Attention IT Managers & CIOs

How to prevent a $1.14 million data recovery bill by securing your endpoints against data loss, unauthorized access & ransomware in just 24 hours.

Step 1: Watch the video below
Step 2: Click Book a Free Consultation

Trusted by leading companies across the globe

CASE STUDY

From no data backups to protecting 8TB of data across 350 users in just days

AGFGRI Requirements:

AFGRI’s initial requirement was simple: protect end-user company data in a cost-effective manner.

Client:

Morne de Klerk, Technology Manager, AFGRI

Website:

https://www.afgri.co.za/

BEFORE

0

Protected
users

100%

User reliant policy
implementation

Days

to restore
data

After

350

Protected
users

0%

User reliant policy
implementation

Minutes

to restore
data

Full Story

AFGRI had a software solution in place but it lacked the required functionality needed to effectively protect and run in its environment. They were at the point of either getting a solution that would work for them OR upgrading their entire network and user devices at a massive cost.

Its data protection requirement was fulfilled by opting for Cibecs Endpoint Cloud. End-user devices
no longer hung on a regular basis, the network was no longer under constant strain and users were able to work more efficiently and be more productive. Additionally,  data recovery user downtime was decreased dramatically due to the fact that users could recover data themselves without having to go through a lengthy technical support process. This saved both the user’s time and required less involvement from IT technical support. Freeing up time for the IT staff to focus on other functions. Crucially, IT Management enjoyed a overview of the protection of their end-user data environment and achieved automated protection and visibility

“During Covid-19 lockdown our end users’ data was protected even though they were working remotely. End users are able to restore data without logging calls and calling on IT to restore lost endpoint data.”

Morne de Klerk, Technology Manager, AFGRI

Industry Insights

4000+

Ransomware attacks
take place everyday

(techjury.net)

68%

Of (US & UK) consumers who would hold a
company responsible
for personal data loss.

(Cybernews.com, 2021)

No.1

Cause of data loss
is human error.

(Netwrix Research)

CASE STUDY

From data leakage concerns to complete security and peace of mind

IDC Requirements:

IDC was searching for a solution that would prevent end-user data loss, downtime and loss of business continuity. It also wanted a solution that could protect sensitive client data from unauthorised access.

Client:

Gert Prinsloo, IT Infrastructure Manager, IDC

Website:

https://www.idc.co.za/

BEFORE

0%

Recoverable
data

Manual

Data
Back up

0%

Data
encryption

After

100%

Recoverable
data

Automated

Data
Back up

100%

Data
encryption

Full Story

We had no endpoint backup strategy in place and had to deal with numerous cases where data was lost.

User downtime was a challenge, the company lost business continuity and we needed to mitigate the risk of data loss against staff productivity. Hardware can be replace easily but you cannot replace data easily. The loss of data has had a direct impact on productivity and comes with huge reputational and legal risk. IDC works with confidential client information that must not be accessible by unauthorized people.

We realized we needed a solution to mitigate our risk. After extensive market research in which Cibecs came out tops. Our endpoint data protection strategy now completely revolves around our Cibecs implementation.

Our biggest win is knowing, without a shadow of a doubt, that our end user data is 100% protected at all times. A proper partner was essential to making this work but it was the great relationships, technical support and solid endpoint solution that made it all come together.

Many of our users rely on being able to restore their own data. Others prefer working with our technical team and have peace of mind that their data is always available, secure and easily recoverable.

With new stringent  data protection compliance requirements being imposed on us, we are confident that with Cibecs as our data protection and security provider we meet and exceed all the legal audit and compliance requirements.

We work on deals worth billions. The value of our information is priceless to us and the risk of damage through data loss and breaches is severe.

Gert Prinsloo from IDC has confidence in his data protection and security strategy with Cibecs and said: “Peace of mind that our endpoints are protected is our biggest win.”

“Cibecs was instrumental in our strategy to move to the cloud. We now have complete peace of mind as Cibecs is forward thinking and always ensures our data protection and that it meets the security is up to date with the latest technology and requirements in the industry. Cibecs ensures our endpoint data continuity, and therefore improves productivity”

Gert Prinsloo, IT Infrastructure Manager, IDC

Who is this for?

(and who it isn’t for)

This is for you if you’re
an IT manager or CIO who…

This is NOT
for you if you…

Here’s the Truth…

You can achieve protection of your user data using a combination of cloud services, security and backup products and specialists.

 

However, you will likely fail to get traction because it will require massive amounts of time, money and technical resources and users most likely won’t comply with data protection policies.

 

We are the best people, dedicated to solving this problem for companies that have 100 to 5,000 users.

Richard Dewing

Cibecs Co-founder & CEO

Richard, who has over 22 years’ experience within the data security industry, is a venture capitalist investor, technologist, and serves as a board member of Venture Technology Partners.

He also  holds board seats in a number of SaaS and tech companies and is intimately aware of the challenges that endpoint data protection poses.

 

How we
solved this problem

Cibecs started out in 2004 as a hardware and software company serving the business market. Today it is one of the foremost IT data protection and security technology providers with partners, resellers, distributors and customers in 16 countries across the globe.

In the early 2000s, while working on a range of business hardware and software solutions, we realised that companies faced major challenges in trying to manage and secure their endpoint data.

Business personnel stored their data in many different locations and the data was either not being backed up or, if it was, it was a nightmare for IT to track and manage.

In addition, few companies had any security at endpoint level and security measures that were used, were poor and ineffective. When users’ personal computers and laptops were stolen, lost, crashed, became infected with viruses or were attacked by ransomware, IT managers faced a major headache trying to recover lost data.

We saw a gap in the market for a viable, cost effective and simple solution to this problem.

After months of testing different solutions, we realised that multiple systems were needed to cover all the gaps and that implementing all these systems would cost time and money.

We made it our mission to develop the solution required.
We put together a dedicated team who spent the better part of four years to create a simple, cost-effective solution that covered every aspect of endpoint data protection.

Our solution worked so well that we secured our first major global investor, Dr. Hasso Plattner, co-founder of software solutions provider, SAP. From there we quickly scaled up to become the user data protection solution of choice for major institutions in a range of industries from retail and finance to tech.

We have partnered with some of the biggest names in tech which includes industry heavyweights, Western Digital and Ingram Micro, which the largest tech distributor globally.

Other clients include major global banks and governments.

We are a Microsoft endorsed partner and are listed as one of the Microsoft Preferred Solutions.

Today, our services and clients span the globe and include South America, the USA, Europe, UK, Africa, Australia, Vietnam, India and Singapore.

As the shift towards a remote workforce began the need for seamless data management, backup and security has become even more important.

Now more than ever, Cibecs is focused on achieving zero data loss and maximum protection for IT Managers and CIOs as quickly and effectively as possible.

Our 8 Step Method

Here’s our proven 8 step method to protect your endpoints against data loss, unauthorized access & ransomware attacks.

Accurately map out your user device & endpoint data environment

Define & deploy a detailed policy of what data should be protected

Use source based deduplication & automate user backups to a secure central store

Implement file based encryption

Remotely wipe PC’s & laptops that are
decommissioned, replaced, lost or stolen

Centrally control who has access to data 

Map out and test all data recovery & migration scenarios

Establish SLA compliance criteria, monitor and manage by exception

STEP 1

Accurately map out your user device
and endpoint data environment

The above images show the complexity of
using a combination of Active Directory and HR lists.

The Old Way

The Old Result

The New Way

The New Result

The above image shows the simplicity of a live up-to-date inventory of computers and users.

Key Insight

Correctly mapping out your user devices and data is critical to ensuring an effective data protection strategy.

STEP 2

Define and deploy a detailed policy 

of what data should be protected

The above is an example of the old way to create a company data protection policy.

The Old Way

The Old Result

The New Way

The New Result

The above image shows how simple it is to create a policy and rules for endpoints with Cibecs

Key Insight

Defining granular level data protection policies, being able to monitor deployment, implementation and thereafter monitoring ongoing compliance is crucial to ensure a workable, compliant strategy.

STEP 3

Use source-based deduplication and automate

user backups to a secure central store

The above image shows the typical environment with data being stored in multiple places and across many cloud servers.

The Old Way

The Old Result

The New Way

The New Result

The image above showsthe use of deduplication which implements convergent encryption for data at rest without compromising deduplication across user data.

Key Insight

Automating backup of all deduplicated data irrespective of where and how users store their data or which storage services they use, will ensure data is recoverable in every eventuality.

STEP 4

Implement file-based encryption

The above image is an example of the lengthy process  required to safeguard one’s data the old way.

The Old Way

The Old Result

The New Way

The New Result

Once your endpoints have been inventoried, the software deployed and activated, encrypting your data is as simple as toggling the encryption button on.

Key Insight

Utilize an integrated centrally-managed file-based encryption to significantly reduce the complexity, time and effort of implementation.

STEP 5

Remotely wipe PCs and laptops that are

decommissioned, replaced, lost or stolen

The above stats shows the vulnerability companies can experience as a result of lost or stolen devices which compromises important company data.

The Old Way

The Old Result

The New Way

The New Result

The above image shows how simple it is to create a policy and rules for endpoints with Cibecs

Key Insight

Centrally managed forensic data deletion capability will drive down IT support costs,  increase service delivery and enhance data security.

STEP 6

Centrally control who has access to data

The above industry stats demonstrates the impact employees, their behaviour and devices have on company data.

The Old Way

The Old Result

The New Way

The New Result

The is a snapshot of the easy-to-use Cibecs dashboard where you can easily geo-locate, remote wipe, revoke user access and check the safety of your endpoints.

Key Insight

The ability to block access to data enhances data security and limits the opportunity for malicious activity.

STEP 7

Map out & test all

data recovery & migration scenarios

The Old Way

The Old Result

The New Way

The New Result

An example of how you would map out different data recovery scenarios.

Key Insight

To improve IT service delivery implement efficient data recovery & migration capabilities and test each scenario to ensure data is recoverable in every data loss scenario.

STEP 8

Establish SLA compliance criteria,

monitor and manage by exception

The above is an example of the old way data & security logs were managed.

The Old Way

The Old Result

The New Way

The New Result

The above image depicts the simple way the proper tool can communicate how secure your endpoint environment is.

Key Insight

Utilizing a single, SLA based, metric to manage data protection and security will significantly:

  • reduce effort and enhance management visibility into the data protection strategy
  • ultimately enhance the  ROI and the ability to monitor the performance of a data compliance strategy.

There are a few ways to achieve this…

Option 1

Do it yourself, using a combination of cloud services, backup products, security products and security specialists which is likely to fail because it is:

Time
consuming

Of your effort & requires
constant management

Is extremely
costly

01

Finding, implementing and then managing the right combination of products, services and skills takes a lot of time and money.

02

Buying these products and security specialists are expensive and can easily run into the hundreds of thousands of dollars a year. To attempt cost saving you’ll have to build inhouse skills which requires a big investment in both time and money.

03

Unfortunately, many products just don’t deliver on their promises.

04

Lastly, even if you do implement a multi-product solution you’ll have to spend massive amounts of time and money managing and supporting all these systems.

Option 2

You can use Cibecs and achieve complete user data protection and security within 24 hours, for a 1/10th of the effort and at a fraction of the cost of any other option.

Under
24 hours

Of the effort
and automated

Fraction of
the cost

This is for you if…

You are an IT manager or CIO with 100 to 5,000 users that wants  their user data protected and recovered in the event of loss or theft and you do not have endless resources or an unlimited budget to manage multiple systems to ensure endpoint data is protected. 

CASE STUDY

From no data security to protection of critical government data on end-user devices in 2 hours*

*from no protection to policy setup and deployment within 2 hours.

Stats SA Requirements:

Statistics South Africa faced a number of challenges in the end-user data environment. The major areas of concern being users not following policy, data not being recoverable and ultimately not meeting the requirements dictated by the Auditor General on the protection of end-user data.

Client:

Anele Chaza, DD: End User Support (ICT), Statistics South Africa

Website:

http://www.statssa.gov.za/

BEFORE

0

Protected end
user data

0TB

Amount of
data protected

5 Days

Data recovery
time

After

460

Protected
user data

8TB

Amount of
data protected

2 Hrs

Data recovery
time

Full Story

Department policy dictated that governmental data should be stored in shared folders, however, data almost always ended up on the local devices.

Users would approach IT Services when devices were lost or stolen and wanted IT to recover data – and when not possible – questioned why the department would provide devices but not have measures in place to protect the information on them.

Lastly the Auditor General logged the key finding that they could see they department were protecting server information but that the end-user data was not covered.

Cibecs was evaluated and found to cover all of the requirements and deliver additional operational value. Users now have less downtime and IT technical support resources no longer had to spend their time trying to recover data which would have been lost or take extremely long to recover where recovery was possible.

Statistics SA implemented Cibecs just before the worldwide COVID pandemic hit in 2019. When lockdown procedures were implemented a key part of the IT Executive team’s role was to quickly assess their ability to protect and assist users while they were working from home. Detailed scenarios were mapped out including protocols in the event of stolen devices, information protection protocols; everyday scenarios at home from kids spilling milk on a notebook to the device being dropped, all events that the department had no control over. Cibecs was core to the strategy and no user data has been lost or valuable time wasted in trying to recreate data. In addition, user support requirements are down.

“Cibecs was instrumental in protecting the critical governmental data stored on our end-user devices while they worked remotely. Due to this capability the department invested in additional notebook devices and increased the number of Cibecs protection licenses because we are satisfied that our valuable data is protected”

Anele Chaza, DD: End User Support (ICT), Statistics South Africa

CASE STUDY

From worrying about ransomware attacks to recovering data in minutes

Accentuate Requirements:

Protecting end-user data during lockdown and data leaks were the two critical concerns of the company. Accentuate wanted a solution that could provide more visibility and control over the company data environment and to simplify the labour intensive bi-annual reports required by Exco for compliance purposes.

Client:

Deon Henning, Group IT Manager, Accentuate

Website:

https://accentuateltd.co.za/

BEFORE

0%

Protection against
ransomware

0%

Control over
unauthorized access

Days

Spent creating
compliance reports

After

100%

Protection against

ransomware

100%

Control over
unauthorized access

Minutes

Spent creating
compliance reports

Full Story

They had an internal solution in place, but mainly Windows based, which was included in their Microsoft license, but the downside was that it was very user reliant, and the management of the system was near impossible.

“Protecting our data and ensuring the users were able to stay as productive as possible during the lockdown period was critically important to our organization. We didn’t want the users to worry about protecting business information and wanted a solution that would just run and have the ability to quickly and easily generate Exco type reports without wasting any time and with our move to a Cibecs’ cloud-based solution we had full peace of mind,” says Deon Henning, Accentuate’s Group IT Manager

Compliance is incredibly important to Deon, as they are listed on the Stock Exchange. As such they get Audited by Independent Auditors on a 6-monthly basis. The IT Department and most importantly, risk, forms a part of these Audits. Deon has to report back on any and all abnormalities or high-risk instances – these reports are incredibly laborious and time consuming to prepare. Cibecs assisted a lot in this respect: With Cibecs reporting it is quick and easy to prove that the risk has been mitigated.

“Due to being listed on the JSE we get audited by Independent Auditors on a 6-month basis. IT and risk form part of these audits and I have to report on any and all abnormalities or high-risk instances. In the past these reports used to be incredible laborious and time consuming to prepare, now however, making use of Cibecs the reporting alone has saved me an incredible amount of time” 

Local Device Encryption is an Audit Requirement, which they cannot be without.

Cibecs has met all of Accentuates requirements. Deon now has full peace of mind that his company’s data is being protected and the risk of data leaving the organization is now a non-event.

He has achieved cost savings since the very start of signing with Cibecs and even avoided employing additional resources or third-party suppliers to assist IT.

Deon maintained a cool, calm and collected response to the Wannacry ransomware attack that took place and his feedback was that he did not worry about it, as he had Cibecs. A fact that his Exco was extremely satisfied and relieved about too.

“Due to the nature of our business things like ransomware attacks are taken extremely seriously and when the Wannacry attacks took place worldwide, we assessed the situation, tested our measures in place, and both from executive and IT management level were completely comfortable that our end-user environment was safe because of Cibecs.

If I didn’t have the Cibecs technology in my environment, I would have had to employ additional resources or third-party companies to assist with all my responsibilities”

Deon Henning, Group IT Manager, Accentuate

Here’s what is going to happen when you work with us:

How does it work?

Device discovery & inventory

Discover and inventory all your devices 

Get a quick snapshot of the location and format of all your endpoint data.

Before, when you wanted to …

Map out your user and endpoint data environment you would have to use a combination of HR records, inventory software and manual audits.

But now…

You can use our simple inventory feature to get a complete view in extremely granular detail of all hardware, software and data without having to spend huge amounts of time trying to get a view.

How easy is that?

Centrally configure policies

Customize backup policies & select data for backup by file types or location

Activate Data Loss Prevention (DLP) features simply by toggling the feature on or off.

Before, when you wanted to …

Ensure that all important data was protected you would have to rely on users to follow company policy on data storage guidelines with no way of monitoring or controlling it.

But now…

You can use the Cibecs Policy Definition function that covers all areas of data protection and security. Automatically identify and protect all important data in a highly efficient manner to ensure success without wasting money or resources.

Policy definition has
never been this simple!

Secure endpoint backup

Easily select which back up is the most relevant to restore

Before, when you wanted to …

Backup user data, you would have to either rely on users or implement and manage a separate backup product and continuously monitor utilization and compliance.

But now…

Cibecs automates backups by default for all your users and does this through source-based deduplication, which optimises bandwidth and storage utilization in the industry!

Our automation prevents failure due to non-compliance and ensures all important data is centralized without the setup, management time, cost or impact on network and storage that comes with these single use products.

Data backup as easy as 1,2,3…

Local file encryption

Seamlessly enable local file encryption from the policy

Before, when you wanted to …

Set up encryption for users, you would have to implement a separate encryption product as well as key management, which is a significant time and systems management overhead.

But now…

Endpoint encryption is part of Cibecs’ functionality by default and automatically deploys and takes care of all key management to ensure complete protection of all critical data from unauthorized access without the time, cost and risk of running a separate system or slowing down user devices.

Simplify encryption and
safeguard your data.

Device Geo-location

Quickly locate a lost, stolen or misplaced device and view it in map or satellite format.

Before, when you wanted to …

Have the ability to locate your devices, you would have to implement and manage separate tracking software.

But now…

You can use this integrated simple location tracking feature for complete tracking of all your devices for auditing, management, support, loss or theft scenarios without any extra hardware, software or costs.

Locate your devices anywhere,
anytime with geo-location software

Remote wipe

Remote wipe any device, any where and protect your confidential information.

Before, when you wanted to …

Securely wipe data on a device, you would have to have to do so manually and with the device on hand. Additionally, formatting does not prevent recovery by unauthorized third parties using forensic tools.

But now…

You can use this simple remote wipe feature to wipe all data on a forensic level and you can do it from anywhere.

This will prevent unauthorized access to data if a device is lost or stolen and cut project times and risk during hardware refresh projects without the time and cost required to do it remotely and without the risk of someone getting their hands on confidential data.

Safeguard your confidential data
with our easy-to-use remote wipe feature.

Revoke user access remotely

Revoke access to any endpoint on your dashboard.

Before, when you wanted to …

Prevent an employee from accessing data you would have to confiscate their device.

But now…

You can easily control who has access to what data and when and even enable a timer that automatically block access if a device is stolen or lost.

This will greatly enhance your security without requiring physical access to the device and you allow control from anywhere in the world.

Revoke unauthorised access
at a push of a button.

Recovery & full remote migration

Fully recover your data just as it was before loss or theft of an endpoint device.

Select which device you would like to migrate to and begin migration

Before, when you wanted to …

Recover data, support users or migrate data you would have to look for data in multiple location, figure out what the latest versions are and where they are stored and hope that it is all the data required.

But now…

Cibecs’ data recovery and migration functionality has every conceivable protection and recoverability scenario catered for to ensure that your data is recoverable every time and it can be used as part of your operational plan.

Cut hardware refresh project
cost and time by up to 95%!

Endpoint cloud management

Easily view endpoints, manage them and get a glimpse of their security status all from the Cibecs cloud dashboard.

Before, when you wanted to …

Monitor and report on the protection of your user data, you would have to manually check that every user’s data is in the correct location, that each of the security systems are active, up to date and running on each device.

But now…

Cibecs’ single SLA metric, the Protection Rating, allows you to define and implement automated monitoring and reporting of all your users. The SLA metric creates visibility of all users without having to implement, access and manage multiple systems with no extra effort and at no additional cost.

Simplify data management
and security through the Cloud.

Offer

If you want to get this job done the old way it would easily cost you over $250,000 per year for the required software and resources for only 500 users.

Cibecs offers you all the functionality & more with a single SaaS solution at a fraction of the cost:

FEATURES Description VALUE PER USER PER MONTH
Complete Inventory Audit
Allows you to see exactly what hardware and software and data you have across your entire base
$5
Automated backup and recovery
Ensures every user’s data is always recoverable - no matter where and how they store their data
$15
Encryption of all your data
Prevents unauthorized access and ensure compliance to regulations.
$10
Remote wipe
Remotely and securely wipe data on stolen or lost devices or those being replaced or upgraded.
$5
Data access control
Gain complete control over who has access to what data, when and where, providing further security
$5
Location tracking
Easily track and manage your devices at all times
$3
Automated migration
Migrate off-premise devices in a hardware refresh or upgrade project at a fraction of the time and resource cost
$15
Reporting & compliance management
Report on and manage all your security in a single dashboard and with minimal time investment.
$10
FEATURES VALUE PER USER PER MONTH
Complete Inventory Audit
$5
Allows you to see exactly what hardware and software and data you have across your entire base
Automated backup and recovery
$15
Ensures every user’s data is always recoverable - no matter where and how they store their data
Encryption of all your data
$10
Prevents unauthorized access and ensure compliance to regulations.
Remote wipe
$5
Remotely and securely wipe data on stolen or lost devices or those being replaced or upgraded.
Data access control
$5
Gain complete control over who has access to what data, when and where, providing further security
Location tracking
$3
Easily track and manage your devices at all times
Automated migration
$15
Migrate off-premise devices in a hardware refresh or upgrade project at a fraction of the time and resource cost
Reporting & compliance management
$10
Report on and manage all your security in a single dashboard and with minimal time investment.

Instead of paying $68 per user per month
plus over (USD)$30,000 for implementation and tens of thousands a year for management, we are offering you all of this at a fraction of the cost.

Click ‘Book a Free Consultation’ and lock in this
special offer.

Limited availability

Since we usually only work through resellers and partners, which means we are limited in the number of direct customers we can service every quarter, so if you are interested, make sure you act now or you might miss your opportunity and will have to try again next quarter.

Special Offer

Now because you visited this page, we are going to do something extremely special:

For a limited time, we are going to offer you implementation and support
worth up to $10,000 absolutely free if you act now. T’s & C’s Apply

Of course, we back everything up with a 30 day money back guarantee
Meaning if we don’t deliver on our promises, you don’t pay a dime.

What do I get?

In summary this is what YOU get with this spectacular limited offer:

Implementation and support worth up to $10,000 is included if you act now, however, we’re limited in the number of customers we can services directly each quarter so book now or you may miss out. This all falls under guarantee.

Questions & Answers

Data Security, Backup,
Recovery & Storage

A: There are three main considerations:

A: Once you cancel or don’t renew we will send you a confirmation email and your account and all related data will be deleted permanently from our servers on the final day of your license. Since we never hold any of the security keys we can never access any of the data anyway but since we have a real cost to store the data we do not hold any data beyond the last day of a licensed customers’ contract. Should you have elected to store your data locally you will obviously be in control of what happens to the data.

A: All system management information is stored in the management section in Azure in a compliant and secure manner. No personal data or company data or documents or files are stored here. You have the options of storing your user data on either a local vault within your control, in a vault created on storage provided by a third party of your choice or on Microsoft Azure under our management. In all instances we do not have any access to your data and it will only be recoverable with your security keys.

A: Absolutely. You can select to either store your data on your own hardware in your chosen location or at your service provider / ISP. Alternatively, you can utilize our cloud storage with Microsoft Azure and you’ll be able to select the Azure territory you prefer and all data will only be stored within that territory.

A: As above, you don’t need any storage but should you wish to use your own you’re welcome to. You can even change your mind at any stage and simply move your data to an online vault when you’re ready.

A: IT administrators can only manage and monitor Cibecs, they can’t access any of the data. This is another major benefit of Cibecs Endpoint Cloud. Only users and administrators with either the user’s encryption key or the master key, which is typically held by the CIO or CFO, can access any data.

A: We are a Microsoft Preferred Solution and had to go through rigorous technical evaluations and testing in order to gain that status. We have furthermore been evaluated to death by many major financial, legal and government departments and have passed all audits. We use….

A: Simply create an exclusion in your policy that looks for items such as *Personal or a specific location that you want to exclude and no data within that location will ever be touched by Cibecs other than to migrate it to your new device in an upgrade or hardware refresh.

A: Recovery is extremely easy to perform and you’ll be able to recover a single file, a complete folder, multiple folders, the entire data set and even the entire user profile with ease. It’s a couple of easy steps in our recovery wizard and you’ll be able to select the version and data you require and our system takes care of the rest in the background. You also can’t damage any archived data so there is no risk in letting your users perform their own recoveries should you wish. Of course there is an extensive help section in the product and we’re also always available to help if you need our assistance.

Ransomware

A: Recovering from Ransomware is as easy as...

  1. Wiping the device to ensure it’s free from the Ransomware,
  2. Updating your Antivirus and make sure your machine is clean,
  3. Running a recovery and roll back to just before you were hit.
  4. No paying anyone any ransom!

Payment Options, Contracts,
Guarantees & Trials

A: Our standard engagement is for 12 months with a 30-day money back guarantee. Book an appointment to get pricing and contract options.

A: You can purchase licenses on a monthly or annual plan. Book an appointment now to get pricing options.

A: One of the elements that make us completely unique is that Cibecs provides you extensive data protection and security as well as compliance, but it is packaged in a manner that cuts your IT user support travel and costs as well as hardware refresh and upgrades by up to 95%. This means that not only is the solution self-funding and creates a return, but you basically receive all the data protection and security functionality free of charge.

A: We have extensive ROI calculators and a comprehensive business case template that you can use as a base for your motivation. Book your appointment now to get pricing and your copy of the calculators and business case.

A: Absolutely, we offer a 14-day trial. Book your appointment now to get pricing and find out how to get a trial going today.

A: You have three types of costs related to this.

* Software & licensing - book your appointment now to get pricing.

* Hardware - you can choose to supply your own or make use of our cloud hosting - again book your appointment for pricing and

* Resources for implementation and ongoing management - we offer a managed service - book your appointment to get pricing options, or your internal team can perform this for you. There are no other hidden costs.

A: Within 30 days of purchase, if you feel that we can’t deliver on our promises made, which is to be able to backup and protect your data with ease then we will refund you in full.

A: You can purchase as many licenses as you wish and you can upgrade to more at any time. Simply decide whose data is worth protecting and whose isn’t and if someone’s data is not important to recover if lost or to secure from unauthorised access outside your company then don’t buy a license for them.

Implementation, Training & Support

A: This is entirely dependent on your team, your user base and your infrastructure but our aim is to get you up and running with minimal effort and even large-scale deployments can be done in as quickly as an afternoon.

A: We offer a Certified Cibecs Administrator course online that will equip your technical team with all the skills to get your data protected in no time and keep it that way. We focus extensively on how to get the maximum return on investment and how to make use of Cibecs Endpoint Cloud to increase your IT service delivery and significantly cut costs, especially in a hardware refresh or migration scenario.

A: We have an extensive support system built into the product and you’ll have access to extensive how-to videos, tutorials and FAQs as you use Cibecs Endpoint Cloud. If you still need additional support our technical support team is always ready and waiting to assist. Book your appointment now to get more information on the different licensing and support options.

A: We love working with partners and have a global partner program. We’d love to work with your local IT supplier so book your appointment now to let us take you through the best way to get your data protected.

A: We do offer a fully managed service where we can configure, rollout and manage the entire solution for you. We are limited in the number of new Managed Services customers we can onboard in any given quarter so book your appointment now to find out more about this program.

A: We are constantly adding functionality and we release updates on a regular basis and all these updates are included in your subscription at absolutely no additional cost. From time to time we may release a whole new optional feature set and this will be offered to you but you have no obligation to purchase any additional functionality.

Cibecs International All Rights Reserved

Contact

sales@cibecs.com
facebook.com/cibecs
linkedin.com/cibecs

Privacy Policy