Qumulo packages disaster recovery into file management tool
Snapshot system available in on-premises and cloud flavors


Enterprise data management company Qumulo has launched a business continuity feature to help protect against ransomware threats.
The feature, Qumulo Recover Q, stores backup data on customers' premises but also replicates and snapshots files in the cloud.
The on-premises deployment is included in the company's Qumulo Server Q product, a file management system running on bare-metal Linux systems. It runs on the primary Server Q cluster and replicates to a remote site. It can also replicate from the remote cluster to others.
The cloud option offers disaster recovery as a service (DRaaS) capability, allowing cloud-based fail-overs. It ships as part of Qumulo Cloud Q, a cloud-based data management system that runs on Amazon Web Services (AWS), Azure, or GoogleCloud.
Qumulo Recover Cloud replicates files from Server Q to a Cloud Q cluster. It can also replicate to Server Q clusters running at the user's facilities or in alternate cloud providers' infrastructures.
The company highlights reduced capital and operating expenditure as two key product benefits. Cloud operation eliminates the need for dedicated backup data centers, the company points out. It also enables customers to cut operating expenses by using application programming interfaces (APIs) to instantiate Cloud Q as a hot site only when needed for fail-over purposes.
RELATED RESOURCE
Evaluating S/4HANA and RISE as part of your digital transformation journey
How to develop a business case for SAP S/4 HANA and RISE
Recover Q Cloud runs on AWS and Google Cloud as self-managed infrastructure and on Azure as a fully managed service.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Qumulo's data management products store files in their native formats, enabling its products to build workflows around the files on-premises and in cloud environments. It focuses on its ability to store and process large volumes of structured and unstructured files, enabling customers to manipulate them via its API.
Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing.
Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you
By ITPro
-
The business value of Zscaler Data Protection
Whitepaper Understand how this tool minimizes the risks related to data loss and other security events
By ITPro
-
BCDR buyer's guide for MSPs
Whitepaper How to choose a business continuity and disaster recovery solution
By ITPro
-
Three essential requirements for flawless data protection
Whitepaper Want a better CASB and stronger DLP? You have to start with the right foundation
By ITPro
-
Anticipate, prevent, and minimize the impact of business disruptions
Whitepaper Nine best practices for building operational resilience
By ITPro
-
Business value of ServiceNow security operations
Whitepaper Experience transformational gains from automating workflows and data-sharing among IT, security, and risk teams to rapidly remediate threats
By ITPro
-
Top ten ways to anticipate, eliminate, and defeat cyber threats like a boss
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
By ITPro
-
Morgan Advanced Materials still unable to restore systems after January cyber attack
News Billion-pound manufacturing firm’s sites are still running processes manually nearly five months after its suspected ransomware attack
By Connor Jones