Hornetsecurity 365 Total Protection vs. Cove Data Protection

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Hornetsecurity 365 Total Protection
Score 8.7 out of 10
N/A
With 365 Total Protection, Hornetsecurity offers users enterprise security management in conjunction with Microsoft Office 365. The Enterprise version gives users enhanced functionality and protection, and covers legally compliant email archiving with advanced features such as eDiscovery and 10-year email retention. It also offers protection against advanced persistent threats through the use of AI-based analysis mechanisms.N/A
Cove Data Protection
Score 8.6 out of 10
N/A
Cove Data Protection (formerly N-Able Backup) is designed to cover servers, datacenters, applications, and workstations, and is provided to ensure business continuity and at-a-glance assessment and fast issue resolution via customizable dashboard.N/A
Pricing
Hornetsecurity 365 Total ProtectionCove Data Protection
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Hornetsecurity 365 Total ProtectionCove Data Protection
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
Hornetsecurity 365 Total ProtectionCove Data Protection
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
Hornetsecurity 365 Total ProtectionCove Data Protection
Data Center Backup
Comparison of Data Center Backup features of Product A and Product B
Hornetsecurity 365 Total Protection
-
Ratings
Cove Data Protection
8.3
16 Ratings
2% above category average
Universal recovery00 Ratings8.413 Ratings
Instant recovery00 Ratings9.213 Ratings
Recovery verification00 Ratings8.314 Ratings
Business application protection00 Ratings8.413 Ratings
Multiple backup destinations00 Ratings6.615 Ratings
Incremental backup identification00 Ratings8.015 Ratings
Backup to the cloud00 Ratings9.915 Ratings
Deduplication and file compression00 Ratings9.215 Ratings
Snapshots00 Ratings7.311 Ratings
Flexible deployment00 Ratings8.614 Ratings
Management dashboard00 Ratings7.816 Ratings
Platform support00 Ratings8.115 Ratings
Retention options00 Ratings9.116 Ratings
Encryption00 Ratings7.915 Ratings
Best Alternatives
Hornetsecurity 365 Total ProtectionCove Data Protection
Small Businesses
Axcient x360Cloud
Axcient x360Cloud
Score 9.0 out of 10
Veeam Data Platform
Veeam Data Platform
Score 9.0 out of 10
Medium-sized Companies
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.7 out of 10
Bacula Enterprise
Bacula Enterprise
Score 9.8 out of 10
Enterprises
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.7 out of 10
Bacula Enterprise
Bacula Enterprise
Score 9.8 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Hornetsecurity 365 Total ProtectionCove Data Protection
Likelihood to Recommend
-
(0 ratings)
9.3
(16 ratings)
Usability
-
(0 ratings)
9.6
(4 ratings)
Support Rating
-
(0 ratings)
9.8
(4 ratings)
User Testimonials
Hornetsecurity 365 Total ProtectionCove Data Protection
Likelihood to Recommend
Hornetsecurity Inc.
No answers on this topic
N-able
Solarwinds Backup is ideal for individuals looking to keep a consistent backup of devices in their environment. We used it primarily for networking equipment. It is easy to set up, as it is one of the steps available when adding a new device to solarwinds. It is probably not an ideal product to use for long-term (1 month+) backups.
Read full review
Pros
Hornetsecurity Inc.
No answers on this topic
N-able
  • Backup Reporting: Email alerts, and a great, easy to read Dashboard with detailed error logs and an easy to search Solarwinds FAQ for a lot of them.
  • Restores: So far I have restored files, full VMs, and VMs to other hardware, and so far it has not only been flawless, but so flexible that I can't imagine going back to any other software.
Read full review
Cons
Hornetsecurity Inc.
No answers on this topic
N-able
  • Restore complete settings: IP settings, the setting of CPU/Memory for VMs, etc. would decrease management during a restore.
  • Individual file backup: more granular settings for backup.
  • Change of device name after setup: at times, computer names change after restore so it would be great to rename the device name.
  • Option to recovery security key.
Read full review
Usability
Hornetsecurity Inc.
No answers on this topic
N-able
Because is a flexible, easy-to-use, complete solution.
it has a complete support site, you can find everything you need.
it can script everything on your network,
it can remote control the pc's and server of your customers.
it can restore from everywhere files and databases.
it can backup quickly and compress finely every kind of data
Read full review
Support Rating
Hornetsecurity Inc.
No answers on this topic
N-able
We have an Italian support partner, they are been very good b7y the first moment.
All the partners are followed with a lot of attention, even the little ones.
there is a site where you can learn everything, the single parts of the product are described perfectly.
Every it specialist should evaluate it.
Read full review
Alternatives Considered
Hornetsecurity Inc.
No answers on this topic
N-able
Cove is able to cover all aspects of backup in a single package. From the same dashboard I can check servers, workstations, and even Office 365. Cove is a much better solution in terms of overall management for a company such as ours. It also provides integration options with N-Able's RMM and Take Control solutions. This allows us to offer our customers with a full service suite in a single package.
Read full review
Return on Investment
Hornetsecurity Inc.
No answers on this topic
N-able
  • There has been NO negative impact to out ROI, but it definitely helps our bottom line. Affordable pricing and solid support make Solarwinds Backup almost a no brainer. That interprets to a growing ROI.
  • The best thing to happen to our ROI is the growth brought in by very happy clients.
Read full review
ScreenShots

Hornetsecurity 365 Total Protection Screenshots

Screenshot of Email Live Tracking with user-defined settings offers users a complete overview of all Emails addressed to them. If an incoming Email has, for example, been classified as spam, you will receive comprehensive information and can individually determine any further interaction. This means that you can always quickly find any email you are searching for and delivery options can be defined for the future.Screenshot of With the help of Infomail Handlings, the inboxes or smartphones of your users will no longer be flooded with newsletters and ad mails. Users are no longer distracted by the constant arrival of unimportant emails, thus making it easier for them to keep track of relevant business matters.Screenshot of Content Control protects your email communication from receiving or sending unwanted or unauthorized file attachments in keeping with your company policy. When running Content Control, umbrella terms and categories (e.g., .docmacro or .executable) may be blocked, for example in the default group (mailboxes that are not allocated to any particular group). For a department such as Marketing, however, the receipt of media files and macros can, on the other hand, be necessary for daily business: In this respect, one can create, for example, a group for the Marketing department and adjust the settings in Content Control so that only potentially dangerous, e.g. executable, file formats are blocked for this group.Screenshot of If an incoming email (e.g. phishing or spam mail) constitutes a threat, the attack is immediately detected by the multi-stage filter systems of 365 Total Protection. Unwanted emails are directly rejected by the Threat Blocking function or detected in later analyses by Threat Intelligence and sent straight to Quarantine. In both cases, these emails will not be delivered to your mailbox.Screenshot of If you do not want to receive emails from one or several specific senders, you can put these on your personal Blacklist. With just one click directly in your in-box the selected senders can be added to the Blacklist to prevent emails from the same sender from being delivered to you in future. If an email from a generally unobjectionable sender lands in Quarantine by mistake, thus appearing in the spam report, the “Whitelist” function can be used. Emails from senders on your Whitelist will always be delivered to your in-box in future.Screenshot of Every email sent out by a company is not only relevant to the business, but is also your company’s business card. In terms of content, a company-wide standardized structure and the completeness of signature datasets are essential. In this context, all email signatures also have the same visual design and layout. This task can also be allocated to the Marketing department or office management via the “What You See is What You Get” editor.