Software House Co-StandbyServer Access control system

Technical Specification

Features:
  • Make: Software House
  • Model code: Co-StandbyServer
  • Series: LEGATO Series
  • Accessories: Data Mirroring Software
Additional info:

The ability to protect and keep mission critical data and applications available has become a key factor for many organizations. Legato’s Co-StandbyServer provides one of the most advanced, reliable and, cost effective solutions. Through the use of a dedicated link, risks and latency effects typically associated with public network are reduce. Co-StandbyServer’s ability to separate servers up to 10 kilometers of dark fiber adds additional configuration flexibility and access protection in a situation where local access is temporarily not available. In the event that a server should fail, the resources from that server such as IP addresses, shares, applications and data volumes are activated (fail over process) on the secondary server.

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control systems & kits
Model code Co-StandbyServer
Accessories Data Mirroring Software
Additional info The ability to protect and keep mission critical data and applications available has become a key factor for many organizations. Legato’s Co-StandbyServer provides one of the most advanced, reliable and, cost effective solutions. Through the use of a dedicated link, risks and latency effects typically associated with public network are reduce. Co-StandbyServer’s ability to separate servers up to 10 kilometers of dark fiber adds additional configuration flexibility and access protection in a situation where local access is temporarily not available. In the event that a server should fail, the resources from that server such as IP addresses, shares, applications and data volumes are activated (fail over process) on the secondary server.

Related Whitepapers

Open credential standards and the impact on physical access control

System design considerations to optimize physical access control

Maximising enterprise security systems in the cloud