Skip to main content

The complete integrity of backup data is critical to ensure a smooth and successful recovery, minimising business downtime in the event of any system outages. 

CloudBacko Go has three ways to ensure the integrity of the backup data.

  1. Post backup check, to verify the all the data transferred to the backup destination is correct 
  2. Weekly data integrity check, perform a health check to verify all data on the backup destination is correct
  3. Manual Data integrity check which can be started by the user to perform a health check to verify all data on the backup destination is correct

Frequently asked questions:

CPU  Quad Core architecture or above Memory

Minimum: 4 GB (at least 50% free memory available)

Recommended: 8 GB or above (at least 50% free memory available)

Disk Space 500 MB Network Protocol TCP/IP Standard Ports 80 and 443 Internet Speed 10 Mbps or above upload speed

The cost of your backup service will depend on two factors; backup data storage requirement and type of backup plan (File /NAS, Databases & VM, or Microsoft 365 backup plan). 

A CloudBacko Go subscription plan already includes the use of CloudBacko Drive which is powered by Microsoft Azure. However, you can save even more money by selecting a bring your own drive/storage plan. Check out our pricing
 

A single Cloudbacko Go subscription covers backups of unlimited devices or endpoints. There is no need to invest in additional hardware, set up centralized backup servers, provision storage, or hire experienced IT personnel to manage your backups. You can get started and have your backups running in a few minutes.

If you still have questions, please contact us on WhatsApp or send us an email.

If you prefer a backup solution that is based on a license purchase model we recommend you use CloudBacko Pro or CloudBacko Lite instead. Check out the license pricing

We are committed to offering enterprise grade security on our backup solutions such as AES 256-bit data encryption, 256-bit SSL communication, Two factor authentication etc.

All backup data is first encrypted before it is transferred over the internet and the backup data remains encrypted even when it is stored.

Check out our blog post

Testimonials: