Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Comet Backup Reviews & Ratings
    211 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,343 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    3,471 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    388 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,109 Ratings
    Company Website
  • Guardz Reviews & Ratings
    96 Ratings
    Company Website
  • Synchredible Reviews & Ratings
    13 Ratings
    Company Website
  • Action1 Reviews & Ratings
    678 Ratings
    Company Website

What is OpenText Core Endpoint Backup?

OpenText Core Endpoint Backup delivers a powerful and automated solution for data protection, specifically designed to meet the needs of today’s distributed workforces, ensuring the safety of Windows and macOS endpoints irrespective of their location or complex networking environments. It centralizes backup management through a unified interface, streamlining the process with automated incremental snapshots and offering versatile recovery options, including targeted point-in-time recovery for individual devices or groups. With top-tier security protocols like AES 256-bit and RSA-4096 encryption, along with innovative key management practices, it guarantees data protection both during transit and while stored. The integrated deduplication functionality significantly improves storage efficiency, making it an ideal option for a range of organizations. Additionally, administrators enjoy easier deployment and policy management across diverse organizational scales and settings, along with capabilities like geolocation tracking and remote-wipe features that protect data on potentially lost or compromised devices. This holistic strategy not only fortifies data security but also simplifies management tasks for IT departments, ultimately fostering a more resilient and responsive working environment. As a result, organizations can confidently navigate the challenges of modern data management with enhanced agility and security.

What is Becrypt?

Maintaining the security of endpoint devices is essential for any organization. Those operating in high-risk environments can particularly benefit from specialized products and services designed to enhance their security posture. These advanced solutions are specifically developed for various types of devices, including desktops, laptops, and thin clients. Their foundations are backed by extensive research and government support, which ensures their effectiveness. The offerings encompass a wide array of managed services, continuous security monitoring, and dedicated research and development efforts. The adoption of zero trust architectures plays a critical role in bolstering the security of cloud services by integrating assessments of both device health and user identity for access control. Furthermore, permitting access to corporate resources from unmanaged endpoints can seriously threaten the integrity of the supply chain. By prioritizing both device health and identity verification, organizations can significantly reduce the risks associated with third-party IT interactions. In addition, managed services facilitate the establishment of secure cloud and mobile infrastructures, promoting safer collaboration with external partners. It is imperative that organizations implement robust security measures to safeguard sensitive data and ensure the continuity of their operations. This proactive approach not only enhances security but also builds trust among stakeholders.

Media

Media

Integrations Supported

Microsoft 365
Microsoft Azure
SQL Server
Windows Server

Integrations Supported

Microsoft 365
Microsoft Azure
SQL Server
Windows Server

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Carbonite

Date Founded

2005

Company Location

United States

Company Website

www.carbonite.com/business/products/endpoint-protection/

Company Facts

Organization Name

Becrypt

Date Founded

2001

Company Location

United Kingdom

Company Website

www.becrypt.com/uk/

Categories and Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Categories and Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Popular Alternatives

Popular Alternatives

AhsayCBS Reviews & Ratings

AhsayCBS

Ahsay Systems Corporation Limited