On & Off Site Data Protection

On-site Data Protection – Level 1

RisksCounter measureRestore time
Virus attackSnapshotsInstant
Data corruptionSelf-healing Instant
Disk failureRAIDInstant
Rebuild failureNoneNone
System failureNoneNone
Natural disasterNoneNone
TheftNoneNone
Human errorNoneNone
DowntimeNoneNone

On-site Data Protection - Level 2

RisksCounter measureRestore time
Virus attackSnapshotsInstant
Data corruptionSelf-healing Instant
Disk failureRAIDInstant
Rebuild failure Second RAID Instant
System failureNoneNone
Natural disasterNoneNone
TheftNoneNone
Human errorNoneNone
DowntimeNoneNone

On-site Data Protection - Level 3

RisksCounter measureRestore time
Virus attack Snapshots Instant
Data corruption Self-healing Instant
Disk failure RAID Instant
Rebuild failure Second RAID Instant
System failure Backup server Instant
Natural disasterNoneNone
TheftNoneNone
Human errorNoneNone
DowntimeNoneNone

On- & Off-site Data Protection

RisksCounter measureRestore time
Virus attack Snapshots Instant
Data corruption Self-healing Instant
Disk failure RAID Instant
Rebuild failure Second RAID Instant
System failure Backup server Instant
Natural disaster Remote server Hours
Theft Remote server Hours
Human error Remote server Hours
DowntimeNoneNone

On- & Off-site Data Protection with HA Cluster

RisksCounter measureRestore time
Virus attack Snapshots Instant
Data corruption Self-healing Instant
Disk failure RAID Instant
Rebuild failure Second RAID Instant
System failure Backup server Instant
Natural disaster Remote server Hours
Theft Remote server Hours
Human error Remote server Hours
Downtime High Availability Instant

The Infrastructure

Backup timeline

On both local and off-site locations there are independent snapshots retention policies for

Disaster Recovery Plan

Everyone knows that having a backup solution is a must but backup policies always differ depending on significance, type etc. of company data. For instance, important data used by the whole company on a daily basis and where the loss of these data may even result in bankruptcy, should be secured at the highest level of protection. On the other hand, less important archived data that are kept for future purposes can be protected by a lower protection level e.g. one off-site backup copy only. Most often, to fulfil data security needs of advanced environments, an additional Disaster Recovery plan is required. Such a plan is a combination of backup and other additional protection mechanisms e.g. disk redundancy or even server redundancy. All of those elements usually have to be provided by different third party tools, adding to overall costs and complexity. VFusionOS with On- & Off-site Data Protection doesn’t require any additional tools and supports many types of backup schemes which is why this software with High Availability and other built-in protection mechanisms is a perfect solution for even the most advanced Disaster Recovery plans.
VFusionOS with On- & Off-site Data Protection doesn’t require any additional tools and supports many types of backup schemes which is why this software with High Availability and other built-in protection mechanisms is a perfect solution for even the most advanced Disaster Recovery plans.

What are the key factors to measure the efficiency of disaster recovery?

RPO – Recovery Point Objective

Amount of time between the incident that caused data loss or corruption and the time of the last successful backup. Smaller RPO = better.

RTO – Recovery Time Objective

Amount of time required to restore the data and successfully resume the company’s operations. Smaller RTO = better.

Data Protection both RPO and RTO

With Off-site Data Protection both RPO and RTO can be counted in minutes. These parameters are among the best in the industry!

Data Protection Levels

Off-site VS High Availability Cluster Off-site Data Protection complements High Availability Clusters but does not replace them!

Off-Site Data Protection

High Availability Cluster

Off-site Data Protection is a solution that prevents and neutralizes threats on data security.

Seamless integration with High Availability Cluster for even greater data protection.