Libelle BusinessShadow® automatically creates the standby-system. The sequences for switching to emergency mode as well as switching back to normal mode can be initiated automatically or at the push of a button. Our high availability and disaster recovery software - impressively fast and simple.
Our software protects against the consequences of both physical influences and logical errors and thus ensures a significantly higher overall availability of your system.
As a single-source solution, our high availability and disaster recovery software can be integrated into both SAP and other application systems. Even in complex and independent application environments, our proven solution consistently mirrors applications, databases, and file systems at the logical level, independent of distance.
After the initial copy, Libelle BusinessShadow® only mirrors the change logs of the production system, which first enter the dynamic time funnel. This means you can provide a functioning standby-system in just a few minutes.
How it works
The creation of the database mirror, the archive file shipping, and the time-delayed recovery are carried out automatically by Libelle BusinessShadow®. The production and standby-systems and all processes are also permanently monitored. In the event of an error, you are immediately alerted by a visual alarm. A comprehensive high availability and disaster recovery solution so you can concentrate on your regular tasks.
Step 1: Preparation
In this phase, Libelle BusinessShadow® automatically copies all data of the production system initially to the standby-system. We take this time to then enable high availability and disaster recovery quickly, safely, and easily with our patented time funnel. This is because only the changes to the production system in comparison to the initial copy are queried and entered into the time funnel by means of our archiver.
Step 2: Hedging
With our high availability and disaster recovery software and its unique time funnel, you have a time safeguard. Before new data is transferred to the standby-system, it is first held in the time funnel. You can determine the duration individually. In the event of errors on the production system, the data is not immediately transferred to the standby system, giving you the chance to activate this failover system at a desired time within minutes. Your backup operating system is available, and you can continue to work without interruption.
Step 3: Switch
When an error has occurred on the production system - by software, users, or batch jobs - this change log lands in the time funnel. You can now switch to the standby-system, manually or automatically. With Libelle BusinessShadow® you provide a system within a few minutes that has all current data up to shortly before the error occurred. Your company can now continue to work quickly and without issues on the standby-system.
Step 4: Troubleshooting
While your business operations continue as normal on the standby-system within a few minutes, your IT team has time to fix the error on the actual production system. Afterwards, you can automatically transfer the current and consistent data from the standby-system back to the production system, and your disaster recovery and availability concept starts again.
Supported database systems
- IBM DB2
- Microsoft SQL Server*
- SAP ASE
- SAP MaxDB
- SAP HANA
Supported operating systems
- Intel Itanium
- PowerPC Little Endian
- SPARC, ARM
- x86 and x64
* Support on Windows only
Frequently Asked Questions
What is the time funnel?
Isn't a pure hardware solution also sufficient?
Can Libelle BusinessShadow® also mirror worldwide?
Is your high availability and disaster recovery software also safe?
All data is transmitted using proprietary technologies based on the TCP/IP protocol, which ensure optimal performance and resource utilization. For performance and security reasons, no standard protocols are used. For the entire system-to-system communication, only one port number is used, which can be freely selected. This allows Libelle BusinessShadow® to be easily and securely integrated into an existing security concept. Compression and encryption of data packets according to proprietary algorithms additionally increase data throughput and data security.