Netswap Encryption setup using Truecrypt

We’ve previously discussed the ability of the NetSwap NAS devices being able to encrypt using the Truecrypt algorithm.  In this Blog, we’ll do a detailed walk through of setting it up. High-Rely NetSwap Plus Encryption Setup Guide Your NetSwap Plus Device is ready for Volume Encryption straight out of the box. Volume Encryption on the…

Read Article

NetSwap 200 Illustrated

Blog

The NetSwap 200 Difference from other NAS products.   NetSwap 200 is our most widely sold NAS product. Yet, with so many other NAS platforms to choose from, it’s hard to quickly understand the NetSwap 200 difference and possibilities. The NetSwap line offers the best of Cloud and removable drive technologies.  We offer this graphic to help illustrate…

Read Article

Using RMM Tools with NetSwap Backup Appliances

Spotlight

Highly Reliable Systems manufactures true backup NAS appliances and that can be monitored with Remote Monitoring and Management (RMM) tools such as LabTech, Kaseya, N-able, and others. Such tools may be used to generate tickets in ConnectWise. In this overview we outline some of the monitoring parameters offered. Network Attached Storage (NAS) devices are popularly used for adding shared storage to a small business network. While providing an inexpensive and convenient way to store extra data, they do not have a true backup focus. Our backup appliances include highly-removable drives, auto-mirroring, offsite replication, virtual machine support, and remote monitoring functionality to provide the most reliable backup solution.

Read Article

Getting Data Out of the Cloud Before Disaster

Blog

As the size of information stored in the cloud grows increasingly larger, IT managers must plan on getting data out of the cloud when it’s critically needed during disaster recovery. For some businesses, the cloud is a place to deposit a second copy of data already retained locally. For others the cloud is primary storage, where unique data is created and modified. Problems arise in both cases: when local data is lost due to fire, flood, or theft, when the data is too large for a timely transfer across limited Internet bandwidth, or when a cloud provider shuts down. This all begs the question: is redundant data in place?

Read Article