Search
Close this search box.

System Recovery for Dell EMC Avamar (ABMR)

ABMR lets you perform a complete bare machine recovery of your system direct from an Avamar backup. It also provides recovery assurance, as the Avamar software can be scheduled to run through a complete recovery process. This fully automates the creation of the recovered machine and then runs test scripts to verify integrity and functionality.

Extending Dell EMC Avamar software (ABMR) to provide System Recovery to Physical, Virtual or Cloud targets

Recover entire systems following a disaster or cyberattack

Cristie ABMR software protects your critical servers by recovering them directly from your Dell EMC Avamar backups.

Trust your DR environment with Cristie recovery simulation

Adding ABMR to your Dell EMC Avamar environment allows recovery of operating systems, applications, user configuration and data to any point in time available in your Avamar backup software. With our enhanced testing you can simulate system recovery with DR automation to verify that your recovery procedures will work when you need them most, and all without having to rely on manual intervention.

Comprehensive reports to meet compliance directives​

System DR process audits are a core component of many industry compliance directives. Our DR orchestration tools enable the automation of recovery simulation reports to simplify your regulatory compliance procedures.

Key features & benefits for Dell EMC Avamar users

Dell EMC Recommended

ABMR is re-sold globally by Dell EMC and its channel partners as a recommended recovery solution and is available for both perpetual and subscription-based licensing.

Broad OS and virtualization platform support

ABMR can recover systems from Windows, Linux, Solaris, AIX, VMware, Hyper-V and cloud platforms such as Azure, OCI and Amazon EC2

DR Automation and Recovery Sandbox testing

ABMR provides DR automation and orchestration capabilities, plus the ability to recover systems within a sandbox environment to validate recovery processes and RTO objectives

Recover directly from existing Dell EMC Avamar backups without extra infrastructure or management

Find out more about our pricing or read more about us at Cristie Data.

How ABMR works

ABMR lets you perform a complete bare machine recovery of your system direct from an Avamar backup. It also provides recovery assurance, as the Avamar software can be scheduled to run through a complete recovery process. This fully automates the creation of the recovered machine and then runs test scripts to verify integrity and functionality.

Schedules can be set up months in advance and planned so that the entire server infrastructure is tested over the course of the desired timeframe.

The recovery machines are held in an isolated network and can be released after every simulation, so storage is not permanently required. Detailed reporting highlights any problems encountered and provides an audit track of successful results.

Running a recovery is straightforward, following this simple process:

  1. Install ABMR on the client system to be protected.
  2. License the Avamar software using a trial or full license. The software will then gather configuration parameters, including details about the hard disks, operating system, storage controller, network adapter and network settings. Some of these details can be tailored.
  3. Perform a standard Avamar backup.
  4. Boot the recovery environment on the target system and monitor the automated restore process
  5. ABMR requires one license per system it protects and includes 12 months’ free support & maintenance.

SiteLock

it-sa 2024
Request your FREE admission voucher code.

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

CMT24 - Registrierung
Cristie Mopped Tour 2024

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.