Month: September 2017
iCAS of iTernity any storage infrastructure can hardware-independent approach virtualize Fribourg, July 14, 2010. Archive virtualization with the iCAS solution brings more flexibility and safety in long-term archiving. With their hardware-independent approach is iCAS as an intermediate layer between ERP, DMS or ECM systems, and the disk space used. Any storage systems (NAS or SAN) can be used for archiving. An advantage is that existing storage infrastructure of many well-known manufacturers can be used for the audit-proof storage of archive data. So, have already made investments of customers remain protected.
The connection to SAN virtualization can smoothly establish yourself with iCAS, because the solution supports among other products such as HP P4000 (LeftHand) or DatCore SANmelody. iCAS systems are highly scalable, so that can grow in the long term archive with the requirements. While the administration effort remains minimal, because iCAS systems are based on industry standards and Connecting little additional expertise for the operation of the systems is necessary. With the flexible management and use of space by iCAS, significant cost savings arise for the company. Among the investments through the more effective use of existing capacities fall.
Moreover, the cost for the purchase of hardware for the operation of the long-term archive and cooling and the hosting of hardware components can be reduced”, stresses Ralf Steinemann, business development manager at iTernity. Special advantages of archive virtualization with iCAS systems are the high level of security and stability in daily use. Maintenance, upgrades on a new hardware as well as migrations can also perform during operation. Here, the leading application with additional transactions will be charged. A migration is merely dependent on the speed of the storage systems. The KPMG certified solution protects the archive data mainly through the use of the safe and the Federal Office for security in information technology-recommended 512-bit hash values against manipulation attempts.