Protect your data

Open Source Backup and Disaster Recovery Orchestration Platform for GNU/Linux workloads

Keep your Business Up

Backup or migrate cloud instances and save costs on extended vendor services.

Over 10 years protecting critical enterprise-grade production systems.

Migrate your systems easily to, or from any hardware or virtualization platform vendors.

The use of open standards promote interoperability and avoids vendor lock-in, offering an adaptable and future-proof solution, providing availability, control and ensuring ownership of your data.  Essential today with increasing cybersecurity threats.

What is DRLM?

The DRLM (Disaster Recovery Linux Manager) project is an open-source software designed to manage disaster recovery in Linux environments.

Its primary purpose is to help organizations automate and simplify the backup, recovery, and restoration of Linux systems in case of a failure or disaster. DRLM is particularly useful in managing multiple Linux systems, allowing administrators to efficiently create, schedule, and manage recovery operations.

Show more

Centralized Management: Simplify the process of creating and maintaining disaster recovery across multiple Linux servers.

Bare-metal Recovery: Restore your systems from scratch, including the operating system, configurations, and data, without needing any pre-installed software.

Integration with Relax-and-Recover (ReaR): DRLM and ReaR together povide the best disaster recovery framework for GNU/Linux systems.

Automated Backup and Restore: Reduce the risk of human error and ensure proper backups are taken with minimal intervention.

Network-based Recovery: Recover systems over the network, especially useful in environments where there are multiple machines to restore or physical access is limited.

Scalability: Handle small and large environments with many Linux systems, it is suitable for enterprises as well as smaller organizations.

Customizable: DRLM can be customized to fit specific organizational needs, allowing users to tweak the software to work with their specific disaster recovery processes.

In essence, DRLM is a powerful disaster recovery tool for Linux, providing a flexible and automated approach to ensure systems can be quickly restored after an incident. It simplifies the often complex process of managing disaster recovery across many machines, making it an important resource for organizations and their systems.

Feature highlights:

Backup & Disaster Recovery

Enterprise-grade solution relying on standard tools and protocols

Operating System

Restore your Operating System within minutes, starting from scratch, and bring it back to a functional point-in-time. Whether due to human errors or OS component upgrade failures, having a robust DR setup ensures minimal downtime and keeps your workloads operational.

Data

Protect various data types, from databases to files in home directories, without the need for additional agents, utilizing standard tools in a flexible manner. Ensure data integrity through encryption, compression, deduplication, incremental backups, and retention policies, mitigating the risk of data loss effectively.

Full DR

Integrate OS and data backups to orchestrate a fully automated Disaster Recovery platform. Whether recovering in-place, activating contingency sites, conducting full data center migrations, or transitioning to cloud instances, DRLM offers a flexible, powerful, and cost-effective solution.

Security

Become compliant with the European NIS2 Directive (Article 21 – 2c)

  • Encryption in Transit & at rest.
  • Anti Virus & Malware Protection
  • Data Access Control
  • Backup Immutability
  • Offsite Replication
  • Cloud Archiving
  • Use of Open Standards

Data management in DRLM (Disaster Recovery Linux Manager) is a multifaceted process that goes far beyond just creating backups. It involves implementing key features and best practices that guarantee data security, resilience, and recoverability. These practices become especially important in the face of today’s increasingly complex cybersecurity threat landscape, where primary data could be at risk from cyberattacks, disasters, or corruption.

Cybersecurity in Backup Systems

Securing backups against cyber threats is not just about preserving copies of data but ensuring that data remains inaccessible to unauthorized users, protected from malware or ransomware, and recoverable in case of attacks. DRLM’s encryption and access controls make it an effective solution for safeguarding sensitive backup data in line with these objectives.

Show more

By adhering to best practices like encryption, access control, and regular audits, DRLM ensures that your organization’s backups are protected, resilient, and recoverable in line with cybersecurity requirements, while also ensuring compliance with the NIS2 Directive.

According to the European NIS2 Directive, essential businesses are required to maintain high standards of cyber resilience. DRLM helps businesses meet these requirements by ensuring data availability, integrity, and confidentiality, which are all critical components of cybersecurity in backup systems.

Article 21 2c highlights the importance of effective disaster recovery mechanisms that protect against data loss and guarantee recovery capabilities. By enabling secure, reliable backups, DRLM addresses these criteria, helping businesses meet NIS2 compliance.

Ransomware Protection

Comprehensive Defense Against Evolving Threats
DRLM equips organizations with the tools needed to prevent ransomware attacks, mitigate their impact, and ensure rapid recovery. Secure your data and enhance your cybersecurity resilience with:

Automated and Incremental Backups

Show more

Frequent Backups: Automate backups to ensure critical data is always up to date for rapid recovery.

Incremental & Versioned Backups: Capture only changes since the last backup and maintain multiple versions to revert to a clean state if needed.

Cloud Storage Archiving

Show more

Secure Offsite Storage: Store backups in the cloud to protect against local threats, including ransomware.

Scalability: Cloud storage expands with your data needs and ensures backups are accessible from any location.

Incident Response Integration

Show more

Streamlined Response: Integrate with incident response plans, facilitating quick action if malware is detected in your backups.

Post-Incident Analysis: Provide insights to improve defenses by analyzing attack vectors.

Secure Backup Storage

Show more

Isolated Storage: Backups are stored in isolated environments to prevent ransomware access and encryption of backup data.

Encryption: Backup data is encrypted with strong ciphers, ensuring only authorized access.

Virus and Malware Scanning

Show more

Proactive Threat Detection: Scan backups for malicious content to avoid reinfecting systems during restoration.

Safe Recovery: Guarantees only clean data is restored, protecting against hidden malware threats.

Bare-Metal Recovery

Show more

Complete System Restoration: Restore entire systems, including OS and configurations, minimizing downtime and enabling quick recovery after attacks.

Real-Time Monitoring and Alerts

Show more

Integrated Monitoring: Detect backup errors and infections in real time, triggering alerts to administrators.

Detailed Reporting: Generate reports for compliance and audits, tracking scanning results and detected threats.

Recovery Plan Testing and Validation

Show more

Recovery Testing: Regularly test disaster recovery plans to identify gaps and improve response strategies.

Backup Integrity Checks: Ensure all backups are intact and ready for use during recovery operations.

With these powerful features DRLM ensures your organization is equipped to defend against ransomware, maintain data integrity, and recover quickly from any attack.

Platform Migration

A vendor-agnostic solution for all your system migration needs, allowing seamless transitions between different platforms and infrastructures.

Physical-to-Virtual

Effortlessly migrate workloads from bare-metal servers to virtual machines, facilitating greater flexibility and resource optimization.

Virtual-to-Virtual

Perform virtualization platform migrations seamlessly, avoiding complexities and vendor lock-in, while ensuring continuity of operations.

Physical-to-Physical

Renew physical servers without the need for OS reinstall, ensuring a fast, easy, and cost-effective migration process.

Virtual-to-Physical

Transition from virtual machines back to bare-metal servers swiftly, maintaining agility and adaptability in your infrastructure.

Adaptive Protection

Today, Hybrid Infrastructures require robust and flexible solutions that guarantee the adoption of continuous changes.

 

The use of Open Standards and Open Source software empowers organizations with a flexible toolkit to evolve alongside their infrastructure needs. By utilizing open technologies, businesses can achieve greater adaptability, security, and cost-efficiency as they undergo significant transformations, including:

 

Datacenter Migrations

Show more

Move data and applications between datacenters with minimal downtime and data loss. Open standards ensure compatibility across various platforms, reducing vendor lock-in.

Virtualization Platform Migrations

Show more

Transition between different virtualization technologies (such as from VMware to KVM). Open source tools and standards make these transitions smoother and more cost-effective by supporting a wide range of hypervisors.

Cloud Migrations

Show more

Move infrastructure or workloads to the cloud (public, private, or hybrid). Open-source solutions provide the freedom to choose without being tied to a single vendor.

 

We provide an Orchestration framework that can support almost any workload running on GNU/Linux systems, ensuring seamless and automated recovery processes.

 

Fully Automated Disaster Recovery

Show more

Automate your recovery procedures, ensuring quick recovery with minimal manual intervention.

Multi-Region Support

Show more

Enable Disaster Recovery across multiple regions or datacenters, enhancing resilience in the event of regional failures.

Point-In-Time Recovery

Show more

Restore systems to a specific point-in-time, ideal for recovering from data corruption or cyberattacks like ransomware.

Custom Backup/Restore Procedures

Show more

A flexible toolkit allows you to define and implement customized backup and restore procedures for any application data, ensuring comprehensive coverage of all critical workloads.

 

DRLM offers scalable solutions that align with evolving infrastructure needs, enabling seamless migrations and modernization without sacrificing security, reliability, or performance.

This comprehensive approach enables businesses to manage backups and disaster recovery efficiently while ensuring minimal downtime and data loss across all critical infrastructure components.

Our Professional Services can help you with the installation, management, consultancy and development.
More information.

Start your Backup & Disaster Recovery journey!

The Orchestration Platform for GNU/Linux workloads. 10+ years protecting critical enterprise-grade production systems.

FAQ

General doubts

What does Disaster Recovery mean?

Disaster recovery involves preparing systems and data to be quickly restored after events like cyberattacks, natural disasters, or power outages. Key elements include a structured Disaster Recovery Plan (DRP), regular data backups, and clear Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO). Additional measures such as data redundancy, failover systems, and regular testing ensure minimal downtime and data loss. The goal is to restore operations as swiftly as possible to minimize impact on the business.

What is Business Continuity?

Business continuity ensures critical operations can continue during and after disruptions like cyberattacks or natural disasters. It involves a business continuity plan (BCP) that outlines how to maintain or quickly restore key services, processes, and systems. Unlike disaster recovery, which focuses on IT systems, business continuity ensures all aspects of a business, such as staffing, communication, and supply chains, remain operational with minimal disruption. The goal is to reduce downtime and financial impact.

What is DRLM?

DRLM (Disaster Recovery Linux Manager) is an open-source tool designed to simplify and automate disaster recovery for Linux systems. It enables centralized management, bare-metal recovery, and automated backup processes, integrating seamlessly with Relax-and-Recover (ReaR). DRLM supports network-based recovery and scales to fit small or enterprise environments, ensuring quick and efficient restoration of systems after a disaster. Its customizable and flexible design makes it an essential resource for managing Linux system recovery.

Is DRLM suitable for both small businesses and large enterprises?

Yes, DRLM is suitable for both small businesses and large enterprises. It is scalable, offering solutions that can be tailored to meet the needs of organizations of any size. Small businesses can benefit from its simplicity and cost-effectiveness, while large enterprises can take advantage of its ability to handle complex, multi-system environments. Whether managing a handful of systems or a large infrastructure, DRLM can ensure reliable backup and disaster recovery capabilities.

Can DRLM be used with virtual environments or cloud systems?

Yes, DRLM can be used with virtual environments and cloud systems. It supports backing up and recovering both physical and virtual machines, including cloud-based infrastructure. By integrating with platforms like VMware, KVM, and cloud services (e.g., OCI), DRLM ensures comprehensive disaster recovery across diverse environments. This flexibility helps businesses manage their backup and recovery needs regardless of whether they are operating on-premises, in virtual environments, or in the cloud.

What are the hardware requirements for implementing DRLM?

The hardware requirements for implementing DRLM depend on the scale of your environment, a DRLM Appliance with sufficient storage capacity for backups, a network connection for data transfer, and processing power to handle recovery tasks is all you need to start.

DRLM supports both physical and virtualized environments, so the hardware can be tailored based on your organization's specific needs, whether on-premises or in the cloud. For detailed requirements, it's best to consult the DRLM documentation or contact their support team.

How does DRLM integrate with existing backup solutions?

DRLM is designed to work alongside existing backup solutions, allowing you to use the best tool for the job. It can manage backups and disaster recovery for GNU/Linux systems while archiving them to your current infrastructure, ensuring compatibility and seamless integration, providing flexibility while enhancing recovery speed and reliability. For specific integration details, it's best to refer to DRLM documentation or contact support.

What does DRLM do to prevent Ransomware?

DRLM protects against ransomware with automated backups, version control, and secure offsite storage options. It enables bare-metal recovery for fast restoration, isolates and encrypts backups to prevent tampering, and scans backups for malware to ensure clean restorations. Regular testing and monitoring tools help identify threats early, while integration with incident response ensures swift action. These features reinforce resilience and safeguard your critical data from evolving threats.

Why can DRLM help your company comply with the NIS2 Directive?

DRLM strengthens compliance with NIS2 by automating backups, supporting rapid recovery, and facilitating business continuity. It provides structured disaster recovery plans, bare-metal recovery, and regular testing to meet Article 21(2)(c) requirements. DRLM ensures audit-ready documentation, detailed incident logs, and centralized management, which simplify compliance and improve incident response. Additionally, training features help prepare staff for cybersecurity challenges. DRLM positions your business to meet regulatory demands while boosting overall resilience against evolving threats.

Can DRLM assist with data recovery from ransomware attacks?

Yes, DRLM can assist with data recovery from ransomware attacks by providing regular, automated backups that are isolated and protected from ransomware threats. DRLM’s features include bare-metal recovery, encrypted backup storage, and proactive malware scanning, which ensure clean recovery points and minimize the risk of reinfection. These tools allow businesses to restore systems quickly and effectively while reducing data loss and downtime after an attack.

What is the EU NIS2 directive and how does it affect my business?

The NIS2 Directive, effective October 17, 2024, strengthens cybersecurity for critical and essential sectors like healthcare, energy, and finance across the EU. It expands compliance requirements, including stricter security measures, mandatory incident reporting, supply chain security, and management accountability. Non-compliance risks penalties up to €10M or 2% of global revenue. Businesses must implement robust cybersecurity strategies, conduct risk assessments, and prepare for rapid incident response to meet the directive's demands.