Backup and Recovery

Your data is critical to you and the the demand for increasingly scalable, capable, and affordable backup and recovery solutions has never been greater

Here’s a list of the most commonly used backup and restore methods. The method or mix of methods you choose will depend on the factors such as:

  • Security

  • Data and applications

  • Locations and environments

  • Infrastructure stability

  • Entire physical computers, servers or virtual machines

Full Image

Full-image only backs up a complete copy the data you want to protect. To restore lost data, you replace it with the most-recent full-image. Full-image restores are fast, but full-image backups can be time-consuming and can’t be performed as frequently as other backups.


Incremental starts with a full-image backup then performs backups of changed data. After a set number of backups, another full-image is performed and the cycle starts again. To restore data, apply the most-recent full-image and then each subsequent incremental.


Differential backup backs up all data that has changed since the last full-image backup. To restore data, you first apply the most-recent full-image backup and then the most-recent differential backup. Backup time increases with each successive differential backup.


Bare-metal backup backs up an entire computer or server—applications, data, operating system, etc.—in a way that allows it to be restored to bare metal hardware (hardware without a previously installed operating system or preinstalled software).

Some of the features we offer:


Backup unlimited PCs, Macs, iPhones, iPads and Android devices into a single account.

Also, data from external hard drives can also be backed up.


Snapshots provide historical view of data for recovery and protect against ransomware; store up to 30 previous versions of all files.


Perform sector-level backup or file-level backup to secure your entire computer, and restore the same to its initial state in the event of a disaster.


Files and folders will be synced in real time across all devices. Sync storage does not impact your backup storage, and matches your limits.


Web-based console helps manage data backups, restores, application settings and more, on remote computers.


Transfer and store files with 256-bit AES encryption using a user-defined key that is not stored anywhere on the servers.