Select Page

How StoneFly delivers Data Transportability

Data transportability is conventionally defined as the migration of data between applications, computing environments or cloud storage tiers. In the context of cloud technology, data transportability is basically the ability to move different types of data between Cloud Service Providers (CSPs) or between different storage tiers; for instance, migrating data from Amazon S3 to S3-IA. This is also referred to as cloud portability.

At StoneFly, we add more meaning to data transportability. It isn’t simply data migration. StoneFly’s application of data transportability makes it a very useful concept for data protection purposes.

Data Transportability with StoneFly’s Appliances

StoneFly’s innovative Virtual Storage Appliance SCVM™ enables you to dedicate disks that are used to maintain replicas of your mission critical data. SCVM™ delivers snapshot technology, replication technology and other options for the purpose of data redundancy. You can choose which data to be copied to these dedicated disks.

In case of a disaster, be it a natural disaster or an artificial disaster like power loss or hardware failure or ransomware attack, SCVM™ automatically disconnects these disks to prevent damage or corruption to the data stored within these dedicated drives/disks.

These dedicated disks can then be removed from the damaged or dysfunctional appliance and used with another appliance to restore all the data.

To understand this data transportability better, consider the example of StoneFly’s scale-out NAS appliance.

How StoneFly delivers Data Transportability

In a scale-out node setup with ‘n’ number of nodes, the transportable storage disks are connected to a single node. Pre-defined mission critical data is replicated to these disks in real time. In the event of a disaster, let’s say all of the nodes are compromised. In this instance, detecting the node failure, SCVM™ detaches the disks from the system. Despite the entire system being affected by a malware or a ransomware, these disks are no longer accessible and thus safe.

Once the disaster concludes, these devices are removed from the scale-out node and added to another similar appliance. Using these transportable storage disks, mission critical data is restored and operations are resumed.

As evident in this example, with StoneFly’s application of data transportability; the storage disks prevent data loss and enhance business continuity.

The necessity of Backup Technology – Despite Data Transportability

Verily, transportable storage disks do prevent data loss but that’s limited to the extent of the data replicated or copied in the disk. This is not a replacement for backup technology. It is strongly recommended to always setup backup services that can ensure data is recoverable and data loss is prevented.

Enterprises can opt to dedicate backup appliances for this purpose or they can setup cloud backup services. StoneFly also delivers software based backup that enables setting up data backups in Microsoft Azure or AWS using Veeam cloud connect.

StoneFly’s storage solutions deliver enhanced data storage and sharing capabilities while StoneFly’s enterprise level backup services efficiently secure enterprise data.

Data Transportability is just one of the enterprise level data services delivered by StoneFly’s appliances. To explore other innovative data services and solutions, contact us and schedule a demo with our experts.

We’d love to hear your data requirements because we can deliver the perfect customized solution for you.

The Spear Phishing Survival Guide

The Spear Phishing Survival Guide

Spear phishing stands as the favored gateway for ransomware delivery and infiltrating corporate networks. Shockingly, 36% of data breaches in 2022 involved phishing, with 25% utilizing email as the ransomware attack vector. Guarding against cyber threats and...

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

In a digitally transformed landscape fraught with ever-evolving cyber threats, the acronyms EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), MDR (Managed Detection and Response), and NDR (Network Detection and Response) have become...

Trigona Ransomware: What is it and How to Defend Against it

Trigona Ransomware: What is it and How to Defend Against it

In an ever-evolving digital landscape, the specter of ransomware looms large, and Trigona stands as a significant player in the realm of cyber threats. This blog delves into the multifaceted world of Trigona ransomware, unraveling its origins, unique characteristics,...

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

In the constantly evolving arena of cybersecurity, the digital landscape is fraught with adversaries lurking in the shadows, ready to exploit vulnerabilities and disrupt the operations of organizations. Among these threats, LockBit ransomware has emerged as a...

What Defending Against Ransomware-as-a-Service (RaaS) Entails

What Defending Against Ransomware-as-a-Service (RaaS) Entails

Ransomware has evolved, becoming a thriving business model for cybercriminals. Ransomware-as-a-Service (RaaS) exemplifies this transformation—a lethal alliance between the creators and distributors of ransomware. It’s no longer a threat relegated to tech...

You May Also Like

WordPress PopUp Plugin

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email