Skip to Content

Don't wait for a disaster to happen.


Be prepared and keep your business moving forward with

KIRZ Disaster Recovery Solutions

Secure Your Business Data with KIRZ Backup & Disaster Recovery (DR)


In today’s digital world, your data is your most valuable asset. With KIRZ Backup & Disaster Recovery (DR), you can proactively protect your business from data loss due to unexpected system failures, cyberattacks, or natural disasters.

Our Offsite DR solution is built on world-class platforms and connects 4 major data centers across Thailand via the KIRZ Data Center Interconnect (DCI) network — ensuring fast, reliable, and seamless data transfer and recovery when you need it most.

Why KIRZ Backup & Disaster Recovery is the right choice? 


Certified for Reliability

Backed by CSA STAR Level 2, ISO 27001, and ISO 20000 certifications

Always Ready for Action

Instant failover to backup systems in case of emergency

Compliant with BCP and IT Audit Standards

Designed for business continuity and peace of mind

Nationwide High-Speed Data Transfers

Through our powerful DCI infrastructure 

photo of 5-story library building

Service Rates

✽  Backup Packages

  • Standard Cloud Backup with 1 TB Starting at 2,500 baht Back up data for Virtual Machine, Server, Workstation
  • Cloud Backup with Antimalware, Ransomware protection Starting at 2,800 baht Back up data and Antimalware, Ransomware protection for Virtual Machine, Server, Workstation
  • Cloud Backup สำหรับ M365 ไม่จำกัดขนาด Starting at 1,500 baht Back up data for Micrsoft 365 Business with 10 Seats, with Unlimited Backup Storage and up to 1 Year backup copy

Key Features

KIRZ Backup and Recovery


Never lose a file again; quickly move your data to new drives and computers.



Full image backups

Create complete system disk or partition replicas for efficient recovery of entire systems, individual files or folders as needed.

 

Backup and Transfer

Never lose a file again; quickly move your data to new drives and computers.


Realtime disk cloning

Create a disk clone on Windows or macOS without interruption, enabling seamless data migration to larger or faster disks, including the operating system, files, applications and settings.


Recovery drive 

Effortlessly restore systems to identical or different hardware using bootable media and the integrated Survival Kit tool.


Microsoft 365 backup  

Establish direct cloud-to-cloud backups for Microsoft 365 accounts, protecting emails, attachments and OneDrive files and folders.


Selective file and folder backups

Control the nature of your backups. Select individual files and folders that you want specific replicas of when you don't want a full image copy.


File synchronization and sharing

Replicate your local backup in the cloud automatically so you always have an off-site copy available for recovery. Following the 3-2-1 backup rule has never been easier.


Dual Protection

Create multiple copies of your data locally and in the cloud, ensuring adherence to the 3-2-1 backup rule and the availability of off-site copies for recovery in case of a loss of a local backup.


Cloud restore 

Access files in your cloud backup from anywhere: download a single file or folder to recover it to another machine, or access your data from another device while traveling.


User-specified encryption keys  

Establish encrypted backups for individual users in your family, secured by their passwords.


End-to-end cryptography  

Enterprise-grade AES-256 encryption protects backups on-site, in transit, and in the cloud, maintaining data privacy for everybody, including Acronis.


Secure data storage infrastructure  

Backup data to Acronis data centers, which adhere to stringent security standards, including on-site protections, 24/7 video surveillance, and biometric access control.


Try and Decide tool

Safely test new software, drivers, system updates and settings with the option to revert to the previous configuration.

Cybersecurity


Prevent viruses and ransomware, and never lose time to recover your system again.



Anti-ransomware and cryptojacking protection

Defend files, applications and systems against ransomware and cryptojacking attacks through advanced detection and prevention technology, enabling automatic recovery of impacted files.



Two-factor authentication (2FA)

Protect your account by requiring two different forms of identification, such as a password and a unique verification code.


Vulnerability assessments 

Evaluate potential security weaknesses in the operating system and applications with a comprehensive vulnerability assessment tool, offering recommendations for updates to enhance security.


Real-time protection 

Safeguard devices and backup files against malicious activity, using continuous threat monitoring to address previously unknown risks.


Malicious URL filtering

Restrict access to URLs attempting to deliver malware, ransomware or cryptojackers to systems.


On-demand antivirus scan 

Execute malware scans as needed, selecting between rapid file scans or comprehensive system analyses.


Signature-based threat analysis  

The threat database is updated every five minutes, ensuring continuous defense against emerging risks.


Behavioral analysis engine  

Detect malware upon execution using a dynamic detection engine that identifies threats based on interactions with the system.


Quarantine and exclusion management  

Isolate potential threats while maintaining approved program functionality through controlled exclusion lists.


Videoconference security

Protect privacy during Zoom, Cisco Webex or Microsoft Teams videoconferencing sessions.

 

Contact our expert team today for a free consultation or demo!