| Standards-based Security |
| Encrypted data transfer |  |  |
| Encrypted data storage on server (AES-256 bit) |  |  |
| Cryptographic data integrity protection (HMAC-SHA-256 bit) |  |  |
| Secure, unique 2-party pass phrase recovery process (RSA-3072 bit) |  |  |
| Pass phrase privacy |  |  |
| Pass phrase strength wizard |  |  |
| Print / export pass phrase during setup |  |  |
| Software manipulation safeguards |  |  |
| Proven Backup Engine |
| Block level incremental backups |  |  |
| Open and locked file support | 1 |  |
| Advanced data compression |  |  |
| Support for files larger than 4 GB |  |  |
| Initial backup of large data sets to USB disk |  |  |
| Network drive support |  |  |
| Map network drives before a backup begins |  |  |
| Automatic removal of excluded data previously backed up |  |  |
| Local Backups |
| Backups to locally attached storage |  |  |
| Backups to network attached storage |  |  |
| Centralized local backups |  |  |
| Near-zero additional configuration |  |  |
| Optionally disable encryption for local backups |  |  |
| Versions stored in local backups | |  |
| Resilient Network Communication |
| Reconnect and resume after connection failures |  |  |
| Congestion aware flow control of backup bandwidth |  |  |
| Bandwidth throttling |  |  |
| Uncapped backup and restore speeds |  |  |
| Pause and resume backup after standby / hibernation |  |  |
| Reliable Scheduling |
| Automated, unattended, scheduled backups |  |  |
| Flexible scheduling options, including multiple backups throughout the day |  |  |
| Ability to wake computer to perform backup |  |  |
| Automatic initiation of a backup after detection of a missed backup |  |  |
| Attentive Notification and Monitoring System |
| Email alerts at start of backup and end of successful backup |  |  |
| Email alerts at the end of a backup with warnings or errors |  |  |
| Email alerts when no backup has completed recently |  |  |
| Email alerts when disk usage changes by more than a given amount |  |  |
| Email alerts when disk usage is above a given amount |  |  |
| Single screen display of backup status, backup history, and disk usage |  |  |
| Disk usage explorer tool |  |  |
| Detailed audit logs |  |  |
| Advanced log viewer |  |  |
| Powerful Backup Policies |
| Visual policy editor |  |  |
| Visualization of exactly which files are included for backup |  |  |
| Search based backup |  |  |
| Advanced policy engine |  |  |
| Smart default policies |  |  |
| Robust Versioning System |
| Unlimited historical versioning | |  |
| Customizable preservation of deleted files | |  |
| Powerful version control settings | |  |
| Customize version settings by folder or file | |  |
| Versions stored using reverse deltas | |  |
| Broad Application Support2 |
| Hot backup of Microsoft Outlook | 1 |  |
| Hot backup of Exchange Server 2003 | |  |
| Verification of integrity of Exchange database before backup | |  |
| Hot backup of SQL Server | |  |
| Hot backup of Oracle | |  |
| Hot backup of MySQL | |  |
| Custom scripts executing before/after the volume snapshot | |  |
| Custom scripts executing before/after the scheduled backup |  |  |
| Fast and Easy Restore Process |
| Web-based access to data 24/7 |  |  |
| Wizard-driven restore of one, many, or all files |  |  |
| Restore data at any historical point just by specifying the date and time | |  |
| Modern Customer Web Portal |
| Management and creation of sub-accounts for additional computers |  |  |
| Reporting and graphing features |  |  |
| Easy to Use Software |
| Fast initial setup |  |  |
| Clutter free, intuitive user interface |  |  |
| Wizard driven processes |  |  |
| Auto-diagnostics when users don't know what to do |  |  |
| Compatible with remote desktop and Citrix |  |  |
| Automatic software updates |  |  |
| Support for 98 / Me / 2000 / XP / 2003 / Vista |  |  |
| Enterprise-grade Server Infrastructure |
| 99.999% reliability for all core systems |  |  |
| Tier-1, multihomed, route-optimized server Internet connections |  |  |
| Redundant power feeds, on-site generators, and UPS systems |  |  |
| Redundant Liebert cooling systems |  |  |
| FM200 fire suppression with VESDA early smoke detection |  |  |
| Multilevel security including biometrics, surveillance, and 24~7 guards |  |  |
| 24~7 monitoring of all services for fast detection and repair |  |  |