FAQ

FAQ

Order & Payment

Explore our Order & Payment FAQ for quick answers to your common queries. Find information on order processes, payment methods, and more. We’re here to make your experience smooth and hassle-free. If you have additional questions, don’t hesitate to reach out to our customer support.

Select the ‘Order Now’ button for the service you want. You’ll be redirected to Cloud Synergy’s pages, where you can follow the provided steps and input the necessary details. Once we receive your payment, your access credentials will be sent to your email.

You can make payments with a credit or debit card, or opt for the alternative method of a bank transfer.
Activation times vary according to the selected service:
– Public Cloud Archive orders are typically activated within 24 hours of payment receipt.
– Private Cloud Archive orders are generally activated within 72 hours after payment is received.
Payment is directed to Digital Synergy Limited, a company based in Cork, Ireland, which owns and operates the Cloud Archive and Cloud Synergy brands.
Unfortunately, we do not offer a trial period.

Regardless of the service type, you will receive an email offering an extension 15 days prior to your subscription’s expiration. Upon payment confirmation, the subscription will be automatically renewed.

Failing to renew the subscription on time will result in the complete deletion of all data, rendering it irretrievable. In such an event, we cannot assume responsibility for data loss.
Failing to renew the subscription on time will result in the complete deletion of all data, rendering it irretrievable. In such an event, we cannot assume responsibility for data loss.

Public Cloud Archive

Uncover answers to your questions about our Public Cloud Archive in our FAQ section. From data security to accessibility, find all the information you need to make the most of our robust archiving solutions. Your queries, our answers, all in one place.

We place a strong emphasis on safeguarding your cloud security through the implementation of Two-Factor Authentication (2FA). This supplementary measure serves to guarantee that only individuals with proper authorization can gain access to your data, thereby fortifying the security of your cloud login process.
In order to gain entry to your cloud account, users are required to employ a mobile app, which produces a one-of-a-kind code for each login attempt.
2FA you can activate on your account.

Instruction for activating and using 2FA you can find on your cloud after first login.

An essential element of data security within the realm of cloud archiving revolves around the management of file deletions. Specifically, when a file (commonly referred to as an ‘object’ in the context of object storage services like Cloud Archive) is deleted, it’s crucial to comprehend the associated protocols and how the previously occupied disk space is repurposed for storing other files. File deletions can occur at various levels, encompassing individual file deletions or more extensive actions like deleting parent folders, buckets, or entire accounts.

Here’s the sequence of events when a file is deleted within the Cloud Archive framework:

1. The file is internally marked as ‘object deleted,’ effectively rendering it inaccessible via the storage application.

2. Metadata linked to the deleted file is expunged from the Cloud Archive database.

3. The content of the deleted file is wiped from the Cloud Archive storage disk, and the space once occupied by the file undergoes a secure overwrite process known as ‘compaction.’ Upon completion of this secure compaction process, the disk space is made available for the storage of other files.

It’s imperative to understand that once a file, folder, or account is deleted through the storage application within Cloud Archive, Cloud Archive Support lacks the capability to recover the deleted content. At this juncture, the content is permanently erased from Cloud Archive.

Furthermore, in cases where there is a failure in a Cloud Archive storage disk containing customer data and a subsequent need for disk replacement arises, Cloud Archive adheres to a similar secure process. This ensures that the data on the failed disk remains inaccessible and irretrievable. Cloud Archive’s erasure coding process guarantees that the disk replacement procedure is executed seamlessly and without disruption to customers, thus preserving the integrity and accessibility of their files.

Cloud-based object storage is a data storage solution tailored for handling substantial quantities of unorganized data, including files, documents, images, videos, backups, and logs. In contrast to conventional file systems or block storage, primarily suited for structured data, object storage classifies data as distinct objects, each endowed with a distinct identifier, typically a unique key.
Cloud Archive presently provides a sole category of object storage. It’s worth noting that while Amazon offers several distinct object storage classes (S3, S3 Infrequent Access, and Glacier) to cater to diverse customer needs in terms of performance and pricing, Cloud Archive operates differently. Cloud Archive offers superior performance compared to Amazon S3, all while maintaining pricing lower than Amazon Glacier. This unique approach obviates the need for a variety of service classes at Cloud Archive.
Cloud Archive has a minimum storage duration policy in place, requiring that stored objects remain intact for a designated 90-day period. This policy aligns with similar minimum storage duration policies present in select AWS, Azure and other leading cloud storage services.
Indeed, you have access to a storage application.
AWS S3 users may have encountered specific guidelines for optimizing object file naming. AWS advises introducing some level of randomness into file names to improve performance. Nevertheless, this naming methodology can impose constraints on certain users. Conversely, Cloud Archive’s architecture circumvents this limitation through the utilization of a b-tree search mechanism. This method empowers users to adopt their preferred file naming conventions, providing them with increased flexibility and autonomy in data management.

https://stackoverflow.com/questions/43035449/add-a-random-prefix-to-the-key-names-to-improve-s3-performance

Throughout the initial 90-day retention window, users are prohibited from executing actions like deleting, renaming, or relocating files within the cloud. This precautionary measure shields crucial data from inadvertent modifications or deletions. Once the 90-day period concludes, users are reinstated with complete control, enabling them to manage files in accordance with their requirements. This strategy harmonizes data security and user autonomy, ensuring the preservation of vital information before granting expanded control and convenience.
Of course.
On your Cloud Archive account you can create an unlimited number of folders.
Data durability on clouds is 11x9s.

99.999999999% durability of objects over any given year makes cloud storage 1 million times more reliable than Iron Mountain’s physical storage, and without the hazards.

Which is much safer than any other solution for storing digital files.

Private Cloud Archive

Explore our Private Cloud Archive FAQ for in-depth insights into our secure, tailored archiving solutions. Get answers to your questions about data protection, privacy, and accessibility. We’re here to provide clarity and support for your private cloud archiving needs.

A private cloud, also known as an internal or corporate cloud, is a cloud computing environment dedicated to a single organization. It is built and managed by the organization’s IT department or a third-party service provider and is typically located on-premises or in a data center. In a private cloud, the infrastructure and resources are exclusive to the organization, providing greater control, security, and customization options. Private clouds can be used to host sensitive or critical applications and data that require strict compliance and regulatory requirements. They offer more flexibility and customization but require upfront investments and ongoing maintenance costs.

An essential element of data security within the realm of cloud archiving revolves around the management of file deletions. Specifically, when a file (commonly referred to as an ‘object’ in the context of object storage services like Cloud Archive) is deleted, it’s crucial to comprehend the associated protocols and how the previously occupied disk space is repurposed for storing other files. File deletions can occur at various levels, encompassing individual file deletions or more extensive actions like deleting parent folders, buckets, or entire accounts.

Here’s the sequence of events when a file is deleted within the Cloud Archive framework:

1. The file is internally marked as ‘object deleted,’ effectively rendering it inaccessible via the storage application.

2. Metadata linked to the deleted file is expunged from the Cloud Archive database.

3. The content of the deleted file is wiped from the Cloud Archive storage disk, and the space once occupied by the file undergoes a secure overwrite process known as ‘compaction.’ Upon completion of this secure compaction process, the disk space is made available for the storage of other files.

It’s imperative to understand that once a file, folder, or account is deleted through the storage application within Cloud Archive, Cloud Archive Support lacks the capability to recover the deleted content. At this juncture, the content is permanently erased from Cloud Archive.

Furthermore, in cases where there is a failure in a Cloud Archive storage disk containing customer data and a subsequent need for disk replacement arises, Cloud Archive adheres to a similar secure process. This ensures that the data on the failed disk remains inaccessible and irretrievable. Cloud Archive’s erasure coding process guarantees that the disk replacement procedure is executed seamlessly and without disruption to customers, thus preserving the integrity and accessibility of their files.

We place a strong emphasis on safeguarding your cloud security through the implementation of Two-Factor Authentication (2FA). This supplementary measure serves to guarantee that only individuals with proper authorization can gain access to your data, thereby fortifying the security of your cloud login process.
In order to gain entry to your cloud account, users are required to employ a mobile app, which produces a one-of-a-kind code for each login attempt.
2FA you can activate on your account.

Instruction for activating and using 2FA you can find on your cloud after first login.

Cloud-based object storage is a data storage solution tailored for handling substantial quantities of unorganized data, including files, documents, images, videos, backups, and logs. In contrast to conventional file systems or block storage, primarily suited for structured data, object storage classifies data as distinct objects, each endowed with a distinct identifier, typically a unique key.
Bucket Replication is a capability provided by Cloud Archive, enabling customers to duplicate objects from a storage bucket located in one specific Cloud Archive region to another bucket in a different Cloud Archive region on the same continent. This feature proves beneficial for enhancing data security, adhering to compliance and sovereignty regulations, or reducing latency.

Bucket replication between Cloud Archive regions comes at no additional cost for Cloud Archive customers. The only associated cost is for the extra storage space required by the replicated data. There are no charges for network transfers or API requests in the process.

Cloud Archive presently provides a sole category of object storage. It’s worth noting that while Amazon offers several distinct object storage classes (S3, S3 Infrequent Access, and Glacier) to cater to diverse customer needs in terms of performance and pricing, Cloud Archive operates differently. Cloud Archive offers superior performance compared to Amazon S3, all while maintaining pricing lower than Amazon Glacier. This unique approach obviates the need for a variety of service classes at Cloud Archive.
Cloud Archive has a minimum storage duration policy in place, requiring that stored objects remain intact for a designated 90-day period. This policy aligns with similar minimum storage duration policies present in select AWS, Azure and other leading cloud storage services.
Indeed, you have access to a storage application.
AWS S3 users may have encountered specific guidelines for optimizing object file naming. AWS advises introducing some level of randomness into file names to improve performance. Nevertheless, this naming methodology can impose constraints on certain users. Conversely, Cloud Archive’s architecture circumvents this limitation through the utilization of a b-tree search mechanism. This method empowers users to adopt their preferred file naming conventions, providing them with increased flexibility and autonomy in data management.

https://stackoverflow.com/questions/43035449/add-a-random-prefix-to-the-key-names-to-improve-s3-performance

Throughout the initial 90-day retention window, users are prohibited from executing actions like deleting, renaming, or relocating files within the cloud. This precautionary measure shields crucial data from inadvertent modifications or deletions. Once the 90-day period concludes, users are reinstated with complete control, enabling them to manage files in accordance with their requirements. This strategy harmonizes data security and user autonomy, ensuring the preservation of vital information before granting expanded control and convenience.
Of course.

In your main cloud folder you can create an unlimited number of folders and assign access to whoever you want, or you can simply create a Ticket for Cloud Archive support, which will do it for you

Data durability on clouds is 11x9s.

99.999999999% durability of objects over any given year makes cloud storage 1 million times more reliable than Iron Mountain’s physical storage, and without the hazards.

Which is much safer than any other solution for storing digital files.

Immutability implies that both the user and Cloud Archive are prevented from deleting stored objects until the designated retention period has elapsed (90 days), serving as a security measure for data protection. It’s important to note that storage, whether it is immutable or not, will be subject to active storage charges.
Public internet connections, with each data center having multiple 10 Gbps connections, for uploading your data to Cloud Archive.

The advantages of this approach include the ability to use your existing internet connection without incurring additional costs or requiring extra provisioning.

However, there are drawbacks to consider. If you don’t have a high-speed internet connection, the data transfer process to Cloud Archive may be time-consuming. For instance, transferring 1 TB of data can be accomplished in approximately 2 hours over a 1 Gbps connection, but it could take approximately 2 days over a 50 Mbps connection. You can perform your own calculations based on your file sizes and available bandwidth.

Looking for cloud solution?

Private Cloud Storage, WordPress Cloud and Cloud Migration
Powered by Cloud Synergy