sb-as logo
Story image

Cohesity announces integrated, automated disaster recovery

29 Sep 2020

Cohesity is set to release a new integrated, automated disaster recovery solution: Cohesity SiteContinuity.

In a statement, the company claims this is the only web-scale, converged solution to protect applications across tiers, service levels, and locations on a single platform. 

This new solution is integrated with the company’s backup and continuous data protection capabilities and aims to help companies ensure data is not lost, applications are available, costs are reduced and that strict service-level agreements (SLAs) are met.

The statement highlights a study published by the Enterprise Strategy Group (ESG); when respondents were asked if their actual recovery times met their pre-established SLAs, 78% stated they are unable to “always” meet their objectives and 33% said they “sometimes” or “rarely” meet these objectives.

With Cohesity SiteContinuity, organisations can recover a single file, critical business application, or an entire data centre, automating recovery operations spanning across application tiers and on-premises and public cloud environments. 

It simplifies the management of hybrid and multi-cloud IT environments with numerous applications running across multiple tiers with varying service levels during the course of normal operations. 

The solution provides:

  • Simplified operations – Consolidate backup, continuous data protection and automated disaster recovery on a single platform, managed through one global UI and a unified policy framework, across application tiers, service levels, and environments.
  • Near-zero application downtime and data loss – Automatically orchestrate failover and failback of a single application or an entire site, ensuring minimal data loss and downtime as business applications are rapidly recovered in a disaster scenario. 
  • Flexible recovery – Journal-based recovery helps to meet varying service levels across application tiers by restoring to any point in time before the disaster hit, on-premises or to the public cloud.
  • Machine learning-based ransomware detection and recommendation – At the time of failover and/or restore, Cohesity Helios’ machine learning algorithm helps identify a clean point in time to restore.  
  • Disaster testing – Meet DR compliance objectives with end-to-end automated non-disruptive disaster recovery testing, including complete audit trail reporting.
  • Reduced TCO – Reduce costs by converging backup and DR. Further reduce data footprint and costs with global variable-length deduplication and compression across workloads. Additionally, there is no need to deploy dedicated virtual machines to support the recovery of each ESXi host.
  • Limitless scalability – The underlying web-scale architecture of the Cohesity platform enables organisations to scale BCDR capabilities limitlessly.

“With the increased frequency and cost of cyberattacks, a robust set of disaster recovery processes combined with proven technology have never been more essential," says ESG senior analyst Christophe Bertrand. 

"Organisations should look for ease of use, automation and the ability to truly control their data recovery and application availability service level agreements. Cohesity's web-scale converged backup and disaster recovery solution is timely and offers a comprehensive set of capabilities to take on disaster recovery challenges.”

This solution will be generally available in the fourth quarter of the calendar year 2020.

Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
O365 a weak point ripe for exploit, say security professionals
71% of more than 1,000 security professionals have been on the receiving end of a Microsoft 365 account takeover, on average, seven times in the last year alone.More
Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Ransomware and Microsoft Exchange attacks surging 
There are global surges in ransomware attacks alongside increases in cyber attacks targeting Microsoft Exchange Server vulnerabilities, according to Check Point Research.More