Nobody can afford to lose data, especially if you run a business.Clients worldwide have been relying upon Host4u2 for over 17 years to maintain their data. We are pleased to offer our Data LockBox service powered by R1soft Enterprise Continuous Data Protection. How it works is simple but powerful. Signup for one of our backup packages and we will provide you the setup to slave any server, workstation, or pc to our protected backups. You can addon our proprietary CDP addon that gives you web access 24/7 to login and restore files directly from the secure backup systems.
| Disk Space||Monthly|| per GB|
| 50 GB||$14.95||$0.30|
| 100 GB||$19.95||$0.20|
| 250 GB||$29.95||$0.12|
| 500 GB||$49.95||$0.10|
| 1 TB||$79.95||$0.08|
| 2 TB||$139.95||$0.07|
Restore servers from disk-based backup. Unlike traditional backup software, there's NO need to partition your drive and install the operating system.
Sector based backups increase throughput and reduce overhead.Servers can be fully operational with minimal performance impact during backups. Backups can usually be performed at anytime, even on busy servers.
Only changed disk sectors are copied between backups. Incremental backups can now be completed in minutes.
Righteous Backup is a total solution including built-in support for backing up open files. NO 3rd party software is required.
During normal host operation, the R1Soft's CDP Agent keeps a journal of disk changes. Incremental backups know what sectors on thedisk have changed before the backup operation even starts. This eliminates the need for file-by-file or block-by-block comparisons every backup.
Software can be completely controlled offsite using a web-based interface.
Incremental sector based backups ignore unused portions of the disk and copy only the disk sectors that have changed since the last backup. This when used with traditional compression, reduces backup storage by as much as 90% when compared to a traditional system wide,file-by-file backup.
Data is continuously encrypted while in storage and during network transmission using RSA keys. Decryption during a restore is only possible when the encryption key holder enters their pass phrase.
During backup and restore data is verified using MD5 checksums.