SlideShare a Scribd company logo
1 of 2
Download to read offline
Turning Data Into Information
EN.150930 - Copyright © 2015 - ARTEC IT Solutions AG /ARTEC Computer GmbH. All rights reserved. VSTOR®
, EMA®
Enterprise Managed Archive®
, EMA®
E-Mail Archive Appliance®
, CMP®
Continuous Mail Protection®
, ANA®
Automated Network Administrator®
, Mail to Archive®
,
Print to Archive®
, Scan to Archive®
, Voice to Archive®
, File to Archive®
, ediscovery®
, Four-Eye-Principle®
and firegate®
are registered trademarks of ARTEC IT Solutions AG. All other trademarks are the property of their respective owners.
Copying, reproduction, or duplication either completely, or in part is not permitted without prior written authorization by ARTEC IT Solutions AG. Subject to change without prior notice.
Every organization faces the challenge of having to access all of its
data and information. The statement that »knowledge is power« is
given a new meaning in this context, because access to informa-
tion now represents cash capital and a competitive advantage
on the market. If an organization is able to access all of its data
and information in a quick and easy manner, the immediate result
is a significant advantage over its competitors. In the era of the
Internet and electronic communication, you can no longer afford to
spend hours or even minutes looking for data and information.
Data and information management in local environments, branch
offices, or within various departments, places today’s IT managers
in front of unsolvable problems. In contrast, storing data is easy,
and the resulting costs are, at least when compared to earlier
times, largely negligible.
Organization and management, however, have become a lot more
difficult, because growing amounts of data and information still
need to be administered. In addition to maintaining the infrastruc-
ture, IT departments must also be able to manage backups and
archiving. A growing list of responsibilities for an IT department
also inevitably increases the administrative burden. If data and
information also needs to be managed in multiple locations, the
costs rise even further. This is especially true when information
needs to be centralized from multiple locations.
Due to the ever-increasing flood of information, we have made it
our task to develop special solutions that help you improve your
organization’s productivity and efficiency.
All-Encompassing Information Management
Perfectly matched, our solutions are well-suited to help organi-
zations implement an efficient, simple, and secure approach to
information management.
Have you got your information under control?
SOLUTIONS FOR »BIG DATA«
Turning Data Into Information
EN.150930 - Copyright © 2015 - ARTEC IT Solutions AG /ARTEC Computer GmbH. All rights reserved. VSTOR®
, EMA®
Enterprise Managed Archive®
, EMA®
E-Mail Archive Appliance®
, CMP®
Continuous Mail Protection®
, ANA®
Automated Network Administrator®
, Mail to Archive®
,
Print to Archive®
, Scan to Archive®
, Voice to Archive®
, File to Archive®
, ediscovery®
, Four-Eye-Principle®
and firegate®
are registered trademarks of ARTEC IT Solutions AG. All other trademarks are the property of their respective owners.
Copying, reproduction, or duplication either completely, or in part is not permitted without prior written authorization by ARTEC IT Solutions AG. Subject to change without prior notice.
AMERICA
ARTEC IT Solutions USA
1600 Parkwood Circle
Atlanta, Georgia 30339, USA
Phone: +1 - 855 - 462 - 7832
Fax: +1 - 678 - 666 - 5153
E-mail: info@artec-it.com
Internet: http://www.artec-it.com
EMEA
ARTEC IT Solutions AG
Robert-Bosch-Str. 38
61184 Karben, Germany
Phone: +49 - 6039 - 9154 - 0
Fax: +49 - 6039 - 9154 - 54
E-mail: info@artec-it.de
Internet: http://www.artec-it.de
ASIA PACIFIC
ARTEC IT Solutions AP
201 Munjeong B/D, 9, Munjeong-ro,
Songpa-gu, Seoul, Korea
Telefon: +82 - 2 - 515 - 3349
Telefax: +82 - 2 - 6008 - 3403
E-mail: info-ap@artec-it.com
Internet: http://www.artec-it.com
Model Overview S60 S120 S400 S800 E2000 E4000 E8000 E15000 E25000
Data Sources
E-Mail
Printer / Output
File Systems
Scan / Input
Search and Access Permissions
Administrator
User
Mail Server Support*
All standard mail servers, such as MS Exchange, Scalix, Exim,
Sendmail, Postfix, Kerio, Open-Xchange, SUN Java System Messaging
Server, Oracle Collaboration Suite, Critical Path, etc.
Lotus Notes (i-Series, AIX)
GroupWise, Tobit
*Using active forwarding mode, extending mail server functionality, or using transparent mode.
Supported File Systems for File Module
CIFS (Windows Network Shares)
NCP (Novell Network Shares)
Administration
Web-Based Administration Interface
Configuration via Console and Keyboard
Automated Network Administrator (ANA) / Automatic Updates
Backup and Restore of Configuration Files
Immediate Backup and Storage of Data on
External Storage of Unlimited Size
Additional Backup to a Second Location
System Monitoring Tools / SNMP
Support for External Storage
NAS Shares (Netware, UNIX/NFS, Windows)
SAN Support, Fibre Channel (Including HBA) — —
iSCSI
Cloud Storage Services (e.g. Amazon S3)
Information Management Features (Search and Find)
Enterprise Full text Search (E-Mail, Documents, Attachments)
Federated Search in Local and Global Environments(1)
Encryption of Archived Data
Four-Eye-Principle
E-Mail Importer (Standard)
E-Mail Importer (Enterprise)
Permission Management for Administrators
Permission Management for Users
Support for Delegates
Management and Linking of User and E-Mail Accounts
Support for Several Authentication Servers
Various Single Sign-On Mechanisms(2)
Consistency Check
Log Files and Reports
Data Recovery by Administrators
Data Recovery by Users
(1)
At least two systems are part of the solution. (2)
HTTPS client certificates, smart cards, PKI, Kerberos, NTLM, ticket server, optionally includes support for RADIUS authentication.
Miscellaneous
Support for Trusted Computing
Hot Standby
Pre-Configured Plug-In Solution
Redundant Power Supplies — —
Chassis Type
1U 19“ short
rack appliance
1U 19“ short
rack appliance
1U Rack 1U Rack 1U Rack 2U Rack 2U Rack 4U Rack 4U Rack
Standard Feature Optional Feature 3rd Party — Feature not available
FEATURE OVERVIEW FOR THE VSTOR®
PRODUCT LINE

More Related Content

Similar to VSTOR_EN-o3pLVQurFU

illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT SolutionsIan Skerrett
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]Ian Skerrett
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEsecuritysytem
 
From ECM to Extended ECM
From ECM to Extended ECMFrom ECM to Extended ECM
From ECM to Extended ECMThomas Demmler
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 
Compass Portfolio Management Proposal
Compass Portfolio Management   ProposalCompass Portfolio Management   Proposal
Compass Portfolio Management Proposalntrung
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
Hp trim vs objective
Hp trim vs objectiveHp trim vs objective
Hp trim vs objectivetraciep
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importanceuniversity of education,Lahore
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...
WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...
WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...Eric Lo
 
Running Enterprise Workloads with an open source Hybrid Cloud Data Architecture
Running Enterprise Workloads with an open source Hybrid Cloud Data ArchitectureRunning Enterprise Workloads with an open source Hybrid Cloud Data Architecture
Running Enterprise Workloads with an open source Hybrid Cloud Data ArchitectureDataWorks Summit
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 

Similar to VSTOR_EN-o3pLVQurFU (20)

illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introduction
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 
From ECM to Extended ECM
From ECM to Extended ECMFrom ECM to Extended ECM
From ECM to Extended ECM
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
Infodigg presentacion alto nivel v3.0 eng
Infodigg presentacion alto nivel v3.0 engInfodigg presentacion alto nivel v3.0 eng
Infodigg presentacion alto nivel v3.0 eng
 
ExertionMaxx, LLC
ExertionMaxx, LLC ExertionMaxx, LLC
ExertionMaxx, LLC
 
Compass Portfolio Management Proposal
Compass Portfolio Management   ProposalCompass Portfolio Management   Proposal
Compass Portfolio Management Proposal
 
Chris Carsten David
Chris Carsten DavidChris Carsten David
Chris Carsten David
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
Hp trim vs objective
Hp trim vs objectiveHp trim vs objective
Hp trim vs objective
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...
WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...
WISE-PaaS 2.0 - the smart manufacturing solutions from edge to cloud-eric lo_...
 
SBDS
SBDSSBDS
SBDS
 
Running Enterprise Workloads with an open source Hybrid Cloud Data Architecture
Running Enterprise Workloads with an open source Hybrid Cloud Data ArchitectureRunning Enterprise Workloads with an open source Hybrid Cloud Data Architecture
Running Enterprise Workloads with an open source Hybrid Cloud Data Architecture
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 

VSTOR_EN-o3pLVQurFU

  • 1. Turning Data Into Information EN.150930 - Copyright © 2015 - ARTEC IT Solutions AG /ARTEC Computer GmbH. All rights reserved. VSTOR® , EMA® Enterprise Managed Archive® , EMA® E-Mail Archive Appliance® , CMP® Continuous Mail Protection® , ANA® Automated Network Administrator® , Mail to Archive® , Print to Archive® , Scan to Archive® , Voice to Archive® , File to Archive® , ediscovery® , Four-Eye-Principle® and firegate® are registered trademarks of ARTEC IT Solutions AG. All other trademarks are the property of their respective owners. Copying, reproduction, or duplication either completely, or in part is not permitted without prior written authorization by ARTEC IT Solutions AG. Subject to change without prior notice. Every organization faces the challenge of having to access all of its data and information. The statement that »knowledge is power« is given a new meaning in this context, because access to informa- tion now represents cash capital and a competitive advantage on the market. If an organization is able to access all of its data and information in a quick and easy manner, the immediate result is a significant advantage over its competitors. In the era of the Internet and electronic communication, you can no longer afford to spend hours or even minutes looking for data and information. Data and information management in local environments, branch offices, or within various departments, places today’s IT managers in front of unsolvable problems. In contrast, storing data is easy, and the resulting costs are, at least when compared to earlier times, largely negligible. Organization and management, however, have become a lot more difficult, because growing amounts of data and information still need to be administered. In addition to maintaining the infrastruc- ture, IT departments must also be able to manage backups and archiving. A growing list of responsibilities for an IT department also inevitably increases the administrative burden. If data and information also needs to be managed in multiple locations, the costs rise even further. This is especially true when information needs to be centralized from multiple locations. Due to the ever-increasing flood of information, we have made it our task to develop special solutions that help you improve your organization’s productivity and efficiency. All-Encompassing Information Management Perfectly matched, our solutions are well-suited to help organi- zations implement an efficient, simple, and secure approach to information management. Have you got your information under control? SOLUTIONS FOR »BIG DATA«
  • 2. Turning Data Into Information EN.150930 - Copyright © 2015 - ARTEC IT Solutions AG /ARTEC Computer GmbH. All rights reserved. VSTOR® , EMA® Enterprise Managed Archive® , EMA® E-Mail Archive Appliance® , CMP® Continuous Mail Protection® , ANA® Automated Network Administrator® , Mail to Archive® , Print to Archive® , Scan to Archive® , Voice to Archive® , File to Archive® , ediscovery® , Four-Eye-Principle® and firegate® are registered trademarks of ARTEC IT Solutions AG. All other trademarks are the property of their respective owners. Copying, reproduction, or duplication either completely, or in part is not permitted without prior written authorization by ARTEC IT Solutions AG. Subject to change without prior notice. AMERICA ARTEC IT Solutions USA 1600 Parkwood Circle Atlanta, Georgia 30339, USA Phone: +1 - 855 - 462 - 7832 Fax: +1 - 678 - 666 - 5153 E-mail: info@artec-it.com Internet: http://www.artec-it.com EMEA ARTEC IT Solutions AG Robert-Bosch-Str. 38 61184 Karben, Germany Phone: +49 - 6039 - 9154 - 0 Fax: +49 - 6039 - 9154 - 54 E-mail: info@artec-it.de Internet: http://www.artec-it.de ASIA PACIFIC ARTEC IT Solutions AP 201 Munjeong B/D, 9, Munjeong-ro, Songpa-gu, Seoul, Korea Telefon: +82 - 2 - 515 - 3349 Telefax: +82 - 2 - 6008 - 3403 E-mail: info-ap@artec-it.com Internet: http://www.artec-it.com Model Overview S60 S120 S400 S800 E2000 E4000 E8000 E15000 E25000 Data Sources E-Mail Printer / Output File Systems Scan / Input Search and Access Permissions Administrator User Mail Server Support* All standard mail servers, such as MS Exchange, Scalix, Exim, Sendmail, Postfix, Kerio, Open-Xchange, SUN Java System Messaging Server, Oracle Collaboration Suite, Critical Path, etc. Lotus Notes (i-Series, AIX) GroupWise, Tobit *Using active forwarding mode, extending mail server functionality, or using transparent mode. Supported File Systems for File Module CIFS (Windows Network Shares) NCP (Novell Network Shares) Administration Web-Based Administration Interface Configuration via Console and Keyboard Automated Network Administrator (ANA) / Automatic Updates Backup and Restore of Configuration Files Immediate Backup and Storage of Data on External Storage of Unlimited Size Additional Backup to a Second Location System Monitoring Tools / SNMP Support for External Storage NAS Shares (Netware, UNIX/NFS, Windows) SAN Support, Fibre Channel (Including HBA) — — iSCSI Cloud Storage Services (e.g. Amazon S3) Information Management Features (Search and Find) Enterprise Full text Search (E-Mail, Documents, Attachments) Federated Search in Local and Global Environments(1) Encryption of Archived Data Four-Eye-Principle E-Mail Importer (Standard) E-Mail Importer (Enterprise) Permission Management for Administrators Permission Management for Users Support for Delegates Management and Linking of User and E-Mail Accounts Support for Several Authentication Servers Various Single Sign-On Mechanisms(2) Consistency Check Log Files and Reports Data Recovery by Administrators Data Recovery by Users (1) At least two systems are part of the solution. (2) HTTPS client certificates, smart cards, PKI, Kerberos, NTLM, ticket server, optionally includes support for RADIUS authentication. Miscellaneous Support for Trusted Computing Hot Standby Pre-Configured Plug-In Solution Redundant Power Supplies — — Chassis Type 1U 19“ short rack appliance 1U 19“ short rack appliance 1U Rack 1U Rack 1U Rack 2U Rack 2U Rack 4U Rack 4U Rack Standard Feature Optional Feature 3rd Party — Feature not available FEATURE OVERVIEW FOR THE VSTOR® PRODUCT LINE