What does the name Teneros mean?
In Latin, it is derived from Tenere and Teneo meaning to hold, to
keep, to preserve, to maintain. In our customers' businesses it
translates to "Always-On, Available and Accessible Mission
Critical Applications".
Which clients are supported by the ACA?
Outlook 2003, Outlook 2002/XP, Outlook 2000 and Outlook Web Access
are supported.
Which versions of Microsoft Exchange does
the ACA support?
Exchange 2003 is supported (all service packs). Upcoming releases
will support Exchange 2000.
Which versions of Active Directory does
the ACA support?
Active Directory running on Windows 2003 (all service packs) and
Windows 2000 SP4 is supported.
Does the ACA support network link aggregation
standards such as 802.3AD?
Yes, the ACA has full support for network link aggregation via 802.3AD.
Does the ACA protect from all forms of
Exchange downtime?
Yes, the ACA provides protection from all forms of Exchange planned
and unplanned downtime including power failure, disconnection from
network, operating system failure, Exchange application failure,
partial failures of Exchange services or components and regular
planned maintenance related downtime.
Can the ACA protect an Exchange front
end server?
Yes, the first release of the ACA only protects the Exchange backend
server. Upcoming releases of the appliance will include support
for protecting the Exchange front end server.
Can the setup of the Teneros ACA be completed
remotely?
Yes, via the web interface.
Does the ACA install any software on the
Exchange server?
No, the ACA doesn’t install any software on the Exchange server.
Does the ACA modify any setting or configuration
on the Exchange server?
No, the ACA doesn’t require any modification of the Exchange
server.
What redundancy is built into the ACA?
The ACA has multiple independent hardware and software control systems
to monitor and self-heal in case of failure. The ACA also has multiple
CPUs and hot swappable power supplies and hard disks. Hardware RAID
with redundant controllers are built into the appliance to provide
additional resiliency.
What type of replication technology is
used by the ACA?
The ACA uses Teneros patent pending replication technology, Transactional
Integrity Validation, that prevents data corruption being replicated
from the Exchange server to the ACA.
What is the process for repairing the
ACA in case of hardware failures?
The two most common causes of hardware failure, power supplies and
hard disks, are redundant and hot swappable in the ACA and can be
easily replaced.
How does the ACA secure against virus
attacks and other intrusion attempts?
The ACA has built-in virus protection based on the award winning
Sophos anti-virus technology. The ACA architecture also provides
for sophisticated anti-intrusion measures against day-zero worm
and virus attacks, network-level attack, identity spoofing, and
Trojans.
How does the ACA prevent accidental or
malicious attempts at accessing the ACA and executing harmful actions?
The ACA is immune to both accidental and deliberate attempts to
access it. The ACA is a "locked down," securely-isolated
appliance that is not open to any standard administrative or access
methods.
Does the ACA require to be backed up?
No, the ACA doesn’t require periodic backups.
Can users continue to access the Exchange
server during installation?
Yes, users have un-interrupted access to the Exchange server while
installation is in progress.
How long does it take for failover to
complete?
The failover process is instantaneous and non-disruptive to end-users,
thanks to the Teneros ACA Instant-On technology. Full services are
available within seconds ensuring continuous email operation.
Do end users experience downtime during
failover?
No, the end users experience no disruption of service during a failover.
After failover can users access their
old email data?
Yes, after failover end users have access to their complete mailbox
data exactly as it existed on the Exchange server at the moment
of failure.
Do the existing user accounts and passwords
continue to work during failover?
Yes, all existing user accounts and passwords continue to work seamlessly
after failover.
Do end users experience downtime during
failback?
No, the end users experience no downtime during failback.
After failback can users access email
data sent and received during failover?
Yes, the end users can see their complete mailbox after failback,
including the messages that were sent or received during failover.
Can the administrator install or modify
software on the ACA?
The ACA is a locked down appliance and doesn’t require maintenance
by the IT administrator.
^top
|