Help the communities most affected by the California wildfires in only a few minutes. We'll donate $10 for every review you submit.
Code42

Code42

4.5
(334)
Optimized for quick response

Online data backup

Work for Code42?

Learning about Code42?

We can help you find the solution that fits you best.

Code42 Features

Functionality

Real-time Sync

Continuously updates backup files to reflect most recent changes and updates.

Not enough data available

Storage Capacity

The ability to store large amounts of data or scale capacity to fit storage needs.

Not enough data available

Remote Backup

Provides remote access dashboards designed to manage and store data from familiar applications.

Not enough data available

Versioning

Keeps track of incrementally changing versions of the same content, data, and files.

Not enough data available

Compliance

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

90%
(Based on 17 reviews)

At-Risk Analysis

Identifies location of data that may be less protected and more vulnerable to threats.

84%
(Based on 12 reviews)

DLP Configuration

Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.

85%
(Based on 8 reviews)

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data available

Management

Disaster Recovery

Delegate backup settings to facilitate specific recovery in the result of a disaster.

91%
(Based on 99 reviews)

Remote Backup

Provide remote access dashboards designed to manage and store data from familiar applications.

93%
(Based on 109 reviews)

Storage Formats

The ability to store multiple types of file formats or convert files to proper format.

90%
(Based on 96 reviews)

Scheduled Backups

The abillity to automate backups or have backup storage updated continuously.

95%
(Based on 115 reviews)

On-Demand Restoration

The ability to restore files to its original location or alternative sources on-demand.

92%
(Based on 108 reviews)

Compatibility

Disk Backup

Allows users to store up full disk image-level backups.

Not enough data available

Local Backup

The ability to store information locally on a hard drive or similar device.

Not enough data available

Storage Formats

The ability to store multiple types of file formats or convert files to proper format.

Not enough data available

Administration

Database Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

81%
(Based on 12 reviews)

Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

Not enough data available

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

Reporting

Activity Monitoring

Actively monitor status of work stations either on-premise or remote.

87%
(Based on 95 reviews)

Documentation

Reporting abilities to assess data quality and activity.

86%
(Based on 92 reviews)

Alerts/Notifications

Send summary, update, or actionable alerts to administrators to detail activity.

85%
(Based on 99 reviews)

Management

File Sharing

Gives users the abilitity to access or send backup files stored online.

Not enough data available

Security Standards

The ability to set standards for asset and risk management.

Not enough data available

Encrypted Storage

Provides some level of encryption of data in transit and sensitive data while it lives online.

Not enough data available

Security

Data Encryption

Provide some level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

94%
(Based on 62 reviews)

Security and Compliance

Abilities to set standards for asset and risk management.

93%
(Based on 89 reviews)

Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

92%
(Based on 78 reviews)

Security

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

77%
(Based on 11 reviews)

Data Transport

Protects data with some form of encryption as it leaves your secure or local network.

Not enough data available

Data Types

Allows the secure storage of differend information types such as text, spreadsheets, or graphics.

Not enough data available

Security Tools

Provides tools that allow adminstrators to quarantine, block, or encrypt data.

Not enough data available