Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Elastio, reclaim access to make changes.
Product Avatar Image
Elastio

By Elastio

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Elastio, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.6 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Elastio?

It's been two months since this profile received a new review
Leave a Review

Elastio Reviews & Product Details

Elastio Media

Elastio Demo - Recoverability Index
Identify applications and data not being protected in your environment quickly and automatically correct.
Product Avatar Image

Have you used Elastio before?

Answer a few questions to help the Elastio community

Elastio Reviews (4)

Reviews

Elastio Reviews (4)

4.6
4 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Km R.
KR
Data Scientist
Mid-Market (51-1000 emp.)
"" Amazing tool during high bandwidth attacks ""
What do you like best about Elastio?

I rely on Elastio because it assures em of quick and effective application recoveries by scanning each recovery point for high bandwidth attacks, detecting ransomware, and malware as they're generated, conducting automated recovery tests, securely creating backup them in an unchangeable condition, and also assures a speedy recovery operative method. Review collected by and hosted on G2.com.

What do you dislike about Elastio?

I observed that when I was dealing with high bandwidth attacks, it got slow to react quickly and a lot of data was lost in real-time, but I huge thanks to the customer support team, who helped to recover the most important data. Review collected by and hosted on G2.com.

vivaan T.
VT
Senior Data Scientist
Enterprise (> 1000 emp.)
"Elastio - " Very Helpful to triggers a cyber backup""
What do you like best about Elastio?

I used Elastio to get back data from cyber attacks. Elastio helps to fulfill my client's issue regarding data loss by cyber attacks. It is designed to work without any agent; in other words, we can say that it is humanless and automated, which helps to eliminate cyber attacks and also create a backup that efficiently in recovering data if it detects any cyber threats. Review collected by and hosted on G2.com.

What do you dislike about Elastio?

It is designed for a high response rate, so there are fewer chances to get dislikes from users and strongly refer to it. Go for it. Review collected by and hosted on G2.com.

NIMRATA S.
NS
DATA SCIENTIST
Enterprise (> 1000 emp.)
"Elastio - excellent i tried"
What do you like best about Elastio?

Elastio helps you to detect ransomware and protect by taking the right actions. It also provides essential fast remediation, prevention of data loss, and also stops active and dormant threats. It's monitoring finds the suspicious files and then gives a response to taking action on it. As a threat or failure in a recovery test is detected, it's team is alerted via Slack®. Review collected by and hosted on G2.com.

What do you dislike about Elastio?

Sometimes I feel that it takes more time than I experienced in past. Otherwise it is perfect to protect your data. Review collected by and hosted on G2.com.

Robert S.
RS
President
Small-Business (50 or fewer emp.)
"Elastio automatic backup and Malware detection"
What do you like best about Elastio?

Elastio is easy to integrate with about any application and process. Review collected by and hosted on G2.com.

What do you dislike about Elastio?

Nothing, Elastio works very well and is easy to use. Review collected by and hosted on G2.com.

There are not enough reviews of Elastio for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Druva Data Security Cloud Logo
Druva Data Security Cloud
4.7
(713)
Druva Data Security Cloud provides Enterprise Endpoint Backup and Protection
2
Unitrends Backup and Recovery Logo
Unitrends Backup and Recovery
4.2
(436)
Protects by bridging virtual, physical, and cloud. Unitrends has provided next-generation enterprise-class data protection to thousands of customers.
3
CyberSentriq Logo
CyberSentriq
4.6
(382)
Cybersentriq provides Integrated Cybersecurity & Data Protection for Businesses and Managed Service Providers. Our unified AI-powered platform offers all in one email phishing and spam protection, DNS filtering, security awareness training, email archiving, M365 backup and recovery - enabling users to ensure compliance, easily store and retrieve data, and protect against online threats such as phishing and ransomware
4
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(733)
Acronis Cyber Protect is an integrated solution that combines advanced cybersecurity, data protection, and endpoint management to safeguard businesses against modern cyber threats. By merging backup and anti-malware capabilities into a single platform, it simplifies IT operations, enhances system efficiency, and ensures comprehensive protection across physical, virtual, and cloud environments. Key Features and Functionality: - Integrated Cybersecurity and Backup: Combines AI-based anti-malware with reliable backup to streamline protection processes. - Vulnerability Assessments and Patch Management: Identifies security gaps and applies necessary patches to maintain system integrity. - Disaster Recovery: Ensures business continuity by enabling rapid recovery of data and systems in the event of a cyberattack or system failure. - Endpoint Management: Provides centralized control over all endpoints, facilitating efficient monitoring and management. - Continuous Data Protection: Safeguards critical data by continuously backing up changes, minimizing data loss risks. Primary Value and User Solutions: Acronis Cyber Protect addresses the growing complexity of managing multiple security and backup solutions by offering a unified platform. This integration reduces operational overhead, lowers total cost of ownership, and enhances protection against evolving cyber threats. Businesses benefit from streamlined operations, improved system reliability, and the assurance that their data and systems are secure and recoverable.
5
Cove Data Protection Logo
Cove Data Protection
4.5
(410)
Cove Data Protection is a cloud-first backup and disaster recovery service for servers, workstations, and Microsoft 365 data, all managed from a single multi-tenant dashboard. Cloud storage is included, with data centers worldwide to keep backups in region and isolated from the local network.
6
Datto BCDR Logo
Datto BCDR
4.6
(270)
Datto BCDR 2 is a complete family of enterprise business continuity solutions, available in both physical and virtual platforms, built from the ground up, for businesses of every size.
7
CrashPlan Platform Logo
CrashPlan Platform
4.9
(253)
CrashPlan provides cyber-ready data resilience and governance in a single platform for organizations whose ideas power their revenue. With its comprehensive backup and recovery capabilities for data stored on servers, on endpoint devices, and in SaaS applications, CrashPlan’s solutions are trusted by entrepreneurs, professionals, and businesses of all sizes worldwide. From ransomware recovery and breaches to migrations and legal holds, CrashPlan’s suite of products ensures the safety and compliance of your data without disruption.
8
BDRShield Logo
BDRShield
4.3
(155)
BDRShield by Vembu offers comprehensive and cost-effective Backup and Disaster Recovery software tailored to meet the diverse data protection requirements of Businesses and Service Providers. BDRShield provides robust backup solutions for a wide range of IT workloads, including virtual machines, servers, endpoints, SaaS applications, cloud VMs, NAS/File Shares, and databases & applications. It offers the flexibility to store backups anywhere and centrally manage the entire backup infrastructure. BDRShield is designed to help businesses keep their data secure and ensure it is easily recoverable in the event of data loss or ransomware attacks. With BDRShield, businesses can achieve reliable data protection and ensure business continuity – all at an affordable price.
9
VMware Live Recovery Logo
VMware Live Recovery
4.4
(136)
VMware Live Recovery is a comprehensive solution designed to enhance cyber and data resiliency within VMware Cloud Foundation environments. It integrates enterprise-grade disaster recovery with specialized cyber recovery capabilities into a unified, cloud-based management interface. This integration enables organizations to effectively protect and recover their VMware-based applications and data from a wide range of threats, including ransomware attacks, infrastructure failures, and human errors. By consolidating these critical functions, VMware Live Recovery simplifies administration, reduces operational complexity, and ensures the availability and recoverability of essential assets. Key Features and Functionality: - Unified Management Interface: Provides a centralized console for managing both ransomware and disaster recovery operations across private and public cloud environments, streamlining administrative tasks. - Secure Cyber Recovery: Offers an isolated recovery environment (IRE equipped with next-generation antivirus and behavioral analysis tools to detect and mitigate fileless malware, ensuring safe restoration of infected virtual machines. - Flexible Deployment and Licensing: Utilizes a single deployment method and a flexible subscription model, allowing organizations to provision and manage VMware Live Cyber Recovery and VMware Live Site Recovery seamlessly. - Advanced Snapshot Management: Supports customizable recovery point objectives (RPOs as low as one minute when used with vSphere replication, along with elastic scaling of recovery infrastructure resources. - Enhanced Scalability: Accommodates up to four cloud filesystems per recovery SDDC, providing increased snapshot storage capacity and improved replication performance. Primary Value and Problem Solved: VMware Live Recovery addresses the critical need for a robust, integrated solution that combines disaster recovery and cyber recovery within VMware Cloud Foundation environments. By offering a unified management experience, it simplifies the complexities associated with protecting and recovering VMware-based applications and data from diverse threats. This consolidation not only reduces administrative overhead but also enhances the organization's ability to respond swiftly and effectively to incidents, thereby minimizing downtime, data loss, and business disruption. The solution's flexible licensing and deployment options further ensure that organizations can tailor their recovery strategies to meet specific business requirements, providing peace of mind in an increasingly threat-prone digital landscape.
10
Axcient x360Recover Logo
Axcient x360Recover
4.6
(131)
Chain-free technology eliminates the need to perform labor-intensive reseeding of data, significantly reduces management costs, and ensures the integrity of backups.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Elastio
View Alternatives