Want the fastest Hyper-V backups? Watch how Alike’s CBT for Hyper-V can backup a VM in minutes!
Want more information on Alike’s unique features, or a few quick troubleshooting tips? Get to know Alike in these short videos! Check out all of our videos on YouTube.
Why Choose Alike?
Want to know how Alike stands out from the competition? This short video explains lists the features and benefits that make Alike the leading solution for Citrix XenServer, Microsoft Hyper-V, and Windows Physical Servers.
Alike Virtual Appliance Sneak Peek
Introducing the New Alike Appliance (A2). The A2 will provide the same high performance, lightweight and reliable data protection but with the added simplicity of an appliance that is both low cost and low maintenance with improved performance and scalability. Read more in our blog post.
Ransomware Protection with Alike DR
If you really want full protection against ransomware and other disasters, prevention by backing up your systems and having a complete disaster recovery plan is your best defense. This video shows you how Alike DR’s comprehensive backup and recovery solution can help protect your data and your business. To read more about how to build a BDR plan to fit your infrastructure and business continuity needs, see this blog post.
How Alike’s Offsite Vaulting Could Save Your Business
Looking for a disaster recovery plan that’s affordable, effective, easy to implement, and also guarantees that your business will survive the zombie apocalypse? If you don’t have site-level data protection, you won’t recover after a disaster. It’s really that simple. This video explains why Alike DR’s offsite vaulting could save your business, even if the zombie apocalypse happens to be a real thing one day.
Benefits of Replication with Alike
With Alike’s highly efficient replication, you always have a standby of your systems in case your in case your Production server has any issues. See how replication with Alike works and how it can benefit your environment.
Why Alike is the Best Backup Software for Citrix XenServer
With features like true Global Deduplication and Changed Block Tracking, technical support from XenServer experts, an intuitive web-based UI, and many more advanced features for XenServer highlighted in this video, you’ll learn why Alike is the leading backup solution for Citrix XenServer.
How to Get the Fastest Hyper-V Backups with Alike’s CBT
Alike features Changed Block Tracking (CBT) for Hyper-V (available in Alike v4.x and up). Watch how to backup a Hyper-V VM in just over a minute using CBT for Microsoft Hyper-V.
Quadric Software’s Alike is a cost-effective, multi-platform backup and disaster recovery software for businesses of all sizes. Learn more about Alike’s powerful features, editions, and why Alike is still the industry leader in deduplication and Citrix XenServer protection.
Run a File Level Restore Job in Alike
Learn how to run a File Level Restore job with Alike in this short video.
Alike’s Changed Block Tracking for XenServer
With the release of v4.5, Alike features Changed Block Tracking for XenServer 6.5 and up. Backups can now be done in just a few minutes. Watch how easy it is to use and how much faster backups are with CBT for XenServer. Update: With the release of Alike v4.6, you can use CBT for Hyper-V 2008 and up.
Adding a New Hyper-V Host
Alike can protect both Citrix XenServer and Microsoft Hyper-V virtual hosts. In this video, learn how to add and license a new Hyper-V host, and start creating backups in minutes.
Alike Web UI Tutorial
Get a brief overview of Alike’s mobile-friendly, web-based user interface and see how easy it is to manage your backup, replication, and recovery jobs from a single console.
Configuring Offsite Vaulting for Amazon S3
Alike DR’s Offsite Vaulting is a powerful way to provide efficient, low cost site level recovery. With Alike v4.0, you may now use Amazon’s S3 cloud storage to store your backups safely and securely.
Creating Policy Backup Jobs in Alike v4.0
Learn how to protect all your VMs on a single host, ensure all future VMs added are protected, and manage backups for systems with unique naming conventions.