Search
Close this search box.

Cristie Project Archive – CPA

Share This Post

The CPA provides each user or user group with a directory, the so-called “IN folder”, on the network. The “IN folder” is on the CPA server and represents the gateway to the archive. The user collects the files to be swapped out and moves them to the “IN folder”. This process can be implemented manually or using appropriate software. As the last file, the user copies the so-called CPA trigger into the directory. The CPA trigger is a file that indicates to the CPA that the files can start being swapped out. As soon as the CPA trigger is recognized in the directory, the CPA processes the files. They are combined into a project container and encrypted. After that, the containers are stored in the connected swap space.
After the container with the project files has been stored in the swap space, the user receives a receipt. This can be sent by e-mail or stored in a specified directory. On the one hand, the receipt serves as proof of successful outsourcing, on the other hand, the files can be restored to any location using it. The document contains, in addition to various

For more information, please read our CPA data sheet or email us using our contact form. If you are interested in CPA as a Service, please send us an email using the CPAaaS email form.

Simplifying migration from VMware

Simplifying migration from VMware Cristie Data provides a seamless transition for customers who want to switch from VMware to an alternative platform. Although VMware has

SiteLock

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Participation subject to availability.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.