top of page

Backup and Recovery

Your data is critical to you and the the demand for increasingly scalable, capable, and affordable backup and recovery solutions has never been greater

Here’s a list of the most commonly used backup and restore methods. The method or mix of methods you choose will depend on the factors such as:

  • Security

  • Data and applications

  • Locations and environments

  • Infrastructure stability

  • Entire physical computers, servers or virtual machines

Full Image

Full-image only backs up a complete copy the data you want to protect. To restore lost data, you replace it with the most-recent full-image. Full-image restores are fast, but full-image backups can be time-consuming and can’t be performed as frequently as other backups.


Incremental starts with a full-image backup then performs backups of changed data. After a set number of backups, another full-image is performed and the cycle starts again. To restore data, apply the most-recent full-image and then each subsequent incremental.


Differential backup backs up all data that has changed since the last full-image backup. To restore data, you first apply the most-recent full-image backup and then the most-recent differential backup. Backup time increases with each successive differential backup.


Bare-metal backup backs up an entire computer or server—applications, data, operating system, etc.—in a way that allows it to be restored to bare metal hardware (hardware without a previously installed operating system or preinstalled software).

Some of the features we offer:


Backup unlimited PCs, Macs, iPhones, iPads and Android devices into a single account.

Also, data from external hard drives can also be backed up.


Snapshots provide historical view of data for recovery and protect against ransomware; store up to 30 previous versions of all files.


Perform sector-level backup or file-level backup to secure your entire computer, and restore the same to its initial state in the event of a disaster.


Files and folders will be synced in real time across all devices. Sync storage does not impact your backup storage, and matches your limits.


Web-based console helps manage data backups, restores, application settings and more, on remote computers.


Transfer and store files with 256-bit AES encryption using a user-defined key that is not stored anywhere on the servers.

bottom of page