Servers · Microsoft 365 · Endpoints · Cloud Workloads

Managed Backup & Disaster Recovery ServicesImage-Based BCDR · SaaS Backup · Ransomware-Resistant

Image-based BCDR for servers, third-party backup for Microsoft 365 and Google Workspace, endpoint file-level backup, and cloud-native protection for Azure and AWS workloads. On-Site Technology designs the architecture, runs the daily backups, monitors every job, and tests recovery on a quarterly cadence. Delivered remotely to businesses across the United States.

<4hr response targetRemote nationwideQuarterly recovery testingNJ HQ · FL office
Request a Recovery Review
Tell us about your environment and we will respond with a scoped plan. We typically reply within 4 business hours.

    Your Name (required)

    Your Email (required)

    Subject

    Your Message

    Your info stays with us. No resale.


    Quick Answer

    Managed backup and disaster recovery (BCDR) protects business data across four surfaces: on-prem servers (image-based, with cloud replication), Microsoft 365 and Google Workspace mailboxes and files, endpoint laptops, and cloud workloads in Azure and AWS. A modern program follows the 3-2-1-1-0 rule, uses immutable ransomware-resistant storage, aligns to NIST CSF 2.0 Recover and HIPAA Contingency Plan requirements, and proves itself with quarterly recovery testing. On-Site Technology designs, runs, and tests these programs remotely for businesses across the United States, with deepest engineering capacity in Northern NJ, the NYC metro, Pennsylvania, and South Florida.



    3-2-1-1-0
    Backup standard
    we architect against
    100%
    Remote-delivered
    U.S. nationwide
    Quarterly
    Recovery testing
    on every account
    24/7
    Backup job monitoring
    by our NOC


    Why Backups Alone Are Not Enough

    The Backups You Have Probably Will Not Save You

    Most businesses think they have backups. But many discover, mid-incident, that the backups are stale, encrypted by the same ransomware that hit production, or restoring at a speed measured in days. The failure modes are predictable. So is the fix.

    Untested Backups

    A backup that has never been restored is a guess. In practice, we routinely audit accounts where last year’s nightly jobs ran green every morning and would not actually restore a domain controller. Bottom line: recovery testing is the only thing that turns a backup into a real recovery option.

    Ransomware-Encrypted Repos

    Modern ransomware crews look for the backup repository first. If the backup server is domain-joined and the storage is writeable from production, they will encrypt or wipe it before triggering anything else. So immutable storage and an isolated identity domain are not optional.

    The Microsoft 365 Gap

    Microsoft’s shared-responsibility model is explicit: they keep the service running, you are responsible for the data. In practice, native retention is short, granular point-in-time restore is limited, and a deleted SharePoint site is gone after the recycle bin window. So third-party SaaS backup is the answer.

    Single-Region Cloud

    A workload that lives in one Azure region or one AWS Availability Zone is one regional outage away from a multi-day recovery. By contrast, cloud-native backup with cross-region copies, plus a documented failover runbook, turns a regional event from a crisis into a maintenance window.

    Broken Restore Chains

    Incremental-forever chains, agent version mismatches, and orphaned snapshots all silently corrupt restorability over months. Meanwhile, the job log says success. Then the actual restore fails three hours into recovery. So we catch this before it matters by exercising the full chain on a schedule.

    RPO and RTO Mismatch

    Most backup programs were sized for a five-year-old version of the business. For example, the finance ERP that was overnight-tolerable in 2020 now runs the order pipeline. If the recovery objectives were not revisited when the workloads changed, the gap shows up at exactly the wrong moment.



    What We Protect

    Four Surfaces. One Coordinated Recovery Posture.

    Your data does not live in one place anymore, and a single backup product cannot cover all of it. So we design and run separate platforms tuned to each surface, then tie them together under one runbook, one monitoring pane, and one quarterly test cycle.

    Server / On-Prem BCDR

    Image-based, application-aware backups of physical and virtual servers running on a purpose-built BCDR appliance. In addition, local instant-virtualization for fast recovery, paired with cloud replication for off-site copies and a regional failover target.

    • Hyper-V and VMware hosts
    • Windows and Linux file servers
    • SQL Server, Exchange on-prem
    • Domain controllers, line-of-business apps
    • Local instant-virtualization for sub-hour RTO

    M365 + Google Workspace

    Third-party SaaS backup that closes the shared-responsibility gap Microsoft and Google document themselves. Specifically, granular point-in-time restore, indefinite retention, and an account-recovery path that does not depend on the SaaS vendor honoring a recycle bin window.

    • Exchange Online mailboxes
    • SharePoint and OneDrive
    • Microsoft Teams chats and files
    • Google Drive, Gmail, Calendar
    • Indefinite retention, item-level restore

    Endpoint / Laptop Backup

    File-level backup for laptops and desktops covers the data your users save outside OneDrive. Often useful for road warriors, regulated roles with local working copies, and the recurring case where someone deletes the wrong folder on a Friday afternoon.

    • Windows and macOS endpoints
    • User document folders, desktops
    • Outlook PST, browser bookmarks
    • Self-service file restore
    • Cloud-native with no on-prem agent server

    Cloud Workload Backup

    Cloud-native and third-party tools that protect Azure VMs, AWS EC2, and managed databases without yanking data back to an on-prem appliance. Specifically, cross-region copies, application-consistent snapshots, and immutable vault tiers built into every workload.

    • Azure VMs, managed disks, Files
    • AWS EC2, EBS, RDS, S3
    • Application-consistent snapshots
    • Cross-region replication
    • Immutable, time-locked vault copies


    The Standard We Architect Against

    The 3-2-1-1-0 Backup Rule

    The classic 3-2-1 rule is two decades old and predates ransomware as a category. By contrast, the modern version adds the immutability and verification clauses that turn a backup program into a recovery program.

    3

    Three Copies

    Three copies of every dataset that matters. Specifically, the production copy plus two backup copies. After all, one copy is one outage away from zero copies.

    2

    Two Media Types

    Two different storage technologies. For example, local disk and cloud object storage qualify. By contrast, two copies on the same SAN do not. In short, diversity defeats correlated failure.

    1

    One Off-Site

    One copy off-site, in a different physical location. After all, a fire, flood, or theft that takes the rack should not take the recovery option with it.

    1

    One Immutable

    One copy that cannot be deleted or encrypted, even by an admin with stolen credentials. Specifically, object lock, air-gapped media, or vendor-side immutability tiers.

    0

    Zero Errors

    Zero recovery errors verified through actual testing. Critically, not log-status green. In practice, real restores against real workloads on a documented cadence.



    Ransomware-Resistant Architecture

    A Backup You Can Restore From, Even After a Domain-Wide Compromise

    The MITRE ATT&CK technique catalog lists T1485 (Data Destruction) and T1490 (Inhibit System Recovery) as standard ransomware behaviors. In practice, modern threat actors target backup infrastructure on purpose, and they do it before triggering the encryption payload. So architecture, not product selection, is what stops them.

    What We Build In

    Storage and Isolation Layer

    • Immutable storage tiers. Object lock or vendor-side immutability flags on the cloud copy, retention-locked for 7 to 90 days. Critically, even a compromised admin account cannot delete protected backups inside the lock window.
    • Air-gapped or logically isolated copies. A second copy on storage that production credentials cannot reach. Specifically, a physically detached medium or a separately authenticated cloud account.
    • Separate identity boundary for backup admin. Backup infrastructure is not domain-joined to production Active Directory. So a compromised production domain does not automatically compromise the backup tenant.

    Identity, Encryption, and Detection

    • Phishing-resistant MFA on every backup admin account. For example, FIDO2 keys, Windows Hello for Business, or certificate-based authentication. By contrast, SMS and authenticator-app push are no longer sufficient for backup-tier access.
    • Encryption-at-rest with customer-controlled keys where the workload demands it, plus TLS 1.2+ in transit on every replication path.
    • Anomaly detection on backup volumes. Sudden compression-ratio drops or large delete operations are leading indicators of an attack in progress; in practice, we watch for them and page the on-call engineer before encryption finishes.

    Standards We Map To

    Federal Frameworks and Threat Models

    • NIST SP 800-209 security guidance for storage infrastructure, including snapshot integrity and replication channel hardening.
    • NIST CSF 2.0 Recover function, specifically RC.RP-1 through RC.RP-5 (Recovery Plan Execution) and RC.CO-1 through RC.CO-3 (Recovery Communications).
    • CISA #StopRansomware Guide (joint CISA, MS-ISAC, NSA, FBI publication) on offline, encrypted, immutable backup design.
    • MITRE ATT&CK coverage of T1485 (Data Destruction) and T1490 (Inhibit System Recovery), used as the threat model when we design the isolation boundary.

    DoD, Compliance, and Zero Trust Mappings

    • CMMC 2.0 Level 2 control RE.L2-3.13.10 for cryptographic protection and CP family controls under NIST SP 800-171 for contingency planning.
    • Zero Trust principles applied to backup admin: explicit verification, least privilege, assume breach. In practice, every action is logged, reviewable, and reversible.


    Our 5-Step Methodology

    From RPO Discovery to Real-World Recovery

    Five phases. Notably, discovery is paid, scoped, and produces deliverables you keep regardless of whether you continue with us afterward.

    1

    RPO & RTO Discovery

    Workload inventory, business-impact analysis, and per-system Recovery Point Objective and Recovery Time Objective targets signed off by ownership before we touch a backup tool.

    2

    Architecture & Initial Seed

    Per-surface platform selection, immutable-tier configuration, identity-domain separation for backup admins, and the initial full backup or seed of every protected workload.

    3

    Daily Backup & 24/7 Monitoring

    Scheduled backups, replication, and capacity management run continuously. Meanwhile, every job feeds our NOC; failures and anomalies escalate before the next business day starts.

    4

    Quarterly Recovery Testing

    Real restores against real workloads on a documented cadence. Specifically, bare-metal, file-level, mailbox, and cloud VM tests rotate through the calendar. As a result, outputs include a written test report and a refreshed RTO measurement.

    5

    Incident Response & Restore

    When a real event hits, the runbook is already written. From there, we coordinate restore-on-demand, communicate to stakeholders, and own the recovery from first call to full operations.



    Compliance Alignment

    Built To Satisfy The Frameworks Your Auditors Care About

    Every backup program we run maps to specific control families across the major U.S. and international standards. So we document the mapping, hand it to your auditor, and update it when frameworks revise.

    NIST CSF 2.0

    Recover function controls RC.RP-1 through RC.RP-5 and RC.CO-1 through RC.CO-3, plus PR.DS-11 (data backup integrity).

    HIPAA Security Rule

    §164.308(a)(7) Contingency Plan, including data backup, disaster recovery, and emergency-mode operations.

    SOC 2 Type II

    Common Criteria CC9.1 (System Recovery) and CC7.5 (Recovery from disruptions), with evidence collected on every test cycle.

    ISO/IEC 27001

    Annex A.12.3 (Information Backup), A.17 (Continuity of Information Security), and supporting A.5.30 (ICT Readiness for Business Continuity).

    PCI DSS 4.0

    Requirement 12.10.1 (incident response plan testing) and 9.4.1 (offsite backup media protection) for cardholder-data environments.

    CMMC 2.0 Level 2

    RE.L2-3.13.10 cryptographic protection plus the full CP family from NIST SP 800-171 contingency-planning controls.

    FINRA & SEC

    FINRA Rule 4370 (Business Continuity Plans) and SEC Rule 17a-4 record retention, including write-once formats and supervised access.

    NIST SP 800-34

    Contingency Planning Guide for Federal Information Systems, used as the structural template for our recovery runbooks and tabletop exercises.



    What You Get

    What’s Included With Every Engagement

    A managed backup engagement with OST is not just a license assignment. In practice, these are the deliverables your team and your auditor receive on day one and on every refresh.

    • A written backup runbook documenting every protected workload, RPO/RTO target, retention policy, and the named engineer responsible for each surface.
    • An RPO/RTO matrix signed off by your business owners and revisited annually, so backup spend tracks the workloads that actually drive revenue.
    • Quarterly recovery test reports with timing data, anomalies discovered, and remediation actions taken before the next cycle.
    • 24/7 backup-job monitoring from our Network Operations Center, with failure escalation through email, ticketing, and on-call paging.
    • A monthly backup health summary covering job success rates, capacity trends, retention status, and any recommended changes for the upcoming month.
    • Restore-on-demand response with a target same-business-day acknowledgement on standard restore requests, and after-hours coverage for declared incidents.
    • An immutable / air-gapped vault tier on the cloud copy of every protected workload by default, with retention-lock windows tuned to your compliance posture.
    • Compliance evidence packs mapped to NIST CSF 2.0, HIPAA, SOC 2, and CMMC 2.0 controls, refreshed each quarter for audit cycles.
    • A documented disaster-recovery procedure covering a regional cloud-failover scenario and a full data-center loss scenario, paired with our broader managed cloud infrastructure design.
    • An annual tabletop exercise with leadership and IT to test the runbook against a simulated event, then refine it in writing afterward.


    Why On-Site Technology

    Why Businesses Pick OST for Backup & DR

    Most managed-backup providers are reselling a vendor portal. By contrast, we run a recovery practice. In practice, the difference shows up the day you have to actually restore something.

    Recovery Testing Rigor

    Quarterly restore tests are baked into the contract, not sold as an add-on. In practice, we treat untested backups as no backups, and we put that on paper.

    Vendor-Neutral Architecture

    We pick the backup platform that fits the workload, the compliance posture, and the budget. Because we are not anchored to one vendor’s economics, the recommendation tends to age better.

    Pre-Sales BCP Guidance

    Most engagements start before licenses are bought. First, we help your leadership team set RPO/RTO targets, then pair the backup design with a real business continuity plan.

    Regional Engineering Bench

    A real engineering bench with deepest concentration in Northern NJ, the NYC metro, Pennsylvania, and South Florida. Critically, senior engineers run real restores, not first-tier dispatchers reading scripts.



    Backup & DR FAQ

    Managed Backup & Disaster Recovery: FAQs

    The questions business owners, CIOs, and compliance leads ask before signing a backup contract.

    What is the difference between backup and disaster recovery?

    Backup is a copy of your data. By contrast, disaster recovery is the procedure that turns that copy back into a running business. A good backup gives you a restore point. Meanwhile, a good DR program gives you the runbook, the failover environment, the contact tree, and the tested recovery time that lets you actually use the restore point under pressure. Most organizations have backups. Still, far fewer have a DR program. In short, the two are complementary, and neither is a substitute for the other. So our engagements always include both.

    Do I really need a separate Microsoft 365 backup if Microsoft already keeps my data?

    Yes, and Microsoft says so explicitly. Specifically, Microsoft’s shared-responsibility model assigns service availability to Microsoft and data protection to you, the customer. In practice, native retention has tight limits, granular point-in-time restore is not always available, and items deleted past the recycle bin are gone. So third-party backup for Exchange Online, SharePoint, OneDrive, and Teams covers accidental deletion, malicious insider activity, ransomware that reaches synced files, and long-tail compliance retention beyond what the platform offers. Typically, we pair this with our managed Microsoft 365 service.

    What is the 3-2-1 backup rule and why does it matter?

    The 3-2-1 rule says keep three copies of your data on two different storage media with one copy off-site. In short, it is the oldest durable backup principle. By contrast, the modern update, 3-2-1-1-0, adds an immutable copy that ransomware cannot encrypt and a recovery-test pass that proves the restore actually works. So we architect every backup program against the 3-2-1-1-0 standard, because each digit closes a real failure mode we have personally seen burn other businesses.

    How often should we test our backups?

    At minimum, quarterly, and a different surface should be tested each quarter so the full estate cycles through annually. Also, weekly file-restore spot-checks for SharePoint and OneDrive add a second tier of verification at very low cost. Compliance frameworks vary on the cadence; for example, SOC 2 and CMMC 2.0 expect documented periodic testing, HIPAA expects testing as part of the contingency plan, and most cyber insurance carriers now ask for a written test schedule on renewal questionnaires. Bottom line: quarterly is a sensible target for most companies in the 10 to 500 user range.

    What is a realistic RPO and RTO for a small or mid-market business?

    RPO is how much data you can afford to lose; RTO is how long you can afford to be down. In practice, most small and mid-market businesses land at an RPO of 1 to 4 hours for the core systems (file servers, ERP, email, line-of-business apps) and an RTO of 4 to 24 hours for the same systems. By contrast, Tier-2 systems (intranet, archived projects, dev environments) typically tolerate an RPO measured in 24 hours and an RTO measured in days. Ultimately, the right answer depends on revenue impact, regulatory exposure, and customer expectations. So we set the targets in Phase 1 of our methodology, before the technology decision.

    Can backups be deleted by ransomware?

    Yes, and modern attackers actively look for them. Notably, the MITRE ATT&CK technique catalog lists T1490 (Inhibit System Recovery) as standard ransomware tradecraft. Typically, threat actors compromise a domain, locate the backup server, and either delete the backups, encrypt the repository, or revoke its credentials before triggering the production payload. By contrast, the defenses are immutable cloud storage that cannot be deleted within the lock window, an air-gapped or logically isolated copy outside the production identity domain, and phishing-resistant MFA on every backup admin account. In practice, we pair this with the broader controls in our managed cybersecurity practice.

    How long do you retain backups?

    Retention is per-workload and per-regulation, not a single setting. For example, default retention for most server image backups is 30 days local plus 1 year in the cloud. Meanwhile, Microsoft 365 mailboxes and SharePoint typically retain at 7 years to satisfy long-tail discovery and SEC 17a-4 record requirements where they apply. By contrast, endpoint file backups retain 90 days by default. Regulated workloads (healthcare, financial services, DoD supply chain) often need longer windows; in practice, we tune the policy in Phase 1 against your compliance map and audit history.

    Do you back up Google Workspace as well as Microsoft 365?

    Yes. In practice, Google Workspace has the same shared-responsibility gap Microsoft has, and the recovery options inside the Admin Console are similarly limited beyond the standard recycle bin window. So our SaaS backup tier covers Gmail mailboxes, Google Drive (including shared drives), Calendar, Contacts, and Sites, with item-level restore and indefinite retention. Critically, the architecture mirrors what we run for Microsoft 365 tenants, which makes mixed-platform organizations straightforward to support.

    Do you back up Azure VMs and AWS workloads?

    Yes. Specifically, we protect Azure VMs, managed disks, Azure Files, and Azure SQL with a mix of cloud-native backup services and third-party platforms, depending on the recovery objectives and compliance scope. On AWS, we cover EC2, EBS, RDS, S3, and DynamoDB with application-consistent snapshots, cross-region copies, and immutable vault tiers. As a result, the cloud workload tier integrates with the rest of our managed cloud infrastructure service, so the backup design lines up with the broader cloud architecture.

    What happens during an actual disaster, what does the recovery process look like?

    When you call the incident hotline, an engineer opens the runbook your account already has on file. First, the opening hour is triage: scope, blast radius, business impact, and a call list. Then the next phase depends on the event type. If a server-room flood, we spin up replicated workloads in the cloud failover target. With ransomware, we isolate, validate that the immutable backup copy is clean, then stage a clean-room restore. During a SaaS-platform incident, we run granular point-in-time restores into the affected tenants. Throughout, we coordinate with leadership, your cyber insurance carrier where relevant, and your business continuity response team.

    Do you offer backup services outside New Jersey?

    Yes. Specifically, managed backup and disaster recovery is delivered remotely to businesses across the United States. In practice, architecture, deployment, monitoring, recovery testing, and incident response all happen over secure remote channels. While On-Site Technology is headquartered in New Jersey, and our deepest engineering capacity sits in Northern NJ, the NYC metro, Pennsylvania, and South Florida, that is a capacity note, not a service boundary. So if your business operates in the U.S., we can run your backup program. Often, we pair the BCDR engagement with our managed IT services for clients in the regional footprint who also want hands-on support.

    How is your service priced?

    Pricing is scoped to the environment: protected workload count, retention windows, compliance posture, and recovery objectives. For example, we do not publish per-seat pricing because a 50-user manufacturer with on-prem ERP, CMMC-aligned retention, and Azure workloads has very different economics from a 50-user services firm running entirely in Microsoft 365. Typically, most engagements include a fixed monthly fee plus a one-time onboarding investment for the discovery phase and the initial seed. Notably, the discovery deliverables are yours to keep regardless of whether you continue with us afterward. So call (973) 777-7227 or use the form at the top of this page for a custom quote.





    Ready When You Are

    Find Out What Your Backups Would Actually Recover

    Tell us a bit about your environment and we will come back with a scoped recovery review: where the gaps are, what they would cost in a real event, and what an upgrade looks like. No pitch deck, no pressure.

    3-2-1-1-0
    Architecture
    5 Phase
    Methodology
    100%
    Remote Model
    24/7
    NOC Monitoring