How They Work: Data Protection Policies define the frequency and retention period for snapshots for each storage profile. You can modify the default policies and create custom policies. These snapshots are replicated to one or more replication targets as defined by you to create a additional copies of the data. And with each BrickStor you get free capacity in the cloud to leverage as an offsite target.
FIPS 140-2 Certified AES-256 Encryption
Leverage BrickStor to encrypt your data at rest and in flight to ensure your data is always protected and encrypted. BrickStor’s inline encryption has no impact on performance which means you gain security without sacrifice.
Through the use of InstaClones you can reduce storage requirements, increase performance and lower your cost per usable terabyte.
As part of the 5th Strata each BrickStor customer is given the ability to replicate data to their on demand myRackTop secure private BrickStor backup array for the ultimate disaster recovery plan and infrastructure. In fact each customer receives 10% of the raw purchased capacity for free in the cloud while under maintenance.
High Availability configurations enable customers to perform BrickStor OS upgrades and changes to head node hardware without interruption to data availability.
All of these great features are available as a turn-key appliance with our acclaimed software.
Software-only subscription allows customers to run BrickStor OS on any compatible hardware.
@maldermania & Paul interviews @ericbednash of @RackTop! #BusinessSecurity https://t.co/l593vefxLh
Latest @georgeacrump Article: Performance vs. Security vs. Management - How to Solve the Primary Storage Paradox https://t.co/FYokO2EXoB
A Brief and Incomplete #History of #Cybersecurity [#infographic]
#MI #ML #AI #IoT #Marketing #DataScience #Startup #Fintech #DL #BigData #Tech #Technology #malware #DataAnalytics #BI #BusinessIntelligence #InternetOfThings #IT #josphpopp #AIDSTrojan #Ransomware #cybersafety