Mes atsinaujinome  
„BTT” tampa „BTT Cloud”!
Nuo gegužės 2 d. tampame valdomų paslaugų teikėju „BTT Cloud“.
Sužinokite apie mūsų pokyčius:
Čia headeris

Mazesnis headeris

  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.

Mazesnis headeris

  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.

Mazesnis headeris

  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.

Mazesnis headeris

  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
  • Define what information needs to be protected, who has access to this information, when and how it should be accessed, and from what machines and/or applications data can be accessed.
PERSONAL DATA

Information we collect

We may collect, store and use the following kinds of personal information:
  • information about your computer and about your visits to and use of this website (including your IP address, geographical location, browser type and version, operating system type and version, referral source, length of visit, page views, website navigation paths and service usage)
  • information that you provide to us for the purpose of registering with us
  • information that you send to us in order to obtain a quotation for services
  • information that you provide to us for the purpose of subscribing to our website email notifications and/or newsletter
  • any other information that you choose to send to us.

How we use your personal information

Personal information submitted to us via this website will be used for the purposes specified in this privacy policy or in relevant parts of the website.
We may use your personal information to:
  • administer the website
  • improve your browsing experience by personalising the website
  • enable your use of the services available on the website
  • supply you with services
  • send statements and invoices to you, and collect payments from you
  • send you general (non-marketing) commercial communications
  • send you email notifications which you have requested
  • send to you our newsletter and other marketing communications relating to our business or the businesses of carefully-selected third parties which we think may be of interest to you by email or similar technology (you can inform us at any time if you no longer require marketing communications)
  • provide third parties with statistical information about our users – but this information will not be used to identify any individual user
  • deal with enquiries and complaints made by or about you relating to the website.

Information disclosures

We may disclose information about you to any of our employees, officers, agents, suppliers or subcontractors insofar as reasonably necessary for the purposes as set out in this privacy policy.
In addition, we may disclose your personal information:
  • to the extent that we are required to do so by law
  • in connection with any legal proceedings or prospective legal proceedings
  • in order to establish, exercise or defend our legal rights (including providing information to others for the purposes of fraud prevention and reducing credit risk)
  • to the purchaser (or prospective purchaser) of any business or asset that we are (or are contemplating) selling
  • to any person who we reasonably believe may apply to a court or other competent authority for disclosure of that personal information where, in our reasonable opinion, such court or authority would be reasonably likely to order disclosure of that personal information.

International data transfers

Information that we collect may be stored and processed in and transferred between any of the countries in which we operate in order to enable us to use the information in accordance with this privacy policy.Information which you provide may be transferred to countries which do not have data protection laws equivalent to those in force in the European Economic Area.You expressly agree to such transfers of personal information.

Security of your personal information

We will take reasonable technical and organisational precautions to prevent the loss, misuse or alteration of your personal information.

We will store all the personal information you provide on our secure (password- and firewall- protected) servers.

Data transmission over the internet is inherently insecure, and we cannot guarantee the security of data sent over the internet.

You are responsible for keeping your password and user details confidential. We will not ask you for your password (except, of course, when you log in to the website).

Policy amendments

We may update this privacy policy by posting a new version on our website. You should check this page occasionally to ensure you are happy with any changes.

We may notify you of changes to our policy by email.
Your rights

Right of Access

You may instruct us to provide you with any personal information we hold about you. Provision of such information will be subject to the supply of appropriate evidence of your identity (for this purpose, we willusually accept a photocopy of your passport certified by a solicitor or bank plus an original copy of a utility bill showing your current address).We may withhold such personal information to the extent permitted by law.

Right to Rectification

Where you identify that incorrect information is held you may instruct us to amend that information.
Right to Erasure

Individuals have a right to have personal data erased and to prevent processing in specific circumstances:
  • Where the personal data is no longer necessary in relation to the purpose for which it was originally collected/processed
  • When the individual withdraws consent
  • When the individual objects to the processing and there is no overriding legitimate interest for continuing the processing
  • The personal data was unlawfully processed (i.e. otherwise in breach of the GDPR)
  • The personal data has to be erased in order to comply with a legal obligation

There are specific circumstances where the company can refuse to erase personal data:
  • to exercise the right of freedom of expression and information
  • to comply with a legal obligation or for the performance of a public interest task or exercise of official authority
  • for public health purposes in the public interest
  • archiving purposes in the public interest, scientific research historical research or statistical purposes; or
  • the exercise or defence of legal claims
Generally BTT Group, UAB will not process a request to erase information where there is an ongoing legal obligation on the company to retain the information, for example for taxation and social security purposes

Right to Data Portability

The right to data portability allows individuals to obtain and reuse their personal data for their own purposes across different services. It allows them to move, copy or transfer personal data easily from one IT environment to another in a safe and secure way, without hindrance to usability.
The right to data portability only applies:
  • To personal data an individual has provided to a controller;
  • Where the processing is based on the individual’s consent or for the performance of a contract;
  • When processing is carried out by automated means.

Right to Object

Individuals have the right to object to:
  • Processing based on legitimate interests or the performance of a task in the public interest/exercise of official authority (including profiling);
  • Direct marketing (including profiling);
  • Processing for purposes of scientific/historical research and statistics.
Objections to processing, other than for marketing purposes for non BTT Group, UAB staff must be made in writing to the Controller and must outline the grounds for objection.

You may instruct us not to process your personal information for marketing purposes by sending an email to us. In practice, we will provide you with continuing opportunities to opt-out of the use of your personal information for marketing purposes throughout our contact with you.
Čia headeris

Mazesnis headeris

Datapipe's Intrusion Detection Services provide 24/7 monitoring by our team of IDS experts to provide ironclad protection against the steady increase in attacks on your network.

Mazesnis headeris

Datapipe's Intrusion Detection Services provide 24/7 monitoring by our team of IDS experts to provide ironclad protection against the steady increase in attacks on your network.

Mazesnis headeris

Datapipe's Intrusion Detection Services provide 24/7 monitoring by our team of IDS experts to provide ironclad protection against the steady increase in attacks on your network.

Mazesnis headeris

Datapipe's Intrusion Detection Services provide 24/7 monitoring by our team of IDS experts to provide ironclad protection against the steady increase in attacks on your network.

Deploy dynamic cloud solutions for your organization

Our industry-leading private cloud technology, coupled with mission-critical cloud management service, allows you to build a private cloud according to your unique requirements. Stratosphere® provides the complete stack – computing, storage, security, and network – in a dedicated environment with industry-leading SLAs. Clients have a choice of hypervisors (VMWare ESX, KVM, or Xen) the amount of computing power (2 to 100+ Dual 6-Core Servers), and the amount of storage (5 TB or more). Datapipe configures and manages the environment.The service extends beyond individual VM images running on commodity hardware. Datapipe provides a turn-key cloud infrastructure software stack for delivering virtual data centers as a service with pay-as-you-grow economics.
Many organisations think that a disaster recovery plan should only be deployed when a hurricane, tsunami, flood or other natural disaster strikes. Practice shows that is simply not the case. Human errors, viruses, ransomware attacks along with other accidents are the type that frequently result in the loss of data.

When a disaster occurs, organisations without a comprehensive disaster recovery plan not only risk losing valuable data, but the accident could also damage customer loyalty, brand image, and the company’s overall reputation.

BTT’s disaster recovery solution is for:

  • Clients who host their production environment at BTT Cloud
  • Clients who host their production environment on-premises, in-house
  • Clients who host their production environments with another hosting provider

How we can help

The best way to avoid downtime is to eliminate single points of failure. As redundancy is added, the ability to restore improves as well. Based on risk tolerance, our experts will help set up a disaster recovery plan that is adjusted to meet your recovery objectives and budget.

Zero Tolerance

Our Zero Tolerance solution provides uninterruptable and near immediate recovery of your infrastructure, applications, and data through a configuration that mirrors the production systems. Dedicated space at the data centre and infrastructure will ensure that mission-critical applications are accessible in case of an accident.

Low Tolerance

Our Low Tolerance solution provides near real-time recovery of infrastructure, data, and applications through a data centre configuration. Data and systems synchronise periodically, allowing recovery based on aged data gathered from the last synchronisation or when the current information is restored. This solution is the best fit for organisations that can tolerate a few hours of downtime.

Medium Tolerance

Our Medium Tolerance solution provides recovery of the infrastructure, applications and data through the configuration and restoration of back-ups available at the disaster recovery location. This solution does not include a prior data or systems mirroring and is recommended for the non-mission-critical applications and organisations that do not need constant availability.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Header 2 Header 2
row 1, cell 1 row 1, cell 2
row 2, cell 1 row 2, cell 2

Register for updates

Thank you! Subscription confirmed.
Oops! Something went wrong while submitting the form.

Registruokitės naujienoms

Thank you! Subscription confirmed.
Oops! Something went wrong while submitting the form.

Contact to request a consultation with our cloud experts

Lietuviškas blokas

Ieškote IT infrastruktūros sprendimo? 
Pasitarkite su mūsų specialistais