Features Something for you, something for your clients.

Centralized management

An important part of Konturra service is the Admin console, a place where you can manage all of your clients and endpoints. Dashboards, charts, tables and reports show all of the information you need to react proactively, whether there is a problem with a endpoint or someone reached his backup quota.
Use policy settings to manage how a particular service behaves. With just a few clicks change group settings on one or hundreds of different endpoints (workstations and servers), all at once, from a single place.

One click installation

If you have many customers, you probably know how difficult it can be to install or deploy something on each single endpoint. Konturra overcomes this problem with its one click installation feature. Log in to the admin console, select your clients and send them an e-mail with the installation link. Use an installation report to monitor in real time who started with installation and what the progress is.
You can use the same installation link for multiple endpoints of a single client, making installation even easier, whether the client is installing a Windows application or Windows service.

Full control

Even though everything is centralized and can be installed in just one click, you still have full control. From the admin console, you can manage different settings influencing many endpoints at once. You can be administrator of every single thing, locking down options and features; on the other hand, you can choose to let clients select the options you allow.
Lock down everything and choose whether or not to collect CPU information, free disk space, firewall setting, what has to be backed up, in which interval... or allow your client to take care of all of these options.

Secure

Konturra is hosted on Microsoft Azure , in several different data centers around the world, enabling high physical security and availability and offering several different security standards. All data coming in and out of Konturra is protected with SSL and all data backed up from your clients is encrypted using the AES-256 algorithm.
We continually monitor all of our services, maintaining the highest security best practices and standards. You can read more about security here.

 

Additional features

Common features:

  • Full and centralized management of end users (current clients and prospects) and endpoints (workstations, servers)
  • Comprehensive dashboards and reports, covering all aspects of effective management
  • Defining your own pricing but assuring that you have huge margin and still staying very competitive
  • Group policy settings — use it to group and manage different endpoints, for easier maintenance of tens/hundreds of endpoints at the same time
  • Co-branding - use your own logos and identity
  • Multiple users for administration — you can create several different user profiles for your employees
  • Installing components on endpoints as a Windows application (desktops) or Windows service (servers)
  • A built-in "check for new version" feature with proven fully automated transactional updates for endpoints, for reliable client component maintenance
  • Silent and continuous — all components installed on endpoints are designed to run continuously and are designed to use minimal CPU/memory

Online Backup features:

  • Data compression, end-to-end encryption and privacy (AES-256) — encrypt, transfer and store user files using a user-defined key that is not stored anywhere on the servers
  • Built-in support for backing up Microsoft SQL Server databases, full or transactional backup
  • Full or incremental backup
  • Bandwidth throttling
  • Enhanced filtering options
  • Open files backup (Volume Shadow Copy Service)
  • Unlimited storage
  • Customizable backup frequency, from every five minutes to once per week
  • Continuous backup — in case of interruption, Windows restarts or sleeps; backup will automatically resume
  • Retention and versioning — you can set enhanced versioning rules
  • Deleted files protection — you can choose how long we should keep your deleted files
  • Restore a single file or a whole directory, in case of multiple file versions, choose which version of a file to restore

Remote System Monitoring features:

  • Choose between dozens of parameters to monitor
    • Windows event log (application, system, security) — collect all data or just errors
    • Additional log files
    • Windows processes
    • Windows services
    • Windows updates
    • OS name
    • OS threads
    • OS processes
    • RAM total
    • RAM free
    • CPU name
    • CPU time
    • CPU user time
    • CPU privileged time
    • HDD name
    • HDD ID
    • HDD type
    • HDD size
    • HDD free space
    • HDD compressions
    • HDD file system
    • HDD S.M.A.R.T.
    • Firewall status
    • Antivirus status
    • Antispyware status
    • Custom log files
  • Customizable intervals for data collection
  • Alerts — define different alerts to be informed of any change on endpoints