It’s estimated that 92% of data on various storage devices across the whole world has been produces in the past two years. This data are the basis of operation for all systems, hence they must be available in emergency situations. Regular backups are the basic rule of security systems. It helps you effectively protect your resources against most accidental events, such as: hardware theft, fires, re-installations, hacking attacks, or human error.


First, lack of access to data means financial losses. According to the “Veeam Availability Report 2017” report, organisations lose an average of $21.8 million due to unplanned downtime. It’s 36% increase compared to the previous year.


It is recommended to a security strategy should follow a 3-2-1 rule. Backup should be kept in three copies, using at least two storage devices, one of which should be outside the main location, e.g. other company office or a cloud by an external provider.


Such protection means that in case of a ransomware attack, which typically targets data, not systems, we’ll be able to recover data from a storage device isolated from an infected environment. You’re not going to lose money either for ransom, or as a result of losing your customers buying at your competition because of the failure. When your resources are located in the cloud, backup covers the entire virtual machine without purchasing physical equipment.


It’s not only necessary to have a backup itself, but the time it takes to recover data, since the longer it takes, the more money we lose. According to an international study by Veeam, the average downtime cost of a strategic application per hour is almost $80 thousand.


The most frequent non-financial consequences of insufficient security and lack of data are the loss of customer and employee trust, as well as loss of reputation.


Tomasz Krajewski - Presales Manager Estern Europe, Veeam

  • backup as a basic data protection mechanism
  • ensures continuity of operations
  • physical and virtual machine backup
  • data recovery time after failure
Veeam backup logo
Grey Wizard cyberbezpieczeństwo logo
Instytut Bezpieczeństa Danych Osobowych logo
Transparent Data logo


Schedule a visit at a convenient time for you. Learn about our standards and comprehensive approach to the security of your data and applications!


We’ve prepared an educational path around the Data Center 2 to let our current and future customers, as well as partners see how the data center which meets the highest security standards is operated. Come and see for yourself how much we can do for you!



Due to our security policy it is possible to schedule a visit at Data Center 2 not earlier as 7 days after request.


Each person requesting a visit will receive an email with information about our facility security requirements and regulations, which should be signed before the educational path around the Data Center.


Persons who fail to comply with these formalities will not be able to take an educational tour.


I hereby agree to the processing of my personal data by Sp. z o.o. to complete the submitted request in accordance with the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 - also known as the General Data Protection Regulation (GDRP). The providing of the personal data is voluntary, however it is necessary for processing the request.
I hereby agree to receive marketing information by email from about its products and services, promotions and events in accordance with the Act of 18 July 2002 – on provision of digital services (Journal of Laws 2017, item 1219 with subsequent amendments). The providing of the personal data is voluntary.

The data controller is Sp. z o.o. ( with a registered office at A. Kręglewskiego 11, Poznań 61-248.