How They Work: Data Protection Policies define the frequency and retention period for snapshots for each storage profile. You can modify the default policies and create custom policies. These snapshots are replicated to one or more replication targets as defined by you to create a additional copies of the data. And with each BrickStor you get free capacity in the cloud to leverage as an offsite target.
FIPS 140-2 Certified AES-256 Encryption
Leverage BrickStor to encrypt your data at rest and in flight to ensure your data is always protected and encrypted. BrickStor’s inline encryption has no impact on performance which means you gain security without sacrifice.
Through the use of InstaClones you can reduce storage requirements, increase performance and lower your cost per usable terabyte.
As part of the 5th Strata each BrickStor customer is given the ability to replicate data to their on demand myRackTop secure private BrickStor backup array for the ultimate disaster recovery plan and infrastructure. In fact each customer receives 10% of the raw purchased capacity for free in the cloud while under maintenance.
High Availability configurations enable customers to perform BrickStor OS upgrades and changes to head node hardware without interruption to data availability.
All of these great features are available as a turn-key appliance with our acclaimed software.
Software-only subscription allows customers to run BrickStor OS on any compatible hardware.
Where #pinterest and the creative talents of @s_cuffley meet... looking forward to our company holiday party tonight!
Today! Join Fornetix, @Seagate, and @RackTop for a webcast where you will discover a new network-attached storage solution with #encryption and key management built in for #data protection. Register: https://t.co/OXXC5miSmw
#Encryption and key management built in for #data protection tips from @Fornetix, @Seagate and @RackTop - don't miss out on this one!
Join @fornetix @racktop @seagate on Dec 13 to learn how SDP2's policy-driven architecture protects sensitive data from #ransomware, insider threat, and #cyberattack. Free #webcast >> https://t.co/NJSR4mf2nV #GovTec