Skip to content
Brand · PH · EN

Colour theme

Region

Opens the same page on another regional site.

Philippines site language

English, Filipino (national language), or Tagalog. Applies to this regional site.

Search site

Menu

NetApp snapshots, offsite mirroring, NinjaOne Backup, Microsoft 365

Backup scope you can defend. Restore evidence your auditors can follow.

Get written in-scope and out-of-scope coverage, named restore owners, and scheduled recovery tests you can show to auditors or insurers. We design around Veeam, Datto, NetApp where it fits, and Microsoft 365 protection on purpose, so backup, service desk, and security follow one incident thread when something fails.

This is a fit if…

  • You need written scope, retention, and immutability that hold up in ransomware reviews and board questions.
  • You want named restore owners and scheduled test evidence, not only green backup job ticks.
  • You need Microsoft 365, SaaS, and hybrid workloads explicitly in scope or out of scope, by design.
  • You need RPO, RTO, and test cadence answers that match the runbook and stand up in tenders, risk reviews, and insurance questionnaires.

A one-time backup install with no operational handover, or a set-and-forget approach with no change records, access control, or restore testing cadence. If you need strategy-only planning without run-state backup scope, start with strategic managed service or a scoped project.

Why assurance teams trust this approach

Data protection holds up when scope, security, and operations tell one story. Across 10,000+ managed endpoints, these controls reflect how we run managed IT in production.

  • Veeam, Datto, and platform depth

    NinjaOne backup for cloud and on-prem estates, plus NetApp snapshots and offsite mirroring. Where continuity requirements suit Veeam or Datto patterns, we align those designs with cloud targets, sized to RPO/RTO, not generic nightly dumps.

  • Quality and governance you can file

    Operations aligned to ISO 9001-style discipline, with security and privacy expectations framed in governance and continuity in the same management system as the rest of our delivery. We obtain independent assurance relating to our network designs, security services, and backup and recovery as part of our governance programme.

  • Where we operate

    Australian MSP delivery with locations and model when buyers need to match data paths and support coverage to their own governance.

Not ready to book yet? Start with the diligence checklist

Use this checklist to compare providers on scope, immutability, restore testing, and audit evidence before your next review or renewal.

Outcome snapshots from recent reviews

De-identified patterns from real delivery work. Use these to pressure-test what your current provider can evidence.

Where backup still fails in real incidents

Most failures are not tool failures. They are scope and process failures discovered during an outage, when Microsoft 365 was never protected, immutability was not enforced, or no one can run a full restore under pressure.

  • "We run Veeam" but no one documented what is out of scope: SaaS, edge devices, or legacy apps that fell outside policy.
  • Jobs show success while restores fail because of bad credentials, broken chains, or undocumented app dependencies.
  • Security and backup are designed in silos, so you can contain an incident but still lack a clean copy to recover.
  • Retention that passes checklist audits but misses legal hold, privacy, or sector requirements. Common in healthcare and government .
  • Renewals get approved while restore testing slips: alerts are cleared, but nobody proves recovery from backup to application login in production-like conditions.

Reliable recovery is deliberately boring: fixed scope, rehearsed restore paths, and dated evidence that anyone can follow. If your next policy review or insurance attestation is already scheduled, ask for written scope and restore logs, not another dashboard screenshot.

Questions leadership teams should be able to answer

Backup, recovery, and business continuity are trust issues for managed IT buyers. Boards, insurers, and auditors do not want marketing claims—they want clear proof, dates, and owners.

  • Can we prove backups are working?

    Green job ticks are not evidence. Proof means immutability and chain integrity you can explain, plus test restores that show data and applications coming back—not another dashboard screenshot alone.

  • When was the last restore test?

    Leadership should see a calendar and artefacts, not someone’s memory. We run scheduled partial and full restores, log pass or fail, and update runbooks when a test surfaces a gap.

  • What is our recovery time?

    RTO and RPO belong in the runbook, not the brochure. We align targets to critical workloads, dependencies, and realistic paths—including Microsoft 365 and SaaS when they are in scope.

  • What systems must come back first?

    Priority order should be agreed before the incident. We help you define tier-one systems, map application dependencies, and document who approved anything left out of the first wave.

  • Who owns the recovery process during an incident?

    Restores stall when ownership is vague. We document named restore owners, handoff between service desk , security , and infrastructure, and keep one ticket thread so escalations do not fragment under pressure.

What we deliver

Data protection works when scope is clear, backup copies are protected, and restores are tested. We run backup and DR as an operating practice with named ownership and repeatable proof.

  • Server, VM, and application backup

    NinjaOne backup across cloud and on-prem workloads with image-level and application-consistent points, plus bare-metal recovery paths for priority systems.

  • Continuity and appliance-backed recovery

    Datto continuity when you need fast virtualization or cloud failover, scoped with your network and identity so failover does not strand users on an island.

  • Microsoft 365 and SaaS protection

    Tenant-level coverage for Exchange, SharePoint, OneDrive, and Teams with retention and legal hold in mind, including journaling for email, SharePoint, and OneDrive where compliance requires. The Microsoft 365 recycle bin is not a backup plan.

  • Immutable repositories and air-gapped posture

    Object-lock capable storage, write-once patterns, and separation of duties so ransomware cannot wipe your last good copy quietly. We design this with managed security so incident response and recovery use the same facts.

  • Hybrid data paths and primary storage fit

    NetApp snapshots and offsite mirroring when your primary storage benefits from orchestration next to cloud targets, with cloud sync and recovery targets matched to how data actually flows.

  • Disaster recovery runbooks and testing

    Written restore steps, tabletop exercises, and scheduled test restores with artefacts your risk committee can keep. Tie the rhythm to strategic reviews when leaders want recovery confidence alongside roadmaps.

Why teams choose Trucell

Backup and DR run on the same platform as your service desk and infrastructure. Our management system ties quality, security, privacy, and continuity to daily operations and review cycles, not policy documents alone.

  • Vendor depth through one MSP

    NinjaOne backup for cloud and on-prem environments, NetApp snapshot and mirroring patterns, plus Veeam/Datto-aligned continuity designs where they fit, with licensing and support consolidated through Trucell.

  • Architecture that matches the CTO brief

    RPO/RTO, data classification, and cloud exit paths get agreed with your technical owners, not sold as a SKU list. We fit how you run Azure , on-prem clusters, and Microsoft 365 in one picture.

  • Assurance-friendly operations

    Change records, access control, and review cadence line up with what enterprises expect when ISO 9001 or sector frameworks ask how you know backups actually work. Improvements get owners, like strategic managed service QBRs when you want leadership in the loop.

  • Integrated with day-to-day IT

    Service desk and NinjaOne context mean restore requests follow the same tickets and escalations your users already use.

RFP answers for common data protection score lines

Most tenders and risk reviews ask similar questions. Use these answer patterns as your starting point.

  • Scope, exclusions, and asset register

    What to ask: what is explicitly in and out of backup, including M365, SaaS, and edge, with sign-off on exclusions? How we answer: written scope before we size storage or licences, with exclusions named for leadership, not discovered at restore time.

  • Immutability, access, and ransomware

    What to ask: can an admin or attacker wipe the chain, and who holds separation of duties for backup accounts? How we answer: we design object-lock and role separation with managed security so IR and recovery align on the same copy and the same playbooks.

  • RPO, RTO, and test evidence

    What to ask: when did you last prove a full restore, and can you file artefacts? How we answer: test restores, drills, and table-top outputs on a cadence matched to risk, with named owners and tracked gaps when a test fails, see also Essential Eight when recovery hygiene is in your control narrative.

  • Microsoft 365, retention, and legal hold

    What to ask: is tenant data protected to match retention and eDiscovery expectations? How we answer: we do not treat the recycle bin or short-term Microsoft retention as a DR plan; we align SaaS protection to your M365 and identity story in writing.

  • Cloud, hybrid, and data paths

    What to ask: where do backups land, and does replication fight production bandwidth on the same network path without QoS or scheduling? How we answer: we align targets and schedules with cloud and network design so protection does not become the next outage source.

  • Handover to the service desk and incidents

    What to ask: which ticket queue runs restore, and who gets paged in a sev-1? How we answer: IT support and backup share escalation paths: users do not get a new mystery process when they need a file or VM back under pressure.

If scope, restore tests, and incident tickets must match, start with a scope review

We review what you run now, what is in or out of scope, and the next restore worth proving. You leave with named owners and one practical gap to close first, no lock-in.

Diligence checks before you trust a green job

Backup jobs can report success while recovery remains unproven. Use these checks before you sign or renew.

  • Immutability and air gap

    Can ransomware or admin error wipe the backup chain? If immutability is optional, treat it as a gap.

  • Application-consistent scope

    Databases and VMs need quiescing or VSS, snapshot-only copies can break recovery for transactional workloads.

  • Restore rehearsal

    Named annual or quarterly tests with owners and runbook updates, not the first full restore during a crisis.

Scope · Protect · Prove · Sustain

Four beats: decide what must survive, harden storage, prove recovery on a calendar, then run it like the rest of managed IT.

  1. Scope

    Inventory workloads, set RPO/RTO, handle regulatory retention, and list exclusions in writing before we size disk or licences.

  2. Protect

    Roll out backup targets, immutability, encryption, and off-site or cloud tiers. Hook into identity and monitoring so the right people see alerts.

  3. Prove

    Run test restores, failover drills, and ransomware-style walkthroughs; keep evidence. Change the policy when the lab result disagrees with the diagram.

  4. Sustain

    Monthly hygiene on capacity and alerts, plus annual or quarterly recovery tests sized to your risk, in step with security posture reporting when both teams need the same story.

When backup is working, and when it is not

You judge backup by tested restores and named owners, not by terabytes moved or job ticks alone.

When it is working

  • Scope matches the asset register. SaaS, VMs, and critical apps are in or out on purpose, with sign-off on anything left out.
  • Test restores hit their dates. Misses become tracked changes, not surprises.
  • Security and backup share the same assumptions on immutable copies and who hands off during an incident.

When it is not

  • Jobs stay green but nobody has pulled a full restore in conditions that look like production.
  • Marketing says immutable storage while admin accounts are shared so wide the control is mostly theatre.
  • Disaster recovery documents still name servers that were retired years ago.

Backup and recovery FAQ

Common due-diligence questions before renewal, migration, or assurance review.

What should be explicitly in scope for backup and recovery?

Scope should name included and excluded workloads, including Microsoft 365, SaaS, virtual machines, edge devices, and legacy applications. Exclusions should be documented and approved before licensing and storage sizing.

How often should restores be tested?

Restore testing should run on a scheduled cadence based on risk and criticality. Teams should keep evidence from full and partial restores, track failures, and update runbooks after each rehearsal.

Why is immutable backup storage important?

Immutable storage helps prevent ransomware and privileged misuse from deleting or altering recovery points. It should be paired with role separation and incident-ready procedures.

Is Microsoft 365 retention the same as backup?

No. Native retention and recycle bins are not a complete backup strategy. Organisations should define tenant-level Microsoft 365 backup coverage aligned to retention, legal hold, and recovery objectives.

Prefer a low-friction start before booking a review?

Share a short backup brief and we will route your request with scope context. Best for teams comparing options before calendar scheduling.

This submits to contact intake with backup and recovery context so your request reaches the right owner quickly.

No obligation, we will recommend a practical first step.

Ready to replace green jobs with restore proof and clear owners

Tell us your RPO and RTO, what platforms you run, and when a full restore was last proven in realistic conditions. We map scope gaps and recommend the next test worth running.

No obligation. Bring your current runbook, insurer requirements, or latest restore report.

Products in this service line

Vendor lines and technologies we deploy and support as part of this solution, not a generic catalogue.

Explore related areas

Jump to an industry, partner, or service line; most Trucell clients touch more than one.