Insulate critical data access from provider and network failures by retaining an active duplicate with a different vendor.
Keep track of the version history of critical documents. The historical file history is logged in real-time to secondary storage or the cloud.
End users can restore files themselves from the file history - no need to send a request to IT or recover backup archives.
A comprehensive audit trail to identify when, who and what was compromised.
Store backup data in the same file and folder hierarchy as the primary - as discrete files. External applications have direct access to the backup storage system without IT having to reconstitute the files first.
No installation is required for primary or backup storage providers. Over 60 data sources supported including CIFS, NFS and object storage.
Support immutable storage and retention policies from IBM Cloud Storage, Wasabi and others that guarantee that files can’t be removed or updated for a specified period of time.
All incoming data must pass through an AntiVirus scanner. Malicious content is rejected immediately, never entering the system.