Use Case
Real-time backup, avoids the damage brought by wrong deletion or modification
Real-time replication
Any change at the source server will be replicated to the target in real time
Bypass mode monitoring
It can replicate the file that is occupied by other processes
Record changes by logs
Every operation will be recorded in the log, to ensure that the log can be used for recovery
Recovery on demand
Restore to specified directory in specified time and by specified operation
Scheme framework
1. i2coopy applies bypass mode monitoring technology to capture data changes in real time, and replicate them to target machine. Moreover, byte-level replication technology can greatly reduce bandwidth occupation to minimum.
2. i2cdp can record each operation into logs. When there is a demand for recovery, data can be restored to a specified location in specified time and by specified operation according to the logs.
3. support for multiple rollbacks. Even if the recovered data is not what is expected, multiple rollbacks are also supported until the expected data is recovered.
  Customer case
China Energy Engineering Group Co., Ltd
Break the boundary, Hybrid Cloud DR practice
Migu Reading of China Mobile
No Data Loss, Strong Consistency in Massive Small File Real-time Disaster Recovery
China West Airport Group (CWAG)
Centralized backup of cluster-based system under the virtualization platform.
Xinjiang Public Security Bureau
Continuous data protection, prevents data loss due to hacker intrusion or mistake

Protect your data perfectly


Please complete the captcha code first


When you register with partners on this website, this website will collect your relevant information and keep records. The personal information collected by this website includes but is not limited to: name, address, company, location, telephone number and e-mail address. The more and more accurate information you offer, the better we can provide you with relevant services.