High Availability Solutions – Critical Infrastructures Secure & Constantly Operational

Ensure high availability with centron’s multi-zone replication feature.

No downtime, no compromises – your business stays online. Ensure that your business-critical infrastructures are always running. Use centron for automatic data replication across geographic boundaries – and across multiple clouds – to ensure that your business-critical applications continue running consistently under almost any circumstances.

Improve the Availability of Your Infrastructure with the centron High Availability Feature

Multi-Zone Replication – High Availability for Business-Critical Applications

The only failover solution you need. Protection against ransomware and other malware.
Ensure your managed server is 100% safeguarded against failures and unwanted downtime!

Keep Mission-Critical Applications Always Operational

Whether on-site or remote, automatically replicate data over a Metropolitan Area Network to ensure that your business-critical applications continue running under almost any circumstances.

Allocated Resources, Secure Encryption

Security was a top priority in the development of centron. Your data is stored on dedicated hardware and protected by encryption both in transit and at rest. Since you manage your own keys, only you have control over access to your data.

More for Less Money

centron offers all the power of enterprise storage without the complexity. Free up resources for strategic initiatives with a fully managed model that only charges for what you use, reducing your costs and administrative overhead.

Pay-As-You-Go Model

No high upfront costs. No commitments required. No more storage upgrades, replacements, or migrations. Use centron for an hour, a month, a year, or forever, and receive the same cost-effective service with a high level of service quality.

cProtect, Your Defense Against Ransomware

The good news: even the most sophisticated ransomware and other malware can be effectively countered, even if they have already infiltrated your corporate IT. The solution is called cProtect. cProtect is a powerful yet affordable failover solution that blocks ransomware. With a finely granular backup system, you can easily rewind time and restore the system to its pre-attack state. You and your employees can continue working as if nothing happened. Without such a solution, successful ransomware attacks can lead to enormous financial losses and prolonged downtime.

For Those Who Want to Be on the Safe Side, There Is

HA Feature

  • Failover protection with Microsoft Storage Spaces
  • Highly available storage volumes across multiple cloud nodes
  • Real-time mirroring of all data for maximum availability
  • Extremely reliable protection against hardware failures
  • Can also be combined with cProtect

The Next Level of Resilience

cProtect

  • Failover through VM replication
  • Replication to a secondary environment
  • 15-minute time delay
  • Retention of 15 data states
  • Protects against software irregularities by utilizing different time states of virtual instances

Guaranteed Reliability at a Low Price

centron cProtect Features

Take advantage of the benefits of our internal failover service now.

Fast Replacement

Thanks to Hyper-V technology, the replacement server responds within a heartbeat and takes over the work of the failed server.

Completely Secure

centron’s data center, based on Tier 3 standards, offers AEC-4 standard, is ISO 27001 certified, and exceeds German data protection regulations.

Cost-Effective

More protection is not possible: starting at just €39 per month, you get an absolutely reliable failover protection for your managed server.

15+1 Fuse

The failover server immediately takes over the services of the failed system. Additionally, you can choose from 15 backup levels.

cProtect Private

Stay within your own ecosystem: easily mirror your systems across two dedicated centron managed servers.

Protection Against Ransomware

Optimal protection against ransomware and cryptotrojans: simply roll your server back to a state (up to 24 hours) prior to the attack.

cProtect

Guaranteed Failover Security

With cProtect, we offer you a simple, cost-effective, and reliable failover solution, as well as protection against ransomware and other malware. Secure your managed server 100% against failures and unwanted downtime!

How cProtect Works

With cProtect, we regularly query the operational status of the live server via a control signal. If any issues arise, the backup system takes over all tasks within seconds. In the event of a ransomware or other malware attack, our technicians can roll back time and restore the system to a state prior to the attack.

No Additional Investments Required

No additional hardware purchases or software licenses are needed to protect your systems and services with cProtect. Simply continue working with your familiar application structures. Use cProtect in combination with a virtual or dedicated centron managed server. Based on Hyper-V, our technicians create an image of your system, which is synchronized and updated every fifteen minutes while in operation.

100% Protection, 0% Additional Investment Costs

System states from up to 24 hours in the past can be restored, providing optimal protection against ransomware, cryptotrojans, and other malware. If the original system crashes, the backup system is ready within seconds. This highly efficient disaster recovery process ensures absolutely reliable redundancy for your systems.

Frequently Asked Questions

How Does cProtect Work?

cProtect replicates the VMs in its own environment and creates a consistent backup of the VM every 15 minutes. A total of 15 + 1 statuses are generated, meaning the 16th status overwrites the first one. In the event of a failover, the replication VM is used, ensuring that the smooth operation of the application running on the server can be restored in the shortest possible time.

How Far Can I Roll Back with cProtect?

By default, cProtect creates a backup every 15 minutes, allowing you to roll back up to four hours. On request, up to 24 hours is also possible. This option is particularly effective against ransomware, cryptotrojans, and other malware.

What Are the Advantages of cProtect?

cBacks and Snapshots are both disk images of ccloud³ VMs. cBacks are automatically created hourly or daily and can be retained indefinitely. Snapshots are created manually and are kept as long as you wish, until you decide to delete them.

Does cProtect Protect Me from Cyberattacks?

cProtect is an effective way to reverse infections from ransomware, cryptotrojans, and other malware—simply roll back time. The prerequisite is that the infection is detected promptly. Therefore, regularly check your systems or use our monitoring service.

How Can I Better Protect Myself from Cyberattacks?

cProtect reaches its limits if the infection is not detected quickly enough. If you want to be on the safe side, we recommend our Managed Backup. Based on a predefined backup plan, we regularly create backups of your systems and retain them for up to four weeks. This provides the best protection against insidious infections that only become active after several days or weeks.

What Alternatives to cProtect Are Available?

We offer two alternatives to cProtect:

  • Managed Backup: With our powerful backup infrastructure, we create data backups based on a predefined backup plan.
  • Failover Cluster: Upon request, we can set up a dedicated or virtual failover cluster for you. This cluster is exclusively yours and offers the highest level of failover security currently available on the market.