Standards-based Security |
Encrypted data transfer | | |
Encrypted data storage on server (AES-256 bit) | | |
Cryptographic data integrity protection (HMAC-SHA-256 bit) | | |
Secure, unique 2-party pass phrase recovery process (RSA-3072 bit) | | |
Pass phrase privacy | | |
Pass phrase strength wizard | | |
Print / export pass phrase during setup | | |
Software manipulation safeguards | | |
Proven Backup Engine |
Block level incremental backups | | |
Open and locked file support | 1 | |
Advanced data compression | | |
Support for files larger than 4 GB | | |
Initial backup of large data sets to USB disk | | |
Network drive support | | |
Map network drives before a backup begins | | |
Automatic removal of excluded data previously backed up | | |
Local Backups |
Backups to locally attached storage | | |
Backups to network attached storage | | |
Centralized local backups | | |
Near-zero additional configuration | | |
Optionally disable encryption for local backups | | |
Versions stored in local backups | | |
Resilient Network Communication |
Reconnect and resume after connection failures | | |
Congestion aware flow control of backup bandwidth | | |
Bandwidth throttling | | |
Uncapped backup and restore speeds | | |
Pause and resume backup after standby / hibernation | | |
Reliable Scheduling |
Automated, unattended, scheduled backups | | |
Flexible scheduling options, including multiple backups throughout the day | | |
Ability to wake computer to perform backup | | |
Automatic initiation of a backup after detection of a missed backup | | |
Attentive Notification and Monitoring System |
Email alerts at start of backup and end of successful backup | | |
Email alerts at the end of a backup with warnings or errors | | |
Email alerts when no backup has completed recently | | |
Email alerts when disk usage changes by more than a given amount | | |
Email alerts when disk usage is above a given amount | | |
Single screen display of backup status, backup history, and disk usage | | |
Disk usage explorer tool | | |
Detailed audit logs | | |
Advanced log viewer | | |
Powerful Backup Policies |
Visual policy editor | | |
Visualization of exactly which files are included for backup | | |
Search based backup | | |
Advanced policy engine | | |
Smart default policies | | |
Robust Versioning System |
Unlimited historical versioning | | |
Customizable preservation of deleted files | | |
Powerful version control settings | | |
Customize version settings by folder or file | | |
Versions stored using reverse deltas | | |
Broad Application Support2 |
Hot backup of Microsoft Outlook | 1 | |
Hot backup of Exchange Server 2003 | | |
Verification of integrity of Exchange database before backup | | |
Hot backup of SQL Server | | |
Hot backup of Oracle | | |
Hot backup of MySQL | | |
Custom scripts executing before/after the volume snapshot | | |
Custom scripts executing before/after the scheduled backup | | |
Fast and Easy Restore Process |
Web-based access to data 24/7 | | |
Wizard-driven restore of one, many, or all files | | |
Restore data at any historical point just by specifying the date and time | | |
Modern Customer Web Portal |
Management and creation of sub-accounts for additional computers | | |
Reporting and graphing features | | |
Easy to Use Software |
Fast initial setup | | |
Clutter free, intuitive user interface | | |
Wizard driven processes | | |
Auto-diagnostics when users don't know what to do | | |
Compatible with remote desktop and Citrix | | |
Automatic software updates | | |
Support for 98 / Me / 2000 / XP / 2003 / Vista | | |
Enterprise-grade Server Infrastructure |
99.999% reliability for all core systems | | |
Tier-1, multihomed, route-optimized server Internet connections | | |
Redundant power feeds, on-site generators, and UPS systems | | |
Redundant Liebert cooling systems | | |
FM200 fire suppression with VESDA early smoke detection | | |
Multilevel security including biometrics, surveillance, and 24~7 guards | | |
24~7 monitoring of all services for fast detection and repair | | |