Additional Features with SureSync Standard
Group Folders allow the user to organise Jobs, Schedules and Real-Time Monitors into individually named folders for simplified management of replication jobs and management of group security.
The new Preview displays all actions in a tree structure which clearly displays all root paths and the actions taken in a single view without the need to toggle between paths.
Copying NTFS Security within Windows
Within Windows, users can choose to copy file permissions, auditing information, and ownership. You can also configure SureSync to preserve security objects on replaced files, copy folder security objects to existing folders, and force SureSync to copy file security objects even if the file is not copied. These features will help you maintain and update security of files and folders on your network.
Open File Support
Open file options are available for Windows. SureSync is able to copy files from open source files. In addition, SureSync administrators have the option to disconnect users from an open file on destinations and then allow SureSync to complete replication. Users running SureSync or Communications Agents on Supported Operating Systems can utilise Advanced Open File Support for Open Locked / Open Exclusive file types. SureSync is able to take advantage of Windows Volume Shadow Services (VSS) technology to replicate these files to a backup machine.
Job Progress / Status
SureSync’s SyncStatus feature allows you to view status of all of your SureSync machines enterprise wide without the need to have access to the SureSync databases. This makes management of remote replication tasks simple and gives a great view of replication progress across your entire organisation.
Alerts & Reporting
SureSync offers a wide array of alerts and reporting tools that will keep you in touch with your replication tasks. With SureSync’s variety of reporting options, administrators can configure the SureSync Log to report on 7 different levels, from application failures to job summaries and errors. The SureSync Log can be viewed within a SureSync interface and can be exported into CSV or TXT formats. SureSync also offers the option to specify the Windows Event Log recording level. SureSync can also be configured to send alert messages via email using SMTP support. Alerts can be configured to report on 5 levels; alerting those who need to know about job completions, errors, application failures, warnings, etc.
Programs or batch files can be configured to run before and after scheduled and real-time jobs. In addition, administrators have the option of choosing the level of errors allowed in a scheduled or real-time job and still have the script run.
SureSync uses native operating system APIs for scanning directories and copying files for optimum performance. It adapts block sizes automatically to optimise performance based on the speed and load on your network and server. SureSync uses fully overlapped operations and writes simultaneously to all its destinations.
You can control the processor priority used by SureSync with options on a Schedule and Monitor intervals.This allows you a fine level of control over the CPU impact of your replication and synchronisation tasks.
Network Load Throttling
To prevent overloading your network, you can set the network load values in SureSync. SureSync accepts a simple parameter to indicate the maximum percentage of network bandwidth that SureSync should utilise, minimising the effect of SureSync’s file copying on other network traffic.
Remote Object Technology
SureSync uses remote object technology to allow jobs to be started and monitored from machines remote from the machines running the job.
SureSync employs extensive error recovery routines. When a network or file system error occurs, SureSync retries operations at the block, file, and job level. You can set retry parameters on Jobs, Schedules, and Monitors. Since temporary files are used, transmission failures will never destroy older versions of files when an error occurs.
SureSync automatically performs CRC checks on each file copied to further ensure data integrity. CRC checks provide an extra layer of protection to ensure destination files are intact.