Search
Close this search box.

Cristie Data and Rubrik bring the cloud to power

Share This Post

Even if the demand for electricity is increasing less than feared a few years ago, despite ever newer and larger data centers, it is still increasing. The fact that the energy requirement no longer grows in proportion to the computing power is primarily due to the technology. Modern computers are much more efficient than their power-hungry predecessors. New technology such as cloud computing helps to make better use of resources. However, despite all the efficiency, the operators are often far from CO2 neutral. And there is still a lot to be done when it comes to optimizing the total cost of ownership (TCO). Cristie Data GmbH has a solution for both. On November 25, the company specializing in data management and disaster recovery presented its latest data center and introduced new managed cloud services. Together with technology partner Rubrik, the innovative company offers backup and disaster recovery as a service (BaaS, DRaaS) with electricity directly from the producer.

The square has to go round

Cristie Managing Director Volker Wester attaches great importance to particularly sustainable and cost-efficient services. In addition, its business partners demand a high level of security for their data with the greatest possible flexibility and minimal downtime. The busy entrepreneur also takes this into account when choosing his data centers (DC), which he u. a. at COMback GmbH and its high-security data center in a former atomic bomb shelter. The new data center also reflects his penchant for unusual locations. It’s in the base of a pinwheel tower.
As a Paderborner, Volker Wester knows the advantages of his homeland. The windy area is ideal for wind farms. A lot of wind generates a lot of green energy. This is a challenge for the existing power grids. If overcapacity threatens, e.g. B. due to too much wind, the wind turbines are curtailed by the grid operator. In order to make better use of its systems, the regional wind energy company WestfalenWIND has come up with an idea: It combines the power-intensive consumer with a sustainable generator. This idea resulted in a data center certified according to availability class III in the tower of an Enercon E-115 wind turbine – the windCORES. The concept was awarded the German Data Center Prize in 2019. The windCORES are directly connected to the large internet nodes in Frankfurt via dedicated Darkfiber. A capacity of up to 6 Tbit/s not only enables almost any bandwidth in the data connection, but also with extremely short latency times. Reliability is guaranteed by the independent media fiber optics and directional radio. “In addition to the unbelievable performance, two things in particular convinced us: the security concept and the fact that we can offer our services at an unbelievably low rate. After all, we save the network fees for the electricity tariff. Of course, we are happy to pass this on to our customers,” says Volker Wester, who of course also appreciates the sustainability of the almost CO2-free data center in the wind turbine.

Cloud-Backup und Disaster Recovery made in Germany

By using the windCORES data center, Cristie offers his clients a wide variety of options. Large organizations can use the new locations for their archives. It doesn’t matter whether the data is to be stored on tape or disk.

However, small and medium-sized enterprises (SMEs) will probably have the greatest advantage. Cristie has partnered with Rubrik to add ransomware damage protection and instant recovery capabilities to its managed cloud services. The service based on the CLOUDBRIK product line is now available as a cloud or hybrid cloud.

Volker Wester helps companies to concentrate on their core business. “Our customers have the certainty that they can access their data at any time – no matter what. CLOUDBRIK and the intelligence of Rubrik protect organizations from the consequences of ransomware attacks. We ensure minimal downtime of critical services and pay attention to efficiency, especially when it comes to total costs. And we’re also saving the climate with our approach,” he adds proudly with a wink.

About WestfalenWIND IT:

WestfalenWIND IT currently operates wind turbines (WEA) with a total output of approx. 350 MW in its group of companies. It deals with the development and extension of the use of wind turbines for IT settlement concepts along sustainable energy generation infrastructures. A symbiosis of conventional data centers (DC) and wind turbines was developed for future IT requirements and energy price developments. The innovative windCORES concept shows new economic ways for the sustainable, efficient and cost-effective operation of various IT applications and systems through a unique use of synergies.

Cohesity Gaia: Revolutionizing Data Management with AI-Powered Conversational Search

Cohesity Gaia: Revolutionizing Data Management with AI-Powered Conversational Search In today’s fast-paced digital world, organizations face the challenge of managing massive volumes of data while ensuring quick, accurate access to information. Cohesity Gaia, an AI-powered conversational search tool, is designed to address this challenge, transforming the way businesses interact with

How Cohesity’s Integrated Approach to Data Security and Management Works

How Cohesity’s Integrated Approach to Data Security and Management Works As organizations manage increasing volumes of data across distributed environments, the need for a unified approach to data security and management becomes essential. Cohesity’s leading data management platform, addresses these challenges with an integrated approach that combines data protection, security,

NIS 2 vs. ISO 27001: A Comparison of Requirements

NIS 2 vs. ISO 27001: A Comparison of Requirements As organizations face an increasing number of cybersecurity threats, compliance with security standards and regulations becomes essential. Two prominent frameworks are the NIS 2 Directive (Network and Information Security Directive 2) and ISO 27001. While both aim to enhance cybersecurity resilience,

Protect Your Organization with Arctic Wolf

Protect Your Organization with Arctic Wolf’s IR JumpStart Retainer Program: A Proactive Approach to Cybersecurity In today’s evolving threat landscape, organizations are more vulnerable than ever to cyberattacks. The need for a swift, expert-led response to cyber incidents is crucial to limiting damage and ensuring recovery. Arctic Wolf’s Incident Response

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat In our recent article we highlighted the top 5 industries targeted by cybercrime with the healthcare sector being number one. Germany’s healthcare sector has become a prime target for cybercriminals, with several significant cyberattacks in recent years causing widespread

The 5 Industries Most Targeted by Cybercrime

The 5 Industries Most Targeted by Cybercrime Cybercrime has become one of the most significant threats to global businesses, with hackers and cybercriminals increasingly targeting industries where sensitive data, critical infrastructure, and valuable financial information are stored. As the world becomes more digitally interconnected, cybercriminals are becoming more sophisticated, exploiting

it-sa 2024
Request your FREE admission voucher code.

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

CMT24 - Registrierung
Cristie Mopped Tour 2024

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.