Download presentation
Presentation is loading. Please wait.
Published byStefan Wilkey Modified over 10 years ago
2
Bullet-Proof Continuous or scheduled Osite and onsite destinations Incremental, unlimited versioning File compression & data de-duplication Background validation & veracation Data veried 6x
3
Reliable Restore Any date, time or version Direct, LAN or Internet Admin or desktop user-initiated Web restore File search Cross-platform
4
Extreme Performance Incremental: Only new data Byte Dierential: Only new data is transmitted and stored Unlimited le size, versions, archives Client-Server / Binary protocol High-eciency, non-blocking I/O Laptop background operation: governed I/O, bandwidth limits, idle job scheduling
5
How Often do You make backup copies? How fast can you restore Your office work after a crash? Do You backup laptop computers data? Is Your Data Protected?
6
How important is your data to You? Will You lose money (working hours) in case of data lose?
8
Total data loss in case of disaster. Not real time Administrator should audit and check backup copies
11
Копия 2 Копия 3
12
Data is encrypted 128-bit AES for transportation over network Data stored encrypted 448-bit Only administrator and end user can restore data
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.