INGATE

From The Sip Trunking Experts

TMCNet:  Condusiv Technologies Announces the World Wide Release of New Undelete 10 Industry Leading Windows Enterprise File Protection with Instant Recovery

[September 03, 2012]

Condusiv Technologies Announces the World Wide Release of New Undelete 10 Industry Leading Windows Enterprise File Protection with Instant Recovery

BURBANK, Calif. --(Business Wire)--

Condusiv Technologies, formerly Diskeeper Corporation, the leader in high-performance software optimizing technology, people and businesses, today announced the worldwide release of Undelete 10, real time data protection and instant data recovery.

The Server, Professional and Client editions of Undelete let you see the contents of Recovery Bins on remote computers like file servers, allowing IT or users to recover their deleted files in seconds anywhere across the network with a single click of a button. It's no longer necessary to spend hours searching backup tapes or Windows Shadow copies when a user accidentally deletes a file from the server.

"We have been using Undelete for close to eight years now. Most all of our clients have it installed and we/they are very happy. I think Undelete is a great product - one that no Windows network should be without," said Rick Mark, Chief Architect - Practice Manager, Singer Lewak. "As I came from a Novell (News - Alert) background in the early 90's and was not seeing an embedded 'salvage' type ability to restore network-based file deletion, Undelete was a must. We had been using Diskeeper® for quite a while. When Undelete came out, it was an instant must-have to accompany the other products."

Undelete can also restore files previously purged from the Recycle Bin or the Undelete Recovery Bin - even if they were deleted before Undelete was installed.

When a file is deleted, it is automatically captured and stored in the Undelete Recovery Bin. Undelete 10 captures all the files the Windows Recycle Bin misses, such as those deleted from shared network folders, deleted from commonly used applications, deleted by the Windows command prompt, or replaced when newer versions of a file are saved. Also, if a file is modified several times between a backup or shadow copy, it will not be saved. With Undelete, these file versions will be saved and are recoverable.

"Data loss can be frustrating, and time wasting catastrophe for IT Directors and System Administrators," said Jerry Baldwin, CEO, Condusiv. "Identifying the business cost of continuing without the data, recreating the data or notifying customers of a compromise and the time loss associated with lost data is unacceptable in today's economic business environment. Undelete satisfies the need for the most advanced, easy to use reliable protection assuring enterprise productivity, and does so at a low price point. Enterprises really should standardize on Undelete across all lines of business.''


Undelete 10 features

  • New One-button Search for Recent Files, which allows the user to locate a file deleted within a 24-hour period or one week period with one click.
  • New Search Wizard, a single pane view that provides fast and easy way to find a lost file.
  • New Dynamic User Interface for ease of use, quality of experience.
  • Undelete 10 Server - Protects server files including those deleted by network clients from a centralized management console.
  • Undelete 10 Desktop Client - Allows connected laptops, workstations and VMs to recover their own files from remote Undelete 10 Server recovery bins.
  • Undelete 10 Professional - Protects locally stored files and allows files to be recovered from remote Undelete Server recovery bins.
  • Undelete 10 Home - Provides comprehensive protection of locally stored files.

Condusiv Undelete 10 "Set it and Forget It"® file recovery system runs on all Windows platforms, including those on VMware and Microsoft (News - Alert) Hyper-V environments.

Undelete 10 Server edition supports Windows Server 2008/2008 R2, Windows Server 2003, Windows XP, Windows Vista, and Windows 7.

Undelete 10 Client, Professional and Home Editions support Windows XP, Windows Vista, and Windows 7.

In compliance with corporate governance or governmental regulatory requirements for secure data deletion, Undelete provides an electronic data shedder: SecureDelete® 2.0. Using a bit pattern specified by the National Security Agency (News - Alert) (NSA) for the Department of Defense, SecureDelete not only deletes a file but overwrites the disk space the file previously occupied making it virtually impossible for anyone to access.

Availability: Immediately.

For more information see http://www.condusiv.com/products/undelete/.

Follow us on Twitter and Like Us on Facebook.

About Condusiv: Condusiv Technologies creates high-performance software that optimizes and maintains application performance and efficiency, extends equipment longevity to make technology, people and businesses more productive. From the moment Condusiv software is installed on physical or virtual disks, our technology ensures data performance is automatically optimized. Requiring zero overhead, our energy-efficient, "Set It and Forget It"® solutions are used by over 90% of the Fortune 1000 and almost three-quarters of The Forbes Global 100. Our customers include literally thousands of global enterprises, government agencies, independent software vendors (ISVs), original equipment manufacturers (OEMs) and home users worldwide. With over 30 years of cutting-edge product development, we lead the market in data storage innovation, delivering thought-leading technology that improves your business and user experience. Condusiv solutions help technology function at peak levels, increasing the productivity of people and business.


[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.