Centralized policy management enables you to ensure that your business-critical data is protected on endpoint devices. Data deemed to be of less business value, like photos or music, can be centrally excluded to ensure that only your truly valuable data is protected.
Redstor's agent-based technology encrypts data at source and deduplicates and compresses it, making the client extremely bandwidth efficient and effective even over mobile connections.
Redstor detects when it is connected to a metered connection, giving you the opportunity to postpone transmission and ensure you avoid any bill shock from transmitting data over expensive networks.
Redstor can be silently deployed and configured with your preferred device management tool. Once deployed, the agent can be completely managed remotely through Redstor’s Remote Access functionality.
Designed from the ground up for secure operation over public networks, Redstor is ideally suited to protect data on your users’ devices regardless of their location. The lightweight client puts minimal strain on devices and the incremental forever technology minimizes the volumes of data to be transferred to the storage platform. The addition of compression further reduces the volume of data to be transferred making Redstor highly bandwidth efficient.