Cloud backup application

Issue 7 2021 Integrated Solutions, Infrastructure

Synology launched its newest Synology C2 cloud application. C2 Backup provides efficient data protection for Windows devices, whether they are located at home or distributed across multiple offices.

“With C2 Backup, we provide a fresh alternative for those who want to centralise protection of their devices, wherever they are,” said Yen-ju Lin, product manager for C2 Backup at Synology. “It is easy to set up and use and requires no additional hardware to protect Windows devices, allowing users to start backing up today.”

With C2 Backup For Individuals and C2 Backup For Businesses, everything on Windows PCs and servers can be securely and efficiently backed up from a single console. This includes system configurations and software, files and folders and external drives. Data backed up on C2 Backup is fully shielded against unauthorised access by end-to-end AES-256 encryption, with a user-held private key necessary to unlock backup files and sensitive information.

Flexible ways to schedule backups

C2 Backup makes use of forever-incremental backup to optimise storage and bandwidth.

Incremental backup reduces the amount of data uploaded for every backup to only those blocks that have changed, making backups more efficient.

Each subscriber can set their own individual version retention preferences. Retention policies can be tailored to meet individual needs or comply with corporate policies and regulations.

Finally, C2 Backup offers scheduling strategies to make sure that users never miss a backup. Users can choose to periodically execute backup tasks, or they can let them be triggered by events such as screen locking, account logout, or device power-up.

Fast and full restoration options

In the event of device failure, data loss or ransomware attacks, C2 Backup's fast recovery methods allow users to quickly resume services. File-level recovery allows you to retrieve any file you need immediately, while entire devices can be restored to their previous state with bare-metal recovery.

Pricing for C2 Backup For Individuals is based on storage use, with no limit to the number of devices protected under each subscription. Annual subscription rates start at $3.49 per month for 500 GB of backed up data or under $8.50 per month to protect up to 2 TB.

For more information, go to www.synology.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.