Axcient x360Recover vs. Hyper Private Access

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Axcient x360Recover
Score 9.0 out of 10
N/A
Axcient x360Recover (formerly BRC) can not only recover a single server or desktop, but can automate the recovery of an entire customer site through its Virtual Office and automated Runbook features. In a disaster event, authorized users can log into the web application or Remote Management Console and create a virtual private cloud called a Virtual Office. The Virtual Office ensures security, privacy and reliability for every organization needing to run one or more failover virtual machines in…N/A
Hyper Private Access
Score 10.0 out of 10
Small Businesses (1-50 employees)
HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.
$5.99
per month per user
Pricing
Axcient x360RecoverHyper Private Access
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Axcient x360RecoverHyper Private Access
Free Trial
YesYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional Details
More Pricing Information
Community Pulse
Axcient x360RecoverHyper Private Access
Features
Axcient x360RecoverHyper Private Access
Data Center Backup
Comparison of Data Center Backup features of Product A and Product B
Axcient x360Recover
8.5
37 Ratings
5% above category average
Hyper Private Access
-
Ratings
Universal recovery9.033 Ratings00 Ratings
Instant recovery6.736 Ratings00 Ratings
Recovery verification9.335 Ratings00 Ratings
Business application protection8.534 Ratings00 Ratings
Multiple backup destinations8.631 Ratings00 Ratings
Incremental backup identification9.336 Ratings00 Ratings
Backup to the cloud9.336 Ratings00 Ratings
Deduplication and file compression7.832 Ratings00 Ratings
Snapshots8.037 Ratings00 Ratings
Flexible deployment8.836 Ratings00 Ratings
Management dashboard8.637 Ratings00 Ratings
Platform support8.037 Ratings00 Ratings
Retention options8.136 Ratings00 Ratings
Encryption9.434 Ratings00 Ratings
Enterprise Backup
Comparison of Enterprise Backup features of Product A and Product B
Axcient x360Recover
8.7
34 Ratings
3% above category average
Hyper Private Access
-
Ratings
Continuous data protection9.527 Ratings00 Ratings
Replication8.432 Ratings00 Ratings
Operational reporting and analytics7.532 Ratings00 Ratings
Malware protection8.323 Ratings00 Ratings
Multi-location capabilities9.331 Ratings00 Ratings
Ransomware Recovery9.45 Ratings00 Ratings
Disaster Recovery
Comparison of Disaster Recovery features of Product A and Product B
Axcient x360Recover
8.8
37 Ratings
9% above category average
Hyper Private Access
-
Ratings
Disaster Recovery Planning9.333 Ratings00 Ratings
Hot Sites9.126 Ratings00 Ratings
Disaster Recovery Testing9.436 Ratings00 Ratings
Automated Disaster Recovery7.329 Ratings00 Ratings
Identity Management
Comparison of Identity Management features of Product A and Product B
Axcient x360Recover
-
Ratings
Hyper Private Access
10.0
1 Ratings
12% above category average
Multi-Factor Authentication00 Ratings10.01 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
Axcient x360Recover
-
Ratings
Hyper Private Access
9.5
1 Ratings
8% above category average
Continuous Verification00 Ratings9.01 Ratings
Admin Access Control00 Ratings10.01 Ratings
Network Data Encryption00 Ratings10.01 Ratings
Network Topology Mapping00 Ratings9.01 Ratings
Best Alternatives
Axcient x360RecoverHyper Private Access
Small Businesses
Cove Data Protection
Cove Data Protection
Score 9.7 out of 10
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Medium-sized Companies
Cove Data Protection
Cove Data Protection
Score 9.7 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
Enterprises
Keepit
Keepit
Score 9.4 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Axcient x360RecoverHyper Private Access
Likelihood to Recommend
10.0
(53 ratings)
10.0
(1 ratings)
Likelihood to Renew
9.1
(12 ratings)
-
(0 ratings)
Usability
8.8
(3 ratings)
-
(0 ratings)
Performance
1.0
(1 ratings)
-
(0 ratings)
Support Rating
7.0
(2 ratings)
-
(0 ratings)
Implementation Rating
2.0
(1 ratings)
-
(0 ratings)
User Testimonials
Axcient x360RecoverHyper Private Access
Likelihood to Recommend
ConnectWise
I feel that Axcient x360Recover is well suited for any environment, both large and small. Weather you build your own device, BYOD or purchase one of theirs, it all works great. I even use it at home via the direct to cloud option. Well work the investment. I am unable to find a downside at this time.
Read full review
Hyper ICT Oy
It is not necessary for a call center to use a secure network, but network admins need HPA. The reasoning behind this is that securing private access is so important.
Read full review
Pros
ConnectWise
  • Setup and configuration is extremely easy.
  • The business continuity component for spinning up the desired recovery point as a virtual machine on the appliance in order to keep the business operational is rock solid.
  • Recovering the desired backup point back to the physical hardware or virtual environment and syncing the most recent changes to finalize the recovery is awesome.
  • The system documentation is concise and easy to use.
  • The support team is absolutely fantastic.
Read full review
Hyper ICT Oy
  • Zero Trust Access.
  • Business VPN.
  • Local Area Network on Public Network.
  • Secure Private Network.
Read full review
Cons
ConnectWise
  • The only thing missing is the ability to cancel a backup as they appear to just continue to try to run even after rebooting the BDR and endpoint until a failure finally occurs.
  • The only other ask would be to expand support to Linux operating systems.
Read full review
Hyper ICT Oy
  • Customer Relation Management.
  • SharePoint.
  • Active Directory.
Read full review
Likelihood to Renew
ConnectWise
We've been using Axcient over the years and have worked with their development team to suggest new features, something that you would not normally be able to do with other companies. They listen to what we have to say and understand that we are a business, just like them. It's great to know that someone will always be there for you when you need them.
Read full review
Hyper ICT Oy
No answers on this topic
Usability
ConnectWise
It is overall very easy to install and get working. Install the application, select the drives you want to backup or leave blank and backup all drives. It starts to run immediately. You configure all the backup retention and how often to run in the portal so once you deploy the agent it is very easy to get started. After the backup completes. The portal will perform a test boot and auto verification of the image.
Read full review
Hyper ICT Oy
No answers on this topic
Support Rating
ConnectWise
Support is pretty good. The issue is that they don't have any SLA so they get to you whenever. Though, if you hound them, they usually bump you up in the chain and get back to you. Their techs are fairly knowledgeable. Occasionally the first level support isn't the best, but once it bumps up to the next level, they are good.
Read full review
Hyper ICT Oy
No answers on this topic
Implementation Rating
ConnectWise
I had the miss fortune to go back to this device. Alot has changed since the first time I had used it. Now instead a full deployable network appliance, you have to download a preconfigured virtual machine that will only run on an ESXi server. What about Hyper-V? I have many clients that are Hyper-V only. I setup a test lab to get this thing up and running and it has been a nightmare to say the least. Will be looking at other options.
Read full review
Hyper ICT Oy
No answers on this topic
Alternatives Considered
ConnectWise
Security and encryption of Axcient is a top priority . Axcient have all the tools to provide solutions to different kind of businesses Best part is it has an MSP friendly console to manage multiples devices and clients at the same Dashboard. Deployment process is very easy in Windows an VMWare Devices.
Read full review
Hyper ICT Oy
Features and ease of implementation. Unlike other options, Hyper Private Access offers comprehensive protection for sensitive data while being user-friendly, which was a crucial factor in our decision-making process. It stands out due to its scalability and flexibility when comparing Hyper Private Access to alternative solutions. Unlike competing products, Hyper Private Access adapts seamlessly to the evolving needs of our business, allowing for effortless expansion and customization as our requirements change over time. Hyper Private Access outperforms its counterparts by providing unparalleled reliability and uptime. While evaluating various options, we found that Hyper Private Access consistently delivers uninterrupted access to critical resources, minimizing downtime and ensuring uninterrupted operations, which was a crucial factor in our selection process.
Read full review
Return on Investment
ConnectWise
  • The few customers I have I feel confident and comfortable that a disaster will make recovery easy and fast for my clients.
  • I can set it up and forget about it with reports and alerts
  • I recommend it to any client that requires a good solid backup solution;
Read full review
Hyper ICT Oy
  • Positive impact: With the implementation of Hyper Private Access, the financial performance of our business has significantly improved. Enhancing access to sensitive resources and information has improved our performance, increasing ROI and greater productivity.
  • Negative impact: Hyper Private Access appears to have had no adverse effect on our overall business objectives. However, the results obtained through ROI measurements indicate that this technology cannot achieve significant results and has created less productivity.
  • Positive impact: Hyper Private Access has directly contributed to improving the efficiency and effectiveness of our business operations. By enhancing the security of sensitive data and improving access to it, we have successfully reduced risks and increased the speed of strategic decision-making, directly leading to improved financial performance and overall ROI of our business.
Read full review
ScreenShots

Hyper Private Access Screenshots

Screenshot of Screenshot of Network Map