Push-button Failover – CloudBoot

We like to keep things simple. And that includes your disaster recovery. CloudBoot brings your business back to life in minutes with less hardware, complexity, and testing costs. With a push of a button, CloudBoot allows you to failover from a single virtual machine (VM), server, application, as well as whole network or site failure. This fast failover applies to both physical and virtual environments. CloudBoot is non-disruptive to your existing environment with support for VMware and Hyper-V hypervisors, and Windows and Linux physical servers. While CloudBoot is perfectly suited for any disaster, it is ideal for site-wide disasters that render local appliances inoperable.

Push-button Failover – ApplianceBoot

Providing the ability to boot systems right on the appliance, ApplianceBoot brings your business back to life in seconds from micro-disasters such as server and application crashes as well as macro-disaster like whole server, network and storage outages. When there is a disaster you can’t wait for all your VMs to failover. With ApplianceBoot you can failover multiple VMs concurrently in minutes. This applies to both physical and virtual environments making it non-disruptive to your existing infrastructure. Coupled with a second offsite appliance, ApplianceBoot can deliver peace of mind for site-wide disasters too.

Cloud Spillover

With traditional backup appliances, you are limited by the storage capacity of the box. With 51Ƶ’s appliances, you can intelligently spillover to the cloud without having to worry about storage limits. All data is replicated to the cloud and automatically removed locally (based on custom policies), so that the local appliance serves more like a cloud gateway or intelligent cache than a purpose-built backup appliance.

UltraSafe Private Key Encryption

Recommended for sensitive data, UltraSafe Private Key Encryption accounts are protected with unique user-defined encryption keys. With UltraSafe Private Key Encryption, keys are NEVER stored or saved in the 51Ƶ cloud. This means absolutely no one is able to access files except for the account-owner. Note: Because of their nature, 51Ƶ cannot reset the password or encryption of UltraSafe accounts. If you lose the password the data will be un-recoverable.

Double-Blind Encryption

51Ƶ employs double-blind encryption which is based on the premise that your data should be encrypted twice – once at the source side and then again with the target custodian (i.e., within the vendor’s cloud). This is analogous to a safety deposit box. In order to open your safety deposit box, two keys are required – one held by the customer and the second held by the bank manager. Similarly, we encrypt your files on the source device with an encryption key that you hold, using UltraSafe’s 256-bit AES encryption. Files are then transferred to and from the cloud via a secure Secure Sockets Layer (SSL) tunnel. Once the files arrive in our cloud, they are encrypted again with a second layer of encryption in which 51Ƶ holds the key. The process of recovering the data requires a secure handshake where both keys need to be present in order to decrypt the data. Given recent security breaches, you should insist on this level of military-grade encryption.


When a device is lost or stolen, our Geolocation functionality lets you quickly locate the device. This becomes important when laptops are lost or stolen, since Geolocation enables IT to track the location of any endpoint for quick recovery or remote wipe, reducing the need to replace devices and giving organizations peace of mind.

Remote Wipe

Lost or stolen mobile devices are the most common source of reported data leaks. 51Ƶ provides IT with the necessary tools to safely protect and remotely remove corporate data from the device while meeting the data needs of BYOD environments.


Infiniscale is the concatenation of two words: “infinity” and “scale” and is the cornerstone technology that underpins our AnyCloud functionality. With most storage architectures, you have to invest in new technologies, servers, and storage capacity when you reach specific thresh holds which can be exceedingly expensive and time-consuming. With Infiniscale, we seamlessly scale out capacity both in terms of the number of sources (i.e., the servers and laptops you want to protect) and in the backend capacity of your designated targets (e.g., storage clusters, backup appliances, private clouds, etc.). Infiniscale lets you add an infinite number of targets and storage capacity without incurring the traditional spikes in the underlying architecture.


Don’t get locked into your vendor’s cloud. We let our customers choose their cloud target. With 51Ƶ, you can easily replicate your data and applications to 51Ƶ’s cloud, a private cloud, or popular third-party clouds such as Google Cloud Platform, AWS and Azure. 51Ƶ’s AnyCloud flexibility is made possible by Infiniscale, the orchestration layer that seamlessly routes traffic to specified targets (e.g., secondary appliances, backup clusters, or private clouds).

Hybrid Cloud

51Ƶ utilizes hybrid cloud technology to improve redundancy and allow users greater protection of their systems and data. Hybrid Cloud continuity is simple in concept yet robust in feature set; it leverages the advantages of local backup and the security of the cloud. It starts with workstations and servers protecting data locally across the Local Area Network (LAN) to the Cloud Failover Appliance or Data Protection Appliance. From there it is automatically transmitted to your cloud, our cloud, or any cloud. The local 51Ƶ device can act as a restore hub for everything from files to application and system fail over, it can also act as a staging environment for offsite transfer. Scheduling off-site data transfers can be critical for bandwidth management and carries no risk of having unsaved backups. In addition, should the local device be compromised data that was transferred to the Cloud can act as a replica site for the business. A local only backup option cannot ensure data integrity should a site wide disaster occur.

Data Centers

51Ƶ utilizes 16 global data centers and operates out of many worldwide locations including United States, Canada, United Kingdom, Australia, and South Africa. Your files are stored on customized clusters of servers that we have perfected over the years. Data is protected by advanced RAID configurations and real-time network monitoring. All of our data center locations are SSAE 16 (SOC 1, 2, and/or 3) audited on a regular basis. Security features include: 24-hour manned security and video surveillance, Proximity security badge access, State-of-the-art smoke and fire suppression, Temperature controlled environment systems, Seismically-braced construction, Redundant backup power systems.

WAN Optimization

One critical performance metric that few buyers consider is how quickly data is transferred from primary storage (or from the cloud-connected backup appliance) to the cloud. Many customers assume it’s entirely a function of the company’s own Internet connection. The larger the pipe, the faster the throughput. While this is largely true, the cloud backup vendor’s own software and technologies can play a large role in improving the speed of cloud replication through WAN acceleration.

Traffic Reshaping

Traffic shaping technology helps throughput by throttling how much bandwidth is consumed at various hours each day (e.g., low bandwidth usage during business hours, high bandwidth usage during non-business hours). Traffic shaping also enables the Cloud Failover Appliance and Data Protection Appliance to prioritize network traffic based on application type or content type (e.g. email vs. video content). We also leverage dynamic MTU (maximum transfer unit) re-sizing to optimize throughput by intelligently sizing the amount of data sent on each request depending on your network connection.

Resilient-Resumption Technology

Sending data to the cloud is still fraught with network hiccups and packet drops. So, it’s critical to ensure that all of your data gets replicated to the cloud. 51Ƶ employs resilient-resumption technology to quickly recover data during network disruptions.

Deduplication (DDFS)

Data deduplication identifies duplicate data, removing redundancies and reducing the amount of data transferred and stored. 51Ƶ’s Deduplicating File System (DDFS) is a patented file system that sits at the heart of our backup appliance’s operating system. DDFS performs block level deduplication that allows us to store a single Golden Master copy of data blocks on the appliance. This translates into massive storage efficiencies on the order of up to 10X. So, a Cloud Failover Appliance with 10 TBs of capacity can actually protect as much as 100 TBs of raw data in your environment.

Over-the-WAN Deduplication (DDFS-AR)

If you think about it, the most efficient way to accelerate the transfer of information across the WAN is to not send it in the first place. While most vendors will utilize source-side deduplication to ensure that the appliance keeps only one version of a file, not all cloud vendors will dedupe the data over the WAN. 51Ƶ leverages our Deduplicating File System-Assisted Replication (DDFS-AR) to perform over-the-WAN (block-level) deduplication. DDFS-AR effectively queries your cloud repository before it transmits any data to see if a particular block already exists within the cloud. It only writes to the cloud archive if that block does not yet exist which reduces your network footprint bandwidth costs but dramatically increase the speed of replication. Unlike competitive solutions which have separate licensing fees for their deduplication, all of this functionality is baked into our hybrid appliances.

Bare Metal Recovery

If a server or a group of servers are totally destroyed by a disaster (e.g., flood, fire, etc.). Bare Metal Recovery still enables the IT team to recreate them from scratch (on a different system/disks) including the operating system, its configuration/ settings, patches, applications running on the operating system and even the data. Our Bare Metal Recovery solution follows automated processes making it super fast and preventing misconfigurations. So, the hardware on to which the system is being recovered can be devoid of any operating system, file formats, and partitions – and the Bare Metal Image would recover them all.

Synthetic Full Backups

51Ƶ pioneered a smarter backup process with synthetic full backups. Making a full backup of your entire system takes time. That’s why 51Ƶ doesn’t make you do it every day. Instead, we take one full backup when you first install it, and after that, only backs up the data that has changed. These incremental backups are then automatically applied to the last backup, so at any time a full, current backup is ready for fast recovery.

Agentless VMware Backup

Traditional backup approaches that require the installation of a backup agent on each virtual machine are unable to scale with this rapid growth of virtual machines in the enterprise. Manually installing a backup agent on each virtual machine is inefficient, time consuming and expensive. It also increases the risk of data loss because newly spun-up virtual machines often go undetected by the system administrator. Our VMware Backup installs at the hypervisor level and automatically detects and backs up every virtual machine in the environment.

ForeverSave Archive

51Ƶ is a true archive and can be used to free up space on your local hard drives and meet your data retention/compliance mandates. We call this ForeverSave. If you delete a file from your computer the backup copy and the most recent of its past versions will remain in the cloud forever. You can manually delete files from your cloud backup if you don’t need them anymore. (Most services limit how long files stay in the cloud after being deleted.) The following file versions will be stored with ForeverSave: Each file version backed up within the past calendar week The last file version backed up each day for the past calendar month The last file version backed up week for the past six months The last file version backed up each month for the past seven+ months, for an unlimited period of time 51Ƶ lets you choose your own data retention periods for the above versions and we’ll auto-delete files from the archive once they hit their retention expiration.

Scroll to Top