Automates the recovery of servers and networks in a new environment

Cristie’s software provides simple and automated protection of IT systems and data across Windows and Unix platforms which is managed from a single browser based interface. The management console is provided as a pre-packaged Linux virtual appliance, the Cristie Virtual Appliance (“VA”).

  • Recovery testing
  • Recovery automation
  • Machine migration
  • Machine replication and fail-over
  • System and data backup

The software has intelligence and advanced integration with the leading hypervisors (including VMware and Hyper-V) and cloud providers (including AWS and OCI).

The Cristie VA allows all the functionality of our software to be controlled from a central browser based console.

Recovery Testing

The Cristie VA allows recovery tasks to be created which will recover a server or group of servers. These can be executed manually or scheduled to run automatically. The test recoveries can be to an isolated virtual or cloud network to prevent any conflict with the production environment. Advanced logic ensures that recoveries of an application group or a number of application groups are carried out in the correct order and that networking and security permissions are in place before servers are brought on line.

The software will automatically carry out the following processes:

  • Create the recovery environment
  • Configure the network
  • Perform the recoveries
  • Perform post recovery checks
  • Produce a report of the recovery process and optionally destroy the recovery environment

The output from the recovery report allows the recovery tasks to be fine-tuned to ensure that all required network and server resources are in place to complete an effective recovery.

Recovery Automation

Recovery automation is the process of carrying out a recovery in a live environment so that the recovered systems and applications are made available to end users once they have been restored. This may involve changing DNS settings and ensuring security privileges are replicated exactly so that users can log back in to systems whilst ensuring security is maintained. It is also possible to provide scripts which would automatically trigger a recovery if certain conditions are met such as a datacenter or application going offline.