Home Cloud Computing CrashPlan
CrashPlan reviews

CrashPlan

Secure, scalable, and straightforward endpoint data backup
our rating 4.5 out of 5 Stars

CrashPlanProduct Overview

  1. About CrashPlan
  2. Pros of CrashPlan
  3. Cons of CrashPlan
  4. Breakdown of core features

CrashPlan product overview

CrashPlan provides organizations peace of mind through secure, scalable, and straightforward endpoint data backup. It helps businesses recover from any worst-case scenario, whether it is a disaster, simple human error, a stolen laptop, ransomware, or an as-of-yet undiscovered calamity.

Aside from delivering endpoint backup and recovery, CrashPlan is also a solution for ransomware recovery, breaches, migrations, and legal holds. It protects the critical data of more than 50,000 world-class organizations, including global brands. It brings enterprise-grade data protection for small businesses with self-service file backup and recovery workflow while protecting vital data from ransomware. For enterprises, the platform offers all the core functionality plus the administration and management features necessary to scale. It also includes a dedicated legal hold workflow, the ability to store own encryption keys, and available professional services assistance.

CrashPlan allows users to work when, where, and how they need to in order to get their jobs done. It securely collects data on a regular basis regardless of where users store it so that it’s always available in the event of device failure, user error, or other catastrophes.

Pros of CrashPlan

Back to top ↑

  • Users can control how often to backup new versions and how long to keep files they delete.
  • Organizations can tailor access controls and restore options for users and departments based on job duties. Users and admins see only what they need to.

Cons of CrashPlan

Back to top ↑

  • CrashPlan has no mobile device backup features.

Breakdown of core features

Back to top ↑

Backup

The software continuously protects important data without impacting the users’ workflow. With customizable version retention settings and backups that run every fifteen minutes, CrashPlan ensures that businesses can meet their compliance and business continuity needs.

Recovery

CrashPlan can recover one or all files from a device in minutes in the event of file corruption, device failure, site disaster, or human error. It provides flexible restore options that let administrators push download jobs to devices, or enable users to initiate their own restores using the app on their device.

File metadata preservation

The system preserves all file metadata. This means that timestamps, file permissions, and directory paths will be preserved and accurate as of the time of version collection and available for discovery.

Ransomware recovery

No matter how many times files get versioned by the malware, CrashPlan makes it effortless to recover sensitive data as it existed minutes prior to the attack. The platform restores all user data to an imaged machine precisely as it was before infection, including permissions and desktop background.

Once the user identifies the restore point, the solution puts back their most recently updated files first, so they can get back up and running immediately. Backups of new and changed files happen without the need for human interaction. CrashPlan’s customizable unlimited version retention means that even if the user wasn’t able to discover an infection immediately, it’s always possible to go back to a known-good state.

(Last updated on 08/02/2022 by Liz Laurente-Ticong)

Quick Facts

  • Industry Specialties
    All Industries
  • Pricing
    Average
  • Works Best For
    Any Sized Businesses

Screenshots

CrashPlan 1CrashPlan 2CrashPlan_Screen_Shot_3CrashPlan_Screen_Shot_4

Video

Features

  • Endpoints
  • File Backup and Recovery
  • Ransomware Recovery
  • Device Migration
  • Legal Hold
  • File Metadata Preservation
  • Version Retention
  • Encryption In-Transit and at Rest
  • Host Your Own Encryption Keys
  • Business Associate Agreement (BAA) Eligibility
  • Administrative Capabilities
  • Layered Encryption
  • Role-Based Access
  • Multi-Factor Authentication
  • Security and Compliance

Integrations

  • Python SDK
  • Open API integrations

Pricing Model

  • Small Business
  • Enterprise

Languages

  • Chinese
  • Dutch
  • English
  • French
  • German
  • Italian
  • Japanese
  • Korean
  • Norwegian
  • Portuguese
  • Spanish
  • Swedish
  • Thai