You can go to our Customer Stories page to read use cases.
This website use cookies to help you have a superior and more admissible browsing experience on the website.
You can go to our Customer Stories page to read use cases.
You can go to our Customer Stories page to read use cases.
i2Stream supports:
If your workloads are not on the list, you can contact us to check if it supports.
Info2Soft protects the backup process with end-to-end encryption, immutable storage, and strict access control, preventing unauthorized access and data tampering. It also uses real-time monitoring and integrity verification to detect threats and ensure backup data remains secure and recoverable, even against ransomware attacks.
Yes, Info2Soft fully supports heterogeneous virtual platform migration, providing a professional and reliable end-to-end migration solution to meet the needs of enterprise IT architecture upgrading and cross-platform data migration.
Our core migration product, i2Migration, is built on independently developed data replication technology, which supports seamless migration between different virtualization platforms (V2V migration) as well as cross-type migration, including physical machine to virtual machine (P2V), virtual machine to physical machine (V2P), and physical machine to physical machine (P2P).
This solution is compatible with mainstream virtualization platforms such as VMware, ZStack, and KVM, and supports online hot migration without stopping the production business.
Info2soft protects backup data from tampering and ensures reliability mainly through an immutable backup mechanism, encrypted transmission/storage, integrity checks, and full audit logging.
In object‑storage and cloud scenarios, this is typically combined with WORM (write once read many), read‑only snapshots, and multi‑version retention so that even if the production system is compromised, attackers cannot easily alter historical backup sets.
Secure transmission and storage
Info2Soft’s backup solution (i2Backup) supports data encryption and compression, which prevents data theft or tampering on the network while also reducing bandwidth usage.
Backups are stored on dedicated backup servers or object storage logically isolated from production systems and can be deployed in tiered architectures or remote DR sites, reducing the chance that a single breach leads to widespread backup corruption.
Logging, audit, and access control
i2Backup explicitly offers event, operation, and debug logs that can be used for auditing, so all backup, restore, and policy‑change operations are traceable to detect or investigate suspicious deletions or restores.
Centralized management consoles, role‑based access control, and strict operation logging help mitigate insider threats such as intentional deletion or manipulation of backup sets.
Integrity and replication consistency
Info2Soft’s core technology uses byte‑level replication at the OS layer, capturing I/O changes and replaying them in order on the DR side to keep source and target data logically consistent.
Between production and DR centers, operations like file create/modify/delete are coordinated with consistency checks so that backup copies remain usable and are not silently corrupted in transit.
Reliable recovery and business continuity
Products such as i2Backup and i2Stream support full, incremental, and differential backups plus snapshots and CDP, providing multiple recovery points so you can roll back to a clean, untampered point in time.
These products emphasize fast recovery and short RTO, indicating that the restore workflow and failover/failback capabilities are engineered so that protected backups can quickly be turned back into a running production environment.
Yes. Info2soft’s products (such as i2Stream) support cross-platform, cross-region, and cross-cloud heterogeneous data synchronization and can effectively ensure data consistency in such scenarios.
We adopt database semantic-level replication technology, which can accurately capture transaction changes from the redo/undo logs of relational databases (MySQL, Oracle, PostgreSQL, etc.) and support full replication of DML/DDL operations.
The built-in i2red algorithm records the starting point of each transaction and maintains the concurrent write timing of the target end to avoid incomplete transactions.
At the same time, Info2Soft’s solutions can automatically identify character set differences, detect and resolve conflicts in insert/update/delete operations, and support point-in-time recovery based on timestamps/SCN, ensuring that data remains consistent even in complex heterogeneous synchronization scenarios.
Our backup software (i2Backup) supports both per-VM and per-socket licensing models. The most suitable option depends on your infrastructure size and deployment scenario. You can contact our sales team. Our sales team can assess your environment and recommend the most cost-effective and flexible licensing model for your business.
Info2Soft provides a comprehensive portfolio of solutions designed to safeguard critical systems and ensure uninterrupted business operations:
These solutions provide a comprehensive business continuity framework, covering backup, disaster recovery, high availability, and real-time data protection. They are designed to meet the diverse requirements of organizations across industries and at different scales.
Info2Soft provides technical support in the following forms, including but not limited to:
1. Remote Technical Support: When your software system encounters technical issues, you may contact us via Email. Technical Support Email: global@info2soft.com.
2. On-site Technical Support: For critical technical issues that cannot be resolved remotely or if you require on-site inspection of your existing software system, you may request our technical experts to provide on-site services. We will dispatch experienced engineers to deliver technical support at your location.
3. Disaster Recovery Drill Service: During the service period, we will assist users in organizing an annual disaster recovery system drill test to validate the feasibility of the disaster recovery system and ensure rapid business recovery in the event of a disaster.
4. Maintenance Services: Based on your purchased service tier, we provide varying levels of on-site support, such as 5×9-hour service, backed by support and services from our technical experts.
5. Training Services: We also offer professional training to help your team better understand and utilize our products, including developing and executing disaster recovery plans.
We use a multi-layered defense strategy. This includes Immutable Storage (WORM) technology to prevent backups from being altered or deleted, real-time I/O monitoring to detect anomalies, and air-gapped recovery options to ensure you always have a clean copy of your data. Explore our Ransomware Protection solutions.
Free Trial