Never be down. Never lose data.

Archive Intelligence by ioFABRIC provides transparent failover of your VM cluster within 15 seconds to a second site or the cloud. This is the ultimate in disaster recovery.

Say goodbye to downtime


1 out of 3 businesses experienced a ransomware attack in the past year


Almost half of all businesses have suffered a failure that required an HA/DR solution to resume operations


75% of IT managers are not able to restore everything when moving data, despite having a backup solution 

Give Your Archive Intelligence

Malicious attacks, infrastructure failures, or even simple human error can compromise your data and systems. With Archive Intelligence, your data is protected by a multipronged approach to data security.


Archive Intelligence verifies your backups are clean, complete, and bootable.

AI encrypts your backups and makes them immutable, preventing ransomware from tampering. It also identifies threats by scanning your backups for ransomware.

Instant Restart icon

Instant Failover

AI preboots your backup images so your applications are ready to run. It verifies your images are clean, complete, and bootable, so you can be confident.

No downtime, no customer impact, and no financial impact.

What people are saying about Archive Intelligence

Delivered at 11:11 and setup by 11:19. That includes unpacking, reading the instructions, going to the basement, finding an available power socket and ethernet cable, going up to the second floor, and registering the device from my iPhone.


I can shut down my computer and not worry about doing a backup every evening.  I didn’t have too many expectations before it was installed but now I just enjoy the whole thing.  I would definitely recommend it to anybody.


How It Works

AI serves as an on-premise backup, replication, and archival target for your existing backup and file services. As either a virtual or physical appliance, the data-aware AI classifies files, scans for ransomware, replicates files offsite, and stands ready for failover.



Files classified as backup images are made immutable to guard against malicious activity.


Each snapshot is verified as bootable, scanned for ransomware, made available for instant failover, and replicated offsite.


 VMs instantly fail over to VMware or onto the Archive Intelligence hypervisor in the case that a production system fails or detects malicious activity.

Try the Intelligent Archive!

Book some time to log into our demo sandbox and see how simple it is to protect your data.

Try re-starting a VM to see it instantly run!

Confirm that the backup's been ransomware scanned and verified bootable

Take a look at the reports first-hand and see detailed information on the archive

See how easy it is to search backups and files (zip and tar) for specific keywords or information

The latest news

  • Six Biggest Data Backup Problems Facing Businesses Today
    by Lori Steuart on December 11, 2018 at 7:46 pm

    It’s the middle of the workday, and a call comes in from a distraught customer. He can’t log in to your service. He needs access to his data right now and can’t get to it. Before he can be helped, three more calls and a dozen emails come in from customers with the same problem. Your social media team is suddenly putting out fires on Twitter. All of your support staff are talking irate customers through the same problem, and new tickets are being opened at an alarming rate. […]

  • Municipal IT Security Is Top of Mind at MISA Infosec, but Few Are Prepared
    by Deborah Brooks Lamb on November 7, 2018 at 9:16 pm

    The rise in cyberattacks on local and municipal governments was the focus of the recent MISA Ontario Infosec conference held in October, and we at ioFABRIC learned a lot. Unfortunately, what we learned wasn’t all good. […]

  • Don't Let Your City Be Held for Ransom
    by Deborah Brooks Lamb on October 22, 2018 at 3:05 pm

    ZDNet has reported that 19 percent of all ransomware attacks are directed at government agencies, and it’s no surprise why. As we discussed previously, small IT teams and small budgets set up some difficult conditions for data protection. […]