Secure Cyber Resilient Cloud Backup

Backup-as-a-Service.  Powered by Asigra.

Backup as a Service for MSPs

Asigra’s Backup2Cloud is a Backup as a Service (BaaS) platform for MSPs, powered by the multi award-winning Asigra Tigris Secure Backup. Delivered as a straightforward pay-as you-go service it protects your clients’ backups from today’s new deadly breed of attacks, significantly improving their prospects of recovering their data.

Gain all the benefits of the award-winning Asigra Tigris Secure Backup product in a ready to go cloud service.


Get Started ➔




[1] Operating systems Including Microsoft Windows, CentOS, RHEL, Debian, SLES, Ubuntu and macOS.

[2] Applications including Microsoft Exchange server, SharePoint server, SQL server, Oracle Database, Oracle MySQL, PostgreSQL and IBM DB2.

[3] Hypervisors including VMware ESXi, VMWare Cloud Director and Microsoft Hyper-V.

[4] Immutability support for secondary air-gapped storage road mapped for Q2 2024.

Key Features

  • No up-front investment for MSPs or clients
  • Simple pay-as-you-go subscription based on the total amount of protected source data.
  • Quick and straightforward set-up and onboarding.
  • Unlimited retention (configurable per backup set).
  • Unlimited restores.
  • Agentless architecture with unlimited clients.
  • Wide support of operating systems, applications and hypervisors[1][2][3]
  • Highly secure cloud backup solution (using Asigra Tigris Advanced Security).
  • At rest and in-flight encryption for enhanced data security.
  • Inline malware protection including Asigra’s Content Disarm and Reconstruction (CDR) technology for proactive malware scanning of both backup and restore data, included as standard.
  • Optional secondary air-gapped immutable[4] backup storage (supporting HIPAA & organisational requirements).
  • Detailed analytics and real-time visibility for total transparency.
  • ISO 27001 certified with full GDPR and data sovereignty compliance.
  • 99.9% uptime / availability SLA.

Compliance and Security You Can Trust

Trust and transparency in your backup partner are vital attributes to a successful backup service. We know how critical data protection is to any business, especially in the era of data theft, ransomware and crypto viruses, so in order to deliver a service that can combat these threats we’ve built our Backup as a Service (BaaS) platform on the award-winning Asigra Tigris Secure Backup Software along with a 99.9% uptime / availability SLA.

Asigra's Backup2Cloud service is certified with internationally recognised accreditations, such as ISO 27001 and is a fully GDPR compliant service.

Backup as a Service Features

Backup2cloud incorporates advanced features  to deliver a highly-secure and advanced Backup as a Service solution.



Store Your Data Anywhere


Clients can select their backup storage location from our range of secure backup storage locations, including North America, Canada, United Kingdom, and the European Union, ensuring regulatory and data sovereignty requirements can be met.


Air-Gapped Secondary Secure Backup Storage

Add an extra layer of protection for your backup data by holding a secure copy of your backup data in an air-gapped repository at a secondary location, essentially providing a backup for your backup. Backup2Cloud Plus conforms to HIPAA and other regulatory and organizational compliance requirements.


Web Based Management


The My2Cloud Portal and Asigra Management Consoles provide complete transparency and management capability. View important information quickly and be confident that the service is delivering exactly what it should.

Intuitive Management

Your time and resources are limited, but your client expectations are increasing. Managing Backup2Cloud is simple, thanks to an intuitive web console that lets you manage every aspect of your cloud-based backup environment.

1 Dashboard Home
2 Asigra Data Backup Sets
3 Asigra Backup Set Details
4 Asigra Backup Set Recent Activities
5 Dashboard Summary
6. Dashboard Analytics Overview
Advanced Security

Bidirectional Malware Scanning

Cybercriminals increasingly implant trojan horse malware months before a ransomware attack is initiated to prevent you from using your backups as a defence against them.

Backup2Cloud uses bidirectional malware scanning to ensure you can perform a clean recovery when needed.

Scans are performed both during the backup and recovery stages.  If previously dormant malware is found, the file is quarantined before it can reinfect your recovered production environment.

Learn More

Content Disarm and Reconstruction (CDR) 

The new breed of attacks includes deeply embedded executable objects hidden in everyday documents like PDFs and media files that even advanced antimalware scanning can miss.

CDR deconstructs documents and strips them of any potentially malicious code.  The file is then reconstructed back into a functional file without the embedded threat.

Backup2Cloud is leading in secure cloud backups by including CDR as part of the backup and restore process to ensure that backed up or recovered files are safe.

Learn More

Advanced Security


If attackers gain access to your administrative credentials by phishing, then they can do direct damage to your backup settings and files.  

Multifactor Authentication (MFA) and Multiperson Approval (MPA) work together to add extra layers of security by first requiring users to authenticate using generated passwords before accessing the management environment.

Once in, if a user accidentally or maliciously performs a destructive action, like deleting a backup repository, MPA intervenes by requiring additional users to approve the action before it can occur, preventing potential data loss from happening.

Learn More

Soft Delete

When all else fails, fool the attackers.   

In the unlikely event that an attacker can gain access to your Backup2Cloud subscription, you can interfere with their ability to permanently delete backup data.

With Soft Delete, the admin console will report that a backup job deletion attempt has succeeded, but a copy of the deleted backup job remains available for recovery.

True deletions require a two-step process that is hidden from attackers unfamiliar with your backup console and can only be performed by administrators.

Learn More

FIPS 140-2 Encryption

An increasingly used tactic is for attackers to not only encrypt data but download a copy for themselves to use as a secondary ransom threat.

While attackers may target your primary data storage repositories, your backup data is also a target and, without sufficient protection, may be easier to steal from than your primary storage.

Backup2Cloud prevents backup data from being used for this purpose by using strong AES-256-bit encryption in-flight and at-rest ensuring the data held in the service can only be accessed with your unique encryption keys.

Learn More

Optimized For Recovery

Be confident that your client data is recoverable when it matters most.



Autonomic Healing

Backup2cloud automatically assesses backup files and, when corruption is detected, a request is made to back up the corrupted file again during the next backup, improving recoverability rates. 

Learn More


Restore Validation

Testing backups is vital to validating recoverability.  Backup2Cloud allows for backup tests to be run in memory, making testing easy, fast, and resource-free, so you can be more confident in your ability to restore.  Learn More


Incremental Forever

Backup2Cloud optimizes backup windows by allowing incremental forever backups.
It also allows granular recovery of files so that small recovery jobs can be performed without waiting for a full backup restore to complete.


Contact Us to Speak With a Representative

We would love to tell you more about Backup2Cloud!  

Contact us today to speak with a representative about offering a secure backup as a service solution to your clients.


  • No up-front investment for MSPs or your clients
  • Simple pay-as-you-go subscription based on the total amount of protected source data.
  • Quick and straightforward set-up and onboarding.
  • Advanced security, including ransomware protection
  • Easy and intuitive management