Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Duplicati is a free and open-source backup solution that enables users to securely store encrypted backups online across various operating systems including Windows, macOS, and Linux. It supports standard protocols such as FTP, SSH, and WebDAV, and integrates seamlessly with popular cloud services like Backblaze B2, Tardigrade, Microsoft OneDrive, Amazon S3, Google Drive, box.com, Mega, and hubiC among others. With robust AES-256 encryption, users can ensure their files and folders are well protected. Duplicati also optimizes storage with features like incremental backups and data deduplication. You can manage backups effortlessly through its web-based interface or command-line interface, and it includes a built-in scheduler and auto-updater for convenience. This versatile software is available for free, even for commercial use, and its source code is licensed under LGPL. Duplicati operates on Windows, Linux, and macOS systems, requiring .NET 4.5 or Mono to function. In addition to AES-256, users have the option to utilize GPG for added backup encryption. Designed specifically for online backups, Duplicati stands out as a comprehensive solution for safeguarding your data. Its user-friendly nature and extensive compatibility make it a reliable choice for individuals and businesses alike.

Description

Authora's Encrypted Data Gateway Engine, known as "EDGE," is a command-line tool specifically developed for organizations that need to securely transmit significant quantities of data. This solution offers robust protection for critical business information with minimal disruption to current systems. Additionally, EDGE safeguards vast amounts of information residing on servers and backup devices from unauthorized access. Whether handling tape backups, batch FTP transfers, or distributing data to partners, EDGE delivers strong encryption features essential for automated data processing tasks. By integrating EDGE's cryptographic capabilities into their applications and workflows, organizations can effectively manage risk and adhere to compliance requirements. Furthermore, Authora's EDGE adheres to OpenPGP standards, making it a reliable choice for secure data exchange. The application seamlessly incorporates cryptographic functions into existing business processes and operates independently of platform, functioning on both Windows and various UNIX systems, which enhances its versatility and appeal to a broader range of users.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon S3
Backblaze
Box
Google Drive
MEGA
Microsoft OneDrive
hubiC

Integrations

Amazon S3
Backblaze
Box
Google Drive
MEGA
Microsoft OneDrive
hubiC

Pricing Details

Free
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Duplicati

Country

United States

Website

www.duplicati.com

Vendor Details

Company Name

Authora

Website

www.authora.com

Product Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

BitReplica Reviews

BitReplica

Auslogics

Alternatives

SecureZIP Reviews

SecureZIP

PKWARE
Encryptik Reviews

Encryptik

Ceptes