Pay as you go |
MSP Partner |
|
---|---|---|
Data and Content Control |
||
Automatic file sanitization Resolve file type and naming differences between platforms |
![]() |
![]() |
Robust migration management Segment your migration into multiple projects and transfers. |
![]() |
![]() |
Adaptable and granular file, user, and folder mapping regardless of platform Customizable source and target assignments for email and file systems |
![]() |
![]() |
Content exclusion and inclusion Based on modtime, file/email size, file types, etc. |
![]() |
![]() |
Granular permission mapping Map permissions between platforms, exclude based on domains or emails, and map different users permissions to different users |
![]() |
![]() |
Automatic filename transformation Configure realtime filename and character transformation |
![]() |
![]() |
Delta/differential sync Manual or scheduled updates to transfer modified data |
![]() |
![]() |
Infrastructure |
||
Highly flexbile platform Compatible with most cloud based file systems as well as on-premise file servers and block storage |
![]() |
![]() |
Email migrations Move emails and files in one platform |
![]() |
![]() |
Resource isolation Temporary worker nodes and no shared resources between customers and projects |
![]() |
![]() |
Granular infrastructure controls Control threads and worker nodes |
![]() |
![]() |
No storing of customer data Data is streamed between platforms in real-time |
![]() |
![]() |
Fast and scalable data transfer Up to 10TB/day into cloud platforms |
![]() |
![]() |
Data Management |
||
Cleanup Tasks Systematic and granular tool for batch deletions |
![]() |
![]() |
Reporting and Alerting |
||
Automatic error handling Granular error logging and rerun capabilities |
![]() |
![]() |
Transparent logging and graphs pre, during, and post-migration Rate‑limiting, worker logs, permissions, and file reports |
![]() |
![]() |
Pre-migration scan Individual containers or whole domain |
![]() |
![]() |
Comprensive data-rich dashboard Provides progress and details on a project and transfer-mapping level |
![]() |
![]() |
Security & Compliance |
||
Secure by design Natively secure through industry best practices and architecture isolation |
![]() |
![]() |
Data Sovereignty compliant Choose your region for data transfers |
![]() |
![]() |
SOC2 compliant Report available in our Trust Center |
![]() |
![]() |
Inactive account security Token revoking after period of inactivity |
![]() |
![]() |
Support |
||
24/7 and on-demand support Available through multiple channels |
![]() |
![]() |
48 hour support Available through multiple channels |
![]() |
![]() |