Off-Site Backup & Disaster Recovery San Antonio TX | AEH Solutions
Off-Site Backup & Disaster Recovery · San Antonio, TX

When Everything Goes Wrong,
Your Data Comes Back.

Ransomware. Hardware failure. Accidental deletion. Fire. Flood. Any one of these can destroy years of business data in minutes. AEH Solutions provides automated, encrypted, geo-redundant off-site backup and tested disaster recovery — so when the worst happens, you're back up and running fast, not starting over.

The Real Risk

What Data Loss Actually
Costs a Business

Most businesses assume backup is optional until the moment they need it. These are the numbers that change that conversation — and the reason we treat backup as non-negotiable for every client.

60%
of small businesses that lose critical data close permanently within 6 months
Source: National Cyber Security Alliance
21 Days
average downtime after a ransomware attack without a tested backup in place
Source: Coveware
$9,000
average cost per hour of IT downtime for a small business
Source: Gartner
93%
of businesses that experience 10+ days of downtime due to data loss file for bankruptcy within a year
Source: University of Texas
Industry Best Practice

The 3-2-1 Backup Rule —
And Why It Matters

The 3-2-1 rule is the gold standard for backup architecture. It's simple, proven, and the reason properly configured backups survive scenarios that destroy businesses relying on a single copy of their data.

3

3 Copies of Your Data

The original plus two backups. If one is compromised — by ransomware, hardware failure, or accidental deletion — two independent copies remain. A single backup is not enough.

2

2 Different Storage Types

Backups stored on different media types — local disk and cloud, for example. A hardware failure or fire that destroys one type won't destroy both. Diversity in storage is diversity in resilience.

1

1 Copy Off-Site

At least one copy stored in a geographically separate location. A local disaster — flood, fire, theft, or Texas weather — cannot reach an off-site copy. This is the copy that saves a business.

Coverage

Everything We
Back Up for You

Your data lives in more places than most people realize. We identify every critical data source in your environment and make sure all of it is protected — not just the obvious stuff.

🖥️

Servers & Workstations

On-premise servers, file servers, and critical workstations — full image backups and file-level backups with configurable schedules and retention.

  • Full system image — bare-metal restore capable
  • File and folder level backup
  • Incremental backups after initial full
  • Configurable retention — 30, 60, 90+ days
☁️

Microsoft 365

Exchange Online, SharePoint, OneDrive, and Teams data — completely backed up daily. Microsoft does not back this data up. You need a separate solution.

  • Exchange Online mailboxes — full history
  • SharePoint sites and document libraries
  • OneDrive for Business — all users
  • Microsoft Teams conversations and files
🗄️

Databases

SQL Server, MySQL, PostgreSQL, and application-specific databases — backed up with transaction log support for granular point-in-time recovery.

  • SQL Server — full, differential, and log backups
  • MySQL and PostgreSQL databases
  • QuickBooks company files
  • Custom application databases
🔗

Network Attached Storage (NAS)

Shared network drives are often where the most critical business files live — contracts, CAD files, accounting records, client data. We protect them the same way we protect servers.

  • Synology, QNAP, and major NAS platforms
  • Scheduled off-site replication
  • Previous version recovery
  • Ransomware-resilient backup architecture
💻

Endpoints & Laptops

Field technicians, remote workers, and executives with critical data on their laptops — all protected with automatic cloud backup that works wherever they are.

  • Automatic backup over any internet connection
  • Document folders, desktop, and custom paths
  • Works on Windows and Mac
  • Restore to same or new device
📱

Virtual Machines

If your environment includes virtual machines — whether on-premise or in a hosted environment — we back them up at the hypervisor level for fast, reliable recovery.

  • VMware and Hyper-V environments
  • Agentless backup at hypervisor level
  • Instant VM recovery for minimal downtime
  • Cloud replication for off-site copy
Solution Comparison

Not All Backup Is
Created Equal

Many businesses think they have backup when they actually have something much weaker. Here's how common approaches compare to a properly managed off-site solution.

Backup Approach Ransomware Safe Off-Site Copy Tested Recovery Monitored 24/7 Point-in-Time Restore
External USB drive ✗ No ✗ No ✗ Rarely ✗ No ✗ No
OneDrive / Google Drive sync ✗ No ✓ Yes ✗ No ✗ No ~ Limited
On-site NAS backup ~ Partial ✗ No ~ Sometimes ✗ No ~ Limited
Basic cloud backup (unmanaged) ~ Partial ✓ Yes ✗ Rarely ✗ No ~ Varies
AEH Managed Off-Site Backup Recommended ✓ Yes ✓ Yes — geo-redundant ✓ Yes — regular tests ✓ Yes — 24/7 alerts ✓ Yes — configurable
Disaster Recovery

When You Need to
Recover — Fast

Having a backup is step one. Knowing how to use it — and having tested that it works — is what determines how quickly your business gets back to normal. Here's our recovery process.

1

Incident Assessment

We determine the scope — what was affected, when the last clean backup was, and the fastest path to recovery. This happens in the first hour of a declared incident.

2

Environment Isolation

Affected systems are isolated to stop any ongoing threat from spreading to backups or unaffected systems before recovery begins.

3

Recovery Point Selection

We identify the most recent clean restore point — before the incident occurred — and confirm what data falls within the recovery window.

4

Data Restoration

Systems, files, and applications are restored from the clean backup. For full system failures, bare-metal restore gets you back to a working state fastest.

5

Verification & Return to Service

Restored systems are verified before being returned to production. We confirm data integrity and application functionality before your team gets back on.

6

Post-Incident Review

After recovery, we document what happened, identify how the incident occurred, and implement any changes to prevent recurrence.

Recovery Targets

Recovery Time Objective (RTO)
2–4 Hours
Target time from declaring a recovery to systems back in production — for standard server recovery scenarios
Recovery Point Objective (RPO)
<24 Hours
Maximum data loss in a worst-case scenario — daily backups mean you lose at most one day of data, not everything

What Recovery Covers

Ransomware and malware encryption events
Hardware failure — server, NAS, or workstation
Accidental file or folder deletion
Corrupt database or application data
Physical disaster — fire, flood, theft
Microsoft 365 data loss — email, files, Teams
Malicious insider data destruction
Common Questions

Backup & Disaster Recovery —
Straight Answers

We back up to an external drive plugged into our server. Isn't that enough?+
For most threats — no. A physically attached drive is visible to ransomware, which will encrypt it along with everything else on the network. It also doesn't protect against fire, theft, or physical hardware failure. A local backup has value as a fast first-restore option, but it cannot be your only copy. The off-site, isolated component is what survives the scenarios that actually destroy businesses.
How often do you test that the backup actually works?+
We perform regular recovery tests — not just verifying that backups completed, but actually restoring data from them and confirming it's valid and usable. The frequency depends on the criticality of the data and the client's recovery requirements. Most clients get quarterly recovery tests as a minimum; higher-criticality environments test more frequently. We document every test and share the results with you. An untested backup is an assumption, not a safety net.
Where is our data stored — is it in the US?+
Yes. All backup data is stored in US-based data centers. For clients with specific data residency requirements — healthcare, legal, financial services — we confirm data center locations and can provide documentation. Data is encrypted in transit and at rest using AES-256 encryption, so even the storage provider cannot access your data without your encryption keys.
How long does it take to restore everything after a major incident?+
It depends on what needs to be restored and how much data is involved. A single file or folder can typically be restored in minutes. A full server restore — depending on data volume and connection speed — can range from a few hours to overnight for very large environments. We size backup solutions with recovery speed in mind, not just storage cost, and we discuss RTO and RPO targets with every client during the initial assessment so you know exactly what to expect.
We already have a backup solution in place. Can you take it over or improve it?+
Yes — backup audits are a regular part of what we do. We'll review your existing solution, test the last backup, check retention policies, and identify any gaps. Many existing backup setups we inherit have issues — backups running but not completing, retention policies too short for ransomware detection windows, or no off-site component at all. We'll give you a straight assessment of what you have and what we'd recommend changing.
Often Paired With

Backup is your last line of defense. These services form the layers in front of it — reducing the chance you ever need to use it.

Get Protected

Do You Know If Your
Backup Would Actually Work?

Most businesses don't find out their backup failed until the moment they need it. A free backup assessment reviews what you have, tests whether it works, and tells you exactly what's at risk — before something goes wrong.

Questions first? Call us:  (210) 721-5080
Scroll to Top