Please note, you will need a monitor and keyboard attached directly to the NetSwap along with a 4GB or larger USB flash drive. You will also need to save a copy of your current Config to restore your settings after the restore is complete. This can be done by selecting Export Configuration from the left-hand…
We’ve previously discussed the ability of the NetSwap NAS devices being able to encrypt using the Truecrypt algorithm. In this Blog, we’ll do a detailed walk through of setting it up. High-Rely NetSwap Plus Encryption Setup Guide Your NetSwap Plus Device is ready for Volume Encryption straight out of the box. Volume Encryption on the…
The NetSwap 200 Difference from other NAS products. NetSwap 200 is our most widely sold NAS product. Yet, with so many other NAS platforms to choose from, it’s hard to quickly understand the NetSwap 200 difference and possibilities. The NetSwap line offers the best of Cloud and removable drive technologies. We offer this graphic to help illustrate…
Highly Reliable Systems manufactures true backup NAS appliances and that can be monitored with Remote Monitoring and Management (RMM) tools such as LabTech, Kaseya, N-able, and others. Such tools may be used to generate tickets in ConnectWise. In this overview we outline some of the monitoring parameters offered. Network Attached Storage (NAS) devices are popularly used for adding shared storage to a small business network. While providing an inexpensive and convenient way to store extra data, they do not have a true backup focus. Our backup appliances include highly-removable drives, auto-mirroring, offsite replication, virtual machine support, and remote monitoring functionality to provide the most reliable backup solution.
As the size of information stored in the cloud grows increasingly larger, IT managers must plan on getting data out of the cloud when it’s critically needed during disaster recovery. For some businesses, the cloud is a place to deposit a second copy of data already retained locally. For others the cloud is primary storage, where unique data is created and modified. Problems arise in both cases: when local data is lost due to fire, flood, or theft, when the data is too large for a timely transfer across limited Internet bandwidth, or when a cloud provider shuts down. This all begs the question: is redundant data in place?