Skip to main content

Data protection

The StorONE storage engine includes a suite of features that ensure rock-solid data protection. It provides the highest level of data integrity, protection, and recovery from hardware failures.

Feature Details
High Availability (HA)
  • Highly availability dual-node storage cluster.
  • If one server node is down, all data can be accessed through the other server node.
  • Active/Active: Provides better performance by balancing the work load between the two servers.
  • Supports all common storage network protocols.
DirectWrite
  • The StorONE system writes directly to drives without an intermediate cache, such as NVDIM, MRAM, or NVRAM.
  • Superior data integrity: All writes go immediately to persistent media.
  • Lowers overall storage server cost. You can mix types of storage media and use white-box or virtual servers.
  • Simplified HA design.
vRAID
  • StorONE vRAID technology is a complete rewrite of the erasure coding algorithm, providing all the benefits of erasure coding while minimizing performance impact.
  • The number of redundant drives per volume can vary from 1 to 16.
  • Fastest drive recovery in the industry, in some cases recovering 20TB drives in less than 3 hours.
Snapshots
  • Snapshots can be taken an unlimited number of times, as long as there is enough storage space available. Snapshots can be easily restored.
  • All snapshots are immutable.
  • Snapshots can restored to new volumes without impacting the original volume or snapshot.
  • vSnap technology automatically moves old snapshots to lower tiers, saving storage resources while minimizing performance impact.
Security
  • Virtual Storage Container (VSC) level encryption.
  • Supports drive encryption, such as self-encrypted drive (SED).
  • Admin interface supports two-factor authentication.
  • Snapshots are immutable and cannot be tampered with.
Replication
  • Each VSC can have its own data replication configuration.
  • Each VSC can be replicated to a different destination.
  • Supported replication strategies: synchronous, asynchronous, and semi-synchronous.