Barracuda Backup

4.4
(18)

Totally secure. Amazingly simple. Utterly reliable.

Work for Barracuda Backup?

Learning about Barracuda?

We can help you find the solution that fits you best.

Barracuda Backup Features

Compatibility

File Server Backup

The ability to store information from filesystems.

Not enough data available

Database Server Backup

The ability to backup data from relational and NoSQL databases.

Not enough data available

Virtual Machines

Support for secure virtualized tape or disk storage.

Not enough data available

Repository Models

Support for various backup storage and operational processes. Examples include system imaging, incremental backup, or differential backup.

Not enough data available

Administration

Data Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data available

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data available

Reporting

Produces reports detailing trends and vulnerabilities related to bot management and performance.

Not enough data available

Management

Disaster Recovery

Delegate backup settings to facilitate specific recovery in the result of a disaster.

90%
(Based on 8 reviews)

Remote Backup

Provide remote access dashboards designed to manage and store data from familiar applications.

85%
(Based on 8 reviews)

Storage Formats

The ability to store multiple types of file formats or convert files to proper format.

92%
(Based on 6 reviews)

Scheduled Backups

The abillity to automate backups or have backup storage updated continuously.

92%
(Based on 8 reviews)

On-Demand Restoration

The ability to restore files to its original location or alternative sources on-demand.

83%
(Based on 7 reviews)

Management

Continuous Backup

The abillity to automate backups or have backup storage updated continuously.

Not enough data available

Disaster Recovery

Delegate backup settings to facilitate specific recovery in the result of a disaster.

Not enough data available

Storage Capacity

The ability to store large amounts of data or scale capacity to fit storage needs.

Not enough data available

Remote Backup

Provides remote access dashboards designed to manage and store data from familiar applications.

Not enough data available

Activity Monitoring

Actively monitor status of work stations either on-premise or remote.

Not enough data available

Governance

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data available

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data available

Data Visibility

Similifies data identification to increase visibility and management capabilities

Not enough data available

Reporting

Activity Monitoring

Actively monitor status of work stations either on-premise or remote.

86%
(Based on 7 reviews)

Documentation

Reporting abilities to assess data quality and activity.

83%
(Based on 8 reviews)

Alerts/Notifications

Send summary, update, or actionable alerts to administrators to detail activity.

90%
(Based on 8 reviews)

Compliance

Security Standards

The ability to set standards for asset and risk management.

Not enough data available

Cloud Data Protection

Provides high quality and wide scope of in-cloud and offline data security capabilities.

Not enough data available

Data Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

Not enough data available

Security

Encryption

Protects data with within and as it leaves your secure or local network.

Not enough data available

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data available

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data available

Breach Detection

Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.

Not enough data available

Security

Data Encryption

Provide some level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

86%
(Based on 7 reviews)

Security and Compliance

Abilities to set standards for asset and risk management.

92%
(Based on 8 reviews)

Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

94%
(Based on 6 reviews)