How it works is simple but powerful. Signup for one of our online backup services plans and we will provide you access to download our backup agent. You determine which files to backup, when, and how long to keep them. You can setup an agent any server (Linux and Windows), workstation, PC or anything holding data you want backed up to our protected systems. You have web access 24/7 to login and restore files directly from the secure backup systems.
|Remote Raid-10 Space
||Price Per Month
Bare-Metal Disaster Recovery
Bare-Metal Disaster Recovery: Restore servers directly from disk-based backup. Unlike traditional backup software, there is NO need to first partition your drive and install the operating system.
Sector based backups increase throughput and reduce overhead. Servers can be fully operational with minimal performance impact during backups. Backups can usually be performed at anytime, even on busy servers.
Small Backup Windows
Only changed disk sectors are copied between backups. Incremental backups can now be completed in minutes.
Open File Backups
Righteous Backup is a total solution including built-in support for backing up open files. NO 3rd party software is required.
Our technology provides consistent point-in-time system-wide backup images.
Near Continuous Backup
During normal host operation, the Lot Servers’s Agent keeps a journal of disk changes. Incremental backups know what sectors on the disk have changed before the backup operation even starts. This eliminates the need for file-by-file or block-by-block comparisons every backup.
Software can be completely controlled offsite using a web-based interface.
Incremental sector based backups ignore unused portions of the disk and copy only the disk sectors that have changed since the last backup. This when used with traditional compression, reduces backup storage by as much as 90% when compared to a traditional system wide, file-by-file backup.
End-To-End Strong Encryption
Data is continuously encrypted while in storage and during network transmission using RSA keys. Decryption during a restore is only possible when the encryption key holder enters their pass phrase.