Storage

Storage Architecture
Highly Available Storage Architecture

Storage Architecture with No Single Point of Failure Provides Continuous Data Availability

Global Data Vault’s data backup service is built on a storage architecture designed for high availability with fully redundant hardware and advanced failover features. Clustered controllers provide a high level of availability by operating in unison to ensure no single point of failure.

Full Redundancy: We provide continuous access to data with dual paths from servers to disk drives, fully redundant power and fans and controller failover support.

Scalable, Clustered Architecture: We achieve higher availability by adding controllers in a dual clustered configuration.

Continuous Availability: We ensure uninterrupted data access with no single point of failure architecture.

Data Storage Systems Architecture


Your data is protected by:

  • Automatic controller failover
  • Controller clustering which delivers higher availability than traditional implementations
  • Multi-path I/O failover whcih requires no special software
  • Mirrored, battery-backed cache for data protection
  • Non-disruptive software upgrades to provide continuous data availability

Global Data Vault’s primary SAN storage platform is NetApp Filers.

NetApp filers have served as the company’s flagship product from the very beginning. A filer is a type of disk-storage device which owns and controls a filesystem and presents files and directories to hosts over the network. This scheme is sometimes called network-attached storage, as opposed to the block storage which major storage vendors like IBM, EMC Corporation and Hitachi Data Systems have traditionally provided.

NetApp Filers support our storage architecture design.NetApp Filers support our storage architecture design.NetApp Filers support our storage architecture design.NetApp Filers support our storage architecture design.

 

NetApp Filers

Petri Interview - Protect Against Ransomware

How to Protect Your Business from Ransomware Attacks

Cybercriminals are having a field day targeting business and government IT infrastructures. You can no longer assume that these criminals only go after weak or poorly secured targets because it’s simply no longer the case. In order to keep your business, your...
Hackers Attacking International Suppliers

Hackers Attacking International Suppliers

There’s a saying, “Make sure everybody in your boat is rowing and not drilling holes when you’re not looking.” It’s a great analogy for some of the more recent high-profile incidents of cybercrime. While your company’s best efforts to thwart cyber attacks may be...

The importance of maintaining databases

If you’re in business, then its likely you’ve got a database such as Exchange, SharePoint and SQL, and all the responsibility (and headaches) that go along with owning one. Without properly maintaining databases, in time, your applications dependent on them will slow...