Advanced Packs
Last updated
Last updated
The Backup Service includes features that cover most of the cyber security threats. You can use these features without an additional fee. In addition, you can enable advanced features to boost the protection of your workloads. The Advanced protection features appear in protection plans marked with the Advanced feature icon:
If at least one feature is enabled from an Advanced pack, you will be charged for the corresponding Advanced protection pack for each workload (a virtual machine, a server or a workstation).
Protects your workloads continuously and ensures that even last-minute changes of your work will not be lost.
One-click recovery
Continuous data protection
Backup support for Microsoft SQL
Server clusters and Microsoft Exchange clusters – Always On Availability Groups (AAG) and Database Availability Groups (DAG)
Backup support for MariaDB, MySQL, Oracle DB, and SAP HANA
Data protection map and compliance reporting
Off-host data processing
Group management for Microsoft 365 and Google Workspace workloads
Backup frequency for Microsoft 365 and Google Workspace workloads
Remote operations with bootable media
Protects your workloads continuously from all malware threats.
Antivirus and antimalware protection with local signature-based detection (with realtime protection)
Exploit prevention
URL filtering
Endpoint firewall management
Forensic backup, scan backups for malware, safe recovery, corporate allowlist
Smart protection plans (integration with CPOC alerts)
Centralized backup scanning for malware
Remote wipe
Microsoft Defender Antivirus
Microsoft Security Essentials
Allows you to patch vulnerabilities on the protected workloads.
Patch management
Disk health
Software inventory
Fail-safe patching
Cyber Scripting
Remote assistance
File transfer and sharing
Selecting a session to connect
Observing workloads in multi-view
Connection modes: control, observe, and curtain
Connection via the Quick Assist application
Remote connection protocols: NEAR and Screen Sharing
Session recording for NEAR connections
Screenshot transmission
Session history report l 24 monitors
Threshold-based monitoring
Anomaly-based monitoring