How They Work: Data Protection Policies define the frequency and retention period for snapshots for each storage profile. You can modify the default policies and create custom policies. These snapshots are replicated to one or more replication targets as defined by you to create a additional copies of the data. And with each BrickStor you get free capacity in the cloud to leverage as an offsite target.
Leverage BrickStor to encrypt your data at rest and in flight to ensure your data is always protected and encrypted. BrickStor’s inline encryption has no impact on performance which means you gain security without sacrifice.
As important as encryption is key management. With BrickStor you can leverage BrickStor’s internal key manager or connect to any enterprise key manager over the standard Key Management Interface Protocol (KMIP). BrickStor gives you complete control over key generation and key management. You can even cryptographically erase drives in just a few seconds.
Through the use of zero-copy InstaClones you can reduce storage requirements, increase performance and lower your cost per usable terabyte.
As part of the 5th Strata each BrickStor customer is given the ability to replicate data to their on demand myRackTop secure private BrickStor backup array for the ultimate disaster recovery plan and infrastructure. In fact each customer receives 10% of the raw purchased capacity for free in the cloud while under maintenance.
High Availability configurations enable customers to perform BrickStor OS upgrades and changes to head node hardware without interruption to data availability.
All of these great features are available as a turn-key appliance with our acclaimed software.
Software-only subscription allows customers to run BrickStor OS on any compatible hardware.