Backup and Recovery

Backup and Recovery2017-09-19T18:24:28+00:00

[vc_row][vc_column][vc_column_text]

A smarter backup process

[/vc_column_text][vc_separator border_width=”4″][vc_row_inner][vc_column_inner width=”1/2″][vc_single_image image=”2214″ img_size=”full”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

TRADITIONAL BACKUP SOLUTIONS first create a full backup, and then divide subsequent backup data into sets of files that have a dependent relationship (known as a “backup chain”). Pruning and additional full backups (or replication of full backups with backup copy jobs) are required to avoid dependency chains that are too long to manage. Increased backup frequency for improved RPOs only makes longer and more fragile chains. More full backups lead to increased use of backup storage, and more IOs for the backup system to process.

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][vc_single_image image=”2215″ img_size=”full”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

INVERSE CHAIN TECHNOLOGY leverages the features, reliability, and efficiency of ZFS built into all appliances. Inverse chains directly use of the snapshot capabilities of an advanced disk storage system to track the “deltas” between recovery points. No more backup reconstruction – Hexistor now has each recovery point (not just the last one) in a fully constructed state, ready to virtualize with a ZFS clone!

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner][vc_text_separator title=”Decouple retention planning from backup management”][vc_column_text]

Whether it is Full, Incremental, or reverse incremental (synthetic) – Every classic backup method still creates a collection of dependent files, and they all have compromises. At best, they can consolidate, but not delete, their chain of incrementals. All require additional full backups (or copying of full backups) to limit the length of the backup chain. Not even reverse incremental or synthetic backups can match the flexibility of inverse backup chains for anything but the last backup, reconstruction is still required.

Inverse Chain Technology enables full flexibility over incrementals. Once any incremental changes are copied from a backup client to a Hexistor Appliance, all backups are maintained equally, all are logically (effectively) and fully constructed. It’s possible to instantly delete any recovery point for a protected server and never have to “reset the backup chain”. Automated pruning enables the Hexistor Cloud to archive a different set of recovery points than the Hexistor’s local appliance system.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_text_separator title=”Hexistor’s Backup Capabilities”][vc_row_inner][vc_column_inner width=”1/3″][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-data” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1505862809192{margin-top: -20px !important;}”]

Image-Based Backup

[/vc_column_text][vc_column_text css=”.vc_custom_1505870061456{margin-top: -20px !important;}”]

Hexistor uses image-based backups to capture a complete picture of a protected workstation or server. Advantages include a quick full system restores, easy recovery of individual files, bare metal restore (BMR) capability, and the ability to boot individual backups as virtual machines.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-world” color=”custom” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1505862990599{margin-top: -20px !important;}”]

Agentless and Agent-based Backup

[/vc_column_text][vc_column_text css=”.vc_custom_1505871020957{margin-top: -20px !important;}”]

Hexistor Appliance supports both physical and virtual systems through agentless and agent-based backup. Agentless protection enables fast and easy pairing of any number of VM. Agent-based protection provides scalable backup for all of your physical devices.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-fire” color=”custom” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1505863216215{margin-top: -20px !important;}”]

Multiple Virtualization Options

[/vc_column_text][vc_column_text css=”.vc_custom_1505863782813{margin-top: -20px !important;}”]

Should a business experience a server failure, the protected systems can be virtualized instantly on the Hexistor device. With the system virtualized, the business can operate “business as usual” until it has the time to fix its server issue, without compromising any data or incurring any downtime.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css=”.vc_custom_1505867739580{padding-top: 60px !important;padding-bottom: 60px !important;}”][vc_column width=”1/3″][vc_row_inner][vc_column_inner][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-like” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1505863416510{margin-top: -20px !important;}”]

Screenshot Backup Verification

[/vc_column_text][vc_column_text css=”.vc_custom_1505863462365{margin-top: -20px !important;}”]

No more guessing if your backup is working properly. To verify a successful backup, the appliance boots a backup locally as a virtual machine, capturing an image of the login page to give you visual proof.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner][vc_column_inner][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-search” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1505863600150{margin-top: -20px !important;}”]

Backup Insights

[/vc_column_text][vc_column_text css=”.vc_custom_1505944864669{margin-top: -20px !important;}”]

Identify files changes between any two backup points, allowing you to perform recoveries directly from the interface with almost no information about when they were lost or even where on the machine they resided.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner][vc_column_inner][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-lock” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1505863664173{margin-top: -20px !important;}”]

End-to-End Encryption

[/vc_column_text][vc_column_text css=”.vc_custom_1505863722437{margin-top: -20px !important;}”]

All data is protected by AES-256 encryption both in transit and in the cloud. Users have the option to encrypt data locally and passphrases can be specified per appliance or per protected machine.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” content_placement=”middle” parallax=”content-moving” css=”.vc_custom_1505867701246{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #efefef !important;}”][vc_column][vc_video link=”https://vimeo.com/234588822″ el_width=”90″ align=”center”][/vc_column][/vc_row][vc_row css=”.vc_custom_1505867620804{padding-top: 40px !important;padding-bottom: 120px !important;}”][vc_column][vc_text_separator title=”Hexistor’s Recovery Capabilities”][vc_column_text css=”.vc_custom_1505867552977{padding-top: 30px !important;}”]

Hardware, software, systems, and data centers – when they fail, your business doesn’t have to.

[/vc_column_text][vc_row_inner][vc_column_inner width=”1/3″][hgr_icontext icon_type=”selector” icon=”fa fa-upload” icon_size=”28″ icon_color=”#1974d2″ icon_background_type=”none” contb_icon_position=”contb-icon-left” content_title=”ESX Upload” content_title_color=”#2a2a2a” content_description=”Uploads a restore pount to ESX host” content_desc_color=”#7c7c7c” custom_link=””][hgr_icontext icon_type=”selector” icon=”fa fa-external-link” icon_size=”28″ icon_color=”#1974d2″ icon_background_type=”none” contb_icon_position=”contb-icon-left” content_title=”Export Image” content_title_color=”#2a2a2a” content_description=”Export a recovery point as a VHD, VHDX and VMDK” content_desc_color=”#7c7c7c” custom_link=””][/vc_column_inner][vc_column_inner width=”1/3″][hgr_icontext icon_type=”selector” icon=”fa fa-hdd-o” icon_size=”28″ icon_color=”#1974d2″ icon_background_type=”none” contb_icon_position=”contb-icon-left” content_title=” Bare Metal Restore” content_title_color=”#2a2a2a” content_description=” Restore back a physical or virtual system” content_desc_color=”#7c7c7c” custom_link=””][hgr_icontext icon_type=”selector” icon=”outline outline-computer” icon_size=”28″ icon_color=”#1974d2″ icon_background_type=”none” contb_icon_position=”contb-icon-left” content_title=”Virtualize via Hypervisor” content_title_color=”#2a2a2a” content_description=”Boot the system in a virtual environment” content_desc_color=”#7c7c7c” custom_link=””][/vc_column_inner][vc_column_inner width=”1/3″][hgr_icontext icon_type=”selector” icon=”fa fa-folder-open-o” icon_size=”28″ icon_color=”#1974d2″ icon_background_type=”none” contb_icon_position=”contb-icon-left” content_title=”File and Folder Restore” content_title_color=”#2a2a2a” content_description=”Restore files and folders from any recovery” content_desc_color=”#7c7c7c” custom_link=””][hgr_icontext icon_type=”selector” icon=”fa fa-tasks” icon_size=”28″ icon_color=”#1974d2″ icon_background_type=”none” contb_icon_position=”contb-icon-left” content_title=”Local Virtualization” content_title_color=”#2a2a2a” content_description=”Boot the system in a local virtual environment” content_desc_color=”#7c7c7c” custom_link=””][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]