Axcient x360Recover (formerly BRC) can not only recover a single server or desktop, but can automate the recovery of an entire customer site through its Virtual Office and automated Runbook features. In a disaster event, authorized users can log into the web application or Remote Management Console and create a virtual private cloud called a Virtual Office. The Virtual Office ensures security, privacy and reliability for every organization needing to run one or more failover virtual machines in…
N/A
Hyper Private Access
Score 10.0 out of 10
Small Businesses (1-50 employees)
HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.
$5.99
per month per user
Pricing
Axcient x360Recover
Hyper Private Access
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Axcient x360Recover
Hyper Private Access
Free Trial
Yes
Yes
Free/Freemium Version
No
Yes
Premium Consulting/Integration Services
No
Yes
Entry-level Setup Fee
No setup fee
Optional
Additional Details
—
—
More Pricing Information
Community Pulse
Axcient x360Recover
Hyper Private Access
Features
Axcient x360Recover
Hyper Private Access
Data Center Backup
Comparison of Data Center Backup features of Product A and Product B
Axcient x360Recover
8.5
37 Ratings
5% above category average
Hyper Private Access
-
Ratings
Universal recovery
9.033 Ratings
00 Ratings
Instant recovery
6.736 Ratings
00 Ratings
Recovery verification
9.335 Ratings
00 Ratings
Business application protection
8.534 Ratings
00 Ratings
Multiple backup destinations
8.631 Ratings
00 Ratings
Incremental backup identification
9.336 Ratings
00 Ratings
Backup to the cloud
9.336 Ratings
00 Ratings
Deduplication and file compression
7.832 Ratings
00 Ratings
Snapshots
8.037 Ratings
00 Ratings
Flexible deployment
8.836 Ratings
00 Ratings
Management dashboard
8.637 Ratings
00 Ratings
Platform support
8.037 Ratings
00 Ratings
Retention options
8.136 Ratings
00 Ratings
Encryption
9.434 Ratings
00 Ratings
Enterprise Backup
Comparison of Enterprise Backup features of Product A and Product B
Axcient x360Recover
8.7
34 Ratings
3% above category average
Hyper Private Access
-
Ratings
Continuous data protection
9.527 Ratings
00 Ratings
Replication
8.432 Ratings
00 Ratings
Operational reporting and analytics
7.532 Ratings
00 Ratings
Malware protection
8.323 Ratings
00 Ratings
Multi-location capabilities
9.331 Ratings
00 Ratings
Ransomware Recovery
9.45 Ratings
00 Ratings
Disaster Recovery
Comparison of Disaster Recovery features of Product A and Product B
Axcient x360Recover
8.8
37 Ratings
9% above category average
Hyper Private Access
-
Ratings
Disaster Recovery Planning
9.333 Ratings
00 Ratings
Hot Sites
9.126 Ratings
00 Ratings
Disaster Recovery Testing
9.436 Ratings
00 Ratings
Automated Disaster Recovery
7.329 Ratings
00 Ratings
Identity Management
Comparison of Identity Management features of Product A and Product B
Axcient x360Recover
-
Ratings
Hyper Private Access
10.0
1 Ratings
12% above category average
Multi-Factor Authentication
00 Ratings
10.01 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
I feel that Axcient x360Recover is well suited for any environment, both large and small. Weather you build your own device, BYOD or purchase one of theirs, it all works great. I even use it at home via the direct to cloud option. Well work the investment. I am unable to find a downside at this time.
It is not necessary for a call center to use a secure network, but network admins need HPA. The reasoning behind this is that securing private access is so important.
The business continuity component for spinning up the desired recovery point as a virtual machine on the appliance in order to keep the business operational is rock solid.
Recovering the desired backup point back to the physical hardware or virtual environment and syncing the most recent changes to finalize the recovery is awesome.
The system documentation is concise and easy to use.
The only thing missing is the ability to cancel a backup as they appear to just continue to try to run even after rebooting the BDR and endpoint until a failure finally occurs.
The only other ask would be to expand support to Linux operating systems.
We've been using Axcient over the years and have worked with their development team to suggest new features, something that you would not normally be able to do with other companies. They listen to what we have to say and understand that we are a business, just like them. It's great to know that someone will always be there for you when you need them.
It is overall very easy to install and get working. Install the application, select the drives you want to backup or leave blank and backup all drives. It starts to run immediately. You configure all the backup retention and how often to run in the portal so once you deploy the agent it is very easy to get started. After the backup completes. The portal will perform a test boot and auto verification of the image.
Support is pretty good. The issue is that they don't have any SLA so they get to you whenever. Though, if you hound them, they usually bump you up in the chain and get back to you. Their techs are fairly knowledgeable. Occasionally the first level support isn't the best, but once it bumps up to the next level, they are good.
I had the miss fortune to go back to this device. Alot has changed since the first time I had used it. Now instead a full deployable network appliance, you have to download a preconfigured virtual machine that will only run on an ESXi server. What about Hyper-V? I have many clients that are Hyper-V only. I setup a test lab to get this thing up and running and it has been a nightmare to say the least. Will be looking at other options.
Security and encryption of Axcient is a top priority . Axcient have all the tools to provide solutions to different kind of businesses Best part is it has an MSP friendly console to manage multiples devices and clients at the same Dashboard. Deployment process is very easy in Windows an VMWare Devices.
Features and ease of implementation. Unlike other options, Hyper Private Access offers comprehensive protection for sensitive data while being user-friendly, which was a crucial factor in our decision-making process. It stands out due to its scalability and flexibility when comparing Hyper Private Access to alternative solutions. Unlike competing products, Hyper Private Access adapts seamlessly to the evolving needs of our business, allowing for effortless expansion and customization as our requirements change over time. Hyper Private Access outperforms its counterparts by providing unparalleled reliability and uptime. While evaluating various options, we found that Hyper Private Access consistently delivers uninterrupted access to critical resources, minimizing downtime and ensuring uninterrupted operations, which was a crucial factor in our selection process.
Positive impact: With the implementation of Hyper Private Access, the financial performance of our business has significantly improved. Enhancing access to sensitive resources and information has improved our performance, increasing ROI and greater productivity.
Negative impact: Hyper Private Access appears to have had no adverse effect on our overall business objectives. However, the results obtained through ROI measurements indicate that this technology cannot achieve significant results and has created less productivity.
Positive impact: Hyper Private Access has directly contributed to improving the efficiency and effectiveness of our business operations. By enhancing the security of sensitive data and improving access to it, we have successfully reduced risks and increased the speed of strategic decision-making, directly leading to improved financial performance and overall ROI of our business.