Backup Procedure
The current backup for all Huge ERP companies controlled by Huge Software is a full backup of the Huge ERP data every night on the same server.
South African Huge ERP Servers runs the following processes:
- Servers are located in a secure data storage facility which no one has access to.
- Full Huge ERP backup runs every night and stored on the same drive as the database
- A full server image of the server system including all data is then backed up every month.
- Every night, all the backups including Huge ERP data, database and attachments are backed up off site to an external data
centrecenter in case of fire, flood, thief or water damage. These backups are done by a program called Crashplan and run between 7pm and 6am, 7 days a week. - Servers have RAID disk drive failures as a hardware fail over. One to two drives spare in case of
harddrivehard drive failure. - It is encouraged for the client to download a copy of their data to hold. This is accessible within the system via security roles
There is currently an option available for a second backup server to be hosted in New Zealand in case of a full Power Grid failure. Speak to our consultants for this.
New Zealand Huge ERP Servers runs the following processes:
- Cloud server is located in Christchurch NZ in a secure location.
- Full Huge ERP backup runs every night and stored on the same drive as the database
- A full server image of the server system including all data is backed up four times a day, 8am, 12am, 4pm and 8pm.
- These backups are moved to another backup server in Picton.
- Every night, all the backups including Huge ERP data, database and attachments are backed up off site to an external data
centrecenter in case of fire, flood, thief, earthquake or water damage. These backups are done by a program called Crashplan and run between 7pm and 6am, 7 days a week. - Servers have RAID disk drive failures as a hardware fail over. One to two drives spare in case of
harddrivehard drive failure. - It is encouraged for the client to download a copy of their data to hold. This is accessible within the system via security roles