Pricing plans
Plan | Features and capabilities | Pricing | |
---|---|---|---|
Error
Change theme
This feature is in early stage, some parts of the platform might not fully support different themes yet.
Plan | Features and capabilities | Pricing | |
---|---|---|---|
CopyAssure is Celerity’s advanced cyber recovery and data resilience solution for IBM Power Virtual Server (PowerVS) environments, supporting IBM i, AIX, and Linux.
Built for mission-critical workloads, CopyAssure delivers automated, verified recovery using continuously tested backup copies. Based on IBM’s Cyber Vault blueprint, it combines frequent data copies, immutable storage, cleanroom validation, and end-to-end orchestration—helping organisations recover with confidence from even the most disruptive cyberattacks and more.
CopyAssure can also be leveraged to spin up clean, digital twin system copies for testing, development, or even AI training—without risking the integrity of the core environment.
CopyAssure orchestrates scheduled snapshots, volume clones, and optional image export to IBM Cloud Object Storage (COS) to provide layered, resilient recovery points with immutability. These are continuously tested to demonstrate recoverability within defined RPO and RTO thresholds.
To extend assurance further, the service includes automated system validation through a proprietary virtual operator. This technology emulates real user interactions—such as 5250 terminal sessions for IBM i, and interactive workloads for AIX and Linux—to verify that systems are fully operational post-recovery.
CopyAssure leverages PowerVS volume clone technology to create logically air-gapped snapshots. This approach provides an additional layer of defence against ransomware and insider threats by ensuring backup copies are inaccessible from compromised systems.
CopyAssure supports image export to IBM Cloud Object Storage (COS) using write-once, read-many (WORM) storage, providing immutable backup copies protected against tampering, deletion, or ransomware encryption. This capability supports long-term data integrity and aligns with regulatory and audit-readiness requirements.
Aligned with IBM’s Cyber Vault methodology, CopyAssure provisions secure cleanroom environments to validate cloned backups prior to restoration. This process proves that a system is fully recoverable through controlled boot procedures, OS-level checks, and bespoke validation of user activity and application services.
The validation framework includes multiple stages:
This multi-layered approach ensures only clean, operational recovery points are promoted for restoration.
CopyAssure delivers end-to-end automation across backup validation and recovery orchestration. By removing manual steps, the service improves consistency, reduces human error, and accelerates recovery across complex environments—enabling repeatable, policy-driven execution at scale.
CopyAssure is aligned with the NIST Cybersecurity Framework, supporting the core functions of Identify, Protect, Detect, Respond, and Recover. This alignment helps organisations strengthen their cyber resilience strategy, meet regulatory expectations, and streamline audit readiness.
CopyAssure enables secure, verified recovery without interrupting production systems. All validation and testing occur in isolated cleanroom environments, ensuring non-disruptive assurance for high-availability workloads and regulated operations. This supports continuous business operations, even during threat response or audit preparation.
CopyAssure helps reduce both direct and hidden costs associated with cyber recovery—including unplanned downtime, manual recovery labour, extended investigation cycles, and potential ransomware-related losses. Automated processes and cleanroom validation reduce operational burden while accelerating time-to-recovery.
With immutable storage, automated cleanroom validation, and proven recovery workflows, CopyAssure gives organisations confidence that every restore point is secure, tested, and reliable. This assurance supports both operational resilience and regulatory compliance.
Orchestrate frequent, scheduled snapshots, volume clones, and optional image export.
Oversight of backup health, validation status, and system integrity across environments.
Continuously test system recoverability using boot validation, application checks, and data integrity tests.
CopyAssure is delivered as a tailored, end-to-end service—designed to meet the specific recovery, compliance, and operational requirements.
Start with core functionality and scale enhancements—such as extended automation.
The Celerity Service Desk provides a fast, efficient, and highly available single point of contact for all your contracted service needs. All incidents or service requests will be recorded via an electronic ticket and the Service Desk will attempt to resolve all tickets at first line. Any tickets that cannot be resolved at first line will be routed to the relevant 2nd or 3rd line team to progress your ticket.
service.desk@celerity-uk.com Copy 24 hours / 7 days a week 1 hour | |
24 hours / 7 days a week 1 hour | |
Support locations | Support locations refer to all of the countries in which product support teams are located.
|
You must wait 4 hours after you contact this product's support before you can begin the escalation process. support@celerity-uk.com Copy 1 hour |