Druva inSync

Druva inSync

(79)
4.6 out of 5 stars

Druva inSync provides Enterprise Endpoint Backup and Protection

Work for Druva inSync?

Learning about Druva inSync?

We can help you find the solution that fits you best.

Druva inSync Features

System Control
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

85%
(Based on 8 reviews)
System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

83%
(Based on 7 reviews)
Device Control

Manages user network accessibility on laptops and mobile devices.

88%
(Based on 9 reviews)
Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

83%
(Based on 8 reviews)
Application Control

Blocks endpoint users from accessing restricted applications.

87%
(Based on 8 reviews)
Management
Disaster Recovery

Delegate backup settings to facilitate specific recovery in the result of a disaster.

90%
(Based on 19 reviews)
Remote Backup

Provide remote access dashboards designed to manage and store data from familiar applications.

95%
(Based on 23 reviews)
Storage Formats

The ability to store multiple types of file formats or convert files to proper format.

91%
(Based on 23 reviews)
Scheduled Backups

The abillity to automate backups or have backup storage updated continuously.

94%
(Based on 23 reviews)
On-Demand Restoration

The ability to restore files to its original location or alternative sources on-demand.

93%
(Based on 16 reviews)
Vulnerability Prevention
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

85%
(Based on 5 reviews)
Firewall

Protects endpoint devices from a variety of attacks and malware threats.

70%
(Based on 5 reviews)
Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

64%
(Based on 5 reviews)
Reporting
Activity Monitoring

Actively monitor status of work stations either on-premise or remote.

88%
(Based on 24 reviews)
Documentation

Reporting abilities to assess data quality and activity.

90%
(Based on 23 reviews)
Alerts/Notifications

Send summary, update, or actionable alerts to administrators to detail activity.

86%
(Based on 24 reviews)
Security Management
Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

81%
(Based on 7 reviews)
Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

85%
(Based on 7 reviews)
Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

93%
(Based on 6 reviews)
Security
Data Encryption

Provide some level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

n/a
Security and Compliance

Abilities to set standards for asset and risk management.

93%
(Based on 21 reviews)
Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

97%
(Based on 21 reviews)