Setting the foundation: 3-2-1

Only a well-structured backup strategy enables data recovery when you need it. If you are just starting, or if you are in the process of rethinking your existing system, follow the 3-2-1 backup rule:

Find the right solution

Only a well-structured backup strategy enables data recovery when you need it. If you are just starting, or if you are in the process of rethinking your existing system, follow the 3-2-1 backup rule:

Step 1 - Protect endpoints and services

Businesses rely on large amounts of data to perform their daily operations. Protecting information stored on enterprise devices or services from hardware and software failure or ransomware is the first step to ensuring business continuity.

VM-level backup

Protect individual Hyper-V and VMware virtual machines efficiently thanks to deduplication and changed block tracking technologies. Restore to the original hypervisor, another instance, or even run VMs directly

Datastore-level protection (iSCSI, NFS)

Create backup plans for iSCSI LUNs or shared folders to meet your RTO/RPO requirements.

Hyper Backup supports scheduled backups locally or remotely, rsync-compatible servers, USB drives, and cloud storage providers.

For the lowest RPO and RTO, Snapshot Replication protects datastores as frequently as every five minutes. Support for one-to-many and multi-step replication paths enables you to build a protection that fits your IT topology and requirements.

Comprehensive device-level protection

Centralize and automate backups of entire Windows or Linux PCs and servers. Flexibly restore devices using bare-metal or file-level recovery, or even perform physical-to-virtual (P2V) restoration to hypervisors.

Granular data protection

Select and back up or synchronize select folders on Windows, macOS, or Linux PCs to a centralized storage.

rysnc / SMB

Agentless backup of rsync and SMB-compatible file servers enables simple drop-in protection of existing file serving infrastructure.

Google Workspace

Protect your Google Workspace deployment by keeping local copies of data stored on Google Drive, Gmail, and any contacts and calendar entries. Find, restore, and export items easily.

Microsoft 365

Take ownership of vital business data stored on Microsoft Exchange Online, OneDrive for Business, SharePoint Online, Teams, and contacts and calendar data stored on each user account. Audit, recover, and restore items quickly.

Automatic protection for your entire PC

Protect your Windows and Linux (Beta) PCs with full-device backups of all your files, programs, and settings, on any drive. Flexible restoration lets you recover only files and folders, or replicate the entire device onto a new one.

Select and protect individual folders

Don’t need to protect the entire computer? Synchronize folders, and add backup and restoration points to your most important files so you can easily roll back any accidental or malicious modifications.

Automatic folder-level backup

Protect important files and folders with automatic real-time or scheduled backups. Versioning enables you to jump back in time to undo a change or to recover from malicious file modifications.

Step 2 - Back up your local data to another destination

Ensure business continuity, no matter what type of disaster strikes. Data and service availability depends on having a thorough and well-practiced backup and disaster recovery plan in place.

Comprehensive full-device backups

Schedule protection of all data, applications, and system settings. Compression and deduplication greatly reduce the amount of storage required. Learn more about Hyper Backup.

High-frequency file / LUN protection

For high-traffic files or iSCSI LUNs, snapshots and replication tasks can be defined as frequently as every five minutes. One-to-many and multi-step replication paths allow system administrators to build out multi-device and multi-site disaster recovery plans.

High-availability solution

For near-zero RPO and RTO with minute-level automatic failover of your entire storage solution, including applications, High Availability
clusters and select dual-controller models provide real-time synchronization of storage.

File protection

Connect with existing public cloud accounts, such as Google Drive, Microsoft OneDrive, or Dropbox to set up one or two-way synchronization.