Unity Breeds Power and Simplicity for Data Protection and RecoveryAIMstor was created to unify many important Data Protection functions, and eliminate the redundant, complex and wasteful ways of legacy approaches.
By unifying Data Protection with natural workflow management in a single user interface and application, Cofio has a created a powerful and easy to use solution that is both hardware agnostic, and driven by the ways you do business. Some of your immediate benefits when choosing AIMstor: - Up to 10X to 20X LAN/WAN Bandwidth improvement over legacy data protection
- Up to 95% Capacity Reduction over legacy data protection
- Improve IT management efficiencies by up to 200% to 400%
- Optimize Restore times 3X to 100X with Tag-Store-Index of all data
One Application, Many SolutionsAIMstor requires only a few short minutes to install and setup. Once you create a policy and data flow, you are ready to go. Combining Live Backup and File Version Archive, Continuous Data Protection, Deduplication, and Forensic Monitoring - would be a nightmare with any set of point products. But with AIMstor installed, you can do it in seconds. The fundamental way of operating AIMstor is to simply drag and drop "operations" such as Backup or Replication, into a Policy screen. Then add your Data Classification, fine tune your selections, such as Retention, Recovery Point Objectives, Triggers and other options, and save. Policies are real time sensitive, and can be triggered by someone changing a file, creating a file, accessing a file share, or via a schedule. Data Classifications are assigned to files the moment they are created. In this way, AIMstor guides and manages your data through any business process that different departments may impose upon it. Perhaps several departments have different policies for the same set of data, or the same file. AIMstor can help. AIMstor can accommodate an unlimited number of policy parameters, and then distribute them in real time. AIMstor Nodes can use new policies the moment they are distributed. The result is protection, governance and compliance of data on an entirely different level.
|
No comments:
Post a Comment