Search
Close this search box.

NEW: Multi-Cloud data management with Cristie CLOUDBRIK

Share This Post

CLOUDBRIK is a turnkey solution for managing all data in the company. A user-friendly management interface (GUI) simplifies management and control. The instant recovery mode ensures uninterrupted work, even in an emergency.

Datenschutz as a Service

CLOUDBRIK allows tiering for data storage.
With CLOUDBRIK, the data is stored in encrypted form in a hyperconvergent infrastructure (HCI). Airgap, media breaks and a WORM functionality protect the data from ransomware attacks. The file system is based on erasure coding. Enterprise search mechanisms ensure that files can be found quickly.
Depending on the use case, the data is stored in one of three available storage tiers:
CLOUDBRIK T1 for backup and disaster recovery
CLOUDBRIK T2 for long-term archiving
CLOUDBRIK T3 as an interface to the cloud
All CLOUDBRIKs are part of Cristie Managed Services. The Cristie Care Packs offer a high degree of flexibility and are available in three SLA variants: Basic, Advanced and Premium. All SLAs can optionally be expanded with the “Plus” package for 7 x 24. From proactive monitoring and reporting to troubleshooting across the entire environment, the Care Packs also include configuration adjustments and support for administrative questions.
Cristie CLOUDBRIK can be deployed anywhere: in your own data center, in branch offices or in multi-cloud environments. Using Cristie CLOUDBRIK significantly reduces the total cost of ownership (TCO), radically simplifies management and protects mission-critical data, including: also from ransomware attacks.

Tier 1: BACKUP & RECOVERY

The TIER 1 CLOUDBRIK is the backup-recovery engine with all the necessary features to protect mission-critical data. The installation takes place on site in the central data center or at a branch or external location.

Tier 2: ARCHIVE STORAGE

The Tier 2 Brik was designed to reduce the cost of long-term storage (archival). Erasure coding and a native S3 interface ensure maximum security and reliability. CLOUDBRIK Tier 2 already includes free tiering for CLOUDBRIK T3 (optional public cloud tiering) and can be combined with any S3-compatible application, local storage (on-premises) or custom volumes.

Tier 3: CLOUD SERVICES

The third tier is cloud storage, including for more data intelligence and to secure Office365 or other cloud-native applications and services provided as SaaS. CLOUBRIK T3 can optionally transfer data to any other cloud provider (S3).
Every CLOUDBRIK is hyper-converged. Based on HCI technology, the appliances consist of 4 servers and are equipped with fast SSDs, powerful HDDs for backup storage and Cristie’s Backup & Recovery software. For operation at remote locations, we recommend using the smaller version CLOUDBRIK AIR.

OPEX statt CAPEX

Each solution is tailored to the individual requirements. In addition to the basic configuration, further functions and services can be added. All CLOUDBRIKs are available as a monthly subscription, with or without upfront payment. The CLOUDBRIK T3 can also store data with a pay-as-you-go option. Of course, combinations of all available billing models are also possible.
Each CLOUDBRIK can be rented with or without prepayment. The CLOUDBRIK T3 also comes with a pay-as-you-go option

Protect Your Organization with Arctic Wolf

Protect Your Organization with Arctic Wolf’s IR JumpStart Retainer Program: A Proactive Approach to Cybersecurity In today’s evolving threat landscape, organizations are more vulnerable than ever to cyberattacks. The need for a swift, expert-led response to cyber incidents is crucial to limiting damage and ensuring recovery. Arctic Wolf’s Incident Response

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat In our recent article we highlighted the top 5 industries targeted by cybercrime with the healthcare sector being number one. Germany’s healthcare sector has become a prime target for cybercriminals, with several significant cyberattacks in recent years causing widespread

The 5 Industries Most Targeted by Cybercrime

The 5 Industries Most Targeted by Cybercrime Cybercrime has become one of the most significant threats to global businesses, with hackers and cybercriminals increasingly targeting industries where sensitive data, critical infrastructure, and valuable financial information are stored. As the world becomes more digitally interconnected, cybercriminals are becoming more sophisticated, exploiting

NIS 2 and KRITIS: What Companies Need to Know

NIS 2 and KRITIS: What companies need to know NIS 2 (Network and Information Security Directive 2) and KRITIS (Critical Infrastructure Protection in Germany) are both regulatory frameworks designed to enhance the security and resilience of critical infrastructures, but they differ in scope, geographic focus, and specific requirements. Here’s a

How Does Cohesity Protect Organizations from Ransomware Attacks?

How Does Cohesity Protect Organizations from Ransomware Attacks? In an era where ransomware attacks have become increasingly sophisticated and frequent, organizations need robust solutions to safeguard their data. Cohesity which Cristie Data customers can benefit from within the Cristie READY program offers a comprehensive approach to protecting against ransomware by

How Does Cohesity Simplify Backup and Restore Processes?

How Does Cohesity Simplify Backup and Restore Processes? Cohesity Backup Solutions: Streamlining Your Backup and Restore Nightmares into a Manageable Dream In today’s data-driven world, safeguarding your information is paramount. Traditional backup solutions can be complex, time-consuming, and struggle to keep pace with ever-growing data volumes and cybersecurity demands. Here’s

it-sa 2024
Request your FREE admission voucher code.

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

CMT24 - Registrierung
Cristie Mopped Tour 2024

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.