User guide

18 | Introduction to AppAssure 5
Today's legacy backup tools and first generation VM backup tools are inefficient and
ineffective. The outdated backup tools lack the ability to handle large-scale data and
do not offer the level of performance and reliability needed for protecting business-
critical applications. Combine this with complex and mixed IT environments and it
presents an administrative challenge for IT professionals and vulnerability of system
data.
AppAssure 5 addresses this complexity and inefficiency through our core
technology and support of multi-hypervisor environments including those running
on VMware vSphere and Microsoft Hyper-V, which comprise both private and public
clouds. AppAssure 5 offers these technological advances while dramatically
reducing IT management and storage costs.
AppAssure 5 Core Technologies
Details about the core technologies of AppAssure 5 are described in the following
topics.
Live Recovery
Live Recovery is instant recovery technology for VMs or servers. It gives you near-
continuous access to data volumes on virtual or physical servers. You can recover
an entire volume with near-zero RTO and an RPO of minutes.
AppAssure 5 backup and replication technology records concurrent snapshots of
multiple VMs or servers, providing near instantaneous data and system protection.
You can resume the use of the server directly from the backup file without waiting
for a full restore to production storage. Users remain productive and IT departments
reduce recovery windows to meet today's increasingly stringent RTO and RPO
service-level agreements.
Recovery Assure
Recovery Assure lets you perform automated recovery testing and verification of
backups. It includes, but is not limited to, file systems; Microsoft Exchange 2007,
2010, and 2013; and, the different versions of Microsoft SQL Server 2005, 2008, 2008
R2, and 2012. Recovery Assure provides recoverability of applications and backups in
virtual and physical environments, and features a comprehensive integrity checking
algorithm based on 256-bit SHA keys that check the correctness of each disk block
in the backup during archiving, replication, and data seeding operations. This
ensures that data corruption is identified early and prevents corrupted data blocks
from being maintained or transferred during the backup process.