Software House RepliStor Access control system
Technical Specification
- Make: Software House
- Model code: RepliStor
- Series: LEGATO Series
- Accessories: Data Recover, Migration and Backup software
LEGATO RepliStor provides a reliable low-cost solution for business continuance, disaster data recovery, data migration, and centralized backup. RepliStor provides real time information protection and availability for Microsoft Windows NT and 2000 environments by replicating and distributing data to one or more targeted systems, either locally or remotely. These targeted systems can either be Windows 2000/NT Servers or Microsoft Cluster Servers. It also compliments a LEGATO Co-StandbyServer by having the capability to mirror system disks. RepliStor’s ability to replicate and distribute data is also used to balance loads across servers to different locations.
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control systems & kits |
| Model code | RepliStor |
| Accessories | Data Recover, Migration and Backup software |
| Additional info | LEGATO RepliStor provides a reliable low-cost solution for business continuance, disaster data recovery, data migration, and centralized backup. RepliStor provides real time information protection and availability for Microsoft Windows NT and 2000 environments by replicating and distributing data to one or more targeted systems, either locally or remotely. These targeted systems can either be Windows 2000/NT Servers or Microsoft Cluster Servers. It also compliments a LEGATO Co-StandbyServer by having the capability to mirror system disks. RepliStor’s ability to replicate and distribute data is also used to balance loads across servers to different locations. |
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
