InstantData streams your data for instant access from any location. While other data is restored behind the scenes, users can start accessing the files that they need immediately. This significantly reduces your Recovery Time Objective (RTO) and allows low-touch tasks, such as data mining, auditing and integrity checks.
Compression on all data greatly reduces the size of each file transmitted, while binary and delta patching technologies ensure only changed files need to be sent. This enables Redstor to protect data environments where other technologies can’t.
Each incremental backup should be considered a ‘synthetic full’ backup from which a complete restore can be performed. Physical or virtual, Full System Recovery can automatically reassemble a system on virtual disks in a virtual format.
Designed for service providers to manage many separate accounts. Users have access to their account but no-one else's data. Encryption keys are provided and managed by the end user. The service provider cannot gain unauthorized access to the user's data.
Trusted by defence, banking and health industries, Redstor uses Advanced Encryption Standard (AES) with a 256-bit key length and is externally audited. Data is encrypted in transmission using Secure Sockets Layer (SSL) and Transport Layer Security (TSL).
Redstor is managed through a centralized management console that provides IT administrators with complete visibility, control and ownership of the backup and restore process, as well as archiving and global insight. Everything can be configured from the management console through a single interface.
Redstor’s flexible technology can be deployed to physical and virtualized environments - VMs, public cloud servers and mobile devices. It enables organizations to back up from any location - to their own data center, the Redstor cloud, a hyper-scale environment or a combination of all three.