[vc_section full_width=”stretch_row” css=”.vc_custom_1542410189858{background: #1dc2ef url(http://staging.compnetfederal.com/wp-content/uploads/2018/11/slider_002.jpg?id=1772) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_class=”mask”][vc_row full_width=”stretch_row” css=”.vc_custom_1540433472474{padding-top: 120px !important;padding-bottom: 100px !important;}”][vc_column width=”7/12″][vc_custom_heading text=”solutions” font_container=”tag:div|font_size:3rem|text_align:left|color:%23ffffff” use_theme_fonts=”yes” css_animation=”fadeInUp” css=”.vc_custom_1536331177663{margin-left: 3px !important;}” el_class=”delay-1 custom-hd”][vc_empty_space height=”20px”][vc_custom_heading text=”data recovery” font_container=”tag:h2|font_size:6rem|text_align:left|color:%23ffffff|line_height:0.9″ use_theme_fonts=”yes” css_animation=”fadeInUp” el_class=”custom-hd delay-2″][vc_separator color=”white” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”fadeInUp” el_class=”delay-4″ css=”.vc_custom_1540433519046{margin-bottom: 50px !important;margin-left: 5px !important;padding-top: 15px !important;}”][vc_column_text css_animation=”fadeInUp” css=”.vc_custom_1540433492610{margin-left: 3px !important;}” el_class=”delay-3″]Contact Us Today[/vc_column_text][/vc_column][vc_column width=”5/12″][/vc_column][/vc_row][/vc_section][vc_section full_width=”stretch_row” css_animation=”none” css=”.vc_custom_1536315102680{padding-bottom: 60px !important;}” el_id=”overview”][vc_row][vc_column offset=”vc_hidden-sm vc_hidden-xs”][vc_widget_sidebar sidebar_id=”sidebar-5bf0d844b028c”][/vc_column][/vc_row][vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][vc_empty_space height=”80px”][vc_custom_heading text=”overview” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”What is continuity of operations?” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”20px”][vc_column_text]A disaster recovery plan–sometimes referred to as a business continuity plan or business process contingency plan–describes how an organization will deal with potential disasters.[/vc_column_text][vc_empty_space height=”60px”][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column width=”1/5″ offset=”vc_col-xs-6″][counter type=”image” value=”30″ duration=”1000″ title=”Years experience” class=”aligncenter” icon_image=”909″ suffix=”+” css=”.vc_custom_1536322833940{padding-top: 15% !important;padding-right: 10% !important;padding-bottom: 15% !important;padding-left: 10% !important;background-color: #f3f6f9 !important;border-radius: 5px !important;}”][vc_empty_space height=”30px”][/vc_column][vc_column width=”1/5″ offset=”vc_col-xs-6″][counter type=”image” value=”250″ duration=”1000″ title=”Certified experts” class=”aligncenter” icon_image=”1253″ css=”.vc_custom_1536322962219{padding-top: 15% !important;padding-right: 10% !important;padding-bottom: 15% !important;padding-left: 10% !important;background-color: #f3f6f9 !important;border-radius: 5px !important;}”][vc_empty_space height=”30px”][/vc_column][vc_column width=”1/5″ offset=”vc_col-xs-6″][counter type=”image” value=”100″ duration=”1000″ title=”End user satisfaction” class=”aligncenter” icon_image=”906″ suffix=”%” css=”.vc_custom_1536322997713{padding-top: 15% !important;padding-right: 10% !important;padding-bottom: 15% !important;padding-left: 10% !important;background-color: #f3f6f9 !important;border-radius: 5px !important;}”][vc_empty_space height=”30px”][/vc_column][vc_column width=”1/5″ offset=”vc_col-xs-6″][counter type=”image” value=”7″ duration=”1000″ title=”Global reach” class=”aligncenter” icon_image=”1254″ suffix=”countries” css=”.vc_custom_1536323036950{padding-top: 15% !important;padding-right: 10% !important;padding-bottom: 15% !important;padding-left: 10% !important;background-color: #f3f6f9 !important;border-radius: 5px !important;}”][vc_empty_space height=”30px”][/vc_column][vc_column width=”1/5″ offset=”vc_col-xs-6″][counter type=”image” value=”365″ duration=”1000″ title=”Service desk” class=”aligncenter” icon_image=”1255″ suffix=”24/7″ css=”.vc_custom_1536323065309{padding-top: 15% !important;padding-right: 10% !important;padding-bottom: 15% !important;padding-left: 10% !important;background-color: #f3f6f9 !important;border-radius: 5px !important;}”][vc_empty_space height=”30px”][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]A disaster recovery plan–sometimes referred to as a business continuity plan or business process contingency plan–describes how an organization will deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken to minimize the effects of a disaster and enable the organization to either maintain or quickly resume mission–critical functions. Typically, disaster recovery planning involves an analysis of the continuity of business processes in the face of a disaster–corruption, degradation, or destruction of data, applications, and infrastructure. It includes a significant focus on disaster prevention.

Assuming you have completed a risk assessment and have identified potential threats to your IT infrastructure, the next step is to determine which infrastructure elements are most important to the performance of your company’s business. Also assuming that all IT systems and networks are performing normally, your firm ought to be fully viable, competitive and financially solid. When an incident–internal or external–negatively affects the IT infrastructure, the business could be compromised.

WAN Backups and Archives

The goal of backup, archiving, and disaster recovery is guarding and preserving data against loss, but local data protection has limited effectiveness. The same fire, flood, or theft that damages your production data can just as easily destroy the copies of that data. The emergence of the Internet as well as other storage-saving technologies have made remote data protection more practical, agile, efficient, and cost-effective with a much faster resumption of normal operations.

Today, a backup, archive, or disaster recovery set (the group of files or data that constitutes a disaster recovery package) can be stored on the other side of the world as easily as next door. With backups and disaster recovery sets, the primary consideration for the wide area network (WAN) is efficiency: making the most of available bandwidth to move the maximum amount of data in the minimum amount of time. This ensures the shortest recovery point objective (RPO).

Because high-bandwidth WAN connections cost too much for many organizations, several techniques have emerged to reduce the sheer amount of data needed to perform a remote backup or disaster recovery set.

A full backup is an essential starting point. But a full backup can take a long time, which can vastly extend the remote RPO. If it takes 36 hours to perform a complete backup across the WAN, the smallest possible RPO would be 36 hours — far longer than most organizations can tolerate.

When backing up remotely, often to a remote virtual tape library (VTL), most organizations will start with a full backup, then revert to incremental or differential backups to save only files that have changed since the full backup. The technique of “delta differencing” saves just the changed blocks or bytes. So the initial backup or disaster recovery set of 20 TB may take many hours, but an average delta difference of 10 GB per day can be transferred in just a few hours, well within an acceptable daily backup window.

Another data reduction method is data compression, which involves searching for repetitive data segments that can be removed from a file. The mathematical algorithm used to compress the file can rebuild it again when the file is read later. Compression typically cuts data volumes in half. But since not all files compress well, the actual compression ratio varies with file type.

Use of the data reduction technique known as data de-duplication continues to grow. Data de-duplication saves only one unique copy of a file, block or byte to remote storage.

The traditional concepts of full backups or disaster recovery sets are changing. Storage administrators realize they don’t need to back up every single PowerPoint presentation or include each MP3 file in a disaster recovery set. More businesses are focusing on protecting mission-critical applications, while ignoring secondary or nonessential file types.

Recoverability from the WAN

Because backups and disaster recovery sets are useless unless they can be recovered from a remote location, storage administrators must also be concerned with recovery time objectives (RTO). RTOs can be different than RPOs. An organization might need an extremely short RPO to minimize potential data loss, but can tolerate 12 to 24 hours for recovery. What’s critical is that remote data can be recovered within the allotted RTO. In some cases, a business may temporarily draw additional bandwidth from a service provider in order to meet tight RTOs. Recovery drills can be used to train personnel and streamline the recovery operation.

Implications of Archiving Data

Unlike backups or disaster recovery sets, which are typically only accessed after a problem occurs, archival data can be accessed at any time (albeit infrequently). An example of archival data is patient records, where a doctor may only access the patient’s history and medical images during an annual physical or follow-up visit. Remote archives add a measure of data protection by placing the data in another location.

With remote archives, WAN bandwidth is not a major concern because the individual files being saved or accessed are small relative to the total archive size. For example, a patient’s x-ray image may only be a few megabytes that can be pulled across a low-bandwidth WAN link. But if the WAN goes down, the archive becomes inaccessible. One way to mitigate the impact of WAN disruptions is to use a local archive platform, then mirror to a remote archive for data protection.

Remote Storage and Security Issues

Because companies are obligated to protect sensitive data, as well as customers’ personal information against theft or loss, any remote operation should factor in data security. Remote data is often beyond your direct physical control, but unlike tapes that are typically vaulted, WAN connectivity carries the added risk of unauthorized electronic access (aka hacking). Consequently, remote storage should include authentication plans along with the use of encryption. Encryption is only needed for sensitive data or personal information, so it’s usually not necessary to encrypt the entire backup or disaster recovery set. Encryption can be implemented in hardware or through software.

[/vc_column_text][/vc_column][/vc_row][/vc_section][vc_section full_width=”stretch_row” css_animation=”fadeInUp” css=”.vc_custom_1540522374191{padding-top: 80px !important;padding-bottom: 30px !important;background-color: #181223 !important;}” el_id=”solutions”][vc_row][vc_column][vc_custom_heading text=”Solutions” font_container=”tag:h6|font_size:10px|text_align:center|color:%231dc2ef” use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Comprehensive IT services include” font_container=”tag:h3|text_align:center|color:%23ffffff” use_theme_fonts=”yes”][vc_empty_space height=”60px”][iconlist icon_size=”small” class=”columns-3 gap-50″][iconlist_item type=”image” icon_image=”1257″]


Cloud services are network dependent, which is why CFSI network management and monitoring services have become critical to IT.[/iconlist_item][iconlist_item type=”image” icon_image=”1258″]

Service desk

CFSI 24/7 support is about maximising service efficiency, resolving problems and driving continuous service improvement.[/iconlist_item][iconlist_item type=”image” icon_image=”1260″]


CFSI ensures your IT infrastructure is always optimised to support the stable and highly available services organisations demand.[/iconlist_item][iconlist_item type=”image” icon_image=”1261″]

Endpoint management

Client and server endpoints are managed as one estate, ensuring security and stability while maximising uptime and employee productivity.[/iconlist_item][iconlist_item type=”image” icon_image=”1262″]


CFSI supports Software as well as on-premise deployments, ensuring applications are always optimised for the best possible user experience.[/iconlist_item][iconlist_item type=”image” icon_image=”1263″]

Managed services plus

CFSI provides advanced management tools to clients who want to take their IT Service Management to a higher level.[/iconlist_item][/iconlist][/vc_column][/vc_row][/vc_section][vc_section full_width=”stretch_row” css_animation=”fadeInUp” el_id=”benefits” css=”.vc_custom_1536330643232{padding-top: 80px !important;padding-bottom: 80px !important;}”][vc_row][vc_column][vc_custom_heading text=”Benefits” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our services provide a unique range of benefits” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row][vc_column][iconlist][iconlist_item type=”image” css=”.vc_custom_1536205294665{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Control IT Costs

You can scale your IT Costs according to your requirements and only pay for what you need. Whether that be increasing or decreasing staff, or IT project work.[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1536205301947{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Trusted IT advisor

Through regular account management meetings your Managed IT service company will be able to oversee your overall IT roadmap and become your trusted advisor.[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1536205308214{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Economy of scale

As your business grows, its support structure needs to grow, too. When you use a managed IT service you can scale your business up or down with nothing more than a simple discussion.[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1536205314909{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Increased efficiency

You’ll have your IT needs outsourced to a team of IT experts, and during times where you need additional project support, your managed IT provider supplies the extra staff.[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1536205321845{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Small initial investment

Managed IT services help you offset the initial investment of technology costs. Rather than spending thousands of dollars on hardware and software upfront.[/iconlist_item][/iconlist][vc_empty_space height=”10px”][vc_column_text]

Stop wasting time and money on technology. Let’s get started

[/vc_column_text][/vc_column][/vc_row][/vc_section][vc_section full_width=”stretch_row” css_animation=”fadeInUp” el_class=”mask” css=”.vc_custom_1536308212411{background: #fc766a url(http://staging.compnetfederal.com/wp-content/uploads/2018/08/job12-279-chim-01065.jpg?id=1062) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_id=”customers”][vc_row full_width=”stretch_row” css=”.vc_custom_1536285924597{padding-top: 120px !important;padding-bottom: 120px !important;}” el_class=”mask”][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][vc_icon type=”entypo” icon_entypo=”entypo-icon entypo-icon-quote” color=”custom” background_style=”rounded” background_color=”white” align=”center” custom_color=”#fc766a”][vc_custom_heading text=”NanoSoft are always accommodating our diverse needs and we feel like they are a part of our company rather than an external supplier.” font_container=”tag:div|font_size:36px|text_align:center|color:%23ffffff|line_height:1.35em” use_theme_fonts=”yes”][vc_empty_space height=”30px”][vc_custom_heading text=”John H. Bedard, Jr” font_container=”tag:h6|font_size:10px|text_align:center|color:%23ffffff” use_theme_fonts=”yes” el_class=”style1″][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” css=”.vc_custom_1536309193694{padding-top: 80px !important;}” el_id=”plans”][vc_row][vc_column css_animation=”fadeIn” el_class=”delay-1″][vc_custom_heading text=”Pricing and Plan” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”1 monthly fee for all IT services. No costly surprises” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space height=”30px”][/vc_column][/vc_row][/vc_section]