By leveraging the cloud as a remote recovery site, enterprise is protected against disasters at its home site and can reconstruct its network to keep services running remotely for as long as it takes to rebuild a server, data center or entire facility. If a disaster strikes, a remote DRaaS team is unaffected and can manage the recovery process to enable faster recoveries.
“We will soon be in a world with over 50 billion interconnected devices and ICT operators, especially in mobile first emerging markets will be able to offer their customers a level of security and availability vastly superior to their OTT competitors,”
Aside of the operational benefits, cloud based DRaaS is also cost effective, as enterprises can share spare capacity with other enterprises, and the capacity can fluctuate based upon the time of day, the time of year, or even season. In the long run, enterprises reduce costs even further by avoiding additional capital investments that one-to-one schemas require and by enabling usage-based billing when disaster recovery is needed.
“Disaster recovery is the number one feature requested by the enterprise customers of our cloud platform and we’re excited to answer their call by rolling-out this service together with Guardtime in the coming months,” said Jason Hoffman, CTO of Joyent. “With enabled SLA-s, near real-time restore and Guardtime’s data integrity validation features enabled by default, the solution is completely unique in the marketplace.”
The Disaster Recovery as a Service offering complements Guardtime’s existing Clean State Proof data integrity suite ( http://www.guardtime.com ), aimed at Infrastructure Service Providers and Telecommunication Operators, validating Virtual Machine images prior deployment and ensuring that the customer data or log files residing in the cloud infrastructure have not been tampered with by any party.
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime's Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime's mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.
Press & Media Contact:
Victor Cruz, Principal
Palo Alto, CA - USA