Watch Animated Demonstration
LiveVault Server Backup from Iron Mountain removes the recovery
failures and burden of tape backup through a fully automated
solution that provides continuous, 100% reliable disk-based
The LiveVault service automates and integrates the entire data
protection process by combining continuous, disk-based backups with
automatic offsite storage, archiving with user-defined retention, and
rapid, reliable recovery, removing the complexity, burden and
failures of tape backup.
LiveVault Server Backup customers have enjoyed a 99.999% restore
success rate for protected servers.
Reliable, Tape-Free Backup and Recovery
LiveVault Server Backup is the first disk-based online backup and
recovery service to:
Automate and integrate the entire data protection workflow
Provide reliable recovery of your data
Combine an optional onsite disk backup appliance with automated
offsite data storage and archiving
Automated, Integrated, Complete Data Protection
LiveVault Server Backup fully automates and integrates the entire data
protection process. Now, with one integrated solution, you can backup
your data, automatically move it offsite to a secure Iron Mountain
facility, archive your data with long-term retention that you define,
and restore your data rapidly and completely.
Disk-Based Speed and Guaranteed Reliability
LiveVault Server Backup completely eliminates tape from the data
protection equation, completely eliminating the risk of data loss.
With LiveVault Server Backup your data is backed up to a secure,
remote Iron Mountain facility where your data is always available for
immediate online recovery. For even faster recovery, LiveVault also
offers LiveVault TurboRestore, an optional on-site disk appliance for
faster, reliable recoveries.
Fully Automated Solution
LiveVault Server Backup is fully automated, to help you reduce the
labor and headaches associated with tape backup. Your backups are
performed automatically and continuously, and moved to a secure remote
Iron Mountain data center. Data is protected as it is created, using
AES encryption, VPN tunneling and digital certificates.