HOME >> Products

Data Disaster Recovery Protection DDP

Product Introduction

Data disaster recovery protection system is to establish and maintain one or more redundant systems exactly the same or similar to the original system, and utilize the redundancy of the data system to ensure the data's ability to resist disasters. It guarantees data integrity and security and can quickly restore the application's data and services.

Data has become an important asset for enterprises. Protecting data and quickly finding data is an important task for IT management. Managing data is usually the management cost: the cost of disk and tape for storing data, and the time cost for managing backup work from beginning to end. The cost of delay when data cannot be quickly found and recovered. Traditional Data Protection tends to cause more problems than solve problems.

Data Disaster Recovery Protection System

The data of Disaster Recovery Information and Disaster Recovery Protection System brings you the solution you need: the most cost-effective reliable data backup and recovery, allowing you to set up a backup task set quickly and easily, and provide a humanized backup strategy. Backup of files allows you to easily browse and find backup data, select on demand, and recover data quickly and efficiently. The data of Discovery Information's Disaster Recovery Protection system uses your existing IT infrastructure and can be deployed quickly and easily.

█ Detailed function

● Active backup strategy

Policy setting: Set the terminal backup policy, automatically back up the suffix format, and set the time interval between daily, weekly, and monthly.

Path blacklist: When the blacklist path is set and the automatic backup is performed, the files under the path are not backed up.

Storage management settings: setting backup storage directory, support for sharing paths, mass storage devices, etc.

Policy application: Apply print policy to the terminal, which can be applied to departments or users to support policy inheritance.

Manual backup: Right-click the terminal to select the file backup and back it up manually to the background.

Version record: A file with the same name in the same directory automatically forms a historical version during backup. You can choose to download the version when downloading.

Version Management: Supports the retention of multiple backup versions of a document, which is beneficial for retrospective historical backup files.

Backup download: The user selects the backup download via the terminal tray icon and downloads the backed up files from the server.

● Backup log audit

Backup file records: According to the organizational structure, find all users' backup records, and can directly download.

Operation log: Record the administrator operation log, including the settings and applications of the print policy.

● Cloud storage mechanism

Supports unlimited expansion of document storage capacity.

Keep only one copy of the same document, reducing redundancy.

● Backup document retrieval and recovery

Supports quick retrieval of related documents.

Supports online viewing of backed up documents.

Enables fast recovery of documents to the terminal computer.

█ Advantages


● Manageability

The management console deployed on the backup server adopts a Web-based B/S structure. Administrators only need to set up and manage the entire backup center through a browser.

Administrators can use the B/S client to easily configure files that need to be backed up, set backup strategy policies, and so on.

Users can view and extract backup files using B/S and C/S clients.

● Scalability

It fully supports the protection of various versions of Windows XP, 2003, Vista, Win7, 2008 and SP versions.

Proactive backup of files is provided. In the case of large-scale and ultra-large-scale file backups, the client can significantly reduce network backup transmission pressure and save data center storage space.

Provides multi-media server management, which provides centralized management of backup policies and clustered storage media for large-scale employee PC backup and branch office data backup.

● Maintainability

The system provides a complete WEB management interface. Administrators can quickly and easily complete the maintenance of the entire backup.

● Security

Secure transmission, in order to prevent leakage of data in the transmission process, can support the encrypted and secure transmission of the contents of the data packet when transmitting data.

File transmission adopts a privately-developed private transmission protocol.

A reliable user authentication mechanism, access to the management console, and remote media must be logged in with an authorized user name, and must be authenticated and authorized by the management console before operations can be performed to prevent end users from randomly deleting backup jobs and backing up data.

Backup data stored on backup media supports AES-128, AES-192, AES-256, Blowfish, and CAST5 encryption algorithms to prevent data loss due to loss of backup media.

The content of the file is encrypted by the user and supports AES-128, AES-192, AES-256, Blowfish, and CAST5 encryption algorithms.

● Flexibility

The product architecture that adopts a mixed B/S and C/S architecture improves the operating efficiency of the backup solution through excellent management and reduces maintenance and use costs.

The B/S client provides management and configuration functions for the direct administrator. The administrator can set directories and files to be backed up, set backup and archive policies, set encryption algorithms and keys, and improve backup and archive flexibility.

At the same time, based on the B/S client, the administrator can configure the entire system's backup and archiving policies, allocate backup and archive storage space, and view the current data center operations.

● Economical

A new disk-based backup solution leverages the many features of disk media to reduce total cost of ownership.

The easy-to-use file backup solution only requires the general system administrator to deploy and manage the system. No professional training administrator is required to maintain the system, which reduces the operating cost of the system.

Modular product structure, when deploying solutions, only need to select the modules needed in the enterprise IT environment, do not need to pay for unnecessary modules.


● Various backup user data files

Supports but is not limited to user file data formats, including:

Office documents: Word, PPT, Excel, PDF, etc.

Audio and video files: MP3, MP4, AVI, MOV, etc.;

Design drawings: Photoshop, AutoCAD, ProE, etc.

Source code: C/C++, JAVA, C#, VB, etc.;

Photo: JPG, PNG, GIF, etc.;

Web documents: HTML, ASP, JSP, PHP, etc.

Other formats of documents.

● File recovery

Supports full recovery of files, users can get a clean copy of the backed up files from the data center.

Supports batch export of backups to export the latest file version of a backup directory through the client.

Backup file search provides flexible search for files that have been backed up to the data backup center.

● Efficient and secure data transmission

In order to protect the privacy of user data in the transmission process, support the independent research and development of secure transmission of the transmission protocol, encrypt the transmission data on the communication channel;

Support multiple encryption algorithms and key lengths, including AES-128, AES-192, AES-256, Blowfish, CAST5, etc., to ensure the safety of backup data;

Support data compression algorithm, high-compression ratio transmission of user data;

Supports the backup of the backup file to adapt to the bad network environment;

Support timeout reconnection mechanism to ensure efficient transmission of backup data;

It can accurately identify the files and files that have changed in the backup task, and does not back up the unchanged files, which reduces the network bandwidth requirement and saves data center storage space.

● Flexible backup strategy

Administrators can customize global backup policies online to serve as policy templates for users.

Backup policies consist of names, monitoring paths, and file rules.

The name can be filled in as a text description that represents the intention of this strategy;

Monitor the path (that is, the range), choose to back up the entire disk or select a specific path.

A file rule can be composed of any number of items, including two types: exclude and exclude, that is, to include or exclude files that satisfy the corresponding attributes during backup. These attributes include file size, file type, and characters contained in the path.

● Friendly human-computer interaction

Automatic operation, once set, never disturb;

Intuitive and timely task execution status display;

Convenient and fast C/S, B/S backup file browser;

● Quick search of backup files

Quick search of backup file archives allows you to flexibly search for backup files that have been backed up to a data active backup system.

█ Target value

● Strengthening management

Build an enterprise-level document data backup environment and manage corporate data assets in a unified manner.

Provides double protection for employees' efforts, business results, and the normal operation of the organization.

● Convenient and practical

The system application incorporates the "easy to manage" idea, which is easy to operate and simple to maintain.

● Reduce investment

The broad adaptability of the system can make full use of existing equipment and networks.

No need to add extra expensive affiliate hardware devices.

Protect the original information construction investment of the enterprise.


Copyright(C)2018, Zero Information Technology (Shanghai) Co., Ltd. All Rights Reserved. Supported by Toocle Copyright Notice 备案字号:沪ICP备18008633号