Protect critical IBM i applications from downtime and guard against data loss with simple, scalable, full-featured high availability and disaster recovery products
Assure QuickEDD HA replicates IBM i data and objects in real time to local or remote backup servers. These servers then stand ready to assume the production role or recover data, including data from past points in time.
Assure Quick EDD HA is expandable to multiple nodes and supports multiple replication topologies. It can also be used with a variety of IBM i OS levels and storage combinations, and is scalable from SMB to enterprise workloads.
The service uses a graphical interface that supports seven languages and a 5250 interface, with customizable switch procedures that can run step-by-step, interactively or in batch mode.
Tools are provided for analysis, monitoring, and specific configurations, and reports can be created on your HA environment, job logs, and more. Alerts are also available through email, MSGQ and SNMP for unattended monitoring.
Assure QuickEDD for PowerHA extends and enhances IBM® PowerHA® SystemMirror® for i with protection for data and applications in SYSBAS, expanded HA/DR configurations and real-time access to business data.
IBM PowerHA for i does not replicate SYSBAS data, meaning there’s gaps in your protection. Assure QuickEDD for PowerHA covers these gaps protection by replicating SYSBAS data, ensuring that all data and applications are fully protected from downtime and loss.
When Assure QuickEDD for PowerHA is paired with Assure QuickEDD HA, they increase HA/DR protection by replicating data in both IASPs and SYSBAS to additional local or remote recovery servers. They can also feed real-time data to non-HA servers for data warehousing, reporting, queries, testing and more.
Assure QuickEDD Anonymizer is an add-on to Assure QuickEDD HA that permanently replaces sensitive IBM i data with substitute values, protecting data privacy and helping you achieve compliance with GDPR and other regulations.
Assure QuickEDD Anonymizer gives you a range of anonymization techniques, including substitution, and can be performed in real time or on a scheduled basis.
Personal data is replaced with unrelated values while retaining the same format, length and type. The data remains perfectly acceptable for testing, training, statistical analysis, and retains its original structure and form. Anonymization is done before the data is transmitted to other IBM i systems so that the actual data never leaves the secured production server.