A modern and simple Hybrid Cloud model
Because data tends to change, backup sessions usually run on a repeated basis (for instance, every day). You can start a new backup session manually or you can create a schedule for it.
1 data source = 1 backup session
Protection by top military standards
B-Up encrypts files and data using the private security key created during installation (data will be unavailable without the key). One of the following encryption methods is used: AES-128 (default),AES-256 or Blowfish-448.
Effective and practical
Effective and practical:
– Compression (to reduce their size (saves bandwidth and storage space).
– Combination– multiple pieces (fragments) in “cabinets” for more efficient use of network resources and storage.
B-Up scans the system to find the data to be backed up and compares the results with those of the previous session. The comparison is based on file attributes (names, modify dates, size, access permissions, and so on) stored in the Backup Register. If at least one attribute in a file is changed, the file is added to the queue for further processing – on the principle of increment.
Advantages of the B-Up technology
Want to try it?
25 days free trial