Disaster recovery (DR) on top of your backups
Add disaster recovery to your backups in a matter of seconds, utilizing the same agent, web console, backup
storage, and cloud infrastructure. Cyber Disaster Recovery , on top of cloud managed backups, provides all-in-one backup, disaster recovery, and advanced ransomware protection.
Disaster recovery for on-premises and cloud workloads
Get complete data and infrastructure protection with the ability to fail-over to and run in the Cloud using
one integrated solution for all your data protection needs, regardless of the location or environment — on-premises, in remote systems, or in public clouds. Multiple recovery point times Customize your recovery point objective (RPO) to each critical application and data set in advance, so you can invoke your DR plan with ease and bring your critical business workloads to life in the cloud. By selecting the optimal recovery point time, you can recover the most recent version of your critical data and access the latest, clean copy of your data.
Run your mission-critical applications consistently, or as usual, even when your production environment is down.
You can achieve the best recovery time objectives (RTO) and RPOs by adding virtual machines into the
cloud, and by using a set of Windows or Linux VM templates to host replicas of the applications.
Isolated testing environment
Ensure process availability with non-disruptive fail-over testing. Keep all backed up servers and applications
running continuously and in line with your DR plan by starting recovery servers in cloud’s isolated testing environment, with no impact on your production network.
Intuitive web-based console
Set up, add, and configure the cloud-based recovery server with just a few clicks. The intuitive, touch-friendly, web-based console ensures Infraplex IT technicians can easily implement most disaster recovery activities, including network configuration, fail-over testing, and fail-back.
Encrypted backup support
Perform fail-overs using encrypted backups and allow the system to use the securely stored passwords for
automated disaster recovery operations. Comply with various data regulations (like HIPAA).