Backup for Windows Servers encrypted with PGP
Posted on 03 August 2012.
Future Systems Solutions announced Casper Secure 3.0 Server Edition, a backup and disk cloning solution designed specifically for Windows Servers using PGP Whole Disk Encryption (WDE) technology.

Data is never placed in an exposed or unencrypted state. All data remains in its original encrypted state during and after the backup and recovery processes, thereby maintaining 100% compliance with enterprise-wide data security directives.

The software was designed specifically to facilitate the rapid recovery of a failed PGP WDE server drive. In the event of a drive or RAID array failure, a backup created by Casper Secure can be used as an immediate and permanent replacement for the failed drive or array, or restored to a new drive or array without requiring separate restoration and re-encryption steps.

Casper Secure Server Edition maintains an instantly bootable backup replacement for a Windows server encrypted with PGP WDE in the same amount of time required by other backup and disk imaging products to perform a partial or incremental backup.

AccuClone and Automatic Copy Verification technologies bring backup dependability to a new level by automatically verifying the integrity of the backup, ensuring it is not compromised by faulty RAM, a defective cable, failing disk, or bad controller interface.

Complete system backups can be performed without restarting or interrupting the operation of the server; and with integrated scheduling and SmartAlert technology, backups can be performed completely unattended for true "set it and forget it" operation.

Casper Secure Server Edition also makes short work of disk upgrades and replacements by quickly cloning a single disk or hardware RAID array to another disk or array to increase speed, increase capacity, or replace a failing disk or array. It supports all SCSI, SATA, ATA/IDE, and hardware RAID configurations, including solid state devices and solid state arrays.





Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //