White Label Cloud Services – What Features Are Important?

White Label Cloud Services – What Features Are Important?

White Label Cloud Services – What Features Are Important?

white-label

A month ago we published an article which took an in-depth look at white label cloud services and whether or not your business should consider using them. Thanks to Chris Mederios, President of Canadian Cloud Backup, we discovered that IT service providers, managed service providers and software developers were particularly well-placed to take advantage of white label service’s benefits.

Once your company has made the decision to use white label services you have to decide which provider to use. A key aspect of your choice should be what features the provider offers. CloudTweaks took a look at some of the most important…

1. Feature-Rich Administration Panel

An advanced web-based management tool is a vital feature to look out for. A high-quality one should enable you to run an entire cloud reseller company directly from the web console.

Important services to ensure are included are the ability to conduct a web-based restore and a way to view logs and manage events. A well-designed web-based restore feature will allow you to verify backups are functional, restore files remotely and manage users from the web interface, whereas a detailed log and event management service will enable you to not only see all completed and pending backups, but all view and monitor individual user’s logs.

2. Auto-Backup

An auto-backup facility will give you the ability to schedule regular offsite backups to ensure your client’s data is continuously being protected.

In order to protect you and your clients against excessive data charges, you should ensure your provider offers both bit level incremental backups and local seeding. Bit level incremental backups mean only updated changes are transferred to the server, whereas local seeding refers to how a provider can use a local seed on an external harddrive to physically transfer data at the data centre. It’s also worth checking to see if data retention times are customisable, a feature that will allow good data to be amalgamated without taking up too much space on the server.

3. Encrypted Data Transfer and Compression

Data should be encrypted using 256-bit AES encryption and transferred by using a private key over SSL. This is the same method of encryption used by governments around the world and means you can be certain your data will be secure.

Data compression should be able to be easily turned on or off, should let users select which extensions not to compress, and should allow for minimum and maximum file sizes to be set. Ideally compression will provide a 2:1 ratio.

Supported Servers

It’s important that you check which servers are supported. The more holistic the support, the better. Chris Mederios’s Canadian Cloud Backup will support NAS servers, MySQL hot backups, MS SQL server backups, MS Exchange server backups, secure file servers, and hot backups.

All the backups can be quickly configured by using Canadian Cloud Backup’s easy-to-use wizards. Their wizards enable users to register and create scheduled jobs, backup a device or restore a backup through a sleek and well-designed user interface.

Conclusion

These are the features we believe are the most essential when choosing your white label provider. If you want an easily solution from a provider which offer all the above, then Canadian Cloud Backup come highly recommended. In addition to the features we mention here they also have energy efficient data centres to help reduce your carbon footprint and store all data on Canadian soil – perfect for businesses worried about the USA’s Patriot Act or NSA.

By Daniel Price

Post Sponsored By Canadian Cloud Backup

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…