Leading automotive supplier implements synchronous system replication to protect web servers with CloneManager®

Ready for true enterprise resilience? Start your free Cristie trial.

Live synchronization between production and target system can be adjusted to near real-time synchronization.

Simultaneous, controlled recovery of multiple physical and virtual servers.

Support for all major Linux distributions including legacy versions.

System failover can be achieved in less than an hour for the entire web server estate.

The entire server estate can be fully recovered without manual intervention.

Time to rebuild and test servers reduced from 12 hours to less than one hour.

Customer Profile:

An award-winning, national supplier to the automotive industry that had recently transitioned from Windows to Linux servers for their vital growing ecommerce web server infrastructure.

Challenge

The company wanted to replace its manual disaster recovery process with an automated, streamlined solution. The Senior Systems Administrator (SSA) says, “We looked for years for something like CloneManager. Something that would help us automate the process of having a backup server ready to be booted up in the event of a failure.”

Solution

CloneManager is currently used on 9 web servers that support the primary business, with plans to extend its usage as new business ventures emerge. Once each web server has been cloned, the Clone Sync feature of CloneManager is utilized twice a week for live syncs between the production systems and target clones. Only data that has changed since the original clone is copied. The SSA comments, “CloneManager is so easy to install and use, and the ability to schedule syncs means I don’t have to waste time re-cloning.” In a DR test, the company failed over all 9 of its web servers to its DR center. Once the server clones were re-booted, the web servers were back online and fully functional. 

Result

“It used to take us around 12 hours to test our servers, it now takes less than one hour. We no longer have to rebuild servers and run lengthy checks for software updates. Our websites are essential to our business – I now have complete confidence that should a disaster happen, we can quickly and fully restore them.”

Elevate Your Migration Strategy with Cristie

Directly migrate to a wide variety of virtual and cloud-based platforms. Provide seamless cloud onboarding with simple licensing that includes 12 months free support & maintenance. Contact us to obtain the latest list of supported migration platforms!

The Cristie Software Blog

Application-based access control | How to Protect Windows Files and Registry Keys with FSBlocker from Cristie Software

How to Protect Files, Folders, and the Windows Registry with Kernel-Level Access Control

FSBlocker introduces kernel-level application-based file access control designed to protect critical data from ransomware and unauthorized modification. By intercepting file system calls and enforcing configurable policies, it prevents malicious encryption attempts and safeguards backup repositories, helping organizations strengthen cyber resilience and ensure the integrity of their recovery infrastructure.

Read More »
Press release: Cristie Software announces FSBlocker, a kernel-level driver for application-based access control of critical data.

Cristie Software announces FSBlocker application-based file access control.

# ## News: Cristie Software announces FSBlocker, a kernel-level driver for application-based access control of critical data.

Cristie Software has launched FSBlocker, a kernel-level driver providing application-based access control for Windows systems. It prevents unauthorized modification or deletion of critical data, including backup stores. The utility intercepts file system calls to block malicious encryption attempts, offering a robust defense against ransomware.

Read More »
Clean Room Recovery | Continuous Recovery Assurance from Cristie Software

What is Clean Room Recovery in Cybersecurity?

Clean Room recovery provides a secure, isolated environment to safely test and validate system recoveries after a cyberattack. By preventing reinfection from hidden threats like ransomware, it ensures recovery points are clean and reliable—making it an essential part of modern cybersecurity and business continuity strategies.

Read More »
https://www.cristie.com/wp-content/uploads/2022/09/thub-logo1.png

Contact Us

https://www.cristie.com/wp-content/uploads/2022/09/thub-logo1.png

Thank you for contacting us. We have received your request.

https://www.cristie.com/wp-content/uploads/2019/06/gdpr_130px.png
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.