Managed SharePoint Backup

Comprehensive SharePoint backup services to the cloud or locally for all your collaboration content, managed by the experts, unburdens your team to work on what matters most.

We’ll backup your data from SharePoint 03, 07, 10, 13, 16, SharePoint Online, Exchange, Exchange Online, Office365,  OneDrive, and personal file shares. You can backup your data on-premises, or in any cloud – Fpweb, AWS, Azure, wherever – and we’ll:

  • Maintain all metadata, security settings and version histories
  • Provide longer retention periods to protect against ransomware threats
  • Restore a single content item or entire server farm

SharePoint Backup & Restore
Protect your organization from data loss with truly comprehensive backup for your entire SharePoint environment, including all content, customizations, solutions, apps, features, and the VMs hosting your SharePoint servers.

SharePoint Business Continuity
Minimize business disruptions caused by service interruptions or accidental deletions with efficient recovery of all SharePoint components, databases, indexes, and configurations.

SharePoint SLA Compliance
Satisfy even the most aggressive Service Level Agreements (SLAs) by minimizing downtime, data loss, and restore times with granular restore of select SharePoint components, including content security and properties.

SharePoint Online Backup and Restore
Office 365’s SharePoint Online lacks the essential ability to recover documents once they’ve been removed from the trash. Furthermore, the retention period is only 14 days and you must restore the entire site. protects all your SharePoint sites with automated daily SharePoint backups down to the object level.   Backup to the secure data center of your choice: Fpweb global data centers, Azure, AWS or your own.  Increase your SharePoint Online backup retention period for disaster or ransomware survival.

Managed SharePoint Backup as a Service
Rest easy knowing has all your SharePoint backup and restore needs covered.  On-premises or any cloud including Office 365 SharePoint Online.  We’ve managed SharePoint backups for over 500,000 SharePoint sites since 1999.  Join the family and get freed up to innovate, focus and have more time for what really matters.

Office 365 Backup Solution
Protect against Office365 data loss with off-cloud backup, archiving, and business continuity.  Set longer retention periods for a bigger safety net to recover from ransomware and other cyberattacks.  Restore SharePoint, Exchange email and calendars, or OneDrive to get it back right away – and get everyone right back to work.

Microsoft Cloud Backup
Your data and applications are everywhere—on servers, clients, and in the cloud. Managed backup services can protect your critical applications, including SharePoint, Exchange, and SQL Server; files and folders; Windows servers and clients; and Azure infrastructure-as-a-service (IaaS) virtual machines (VMs).

Ensure Maximum Content Availability
Perform comprehensive backups of your content across your Office 365 services including SharePoint Online, OneDrive for Business, and Exchange Online. Essentials takes your content and normalizes the data, so that whether you’re storing your backups locally or in another cloud service such as, Amazon or Azure, you always have quick and easy access to your content. The content is stored in the same format as it was in the source environment so that searching and restoring on a granular level is painless and maximizes content availability.

Backup and Recovery with SharePoint in Office 365
Microsoft does offer some recovery options through support. It does offer disaster recovery (with up to a 12 hour time difference) and it will allow recovery of a deleted site within 7 days of the deletion (up to date within 24 hours of the deletion). But keep in mind that you don’t have access to the server (only Microsoft does).

In the case of the Office 365/SharePoint Online user, your Service Administrator (this is the person in your company who is responsible for managing the online SharePoint site) does have some ability to recover content. However, they cannot recover a site that was deleted by mistake and they have no disaster recovery capability. They can, however, recover from both a first stage and second stage recovery bin, as well as items accidentally deleted (and in some cases the user himself can recover). If a site is corrupted, the Admin can use SharePoint Designer to revert to the site definition.

But if you are looking for more than these basics, managed SharePoint backups from may be just the ticket. Find out more about managed SharePoint backup services from at Fill out this form, email, or call us at 866-780-4678 to get started.

Posted in Administrative Support, Office 365, SharePoint | Tagged , , , , , , , , , , | Leave a comment

Managed Security Services Infographic


Posted in Administrative Support, Cyber Security, Cyber Security | Tagged , , , , , , , , , | Leave a comment expands global infrastructure with Frankfurt data center, a managed cloud computing and security services company based in Fenton, Missouri, has expanded its global infrastructure to include a data center in Frankfurt, Germany. adds this European location to its global infrastructure that already includes data centers in London, St. Louis, and Kansas City. All data centers boast enterprise-grade security that includes physical measures like guarded entry with access cards and biometric registration, as well as cyber protection that is built into the entire network’s security framework.’s global infrastructure is highly available, fault tolerant, and scalable. It meets the Tier III Uptime Institute Data Center Standard and SSAE 16 SOC I Type II certification. Each data center includes redundancy in all critical systems, on-site Network Operations Centers (NOCs), backup power generators, advanced fire detection and suppression, temperature-controlled environment, raised anti-static floors, and 100% financially-backed uptime.

The Frankfurt data center lowers latency for European clients with lightning-fast, fiber-optic networking and helps meet regional compliance and data residency requirements.

Please contact at or 866-780-4678 for more information about its global infrastructure and to discuss simplifying your infrastructure in a dedicated cloud or a hybrid cloud model.

Posted in Cloud Hosting, Cyber Security, Team | Tagged , , , , , , | Leave a comment

Migrating to SharePoint

Migration to SharePoint

Businesses are migrating from Lotus Notes, LiveLink, OpenText, Documentum, and Jive to SharePoint in order to modernize their collaboration platform and save money.

Nine out of 10 of the top performing Intranets are built on SharePoint.  SharePoint 2016 is the preferred collaboration tool for search, CMS, mobile, news, and secure file sharing.

Companies of all sizes are moving to SharePoint for significant cost savings.  SharePoint often costs less than the ongoing maintenance of other software like Lotus Notes, LiveLink, OpenText, Documentum or Jive.

SharePoint Migration Tools
Get the right tools for the job and do your SharePoint migration on-time and on-budget. SharePoint migration services uses a blend of the industry’s best SharePoint migration tools from Metalogix, Sharegate, and Avepoint.  With thousands of migrations under our belt since 2003, we’ve found that each tool does something a little better than the others.  Combining them all saves time and headache.  If you bought them separately your cost would exceed $25,000 for just the tools!

SharePoint Migration Plan
You need a man with a SharePoint migration plan.  SharePoint migrations and conversions are often complex and time-consuming.  Without a SharePoint migration plan backed by years of experience and thousands of successful migrations, you are wasting valuable time, money and effort.  Get it done right the first time with SharePoint migration services.

SharePoint Data Migration
Here is a list of software applications commonly being migrated to SharePoint for better collaboration functionality and cost savings:

  • Lotus Notes to SharePoint migration
  • LiveLink to SharePoint migration
  • OpenText to SharePoint migration
  • Documentum to SharePoint migration
  • Jive to SharePoint migration
  • FileNet to SharePoint migration
  • Confluence to SharePoint migration

And the rest: Eroom, Hummingbird, Exchange public folder, Mediawiki, Quickr, Google, Box, Huddle, Egnyte, Accellion (Sharefile), WatchDox, Syncplicity, Hightail, DropBox, Slack

SharePoint Migration Checklist
We make a custom SharePoint migration checklist for you and make sure each task is completed to our best practice standards and on time.  The list is documented in your SharePoint migration services State of Work (SOW) so there is no guessing on what will be done, by who, and by when.

SharePoint Migration Services
SharePoint migrations are not easy and probably not your core business.  They are time consuming and demand the right tools, people, processes, and experience.  Get just one of those wrong and your SharePoint migration project will fail.  Go with the pros at, rest easy, and be the hero!  You’re in good company with thousands of SharePoint migrations and 1.8 billion SharePoint logins managed each and every day since 1999.

Fill out this form, email us at, or call us at 866-780-4678 to get started!

Posted in SharePoint | Tagged , , , , , , , | Leave a comment

Don’t forget the front desk part of cyber security

There is an article in the Summer 2016 issue of Security Smart about a security consultant who was hired to infiltrate a company’s buildings and networks to assess the effectiveness of its security procedures.

He walked in off the street and told the lady at the front desk that there was a ticket put in and asked if they received an email notification that he would be there to do some migration on the network. The undercover security consultant then asked her to log out and allow him to sit down at the desk. He plugged in a key logger, which covertly tracks the keys struck on a keyboard.

Then, he asked her to log back in so that he could pull up a command prompt to test the connectivity. She did and the key logger recorded the password. He told her that because he would have to ask her to do that a few times, he would like her to write down her password, and slid over a Post-it stack to her with a pen, as if that was normal. She wrote down her password and slid it back to him while he clicked around, gained access to network shares and several systems on the network.

The undercover security consultant asked her if she ever works from home and she said that she couldn’t ever get the VPN to connect. He told her that if she could tell him how she is supposed to remotely connect to the network that he could try to reset some things for her while he was there. She did and before long he had another gig of data, domain credentials, an encryption key, and a tutorial about how to connect to the VPN.

The article says “Don’t be gullible. Always double-check an outsider’s story, especially when that person is claiming to need access to company equipment or sensitive information. It’s perfectly OK to take a minute to call and verify someone’s story and/or credentials, whether the person appears legitimate and sympathetic, or impatient and inconvenienced. And never, ever write down your passwords.”

Posted in Cyber Security | Tagged | 1 Comment

Provide a secure and consistent digital workspace with Secure VDI

The previous post here, Meet compliance standards for regulated industries with Secure VDI, explained how Secure Virtual Desktop Infrastructure (VDI) meets the managed access compliances for regulated or  sensitive data industries, such as healthcare and financial organizations.

Building off of that, Secure VDI allows for a dedicated desktop profile on a Terminal Server, meaning the users have the ability to set background images and set shortcuts on the desktop for frequently used applications or files/folders.

The same applies to which applications can be run or installed on these environments. The general practice is to have an agreed upon desktop design or build that includes all of the applications required for the individual user. By design this does not allow the user the  administrative capability to add or remove non approved applications.

In addition to application and desktop customization, firewall controls are also configurable. This often speaks to productivity concerns and overall security.

Given the secure environment in which these virtual instances are created, the ability to easily control what these devices can access on public internet becomes a management feature as well. An example would be to simply limit internet access to specific work related sites, and not allow non work related sites, such as social media and other more recreational driven content. This process combined with multi-factor authentication continues to focus on security.

What sets apart from the rest when looking to add VDI?

We have engineered this service and application out of necessity. As client access environments continue to expand locally and across the globe, the challenge becomes increasingly more complex to work.  What makes the leader in this service, is that we have not only developed this solution for client based consumption, but this is something that is used by and has had an amazing impact on security and productivity.

We are 100% dedicated to improving upon security and ease of access to easily extend and manage workforces, whether they reside under the same roof, or they are halfway around the world.  Our security practices and infrastructure, coupled with our Absolute Support®, is what truly makes an already amazing product even better.

Visit for more information and to try out a free demo. Fill out this form, or contact the cyber security specialists at or 866-780-4678 to get Secure VDI set up for your organization.

Posted in Cyber Security | Tagged , , , | Leave a comment

Meet compliance standards for regulated industries with Secure VDI

A previous post, Secure VDI – What it does and why you need it, explains that virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine running on a centralized server and that it allows for secure remote computing with the accessibility and ease of use, as if your personal laptop was tucked away safely in a data center.

Picking up where that post left off, another advantage of Secure VDI is that it meets the managed access compliances for regulated or sensitive data industries, such as healthcare and financial organizations.

Secure VDI provides the ability to audit and measure user permissions and functions by utilizing the Active Directory services. User’s logon/logoff times and session duration are still captured by their Active Directory user object, allowing for full audit capability for all user access, dates, and times. These Secure VDI users and groups can be joined to the existing AD environment, or created as new. Both are supported.

This is the key element that is enforced by leveraging unique credentials for each remote user and placing those user objects into specific security groups. This is the same process for providing access to the Secure VDI environment, and the file or folder structure permissions.  Active Directory Group Policies enforce unique logins and access not only by the username and password, but also by multi-factor authentication.

The combination of secure Active directory user groups and multi-factor authentication mitigates the chance of non-authorized access, and/or username and password sharing.  This also speaks to  fraud protection, so the users are able to alert their administrators if there are unauthorized attempts, or if enough logon failures occur the administrator and user are alerted.

Each of the Secure VDI machines are 100% virtual, including the user file and directory structure. Information that is stored during active sessions is 100% deleted upon logging out.  This is enforced by local security policies applied at the server and Active Directory level. This process ensures that any and all data, either gathered as cookies, browser data, or temp files while creating and/or editing documents, are 100% deleted when the user ends their session.  By creating these security rules, you are ensuring that no user will be able to log on to a session and be able to view or edit another user’s content.

We get into how Secure VDI allows for a dedicated desktop profile on a Terminal Server in this recent post, Provide a secure and consistent digital workspace with Secure VDI.

Visit for more information and to try out a free demo. Fill out this form, or contact the cyber security specialists at or 866-780-4678 to get Secure VDI set up for your organization.

Posted in Cyber Security | Tagged , , , | Leave a comment

Adding Absolute Support® to your team

Pretty much everything we do at revolves around our Absolute Support®. But what exactly is that?

Basically you’re outsourcing the administrative support necessary to move your business forward. We take headaches off your plate and unburden your team so they can focus on your core business. Absolute Support® is expert, five-star customer-rated, USA-based support on-premises, or in any cloud, with a six-minute ticket response, 24/7/365. You pick your apps, pick your users, and pick your level of support. We don’t care where you put your data, because we’ll take care of it wherever it lives.

  • 24/7 access to Microsoft experts
  • 68% multi-role cost savings
  • Frees up your team to innovate
  • 20 years Microsoft experience
  • Microsoft Gold Certified Partner
  • 1.8 billion logins managed
  • LightSpeed™ Network
  • Bring your license or rent
  • Personal account advisor

How does it work?

In the IT world, most companies have tiered support levels. The different levels can be explained in a number of different ways, but we’ve arranged ours by the full-time employees you would need to provide the same support as our team.


  • 24/7 Help Desk
  • Emergency Break-Fix
  • Training, Tutorials
  • Migration, Upgrades
  • Controlled Patching
  • Backup, Restore
  • Consulting, Projects

Database includes everything in Admin, plus:

  • Microsoft SQL Server, Oracle
  • NoSQL, MongoDB
  • PostgreSQL, MySQL
  • DBA Performance Tuning
  • DB Upgrades, Migrations, High-availability

Development includes everything in Database, plus:

  • SQL, Java, JS, C#, Python, HTML
  • Software/App Source Code
  • Analysis, Algorithms, Debugging, Maintenance
  • Secure Code Review
  • Team Foundation Server (TFS)

Security includes everything in Development, plus:

  • Cyber Security, Secure Cloud, Encryption
  • Advanced Malware Protection
  • Secure Hybrid AWS, Azure, Google
  • 24/7 Incident Response Team (IRT)
  • DDoS, Firewall, VPN, WAF, IPS/IDS, DLP

The budget-friendly subscription plans have a flat rate monthly billing cycle. If you need support, you just submit a ticket and we’ll have a real, live, American respond in six minutes.

We have your Microsoft apps covered


  • AWS
  • Azure
  • Google
  • IBM
  • VMware
  • Oracle
  • On-premises
  • Private cloud hosting provider

The more we cover, the more you save
According to, the average salary for a Systems Administrator II in the U.S. is $74,273 ($6,189/month). The Absolute Support® Admin plan is only $3,495/month, saving you $2,694/month.

The average salary for a Database Administrator II in the U.S. is $88,333 ($7,361/month). Combine that with the average salary of a Systems Administrator II and your payroll is $8,555/month more than the $4,995/month Absolute Support® Database plan.

Combine those two salaries with the $99,376 ($8,281/month) average salary for a Software Developer III, and your payroll for those three positions is $21,831/month – $14,336/month more than the $7,495/month Absolute Support® Development plan.

The average salary for a Data Security Analyst IV is $116,082 ($9,674/month). Add that with the average salaries of a Software Developer III, Database Administrator II, and Systems Administrator II, and your payroll for those four positions is $31,505/month – $21,510/month more than the $9,995/month Absolute Support® Security plan that covers all four job responsibilities, 24/7/365. That’s a 68% cost savings! Factor in the cost of benefits (according to for those four positions, and your savings increase to 77%!

Put our talent on your team and use the experts to unburden your team. Complete this form, send us an email, or call us at 866-780-4678, to get started.

Please Note: All pricing above is current as of the date this blog was posted. Pricing is subject to change.

Posted in Administrative Support | Tagged , , , , , , , , , , | Leave a comment