Frequently Asked Questions
If your question is not addressed below, contact us through our feedback form and we will get back to you shortly.
- How does IDrive® 360 secure my data?
- How does IDrive® 360 protect data?
- Where is IDrive® 360 data stored?
- My data is affected by ransomware. Can I recover my data using IDrive® 360?
How does IDrive® 360 secure my data?
IDrive® 360 uses industry standard 256-bit AES encryption on transfer and storage, ensuring all your data is secure and safe. Data stored at our world-class data centers is encrypted using the encryption key (known only to you in case you set the private encryption key).
WARNING: IDrive® 360 does not store your private encryption key on its servers. It is recommended that you archive it safely to backup and restore your data. However, if you choose the Default encryption key, you need not remember it.
How does IDrive® 360 protect data?
IDrive® 360 performs backup of all the computers of your organization and minimizes the impact of any kind of downtime. This helps to recover your critical data instantly in the event of a data loss, ensuring business continuity, revenue, and most importantly, credibility.
Where is IDrive® 360 data stored?
The IDrive® 360 application and data are hosted at multiple world-class data centers. The data centers provide the physical environment necessary to keep the servers up and running 24/7.
These world-class facilities are custom designed with raised floors, HVAC temperature control systems with separate cooling zones, and seismically braced racks. They offer the widest range of physical security features, including state-of-the-art smoke detection, fire suppression systems, motion sensors, 24/7 secured access, as well as video camera surveillance and security breach alarms.
We also have periodic third party reviews of our network infrastructure to check for known application and service vulnerabilities.
My data is affected by ransomware. Can I recover my data using IDrive® 360?
IDrive® 360 enables you to perform snapshot restore to a time prior to ransomware attack, thereby ensuring you can recover your valuable data.