G Suite / Office 365 Backup Service

Backup Your G Suite / Office 365 Email, Drive, Contacts, Calendar and Sharepoint Today.

G Suite & Office 365 provide no point in time recovery for your data.

How It Works

microsoft office 365It is important to understand how G Suite & Office 365 address data retention and integrity so you know what you are working with. Both, G Suite & Office 365, are known as high availability infrastructures. For example if a datacenter had a problem, you still have access to you email and your data. If a cluster server goes down, you still have access to you email and your data. It does not backup your data. They give you access to your data.

It is often misunderstood that the G Suite & Office 365 cloud environments keep your data safe by backing up your data. G Suite & Office 365 do not backup your data, they only provide a high availability infrastructure for your data. This mean you always have access to what is on their system.

G Suite & Office 365 Backup Solution
What You Need To Know

While reliable access is good for everyday needs, neither G Suite or Office 365 provide any point in time recovery for your email, drive, contacts, calendar or sharepoint.

If any email is lost due to malware, hacked account, disgruntled employee or other means of deleting data, G Suite & Office 365 do not provide a means of recovery from some point in time.  

It is your responsibility to backup your data. There is a big difference between accessing your data and being able to get your data back if lost.

A Reliable Managed Solution

Backup Office 365JIKOmetrix does offer a G Suite / Office 365 backup solution that will backup  email, drive, contacts, calendar and sharepoint. The pricing works like this.

$38 per User per Year
$45 per 100GB Storage block per Year

Example, let's say you have 10 licensed users. The annual licensing for 10 users is $380. Additionally in our example,  you are using about 100GB for storage for email, drive, contacts, calendar and sharepoint. Let's say you wanted to have a combination of full retention of email and 60 day retention drive items while holding on to the last version of any file backed up. We will go with a four times standard, 4 x 100GB = 400GB at an annual fee of $180.

In the above example, you can implement solid, automated backup solution for your email, drive, contacts, calendar and sharepoint for just $560 annually with 60 day retention policy based on above sample usage.

Take Action Today By Calling (630)759-9283

Let us know if this is something you'd like to implement by calling (630)759-9283 x1001. JIKOmetrix does all of the work and confirms your backups are running.

logo google gsuite

Call today (630)759-9283 for your 15 day trial!

Want to order now follow this link.


Custom Groups

With allAccess's Custom Groups functionality not only admins but also users are able to create groups of users for quick and easy sharing purposes. This makes it easier than ever for users to collaborate and work efficiently as a team while saving administrators unnecessary work.

Using Custom Groups in allAccess

In the allAccess web interface simply click 'Settings' in the top right-hand corner and navigate to the 'Custom Groups' section in the menu. Here users can create and manage their Custom Groups with a few simple clicks. Custom Groups are visible only to members of the group and allAccess administrators can see and modify all Custom Groups. Additionally the application provides permission management capabilities to enable a collaborative management of Custom Groups: Members of a group can be classified either as 'Member' or 'Group admin'. Members can share with the group, view the member list and leave the group. Group admins, in addition, can add and remove members, rename or delete the group and set permissions of other members.

Sharing with a Custom Group is as easy and quick as always. Just click on the sharing symbol of a file or folder, go to the 'Users and Groups' tab in the Sharing menu and select the relevant Custom Group from the dropdown menu. Also, all allAccess clients (Desktop/Android/iOS) can be used to share with Custom Groups conveniently.

Anti-virus scanning

When talking about file sharing, one aspect is key: Security. But security not only means privacy and control over data. It also includes the protection against malicious software like trojans or viruses. The allAccess Anti-Virus forwards files that are being uploaded to the allAccess server to a malware scanning engine before they are written to storage. When a file is identified to be malicious it is prevented from being uploaded to the server to ensure that files in allAccess are free of malware. 

ClamAV is the virus scanner used with allAccess. It detects all forms of malware including trojans, viruses, and worms and scans compressed files, executables, image files, PDF, as well as many other file types. 

Transactional File Locking

allAccess’s Transactional File Locking mechanism locks files to avoid file corruption during normal operation. It performs these functions:

  • Operates at a higher level than the filesystem, so you don’t need to use a filesystem that supports locking

  • Locks parent directories so they cannot be renamed during any activity on files inside the directories

  • Releases locks after file transactions are interrupted, for example when a sync client loses the connection during an upload

  • Manages locking and releasing locks correctly on shared files during changes from multiple users

  • Manages locks correctly on external storage mounts

  • Manages encrypted files correctly

Transactional File locking will not prevent multiple users from editing the same document, nor give notice that other users are working on the same document. Multiple users can open and edit a file at the same time and Transactional File locking does not prevent this. Rather, it prevents simultaneous file saving.

Two Factor Authentication

2-Factor Authentication adds another layer of access security to allAccess. The authentication method confirms a user’s identity utilizing a combination of two independent components. Instead of simply requiring a username/password combination, an additional access token (time-based one-time password/TOTP), which can be obtained via mobile phones for instance, is needed to gain access to allAccess accounts. This not only improves access security, but also provides administrators with an option for disabling individual tokens. Time-based one-time passwords (TOTP) can be obtained through services like Google Authenticator or an Open-Source implementation of the TOTP standard like LinOTP. This extension provides the most simple way to add a second factor to user logins.