Software House Co-StandbyServer Access control system
Technical Specification
- Make: Software House
- Model code: Co-StandbyServer
- Series: LEGATO Series
- Accessories: Data Mirroring Software
The ability to protect and keep mission critical data and applications available has become a key factor for many organizations. Legato’s Co-StandbyServer provides one of the most advanced, reliable and, cost effective solutions. Through the use of a dedicated link, risks and latency effects typically associated with public network are reduce. Co-StandbyServer’s ability to separate servers up to 10 kilometers of dark fiber adds additional configuration flexibility and access protection in a situation where local access is temporarily not available. In the event that a server should fail, the resources from that server such as IP addresses, shares, applications and data volumes are activated (fail over process) on the secondary server.
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control systems & kits |
| Model code | Co-StandbyServer |
| Accessories | Data Mirroring Software |
| Additional info | The ability to protect and keep mission critical data and applications available has become a key factor for many organizations. Legato’s Co-StandbyServer provides one of the most advanced, reliable and, cost effective solutions. Through the use of a dedicated link, risks and latency effects typically associated with public network are reduce. Co-StandbyServer’s ability to separate servers up to 10 kilometers of dark fiber adds additional configuration flexibility and access protection in a situation where local access is temporarily not available. In the event that a server should fail, the resources from that server such as IP addresses, shares, applications and data volumes are activated (fail over process) on the secondary server. |
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
