White Label Cloud Services – What Features Are Important?

White Label Cloud Services – What Features Are Important?

White Label Cloud Services – What Features Are Important?

white-label

A month ago we published an article which took an in-depth look at white label cloud services and whether or not your business should consider using them. Thanks to Chris Mederios, President of Canadian Cloud Backup, we discovered that IT service providers, managed service providers and software developers were particularly well-placed to take advantage of white label service’s benefits.

Once your company has made the decision to use white label services you have to decide which provider to use. A key aspect of your choice should be what features the provider offers. CloudTweaks took a look at some of the most important…

1. Feature-Rich Administration Panel

An advanced web-based management tool is a vital feature to look out for. A high-quality one should enable you to run an entire cloud reseller company directly from the web console.

Important services to ensure are included are the ability to conduct a web-based restore and a way to view logs and manage events. A well-designed web-based restore feature will allow you to verify backups are functional, restore files remotely and manage users from the web interface, whereas a detailed log and event management service will enable you to not only see all completed and pending backups, but all view and monitor individual user’s logs.

2. Auto-Backup

An auto-backup facility will give you the ability to schedule regular offsite backups to ensure your client’s data is continuously being protected.

In order to protect you and your clients against excessive data charges, you should ensure your provider offers both bit level incremental backups and local seeding. Bit level incremental backups mean only updated changes are transferred to the server, whereas local seeding refers to how a provider can use a local seed on an external harddrive to physically transfer data at the data centre. It’s also worth checking to see if data retention times are customisable, a feature that will allow good data to be amalgamated without taking up too much space on the server.

3. Encrypted Data Transfer and Compression

Data should be encrypted using 256-bit AES encryption and transferred by using a private key over SSL. This is the same method of encryption used by governments around the world and means you can be certain your data will be secure.

Data compression should be able to be easily turned on or off, should let users select which extensions not to compress, and should allow for minimum and maximum file sizes to be set. Ideally compression will provide a 2:1 ratio.

Supported Servers

It’s important that you check which servers are supported. The more holistic the support, the better. Chris Mederios’s Canadian Cloud Backup will support NAS servers, MySQL hot backups, MS SQL server backups, MS Exchange server backups, secure file servers, and hot backups.

All the backups can be quickly configured by using Canadian Cloud Backup’s easy-to-use wizards. Their wizards enable users to register and create scheduled jobs, backup a device or restore a backup through a sleek and well-designed user interface.

Conclusion

These are the features we believe are the most essential when choosing your white label provider. If you want an easily solution from a provider which offer all the above, then Canadian Cloud Backup come highly recommended. In addition to the features we mention here they also have energy efficient data centres to help reduce your carbon footprint and store all data on Canadian soil – perfect for businesses worried about the USA’s Patriot Act or NSA.

By Daniel Price

Post Sponsored By Canadian Cloud Backup

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

Find out more
View All Articles

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb