Standards-based Security |
Encrypted data transfer |  |  |
Encrypted data storage on server (AES-256 bit) |  |  |
Cryptographic data integrity protection (HMAC-SHA-256 bit) |  |  |
Secure, unique 2-party pass phrase recovery process (RSA-3072 bit) |  |  |
Pass phrase privacy |  |  |
Pass phrase strength wizard |  |  |
Print / export pass phrase during setup |  |  |
Software manipulation safeguards |  |  |
Proven Backup Engine |
Block level incremental backups |  |  |
Open and locked file support | 1 |  |
Advanced data compression |  |  |
Support for files larger than 4 GB |  |  |
Initial backup of large data sets to USB disk |  |  |
Network drive support |  |  |
Map network drives before a backup begins |  |  |
Automatic removal of excluded data previously backed up |  |  |
Local Backups |
Backups to locally attached storage |  |  |
Backups to network attached storage |  |  |
Centralized local backups |  |  |
Near-zero additional configuration |  |  |
Optionally disable encryption for local backups |  |  |
Versions stored in local backups | |  |
Resilient Network Communication |
Reconnect and resume after connection failures |  |  |
Congestion aware flow control of backup bandwidth |  |  |
Bandwidth throttling |  |  |
Uncapped backup and restore speeds |  |  |
Pause and resume backup after standby / hibernation |  |  |
Reliable Scheduling |
Automated, unattended, scheduled backups |  |  |
Flexible scheduling options, including multiple backups throughout the day |  |  |
Ability to wake computer to perform backup |  |  |
Automatic initiation of a backup after detection of a missed backup |  |  |
Attentive Notification and Monitoring System |
Email alerts at start of backup and end of successful backup |  |  |
Email alerts at the end of a backup with warnings or errors |  |  |
Email alerts when no backup has completed recently |  |  |
Email alerts when disk usage changes by more than a given amount |  |  |
Email alerts when disk usage is above a given amount |  |  |
Single screen display of backup status, backup history, and disk usage |  |  |
Disk usage explorer tool |  |  |
Detailed audit logs |  |  |
Advanced log viewer |  |  |
Powerful Backup Policies |
Visual policy editor |  |  |
Visualization of exactly which files are included for backup |  |  |
Search based backup |  |  |
Advanced policy engine |  |  |
Smart default policies |  |  |
Robust Versioning System |
Unlimited historical versioning | |  |
Customizable preservation of deleted files | |  |
Powerful version control settings | |  |
Customize version settings by folder or file | |  |
Versions stored using reverse deltas | |  |
Broad Application Support2 |
Hot backup of Microsoft Outlook | 1 |  |
Hot backup of Exchange Server 2003 | |  |
Verification of integrity of Exchange database before backup | |  |
Hot backup of SQL Server | |  |
Hot backup of Oracle | |  |
Hot backup of MySQL | |  |
Custom scripts executing before/after the volume snapshot | |  |
Custom scripts executing before/after the scheduled backup |  |  |
Fast and Easy Restore Process |
Web-based access to data 24/7 |  |  |
Wizard-driven restore of one, many, or all files |  |  |
Restore data at any historical point just by specifying the date and time | |  |
Modern Customer Web Portal |
Management and creation of sub-accounts for additional computers |  |  |
Reporting and graphing features |  |  |
Easy to Use Software |
Fast initial setup |  |  |
Clutter free, intuitive user interface |  |  |
Wizard driven processes |  |  |
Auto-diagnostics when users don't know what to do |  |  |
Compatible with remote desktop and Citrix |  |  |
Automatic software updates |  |  |
Support for 98 / Me / 2000 / XP / 2003 / Vista |  |  |
Enterprise-grade Server Infrastructure |
99.999% reliability for all core systems |  |  |
Tier-1, multihomed, route-optimized server Internet connections |  |  |
Redundant power feeds, on-site generators, and UPS systems |  |  |
Redundant Liebert cooling systems |  |  |
FM200 fire suppression with VESDA early smoke detection |  |  |
Multilevel security including biometrics, surveillance, and 24~7 guards |  |  |
24~7 monitoring of all services for fast detection and repair |  |  |