
Backup and Recovery
Your data is critical to you and the the demand for increasingly scalable, capable, and affordable backup and recovery solutions has never been greater
Here’s a list of the most commonly used backup and restore methods. The method or mix of methods you choose will depend on the factors such as:
-
Security
-
Data and applications
-
Locations and environments
-
Infrastructure stability
-
Entire physical computers, servers or virtual machines
Full Image
Full-image only backs up a complete copy the data you want to protect. To restore lost data, you replace it with the most-recent full-image. Full-image restores are fast, but full-image backups can be time-consuming and can’t be performed as frequently as other backups.
Incremental
Incremental starts with a full-image backup then performs backups of changed data. After a set number of backups, another full-image is performed and the cycle starts again. To restore data, apply the most-recent full-image and then each subsequent incremental.
Differential
Differential backup backs up all data that has changed since the last full-image backup. To restore data, you first apply the most-recent full-image backup and then the most-recent differential backup. Backup time increases with each successive differential backup.
Bare-metal
Bare-metal backup backs up an entire computer or server—applications, data, operating system, etc.—in a way that allows it to be restored to bare metal hardware (hardware without a previously installed operating system or preinstalled software).
Some of the features we offer:

MULTIPLE DEVICES
Backup unlimited PCs, Macs, iPhones, iPads and Android devices into a single account.
Also, data from external hard drives can also be backed up.

SNAPSHOTS
Snapshots provide historical view of data for recovery and protect against ransomware; store up to 30 previous versions of all files.

CLONING
Perform sector-level backup or file-level backup to secure your entire computer, and restore the same to its initial state in the event of a disaster.

ONLINE SYNC
Files and folders will be synced in real time across all devices. Sync storage does not impact your backup storage, and matches your limits.

MANAGEMENT
Web-based console helps manage data backups, restores, application settings and more, on remote computers.

SECURITY
Transfer and store files with 256-bit AES encryption using a user-defined key that is not stored anywhere on the servers.