Protect & Restore Workstation, 1 license

The sale of this product is suspended.

Try to search similar items from other sellers.

Sold: 0
Uploaded: 04.10.2016

Product description

Protect & Restore Workstation, 1 license


Protect & Restore Workstation, 1 license


PRGN-PR-RES-WRK-1-9
Language: Eng
 Operating Systems: Windows
Superkategoriya: Security and Data Protection
 Platform: x64
Platform: x86
Product supplied are: the key
 Product supplied are: link
 Product Release Date: 2015
Powerful free version without time limit on work - a great opportunity to test our solution without any obligation
Version VMware vSphere Free for agentless backup and replication of VMware guest machines
Version Windows Workstation Free for remote physical protection workstations based on Windows OS
A unique feature set for free solutions: data deduplication, incremental backup, pseudo-protection, tiered storage infrastructure, traffic management and intelligent load balancing
The centralized console with an easy intuitive interface for the management of infrastructure facilities and the effective protection of virtual and physical machines
Protection of e-mail databases MS Exchange data at the application level deduplication of backup data, remote deployment of components and more does not require the purchase of additional modules
 
Centralized protection of virtual and physical environments
Minimizing overhead costs and expenses in the IT-sector (single software interface makes the learning process easy license management, unified address support)
Native format pVHD archive (Paragon Virtual Hard Drive - the virtual hard disk Paragon) is optimized for storing the images of virtual and physical machines
High scalability: our solution works effectively in both small companies and large enterprises; a gradual transition from the old software according to our current service contracts
Prospective investments - Paragon Software has 20 years on the market, and our company´s technology has been repeatedly proved its uniqueness and competitiveness
Using local agents protects VMware fault-tolerant configurations, as well as non-ESX-systems
Integration of enterprise applications like MS Exchange does not require the purchase of additional modules
 
Business Continuity
Fast switching to the damaged system in its replica provides business continuity (the operation takes only a few seconds)
The ability to run a virtual or physical machine directly from the backup image in a VMware Infrastructure environment minimizes the time required to return the damaged system to a working state (Return to Operation)
Flexible scheduling mechanism provides a pseudo-continuous data protection (nCDP - near Continuous Data Protection) to meet the most stringent requirements for data availability for recovery (RPO - Recovery Point Objective)
Restoring a virtual machine like on the original and on any available datastore enhances your disaster recovery plan (Disaster Recovery Plan)
Multifunctional emergency support will help restore the physical system based on the Windows operating system on a different hardware platform, ie completely solve the problem, depending on your existing equipment
 
Minimal impact on the production infrastructure
Automatic exclusion of temporary official OS files, empty blocks, as well as certain types of data (music, photos, etc.) from the archive can increase backup speed
Direct interaction with VMware Infrastructure through ESX Bridge (PPR component), and VMware support a CBT (Changed Block Tracking - Tracking changed data blocks), provides fast and reliable backup and replication of virtual machines
Using Shadow Copy Service company Microsoft (VSS - Volume Shadow Copy Service) provides 100% data integrity in obtaining images Windows-machines
traffic control mechanism helps to distribute network traffic among customers in accordance with the QoS (Quality of Service)

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.