Software Information

Getting Started Wizard

Getting Started Wizard

The Getting Started Wizard will automatically appear if any of the critical fields have been left blank when Monster Backup was run. This wizard walks the user through the steps of connecting to the backup server, configuring backup sets, creating a backup schedule and setting a secret encryption key.

FastBIT Incremental Backups

FastBIT Patching Technology

The most efficient backup technology available today! FastBIT technology can accurately extract the changes that you've made to a file since your last backup. This efficiency is achieved by using the powerful FastBIT difference engine to identify and extract the binary-level differences on two versions of any file. The technology works on ANY type of file. On average, FastBIT backups are more than 6 times smaller and faster than Delta Block technology used by other companies. That means Monster Backup requires 1/6 of the bandwidth and server storage than applications using Delta Block technology.

Tamper Proof Blocking

tamper_sm.png (8730 bytes)

Monster Backup v3.6 offers administrators the ability to "lock down" certain functions on each Monster Backup client. At any time, administrators can view or change the settings that control the level of usage each client is offered. This could be used to prevent users from changing backup schedules or changing file selections.

Silent Mode

The Monster Backup Client now supports a silent mode that will allow the program to run silently in the background without displaying any Windows or Task Bar icons. This allows the administrator to set scheduled backups to run silently at a low priority to accomplish users backups throughout the day.

Multiple Version Restoration

Restore Files From Multiple Dates

All Monster Backup users have instant access to restore any version of their data files. Due to the technique used in the FastBIT incremental backups, a tremendous file history can be stored in a minimal amount of disk space. Although each incremental backup contains the small changed portions of the file, the server software has the capability of recovering any version of a file from the initial backup to the last incremental backup and EVERY version in between

Automatic Online Upgrades

All version upgrades can be distributed to all end-users automatically after completing a backup. When new versions of the client software are available, the update patches can be placed on the server to allow client to automatically get updated to the latest version. All update patches are created with the same FastBIT technology to reduce transfer time. Upgrades happen seamlessly without any user intervention required.

Event Manager

Click to View Full Size Image

The Event Manager is provided to alert users of any missed or failed backups. If a scheduled backup is missed, the next time the computer is started the Event Manager will display the missed event and allow the user to immediately perform the missed event. This is useful for laptop users that may be out of the office during a regularly scheduled backup.

If a backup fails to complete successfully, the Event Manager will try the backup again when the computer is restarted or Monster Backupis executed. If a backup fails due to a network problem, the Event Manager will prompt the user to complete the backup at a later date.

E-mail Notification

Backup Notification via E-mail

The client software can be configured to send an e-mail to any user(s) upon any successful backup or a backup with errors or warnings. A summary of the attempt is sent in the body of the message and the complete log file may be attached as an option.

Backup Sets

Backup Sets

Monster Backup features the ability to create an unlimited number of backup sets. Since backup sets can be scheduled to run independently, a user can configure multiple backup sets to run at different times. For example, a backup set containing all data files can be configured to run at the end of each week and another backup set containing a single database file can be configured to run multiple times per day. All file versions will still be immediately available for the user to restore.

Advanced Encryption

Secure encrypted backup

In order to secure every user’s data from prying eyes, all data is stored in an encrypted format and all communications between the client and server are encrypted. Users can choose between DES, Triple-DES and Blowfish encryption algorithms. The software is available with exportable levels of encryption for International customers.

File Filters

Click to View Full Size Image

Including or excluding files from the backup selection is readily available to allow users to set filters manually or use the filter wizard to help the novice user. Filters can be created to include all data files on a users system to avoid hunting through a hard drive for all of the data files. If a user or administrator creates a useful filter, it can easily be shared with any other users.

Enhanced Scheduling

Backup scheduling

Enhanced scheduling options have been added to the client software to he automate the backup process, ensuring that the user data is backed up on a regular basis without requiring user intervention. The new scheduling capabilities allow users to configure backups at any time, multiple times per day or even before Windows Shut Down. Additionally, any third party scheduling application can be used to run the backup application by scheduling simple command line calls to run an automated backup.

System Tray Control

Tray

Upon installation, a small application is configured to run in your Windows System Tray. This application monitors the scheduling process and give the end user quick access to a number of useful functions, including:

  • Backup and Close – Run a backup and then close the application when finished.
  • Backup and Logoff – Run a backup and logoff the system when finished.
  • Backup and Shutdown – Run a backup and shutdown the system when finished.
  • And more...

Log File Review and Printing

All backup and restore transactions are thoroughly logged on the client and the server applications. The user can quickly review and print the client logs from the client application. The server maintains a Master Log of all general user activity and records detailed information for each user to help track usage and aid in technical support.

Configurable 3rd Party Tools

Tools for Backup and Restore

Monster Backup supports the ability to run any 3rd party application(s) before or after a backup or restore action. For instance Monster Backupcan be configured to run a virus scanner before the backup and run a defragmentation utility after the backup. A virus scanner can also be configured to run after every restore process.

CPU Utilization

Backup CPU Usage

Since the FastBIT technology leverages the CPU power to get the great file reductions, it can be taxing on the processor. Since some backups are done while the user is working on the system and some backups are done after hours when the user is away, we allow the CPU utilization to be configured. Users can give the backup application all the processing power it needs, or make the backup application subordinate to other tasks.

Customizable Toolbars

toolbar.png (1688 bytes)

Monster Backup supplies useful toolbars for users to quickly access commonly used functions. The toolbars can be customized and displayed based on the users individual preference.

[Top]