Software House Co-StandbyServer Access control system
Technical Specification
- Make: Software House
- Model code: Co-StandbyServer
- Series: LEGATO Series
- Accessories: Data Mirroring Software
The ability to protect and keep mission critical data and applications available has become a key factor for many organizations. Legato’s Co-StandbyServer provides one of the most advanced, reliable and, cost effective solutions. Through the use of a dedicated link, risks and latency effects typically associated with public network are reduce. Co-StandbyServer’s ability to separate servers up to 10 kilometers of dark fiber adds additional configuration flexibility and access protection in a situation where local access is temporarily not available. In the event that a server should fail, the resources from that server such as IP addresses, shares, applications and data volumes are activated (fail over process) on the secondary server.
Read moreMake | Software House |
---|---|
Manufacturer | Software House, Tyco International |
Category | Access Control>Access control systems & kits |
Model code | Co-StandbyServer |
Accessories | Data Mirroring Software |
Additional info | The ability to protect and keep mission critical data and applications available has become a key factor for many organizations. Legato’s Co-StandbyServer provides one of the most advanced, reliable and, cost effective solutions. Through the use of a dedicated link, risks and latency effects typically associated with public network are reduce. Co-StandbyServer’s ability to separate servers up to 10 kilometers of dark fiber adds additional configuration flexibility and access protection in a situation where local access is temporarily not available. In the event that a server should fail, the resources from that server such as IP addresses, shares, applications and data volumes are activated (fail over process) on the secondary server. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The Critical Role of Access Control in K-12 School Security
The Benefits of Edge AI + Cloud For Security Systems
Integrated Access Control: Reap The Benefits Of Connected Security