Xtium, an Elite Nimble Storage services partner, provides a fast, reliable, and efficient data backup solution for customers maintaining an on premise Nimble storage device. Xtium’s Nimble-to-Nimble Replication solution provides volume-level backup and recovery capabilities that strengthen business continuity plans without the need to purchase a second Nimble array.
By replicating data from your on premise Nimble device to a Nimble device securely hosted in Xtium’s Tier IV Gold datacenter, you can:
Xtium can help you leverage the inherent business continuity capabilities of your Nimble storage device and maintain control over your data and the replication process. Your IT managers retain full control of platform configuration, including determination of the volume and frequency of the replications, as well as the retention period. Xtium helps clients determine the required repository size, setup the necessary volumes, and provide access to dedicated space for replication. Upon request, replicated backup data can be exported to external media and delivered to the client.
One of the advantages of this solution is the ease of reconfiguring the solution for reverse replication from the Xtium datacenter back to the client. Additionally, clients are able to configure their side of the Nimble replication jobs, as desired. Specifically, they can dictate their own replication frequency and retention periods, and can administer their own SLAs.
Restoration of the data is as simple as engaging the Xtium Support Desk so our technicians can reverse the replication of the requested data back to your on premise Nimble device. Timing of this restoration is dependent upon dataset size, your bandwidth, and amount of data change that has occurred.
Beyond the benefits of secure, off-site replication, Xitum’s team can extend your solution to include managed Disaster Recovery with guaranteed RTO and RPO timeframes.
No company is safe from the onslaught of cyptolocker virus ransomware attacks. The unfortunate nature of these attacks is that human error and simple mistakes can allow entry to a cyberattacker and can render files and systems useless.Read Case Study