AutoSelect - AutoSelect allows end users to select files by file type rather than by file location. So, you don't have to know where a file exists to back it up. Just select from a list of files by type (i.e. "Spreadsheets" or "MS Word Documents") and they will be backed up wherever they exist, from any folder.
Server Locator Service - The Rbackup Server Locator Service is a built-in dynamic DNS that enables you to connect to the server on an inexpensive non-dedicated Internet connection with a dynamic IP address anywhere in the world.
Strong Encryption - Built-in strong encryption. RBackup has seven (7) selectable encryption methods - DES v1, DES v2, TDES, Blowfish, AES-128, AES-192, and AES-256. Mercury uses 448-bit Blowfish - the most secure encryption method.
Encryption Key Generator - One button creates a statistically perfect encryption key using the currently selected encryption method.
Print Key Information - Displays and prints a form containing all information necessary for a Disaster Recovery. This customizable form should be printed and retained by the end user as a backup to the Key File and Key Escrow systems.
Create Portable Key File - Maintains a portable Key File that can be copied to a memory stick and used for Disaster Recovery and for securely accessing backup files over the web. Fully compliant with HIPAA, SOX, GLB, and other regulations.
Maintains Encryption Key History - Maintains a complete history of all encryption keys. End users may change encryption keys as often as they like for maximum security, allowing the promptless restore of all files, regardless of the key used to encrypt them at backup time.
Failsafe Server Monitor - Built in Server Monitor automatically recycles and restarts rbackup within seconds if anything causes it to shut down.
Advanced Scheduling - This edition can schedule backups by day of week, day of month, calendar day, daily, on demand, and several times a day.
Configurable File Retention Policy - The Client can set File Retention Policy to keep files on the server for a number of days after they have been deleted from the Client computer. This can range from one day to ten years. It can also set a number of versions of files to keep, regardless of the age of the files. Files are deleted from the server as they expire, oldest first.
Keep Latest Version - An Rbackup exclusive, this feature keeps the most recent version of a file regardless the other file retention settings. For example, assume you have set files to purge after they are 30 days old. If you only have a single copy of a file within that time frame, and you do not select this option, that file will be erased when its age is over 30 days. If you select this option, that file will be retained regardless of its age until a more recent one appears at the Server.
Multiple Backup Sets - RBackup can maintain an unlimited number of Backup Sets. Backup Sets are groups of files with the same File Retention Policy, Backup Schedule, Backup Method, and many other options. This allows users to (for example) back up more important files more often, or to archive some files for years and not others.
Pre- and Post- Backup Command Processor - RBackup will process user-written command files before and after backup sessions. Each Backup Set can have its own individual pair of command files. Command files can perform operations like integrating the backup software with other applications, doing local backups, stopping and restarting services, sending notifications, running programs, and much more.
Data Compression - Data files are compressed on the Client computer by as much as 90% before being encrypted and transmitted to the Server. This reduces the amount of bandwidth required to send backups, saves space on the Server, and ads another layer of security to the backup.
Shut Down or Log Out After Backup - This feature will optionally shut down the computer after a scheduled backup (to save energy and increase security) or log off the current user.
Backup Time Window Control - Similar to Session Quota (above), Backup Time Window Control sets a time limit on each end user's backup session. This prevents backups that are scheduled to run when businesses are closed from exceeding the time allotted to them, so they are not still running when the business opens the next morning. Backups that do not finish because they last longer than the defined Backup Window are resumed where they stopped during the next session. Service Providers use this feature to spread out initial full backups (which can be large) over multiple backup sessions.
Resume Failed Backups Automatically - Backups that fail because of a lost Internet connection, a power failure, or some other interruption are automatically resumed at the point they stopped within sixty seconds without any loss of data. The software will retry the backup every sixty seconds throughout the Backup Window. If it cannot resume the backup within the time allotted by the Backup Window, it will resume during the next scheduled backup.
Optionally use Windows Task Scheduler - RBackup has its own built-in backup scheduler. However, some Service Providers like the Windows Task Scheduler better. A simple checkbox automatically creates and activates a Windows Task on a per-Backup Set basis.
Operates on Clear Registered Ports - There is never any worry about conflicting with other applications. This software operates on "Registered Ports," which means that Rbackup effectively "owns" them (and has since 1993). No other software vendors will use our ports, so there will never be a conflict with other applications.
Full Backups - Always performs full file backups of all selected files and folders.
Incremental Backups - Backs up only files that have been changed or added since the last backup, toggles the Archive Bit. Complies with Advanced File Selection Methods below.
Differential Backups - Backs up only files that have been changed or added since the last backup, does not toggle the Archive Bit. This is used when an Online Backup needs to integrate with a tape backup on the same computer. Complies with Advanced File Selection Methods below.
Advanced File Selection Methods - The software can be set to determine which files need to be backed up using the Archive Bit, the modified date and time as compared with the date and time of the most recent backup of each file, or Rbackup' proprietary FastPick method.
Automatic Adjustment for Daylight Savings Time - The software automatically detects Daylight Savings Time worldwide and adjusts the File Selection Method. Without this feature, a change in time would force a full backup of all files, or prevent a backup session.
Supports Dialup Connections - This feature activates a telephone modem and dials in to an Internet Service Provider to establish a connection for a backup session. The connection is dropped at the end of the backup session.
Can Operate Off-Net - This feature allows the Client software to make a direct connection to the Server using telephone modems, radio links, null modem cables, and other non-network connections. It is used in areas without Internet, and when special security is required.
CPU Throttling - The Client software can be set to subordinate itself to more important processes that require CPU time. The default setting is "Medium," which rarely needs to be changed.
HIPAA Compliant - The software is fully compliant with HIPAA.
Files Stored Encrypted on Server - Files are stored on the Server in fully encrypted form, using an encryption key known only to the end user. It is impossible for the Server operator to decrypt and view end user files unless the end user discloses the encryption key.
Filenames Encrypted on Server - File names are stored encrypted on the Server. This prevents disclosing sensitive information to the Server operator. File names often contain sensitive information. So, even if a file is fully encrypted, its name can be a security risk, and can prevent regulatory compliance. For example, a file named "John Smith heart surgery May 13 2009.doc" is not HIPAA compliant.
Easy Disaster Recovery - In the event of a loss of data due to catastrophic hardware failure, the Disaster Recovery feature will automatically restore the Client software's setup options and the most recent backup quickly and easily.
Virtual Full Restore - The software can automatically compile a full restore from a series of incremental backups across multiple backup sets and sessions. This feature significantly reduces or eliminates the need for periodic full backups.
Restore has Advanced Search Capabilities - The Restore interface contains advanced search features that can search across backup sets and sessions by date (before, between, after), by Backup Set, by drive and folder, and by file and folder names or parts of names, and can include wildcards.
Open Files Agent - Back up files that are open and in use by other applications. Without this feature, files cannot be backed up if they are in use. For example, if Quickbooks is open at the time of the backup, its files cannot be backed up. Many applications should run constantly, and cannot be automatically shut down for backups. The Open Files Agent solves this problem.
Delete from Server - This feature is a client-side interface that lets you search and delete files from the Server by date or file type, or by file name. It is good for cleaning out old files that don't need to be saved, speeding up backups and restores, and saving disk space on the Server. Without this feature, files are deleted from the Server according to the rules you set for File Retention Policy.
Internet Support - This feature allows the software to operate over the Internet. Otherwise, it will run only within private (local) networks. Many businesses do not want to expose their backups to the Internet for security reasons.
BitBackup - BitBackup is a special kind of backup that can back up and restore only the changed pieces of files. Sometimes called "Sub File Backup," BitBackup can significantly reduce the amount of storage space required at the Server, and the backup time as well - sometimes by as much as 98%. Another benefit of BitBackup is that it maintains a Local Data Store at the Client-side. The Local Data Store is a complete copy of the very latest version of backed up files, stored locally, at the Client's location. RBackup automatically restores from the Local Data Store if the user needs the most recent backup, which decreases restore time significantly. The Local Data Store adds another level of redundancy (a local backup as well as an Online Backup,) and allows restores even if the Client cannot make a connection to the Server. * Unlike other companies, RBackup's BitBackup was designed specifically for high-reliability online backups. The others are risky.
Active Directory - Back up and restore Windows Active Directory from Windows Servers.
Exchange Backup - Brick level backup and restore of Microsoft Exchange Servers. RBackup backs up at the sub-mailbox level. * This is far superior to our competitors who simply rely on Windows' built-in NTBackup for full-file backups, or (see below) charge an extra fee PER MAILBOX.
No Extra Charge for Mailboxes - Many companies charge a per-mailbox fee for Exchange Backup. At b-enterprises inc we think that's silly and unfair. Our most advanced brick-level Exchange Backup can back up an unlimited number of mailboxes at no extra fee.
SQL Server Backup - Incremental table-level backup and restore of Microsoft SQL Server. Backs up multiple instances of SQL Server on the same computer.
System State Backup - Back up and restore the Windows System State.
Sharepoint Backup - Back up and restore Windows Sharepoint Servers.
Simple Interface - The RBackup Client software can be deployed with one or both of two user interfaces. The Simple Interface is wizard-driven, very modern and user friendly, containing only the most commonly used functions. This is best for most end users. The RBackup Simple Interface and the Mercury Interface are available in more than 20 languages and dialects.
Advanced Interface - The RBackup Client software can be deployed with one or both of two user interfaces. The Advanced Interface is for power users or administrators. It contains all available options in a compact, fast format. It is not suitable for inexperienced end users.
Simple/Advanced Interfaces - The Service Provider Edition features both the Simple and the Advanced Interfaces above.
Copy to Disk - This feature is usually used to perform a first full backup using a USB drive, which is then available for online restore. Sometimes the first backup is very large, and because of bandwidth it is more convenient to do it using a portable hard drive or memory stick, which is then transported to the Server and simply copied. Subsequent backups are much smaller, and are done online.
EMail Notifications - The Server can send five different EMail Notifications, triggered by five events - successful backup, failed backup, missed backup, over quota, and new customer signup. Each of the emails can go to multiple addresses, and can be individually configured
Mapped Drive Support - This feature allows the software to back up data from mapped drives. Without this feature, it will back up only drives directly attached to the computer it runs on.
Remote Management - This feature allows the Server Administrator to remotely change many of the settings on the Client software.
Web Restore - This feature allows restoring Client data from a web site, using any web browser, without the Client software installed. NOTE: Some Web Restore agents are not secure - files restored via the web are sent across the Internet unencrypted and can be accessed by others in transit. The following excerpt is from Carbonite's Web Restore policy. All of RBackup Web Restore agents always send files fully encrypted - as safe as our backups. Files are only decrypted after they reach the Client computer.
"You may elect to Use Carbonite Products or Service that permit you to decrypt and download Backup Data from any Internet enabled computer. You understand that by electing to access your files from a computer other than the one you used to create the Backup Data, that your Backup Data will be decrypted by Carbonite in its data center and sent to you in a decrypted format via public infrastructure. You acknowledge that this may cause the contents of these files to become accessible to individuals other than you and that you accept this risk. You further acknowledge that depending upon the Carbonite Product or Service you use or the features of the Carbonite Product or Service you use, accessing your Backup Data from any Internet enabled computer may not be possible. "
Works with the Mirror Server - The Mirror Server mirrors the contents of your critical Server folders to a remote computer. It keeps an exact duplicate of your Server at a remote location, while providing automatic failover and recovery for your Clients.
Maintains Local Backup + Online Backup - The software can be set to maintain a local backup at the Client's site in addition to its Online Backup. The local backup can be sent to a shared network drive, an offsite drive via VPN, or any other mapped drive letter. BitBackup automatically maintains a local Data Store. In addition, the pre- and post- backup command files can be used to launch any other backup utility to perform local backups.
Stand Alone Restore Agents - The two Stand Alone Restore Agents are very small programs that can restore clients' data without installing the Client software. One of them restores files from a disk drive, and the other restores from the Web. Each are single .EXE files compiled by the Server, and contain all the information specific to the Server (like login, IP address or domain name, port numbers, etc) necessary to connect and restore. Users only need to enter their username and password and Encryption Key (or use their Key File) to restore data. The agents automatically uninstall and remove themselves after they have been used to restore files, making them safe for public computers.
Stealth Mode - The software can be set to perform all its operations completely silently - without any on-screen messages, windows, or sounds. This is useful when integrating with other software, or when users just don't want to be bothered with pop-up windows.
Hide Progress Screen - This feature hides the backup progress screen, but none of the other program icons or messages. This is useful when backups are scheduled to happen during times when the computer is being used for other applications and you don't want to disturb the user.
Supports Clustering - Built in support for Windows Clustering. Also includes its own built-in Automatic Failover and Load Balancing.
Built in Automatic Failover - For maximum uptime, multiple Servers can be installed, even at geographically distant locations. The Client software will automatically fail over to the next available Server if problems or loading prevent it from reaching its Home Server.
Amazon Elastic Compute Cloud (EC2) Supported - Runs in Amazon's Elastic Compute Cloud (EC2) platform. A free AMI is available, making provisioning a Server in the Cloud quick and easy.
No Complicated "SPEUs" - Easy Client Licensing - Some companies that provide Online Backup software license their software using complicated techniques that make it difficult and confusing to provision new clients by assigning "SPEUs" or some other unit of measurement to buy features and options.
Outlook Backup Built In - Microsoft Outlook is difficult to back up. Some software just can't do it. Rbackup backs up Outlook as a standard feature.
Client Installers Digitally Signable - Microsoft Vista, 2008 Server, and other advanced operating systems complain if Client installers are not digitally signed, or aren't properly named, or don't automatically adjust the User Access Control (UAC) systems.
Client Installers use InstallShield - RBackup installers, use InstallShield. InstallShield is the premier installation platform - the most widely used, and the most powerful available. It automatically handles all the complex installation requirements of the most advanced Windows platforms like Vista, 2008 Server, and others; including the UAC, firewalls, and antivirus.
Run Backups with Command Line Options - The software can be run with command line options that can perform many of the tasks on its menus. This is useful for highly customized backup scenarios and for integration purposes.
Works with PC and Mac - This edition runs on both PC and Mac computers, in native code for the operating system. It supports Windows 2000 and above, and Mac OS 10.4 and above. The Client software looks and works the same on each platform. Files can be restored cross-platform.
Continuous Data Protection - This edition backs up files as they are changed. It can also be scheduled to run once a day at a specific time.
Bandwidth Throttling - Bandwidth usage can be throttled using a simple slider bar control. This is used to limit the amount of bandwidth used by the software during backup sessions.
Remotely Erase Sensitive Data - End users can log into their Web consoles from any computer and order their computers to erase files on their computer that have been backed up. They can also shred files with military-level DoD 5220.22-M file shredding technology that cannot be reversed. This prevents sensitive data from falling into the wrong hands. Data will not be erased from the Mercury Server.
Send Technical Details - Client computers can collect and send technical information about their environments, including networks to which they are connected, and other data that might help zero in on who is using the computer.
Help Track a Stolen Computer - Using a unique geolocation technology that does not require a GPS in the client computer, the Remote Security Suite collects and transmits location information. Users can then look up this information in public databases to help isolate their computer's location. (Geolocation services are not exact, and depend on the reliability of the databases and the presence of WIFI access points around the missing computer.)
Remotely Freeze Desktop Agent - This prevents a computer thief from accessing the user's online account. The Desktop Agent will continue to do backups (sometimes capturing documents, links, and other evidence created by the thief.) but its menu will be disabled, and it will operate in "silent" mode with no prompts or messages to draw attention. All the data collected by the Remote Security Suite is transmitted and stored in users' online accounts, accessible with a web browser.
Lowest Prices, More Features - Our advertised prices are lower than any of our competitors' for similar products. Our ongoing costs are also lower, and we give you more features. But, we all offer special prices from time to time. So, if you have received a lower quote from a competitor, send it to us and WE WILL BEAT IT!
No Additional Charges for Exchange Mailboxes - Most of our competitors charge an additional fee to back up each Exchange mailbox your clients have. That can get very expensive, and it is difficult to keep up with. Rbackup charges one low price for our Exchange module, regardless how many mailboxes your clients back up.
or for more information about our Services contact us