This is just another feature to ensure that their customers retain full control over data. There’s other granular management controls too, such as searching and data retention policies.

Overall, they’re affordable; they have a solid system in place to help organizations in the cloud deal with backups just as if the data was in-house; and the entire platform was built with security in mind from the start. Not bad for a company that you’ve probably never heard of.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed the new CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.