Machines icon

Server and Endpoint Backup 

Protect your systems so your data will be available when you need it.

Cloud-first backup with zero hardware

Back up your systems to the cloud and recover them to a different physical machine or a Hyper-V or VMware virtual machine. Choose between restoring the whole system, the system state, or just bare metal. With Redstor, your data is backed up to two cloud locations, with an optional local copy available free of charge.

Graeme-PC
Graphics showing backup

Recover instantly 

Traditional server and endpoint recovery requires users to wait for full systems and files to restore before being able to access the data. Redstors’ unique InstantData™ technology breaks the time barrier and enables users to instantly access files while full systems recover in the background. 

Centralised management, from anywhere  

Redstor minimises management overhead by providing a single app, through which all data sources can be protected. Flexible recovery options ensure data can be restored to and accessed from any location, either locally or in the cloud.

In just a few clicks, set policies, add additional workloads, define user access, and exclude data with no business value to define and manage your data protection needs in minutes.

Time spent managing backup is minimized by utilising Redstors’ AI and intelligent automation and customized reporting to free up time for you to spend time on more strategic tasks. Simply set and forget and manage by exception.

The graphic shows overview
1
Quick and effortless recovery 

Quick and effortless recovery 

Redstor’s data streaming technology allows you to recover massive systems in moments. When you initiate a recovery, InstantData™ makes sparse files of all your data accessible immediately. Whatever files you open first are then rehydrated on demand, while your less critical data is recovered in the background. 

Graphics of a woman reaching for files
2
Malware detection

Malware detection 

Redstor’s smart AI-powered malware detection technology scans your endpoints for potentially malicious files and alerts you to their presence. You can then check and action these files from the RedApp. This acts as an additional layer of security, further protecting you from the growing risk of ransomware, in line with a best practice layered approach.

Graph showing Suspicious files
3
Archiving to free up space 

Archiving to free up space 

Remove redundant, obsolete and trivial (ROT) data from your primary storage with our smart archiving service. Our policy engine identifies rarely accessed files and replaces them with stub files that take up less space, while the full file can still be opened on demand. This gives you a cost saving on your primary storage infrastructure without affecting the user experience.  

Men working
4
Wide-ranging compatibility

Wide-ranging compatibility

Our backup solution supports many operating systems, including several versions of Windows, macOS and Linux (CentOS, Ubuntu, Red Hat, SUSE). You can also back up Hyper-V virtual machines by leveraging the VSS writer. 

Graphics showing the files

See how we compare to the competition

Looking for a new backup vendor? See how Redstor stacks up against alternate solutions on G2.

Veeam

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Datto

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Acronis

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Cove Protection

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Arcserve

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Barracuda

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Commvault

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Spanning Backup

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Backblaze

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Azure Backup

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Carbonite

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Druva

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

MSP360

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Axcient

Redstor logo
Ease of use
Quality of support
Ease of setup
Product direction

See the full G2 comparison report.

Frequently asked questions

What systems do you support?

We can protect a wide variety of operating systems, including versions Windows, Windows Server, macOS, Ubuntu, RHEL, CentOS and SUSE.

Yes. You’ll use the RedApp to generate a backup agent installer file for each machine/server, and that’s all you need to install to get your data protection up and running.

You can initiate a recovery directly from the RedApp, whether you want to restore a whole system or only specific files. You can also use the backup agent on any machine to recover that machine.

Expert Support

Redstor MSPs all gain 24/7 access to Redstor’s market-leading support team, that draws on Redstor’s 20+ years’ experience of delivering consultancy and support within the storage and backup industry.

The graphic shows a woman talking to clients