|
Basic
|
Select
|
Standards-based Security
|
Encrypted data transfer
|
|
|
Encrypted data storage on server (AES-256 bit)
|
|
|
Cryptographic data integrity protection (HMAC-SHA-256 bit)
|
|
|
Secure, unique 2-party pass phrase recovery process (RSA-3072 bit)
|
|
|
Pass phrase privacy
|
|
|
Pass phrase strength wizard
|
|
|
Print / export pass phrase during setup
|
|
|
Software manipulation safeguards
|
|
|
Proven Backup Engine
|
Block level incremental backups
|
|
|
Open and locked file support
|
1
|
|
Advanced data compression
|
|
|
Support for files larger than 4 GB
|
|
|
Initial backup of large data sets to USB disk
|
|
|
Network drive support
|
|
|
Map network drives before a backup begins
|
|
|
Automatic removal of excluded data previously backed up
|
|
|
Local Backups
|
Backups to locally attached storage
|
|
|
Backups to network attached storage
|
|
|
Centralized local backups
|
|
|
Near-zero additional configuration
|
|
|
Optionally disable encryption for local backups
|
|
|
Versions stored in local backups
|
|
|
Resilient Network Communication
|
Reconnect and resume after connection failures
|
|
|
Congestion aware flow control of backup bandwidth
|
|
|
Bandwidth throttling
|
|
|
Uncapped backup and restore speeds
|
|
|
Pause and resume backup after standby / hibernation
|
|
|
Reliable Scheduling
|
Automated, unattended, scheduled backups
|
|
|
Flexible scheduling options, including multiple backups throughout the day
|
|
|
Ability to wake computer to perform backup
|
|
|
Automatic initiation of a backup after detection of a missed backup
|
|
|
Attentive Notification and Monitoring System
|
Email alerts at start of backup and end of successful backup
|
|
|
Email alerts at the end of a backup with warnings or errors
|
|
|
Email alerts when no backup has completed recently
|
|
|
Email alerts when disk usage changes by more than a given amount
|
|
|
Email alerts when disk usage is above a given amount
|
|
|
Single screen display of backup status, backup history, and disk usage
|
|
|
Disk usage explorer tool
|
|
|
Detailed audit logs
|
|
|
Advanced log viewer
|
|
|
Powerful Backup Policies
|
Visual policy editor
|
|
|
Visualization of exactly which files are included for backup
|
|
|
Search based backup
|
|
|
Advanced policy engine
|
|
|
Smart default policies
|
|
|
Robust Versioning System
|
Unlimited historical versioning
|
|
|
Customizable preservation of deleted files
|
|
|
Powerful version control settings
|
|
|
Customize version settings by folder or file
|
|
|
Versions stored using reverse deltas
|
|
|
Broad Application Support2
|
Hot backup of Microsoft Outlook
|
1
|
|
Hot backup of Exchange Server 2003
|
|
|
Verification of integrity of Exchange database before backup
|
|
|
Hot backup of SQL Server
|
|
|
Hot backup of Oracle
|
|
|
Hot backup of MySQL
|
|
|
Custom scripts executing before/after the volume snapshot
|
|
|
Custom scripts executing before/after the scheduled backup
|
|
|
Fast and Easy Restore Process
|
Web-based access to data 24/7
|
|
|
Wizard-driven restore of one, many, or all files
|
|
|
Restore data at any historical point just by specifying the date and time
|
|
|
Modern Customer Web Portal
|
Management and creation of sub-accounts for additional computers
|
|
|
Reporting and graphing features
|
|
|
Centralized Web-based Management and Reporting
|
Instant provisioning of new customers and accounts
|
|
|
Account service management features
|
|
|
Dash-panel for monitoring of backup status for all accounts
|
|
|
Export account data for customized reporting and billing
|
|
|
Easy to Use Software
|
Fast initial setup
|
|
|
Clutter free, intuitive user interface
|
|
|
Wizard driven processes
|
|
|
Auto-diagnostics when users don't know what to do
|
|
|
Compatible with remote desktop and Citrix
|
|
|
Automatic software updates
|
|
|
Support for 98 / Me / 2000 / XP / 2003 / Vista
|
|
|
Flexible Service Offerings for Budgets of All Sizes
|
60-day free trials for new customers
|
|
|
Allow accounts to share storage allotment
|
|
|
No additional charge for additional computers
|
|
|
Hard and soft disk usage quotas
|
|
|
Multiple levels of service allowed per customer
|
|
|
Enterprise-grade Server Infrastructure
|
99.999% reliability for all core systems
|
|
|
Tier-1, multihomed, route-optimized server Internet connections
|
|
|
Redundant power feeds, on-site generators, and UPS systems
|
|
|
Redundant Liebert cooling systems
|
|
|
FM200 fire suppression with VESDA early smoke detection
|
|
|
Multilevel security including biometrics, surveillance, and 24~7 guards
|
|
|
24~7 monitoring of all services for fast detection and repair
|
|
|