DRaaS Physical Server Replication
Continuous Replication Without Taxing Your Network Bandwidth
Storagepipe replication for DRaaS enables the highest availability of Windows and Linux servers by preventing downtime and data loss. With support for physical, virtual or cloud source systems, Storagepipe provides complete availability with a comprehensive replication solution for organizations with mixed IT environments.
Storagepipe continuously replicates changes from the source environment into a secondary target in the Storagepipe DRaaS Cloud. Once the initial seeding is complete, changes are transmitted in real time, ensuring the replica is in sync. We replicate files, applications or an entire server, including its system settings.
PREVENT DOWNTIME WITH RAPID FAILOVERS
In the event of a disaster to one system or an entire data center, a failover to the secondary location can be easily initiated. The secondary systems spin up and users are rerouted with only a few seconds or minutes of interruption.
NEGLIGIBLE PERFORMANCE IMPACT
The production servers protected by Storagepipe DRaaS will not experience any performance degradation due to the replication since changes are captured and transmitted at the byte-level with minimal impact to network performance.
BUSINESS CONTINUITY SUPPORT
Physical systems, which are typically critical to operations, are often left out of the disaster preparedness plan. To ensure all IT systems are protected, Storagepipe can replicate Microsoft Windows or Linux servers on any underlying platform and to any target: physical, virtual or cloud. We also enable combinations of servers to be replicated into our DRaaS Cloud within the same private network to provide a unified business continuity solution across all platforms in a single solution.
How It Works
Replication technology is used to capture changes at the byte level and replicate them between the customer’s environment and Storagepipe’s secure global data centers.
All the servers being protected are configured and replication begins with a seeding process. All data transmitted is encrypted using AES-256 encryption, and compressed using three tiers of bandwidth-saving mechanisms. Once the seeding is complete, the solution updates the target with any changes in real time.
In the event of an outage, administrators can manually or automatically fail over users to the secondary server in minutes or seconds. The recovery point can be current, or systems can be reverted to an earlier point, before an error or infection occurred.