Cloud Backup
CLOUD BACKUP
Did you know that 25% of companies are unable to reopen after a major disaster, according to the US Small Business Administration? In a modern hyper-connected world, a data loss qualifies a major disaster.
Access delivers data protection solutions to small businesses, protecting data and systems on-premises, at remote locations, in private and public clouds, and on mobile devices.
With Access Data protection solutions, you can:
Protect your businesswith proven backup that's managed via a unified, touch-friendly, web-based management console for complete backup and proven recovery of your workloads and data. |
Get back to business quicklywith reliable recovery of your systems to any hardware or to Access Cloud using proven and trusted technologies. |
Prevent ransom-ware attackswith Access Protection, which detects and defends your data from unauthorized encryption of files and backups. |
Complete Business Protection
Disk-Imaging BackupProtect your entire business with complete and reliable backup images of your entire system files, or data. Store backups to a variety of storage devices, including local disks, network storage, tape devices, and the cloud. Easily recover a complete image or selected files, folders, items, and applications.
|
#1 Virtual Server ProtectionMitigate risks with agentless and agent-based backup and recovery of your virtual machines and hosts on any six supported hypervisors. Migrate between different hypervisors and to/from physical machines (P2V, V2V, V2P, and P2P) or the cloud.
|
Cloud ProtectionMigrate workloads easily between various clouds, virtual systems, and physical machines (P2C, V2C,C2C, C2V, and C2P). Increase user service availability by protecting your Office 365 mailboxes, Microsoft Azure VMs, and Amazon EC2 cloud workloads.
|
Microsoft Business Applications ProtectionIncrease user satisfaction and reduce data loss risks with built-in application aware, single-pass backup that protects Microsoft Office 365, Exchange, SQL Server, SharePoint, and Active Directory - even in the cloud. Restore individual emails, folders, documents, databases, or entire systems.
|
World's Fastest Recovery
Bare-Metal RecoveryMinimize expensive downtime and simplify recovery by restoring entire systems from reliable and proven disk-image backup, with no need to reinstall the operating system applications, or reconfigure settings.
|
Workload MigrationImprove your business agility by migrating VMs between different hypervisors and to/from physical machines (P2V, V2V, V2P, and P2P) or the cloud. |
Access Universal RestoreMinimize expensive downtime by restoring Windows and Linux systems to dissimilar hardware, including bare-metal physical, virtual, or cloud environments.
|
Easy Granular RecoveryIncrease user satisfaction and reduce RTOs by restoring folders, files, databases, documents, mailboxes, and individual emails directly from your complete image backup - with no extra steps or third-party tools required.
|
Flexible Storage Options
Local disks, NAS, SANReduce RTOs of individual systems and speed up granular recoveries with support of any local and network-based disk storage, without the need to establish backup or media servers.
|
Access Cloud StorageEnsure recovery from any disaster and maintain control of data location by storing backups in one of 14+ secure and reliable Access Cloud Data Centers.
|
Intuitive, Scalable Management
Centralized Web Management ConsoleReduce IT's workload with a touch-friendly, web-based management console. Reduce RTOs by accessing the web console from any device, including tablets.
|
Backup Operations SchedulingAchieve target recovery point objectives (RPOs) by automating the backups with simple or custom schedules.
|
Innovative Data Protection
Access Active ProtectionProactively prevent the need to recover by protecting data and systems from ransomware attacks,detecting and preventing suspicious changes to data, backup files, and the backup application.
|
Strong EncryptionImprove security of your data with at-source AES-256 encryption of your backups and metadata, protected by irreversibly encrypted passwords.
|