{"id":2665,"date":"2020-05-20T12:39:51","date_gmt":"2020-05-20T10:39:51","guid":{"rendered":"https:\/\/blog.gdsys.de\/en\/?p=2665"},"modified":"2020-07-28T14:04:18","modified_gmt":"2020-07-28T12:04:18","slug":"redundancy-concepts-from-gd-an-overview","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/","title":{"rendered":"Redundancy concepts from G&#038;D: An overview"},"content":{"rendered":"<p>KVM systems are often the backbone of the control room infrastructures. They are indispensable helpers for flexible access to and operation of computer systems. On top of that, they also optimize processes and working conditions. Beyond this, system security is also an essential aspect \u2013 especially when it comes to critical control tasks. A lack of security can affect both the KVM system itself and the computer systems. To protect such critical systems, G&amp;D offers various redundancy concepts.<\/p>\n<p>From simple setups with extender lines to complex concepts for fully redundant infrastructures with automatic switching to back-up systems or redundant control rooms: The possibilities for designing redundant structures using KVM systems and thus increasing application security are endless.<\/p>\n<p>Depending on the complexity and requirements of individual applications, you can use both simple and extremely comprehensive redundancies to back up either only the KVM system, the computer side, the console side or the entire application.<\/p>\n<h2>Redundancy concepts for KVM systems and matrix installations<\/h2>\n<h3>Redundant computer combined with a KVM switch<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-2671 size-medium\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch-300x139.png\" alt=\"Redundancy concept 1: A KVM switch connected to two computers\" width=\"300\" height=\"139\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch-300x139.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch.png 370w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>This redundancy concept allows you to switch to a backup system in the event of a system failure. The two computers do not even have to be connected via network. With the help of a <a href=\"https:\/\/www.gdsys.de\/en\/kvm-solutions\/kvm-switches\" target=\"_blank\" rel=\"noopener noreferrer\">KVM switch<\/a>, you just switch to the redundant line if the primary system fails.<\/p>\n<h3>Redundant computers with remote access<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/2_Computer_Fernzugriff.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-2673 size-medium\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/2_Computer_Fernzugriff-300x143.png\" alt=\"Redundancy concept 2: Redundant computers that are remotely operated\" width=\"300\" height=\"143\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/2_Computer_Fernzugriff-300x143.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/2_Computer_Fernzugriff.png 405w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>In this variant, the primary and redundant computers are placed in a separate technical room. An extender line extends the computer signals that are made available again at the remote console using a KVM switch and CON modules.<\/p>\n<h3><strong>Redundancy concepts for matrix<\/strong> installations<\/h3>\n<p>From simple to extremely complex \u2013 you can choose between numerous redundancy concepts for your matrix installation. In the following, we will show you the most important ones:<\/p>\n<ul>\n<li><u><a href=\"#line-redundancy\">Line redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#switched-line-redundancy\">Switched line redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#automatic-line-redundancy\">Automatic line redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#matrix-redundancy\">Matrix redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#automatic-matrix-redundancy\">Automatic matrix redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#one-sided-application-redundancy\">One-sided application redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#two-sided-application-redundancy\">Two-sided application redundancy<\/a><\/u><\/li>\n<li><u><a href=\"#full-application-redundancy\">Full application redundancy<\/a><\/u><\/li>\n<\/ul>\n<h3 id=\"line-redundancy\">Line redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/3_Streckenredundanz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2675\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/3_Streckenredundanz-300x139.png\" alt=\"Redundancy concept 3: Line Redundancy\" width=\"300\" height=\"139\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/3_Streckenredundanz-300x139.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/3_Streckenredundanz-768x355.png 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/3_Streckenredundanz.png 891w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>With line redundancy, the workstation is designed redundantly. Two console modules (CONs) connect the workstation to the computer both via a KVM matrix and a direct line. Thanks to the CPU-UC computer module, you can operate your computer via the matrix system and, in the event of a failure, also via the direct connection. To access your computer as usual, you just have to change your workplace. When applying this concept, you can store the computer technology in a central server room.<\/p>\n<h3 id=\"switched-line-redundancy\">Switched line redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/5_GeschalteteStreckenredundanz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2679\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/5_GeschalteteStreckenredundanz-300x139.png\" alt=\"Redundancy concept 4: Switched line redundancy\" width=\"300\" height=\"139\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/5_GeschalteteStreckenredundanz-300x139.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/5_GeschalteteStreckenredundanz-768x356.png 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/5_GeschalteteStreckenredundanz.png 883w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Using a KVM switch and two connected <a href=\"https:\/\/www.gdsys.de\/en\/kvm-solutions\/digital-kvm-matrix-systems\/console-modules\/\" target=\"_blank\" rel=\"noopener noreferrer\">CON modules<\/a>, you can connect a remote workstation to a remote computer both via a matrix cluster and a redundant line connection. If the primary line fails, you can access the remote computer via KVM switch. A CPU-UC module lets you access the computer over both lines.<\/p>\n<h3 id=\"automatic-line-redundancy\">Automatic line redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/4_AutomatischeStreckenredundanz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2677\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/4_AutomatischeStreckenredundanz-300x138.png\" alt=\"Redundancy concept 5: Automatic line redundancy\" width=\"300\" height=\"138\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/4_AutomatischeStreckenredundanz-300x138.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/4_AutomatischeStreckenredundanz-768x354.png 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/4_AutomatischeStreckenredundanz.png 886w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>For automatic line redundancy, simply equip your workstation with a CON-2 module. This module picks up the keyboard, video and mouse signals at the corresponding interfaces of the workstation and forwards them to the remote computer either via matrix or direct extender line. If the primary line via matrix cluster fails, the system automatically switches to the redundant connection. This way, you will still be able to operate your computer remotely<\/p>\n<h3 id=\"matrix-redundancy\">Matrix redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/6_Matrixredundanz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2681\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/6_Matrixredundanz-300x139.png\" alt=\"Redundancy concept 6: Matrix redundancy\" width=\"300\" height=\"139\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/6_Matrixredundanz-300x139.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/6_Matrixredundanz-768x356.png 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/6_Matrixredundanz.png 881w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>With matrix redundancy, you can design both your workstation and your <a href=\"https:\/\/www.gdsys.de\/en\/kvm-solutions\/digital-kvm-matrix-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">matrix system<\/a> redundantly. You can access the remote computer via both matrix clusters using a CPU-UC module. If a matrix or a console fails, you can continue to access the remote computer as usual via both the redundant workstation and the redundant matrix.<\/p>\n<h3 id=\"automatic-matrix-redundancy\">Automatic matrix redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/7_AutomatischeMatrixredundanz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2683\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/7_AutomatischeMatrixredundanz-300x138.png\" alt=\"Redundancy concept 7: Automatic matrix redundancy\" width=\"300\" height=\"138\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/7_AutomatischeMatrixredundanz-300x138.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/7_AutomatischeMatrixredundanz-768x354.png 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/7_AutomatischeMatrixredundanz.png 875w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>With automatic matrix redundancy, you can use a CON-2 module to connect a workstation to both matrix clusters. In this way, the remote computer is also connected to the two matrices. In the event of a failure, you can access your computer via the first or the second matrix. If the primary matrix system fails, an automatic switchover including switchover synchronization ensures that you can continue your work seamlessly on the redundant system.<\/p>\n<h3 id=\"one-sided-application-redundancy\">One-sided application redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/9_EinseitigeApplikationsredundanz.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2687\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/9_EinseitigeApplikationsredundanz-300x139.jpg\" alt=\"Redundancy&lt; concept 8: One-sided application redundancy\" width=\"300\" height=\"139\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/9_EinseitigeApplikationsredundanz-300x139.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/9_EinseitigeApplikationsredundanz-768x357.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/9_EinseitigeApplikationsredundanz.jpg 779w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>The redundancy concepts we&#8217;ve shown so far are based on the assumption that a KVM device, for example a matrix, will fail. But what happens if a computer fails due to a software error? In this case, a computer-sided application redundancy offers a fitting solution, because it does not only include G&amp;D matrix systems, but also the computer equipment. Each computer is connected via both matrix clusters and therefore remains easily accessible. Even if the primary matrix or the primary computer should fail, you can still access the redundant computer via the redundant matrix line and continue your work immediately.<\/p>\n<h3 id=\"two-sided-application-redundancy\">Two-sided application redundancy<\/h3>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/8_BeidseitigeApplikationsredundanz.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-2685\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/8_BeidseitigeApplikationsredundanz-300x139.png\" alt=\"Redundancy concept 9: Two-sided application redundancy\" width=\"300\" height=\"139\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/8_BeidseitigeApplikationsredundanz-300x139.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/8_BeidseitigeApplikationsredundanz-768x357.png 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/8_BeidseitigeApplikationsredundanz.png 882w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Depending on the security level, some applications do not only require redundant computer equipment, but also a redundant operator console or even a completely redundant KVM system. With two-sided application redundancy, you therefore install the entire KVM infrastructure redundantly. Computers, matrices and operator stations access the respective backup system in case of failure. Through CPU-UC and CON-2 modules, every workstation has access to every computer. If a line or module fails, you are automatically switched to the back-up system.<\/p>\n<h3 id=\"full-application-redundancy\">Full application redundancy<\/h3>\n<p>But we can still top the last, already very complex redundancy concept. Highly sensitive, security-critical areas and control rooms go even one step further and require a completely redundant technical area <em>and<\/em> a redundant control room.<\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-2691\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN.jpg\" alt=\"Full application redundancy\" width=\"1137\" height=\"946\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN.jpg 1137w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN-300x250.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN-1024x852.jpg 1024w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN-768x639.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_8_EN-721x600.jpg 721w\" sizes=\"(max-width: 1137px) 100vw, 1137px\" \/><\/a><\/p>\n<p>But what if, in the application shown above, technical room B fails completely due to a fire or another emergency? In addition, a KVM matrix and another server fail in server room A, e. g. due to a software bug or a cyber attack. In the worst case, one of the two control rooms (in this case control room B) fails completely. And to make matters worse, one of the two console modules in control room A is on strike.<\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-2695\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN.jpg\" alt=\"\" width=\"1139\" height=\"944\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN.jpg 1139w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN-300x249.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN-1024x849.jpg 1024w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN-768x637.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/GD_Redundanz_9_EN-724x600.jpg 724w\" sizes=\"(max-width: 1139px) 100vw, 1139px\" \/><\/a><\/p>\n<p>Fully redundant KVM components, systems and premises allow you to finish your work even under such extreme circumstances. Although this scenario is quite unlikely, we have already installed it just like that.<\/p>\n<p><strong>Redundancy concepts for your individual KVM installation<\/strong><\/p>\n<p>Is your IT installation designed in a similar way as one of our examples? Or do you have a completely different variant? Regardless for which application you need a redundancy concept \u2013 our KVM experts will be happy to support you. Together with you they will create a concept fitting your installation. We look forward to your requests.<\/p>\n<div class=\"shariff\" data-title=\"Redundancy concepts from G&#038;D: An overview\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch-300x139.pnghttps:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch-300x139.png 300w, https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/1_Computer_KVMSwitch.png 370w\" data-url=\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>KVM systems are often the backbone of the control room infrastructures. They are indispensable helpers for flexible access to and operation of computer systems. On top of that, they also optimize processes and working conditions. Beyond this, system security is also an essential aspect \u2013 especially when it comes to critical control tasks. A lack &#8230;<\/p>\n","protected":false},"author":5,"featured_media":2697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[19,42],"tags":[485,481,483,24],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Redundancy concepts: Secure IT installations with the help of KVM<\/title>\n<meta name=\"description\" content=\"In mission critical environments, redundancy concepts are a must for IT installations: Application \u2713 Options \u2713 Variants \u2713 using KVM\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Redundancy concepts: Secure IT installations with the help of KVM\" \/>\n<meta property=\"og:description\" content=\"In mission critical environments, redundancy concepts are a must for IT installations: Application \u2713 Options \u2713 Variants \u2713 using KVM\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/pages\/Guntermann-Drunck-GmbH\/318396891518396\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-20T10:39:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-28T12:04:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/Beitragsbild_GD_Redundanzkonzepte_2020-05.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guntermann &amp; Drunck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/Beitragsbild_GD_Redundanzkonzepte_2020-05.jpg\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/Beitragsbild_GD_Redundanzkonzepte_2020-05.jpg\",\"width\":1920,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/\",\"name\":\"Redundancy concepts: Secure IT installations with the help of KVM\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#primaryimage\"},\"datePublished\":\"2020-05-20T10:39:51+00:00\",\"dateModified\":\"2020-07-28T12:04:18+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/8a534089ddd87159da419a5410c7a28a\"},\"description\":\"In mission critical environments, redundancy concepts are a must for IT installations: Application \u2713 Options \u2713 Variants \u2713 using KVM\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Redundancy concepts from G&#038;D: An overview\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/8a534089ddd87159da419a5410c7a28a\",\"name\":\"Guntermann &amp; Drunck\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c9f024537e13f1ee849097111f291670?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c9f024537e13f1ee849097111f291670?s=96&d=mm&r=g\",\"caption\":\"Guntermann &amp; Drunck\"},\"description\":\"Die Guntermann &amp; Drunck GmbH wurde im Jahre 1985 gegr\u00fcndet und hat sich zu einem f\u00fchrenden Hersteller von digitalen und analogen KVM-L\u00f6sungen etabliert. Guntermann &amp; Drunck was founded in 1985 and is now regarded as one of the foremost manufacturers of digital and analogue KVM solutions.\",\"sameAs\":[\"http:\/\/www.gdsys.de\",\"https:\/\/www.facebook.com\/pages\/Guntermann-Drunck-GmbH\/318396891518396\",\"https:\/\/www.linkedin.com\/company\/guntermann-&-drunck-gmbh\/\",\"https:\/\/twitter.com\/gdsys\"],\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/guntermanndrunckgmbh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Redundancy concepts: Secure IT installations with the help of KVM","description":"In mission critical environments, redundancy concepts are a must for IT installations: Application \u2713 Options \u2713 Variants \u2713 using KVM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/","og_locale":"en_US","og_type":"article","og_title":"Redundancy concepts: Secure IT installations with the help of KVM","og_description":"In mission critical environments, redundancy concepts are a must for IT installations: Application \u2713 Options \u2713 Variants \u2713 using KVM","og_url":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_author":"https:\/\/www.facebook.com\/pages\/Guntermann-Drunck-GmbH\/318396891518396","article_published_time":"2020-05-20T10:39:51+00:00","article_modified_time":"2020-07-28T12:04:18+00:00","og_image":[{"width":1920,"height":600,"url":"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/Beitragsbild_GD_Redundanzkonzepte_2020-05.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Guntermann &amp; Drunck","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/Beitragsbild_GD_Redundanzkonzepte_2020-05.jpg","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2020\/05\/Beitragsbild_GD_Redundanzkonzepte_2020-05.jpg","width":1920,"height":600},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/","name":"Redundancy concepts: Secure IT installations with the help of KVM","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#primaryimage"},"datePublished":"2020-05-20T10:39:51+00:00","dateModified":"2020-07-28T12:04:18+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/8a534089ddd87159da419a5410c7a28a"},"description":"In mission critical environments, redundancy concepts are a must for IT installations: Application \u2713 Options \u2713 Variants \u2713 using KVM","breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2020\/05\/20\/redundancy-concepts-from-gd-an-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Redundancy concepts from G&#038;D: An overview"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/8a534089ddd87159da419a5410c7a28a","name":"Guntermann &amp; Drunck","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/c9f024537e13f1ee849097111f291670?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c9f024537e13f1ee849097111f291670?s=96&d=mm&r=g","caption":"Guntermann &amp; Drunck"},"description":"Die Guntermann &amp; Drunck GmbH wurde im Jahre 1985 gegr\u00fcndet und hat sich zu einem f\u00fchrenden Hersteller von digitalen und analogen KVM-L\u00f6sungen etabliert. Guntermann &amp; Drunck was founded in 1985 and is now regarded as one of the foremost manufacturers of digital and analogue KVM solutions.","sameAs":["http:\/\/www.gdsys.de","https:\/\/www.facebook.com\/pages\/Guntermann-Drunck-GmbH\/318396891518396","https:\/\/www.linkedin.com\/company\/guntermann-&-drunck-gmbh\/","https:\/\/twitter.com\/gdsys"],"url":"https:\/\/blog.gdsys.de\/en\/author\/guntermanndrunckgmbh\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/2665"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=2665"}],"version-history":[{"count":8,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/2665\/revisions"}],"predecessor-version":[{"id":2895,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/2665\/revisions\/2895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/2697"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=2665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=2665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=2665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}