CrashPlan Cloud

Endpoint backup & recovery for the enterprise

View Plans
Code42 Backup + Restore app highlighting Get Files ability.


Crashplan Cloud backs up data 96x a day so you’re always ready to recover files when needed. A real-time file watcher looks for new files and file updates, and backs up changes every 15 minutes by default.


Protect your most important files—what you’re working on right now. Crashplan Cloud backs up files in the following order 1) newer, smaller files 2) newer, larger files, 3) older, smaller files, 4) older, larger files. Read why prioritization is key.


Set CPU allowances for when users are present and away from devices. Configure backup to stop when a laptop reaches a set percent of remaining battery power. Set bandwidth limits by network type, location or peak/off-peak work hours.

Reliable restore

Bounce back from ransomware, hardware failure and user mistakes

Fast data recovery

Source-side deduplication allows you to restore data faster than with other backup solutions.

Flexible versioning and retention

Configure Crashplan Cloud to retain files as long as needed so you can recover previous file versions and even deleted files. User

User admin and restore

Restore files to their original location, to downloads, or to a new location. Select files for restore by any date, time or version. Recover files through self-service restores or remote, admin restores.

Self-healing archives

Regular archive maintenance takes place to validate the health of the backup and check for data corruption. If archive maintenance finds bad blocks of data, the destination self-heals the archive by re-requesting the affected data blocks from the source device.

Foundational data protection

  • Data migration. Crashplan Cloud streamlines device replacements and allows you recover data from ransomware. Files restore in the background while users work.
  • Legal hold. Use Crashplan Cloud to create and manage legal hold preservation policies. Place users on a legal hold to preserve files in place.


Looking to detect data risk from insider threats?