Skip to main content

Backup, Disaster Recovery, and Archiving

Backup software creates recoverable copies of data, systems, and configurations to protect against data loss, corruption, ransomware, and disasters. Disaster recovery extends this capability to enable rapid restoration of entire systems and services following catastrophic failures. Archiving addresses long-term retention requirements for compliance, legal hold, and historical reference.

This page covers client-server and standalone backup solutions that protect file systems, virtual machines, applications, and databases. The scope includes deduplicating backup tools, enterprise backup platforms, and solutions with integrated disaster recovery capabilities. Cloud-native backup services (AWS Backup, Azure Backup) and database-specific backup tools are covered in separate benchmarks.

Assessment methodology

Tool assessments derive from official vendor documentation, published API references, release notes, and technical specifications as of 2026-01-24. Feature availability varies by product tier, deployment model, and version. Verify current capabilities directly with vendors during procurement. Community-reported information is excluded; only documented features are assessed.

Requirements taxonomy

This taxonomy defines evaluation criteria for backup, disaster recovery, and archiving tools. Requirements are organised by functional area and weighted by typical priority for mission-driven organisations. Adjust weights based on specific operational context and compliance obligations.

Functional requirements

Core capabilities that define what the tool must do for data protection.

Backup operations

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F1.1File-level backupAbility to back up individual files and directories with metadata preservationFull: preserves permissions, timestamps, extended attributes, ACLs. Partial: basic metadata only. None: data only.Review file backup documentation; test with complex permission structuresEssential
F1.2Image-based backupBlock-level backup of entire disks or volumes capturing complete system stateFull: bootable images, bare-metal restore support. Partial: images without boot capability. None: file-level only.Review image backup documentation; verify bare-metal restore proceduresEssential
F1.3Incremental backupBackup of only changed data since the last backup, reducing time and storageFull: block-level change detection, forever-incremental support. Partial: file-level incremental. Limited: full backups only.Review incremental backup documentation; assess change tracking mechanismEssential
F1.4Synthetic full backupCreation of full backup from existing incremental chain without re-reading source dataFull: automated synthetic full creation. Partial: manual consolidation only. None: requires source re-read.Review synthetic full documentation; verify storage efficiencyImportant
F1.5Continuous data protectionNear-real-time backup with recovery point objectives measured in seconds or minutesFull: journal-based CDP with configurable RPO. Partial: frequent scheduled backups. None: minimum daily intervals.Review CDP documentation; verify actual achievable RPOContext-dependent
F1.6Application-consistent backupCoordination with applications to ensure backup captures consistent application stateFull: VSS/application quiescing, pre/post scripts. Partial: crash-consistent only with application support.Review application consistency documentation; test with database workloadsEssential
F1.7Parallel backup streamsAbility to backup multiple sources simultaneously to maximise throughputFull: configurable parallelism per job and globally. Partial: fixed parallelism. None: sequential only.Review parallelism documentation; test with multiple backup sourcesImportant

Deduplication and storage efficiency

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F2.1Content-defined chunkingVariable-length chunking that identifies duplicate data across files and backupsFull: content-aware chunking with configurable parameters. Partial: fixed-size blocks. None: no deduplication.Review deduplication documentation; verify chunking algorithmEssential
F2.2Global deduplicationDeduplication across all backup sources and retention periods in a repositoryFull: repository-wide deduplication. Partial: per-job or per-client only. None: no cross-backup deduplication.Review global dedup documentation; test with multiple similar sourcesImportant
F2.3CompressionData compression to reduce storage requirementsFull: multiple algorithms (zstd, lz4, zlib), configurable levels. Partial: single algorithm, fixed level. None: no compression.Review compression documentation; benchmark compression ratiosImportant
F2.4Source-side deduplicationDeduplication processing at the backup client before data transferFull: client-side dedup reducing network traffic. Partial: server-side only.Review client architecture documentationImportant
F2.5Storage backend flexibilitySupport for multiple storage destinations including local, network, cloud, and tapeFull: 5+ storage backends with consistent API. Partial: 2-4 backends. Limited: single backend type.Review storage backend documentation; verify supported destinationsEssential

Recovery operations

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F3.1Granular file recoveryAbility to restore individual files without recovering entire backupFull: file browser, search, instant access. Partial: extraction from archive. None: full restore only.Review file recovery documentation; test selective restoreEssential
F3.2Point-in-time recoveryRecovery to specific timestamps within retention periodFull: any point within retention. Partial: backup point times only. None: latest only.Review PITR documentation; verify granularityEssential
F3.3Bare-metal recoveryFull system restoration to dissimilar or replacement hardwareFull: hardware-independent restore, driver injection. Partial: same hardware only. None: not supported.Review bare-metal documentation; verify hardware compatibilityImportant
F3.4Instant recoveryImmediate workload availability by running directly from backup storageFull: VM instant recovery with storage vMotion. Partial: manual failback. None: traditional restore only.Review instant recovery documentation; verify performance impactImportant
F3.5Cross-platform recoveryRecovery of backups to different operating systems or hypervisorsFull: P2V, V2V, cross-hypervisor support. Partial: limited conversion options. None: same platform only.Review cross-platform documentation; test conversion scenariosContext-dependent
F3.6Recovery verificationAutomated testing and validation of backup recoverabilityFull: automated recovery testing, integrity verification, sandboxed boot testing. Partial: manual verification only.Review verification documentation; assess automation optionsImportant

Disaster recovery

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F4.1ReplicationReal-time or scheduled copying of backups to secondary locationsFull: continuous replication with bandwidth control. Partial: scheduled copy jobs. None: manual copy only.Review replication documentation; verify bandwidth managementEssential
F4.2Failover automationAutomated or orchestrated failover to recovery site during disasterFull: automated failover with runbooks. Partial: manual failover with procedures. None: no failover support.Review failover documentation; verify orchestration capabilitiesImportant
F4.3Recovery orchestrationCoordinated recovery of multiple systems in correct sequence with dependenciesFull: dependency-aware orchestration, runbooks. Partial: manual sequencing. None: individual recovery only.Review orchestration documentation; test multi-system recoveryImportant
F4.4RTO/RPO monitoringTracking and reporting of recovery time and recovery point objectivesFull: automated SLA monitoring, alerting. Partial: manual calculation. None: no tracking.Review RTO/RPO documentation; verify reporting capabilitiesImportant
F4.5DR testingNon-disruptive testing of disaster recovery proceduresFull: isolated DR testing, automated validation. Partial: manual test procedures. None: production-impact testing only.Review DR testing documentation; assess test isolationImportant

Archiving and retention

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F5.1Retention policiesConfigurable rules for backup retention based on age, count, or custom criteriaFull: GFS schemes, custom policies, per-source rules. Partial: global policies only. None: manual deletion.Review retention documentation; verify policy flexibilityEssential
F5.2Legal holdAbility to prevent deletion of backups subject to legal or compliance requirementsFull: explicit legal hold with audit trail. Partial: manual policy override. None: no hold capability.Review legal hold documentation; verify audit capabilitiesContext-dependent
F5.3Immutable backupsWrite-once storage preventing modification or deletion for specified periodsFull: software and hardware immutability support. Partial: software-only. None: mutable backups only.Review immutability documentation; test deletion attemptsImportant
F5.4Archive tieringMovement of aged backups to lower-cost storage tiersFull: automated tiering with policies. Partial: manual archive migration. None: single tier only.Review tiering documentation; verify automationContext-dependent
F5.5Long-term format stabilityBackup format designed for long-term accessibility without version lock-inFull: documented open format, format versioning. Partial: proprietary but stable. Poor: frequent format changes.Review format documentation; assess upgrade requirementsImportant

Technical requirements

Infrastructure and architecture considerations.

Deployment and hosting

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T1.1Self-hosted deploymentInstallation on organisation-controlled infrastructureFull: documented self-hosted deployment, no cloud dependency. Partial: hybrid only. None: SaaS only.Review deployment documentation; verify offline capabilityEssential
T1.2Container deploymentDeployment via containers for consistent, portable installationFull: official container images, Kubernetes support. Partial: community images. None: no container support.Review container documentation; verify image maintenanceImportant
T1.3High availabilityRedundant deployment preventing single points of failureFull: active-active or active-passive HA, documented procedures. Partial: manual failover. None: single instance only.Review HA documentation; verify failover mechanismsImportant
T1.4Air-gapped deploymentOperation in isolated networks without internet connectivityFull: offline installation, updates, licensing. Partial: initial online activation. None: requires connectivity.Review air-gap documentation; verify offline licensingContext-dependent
T1.5Multi-site architectureDistributed deployment across multiple geographic locationsFull: federated management, site-aware routing. Partial: independent instances.Review multi-site documentation; assess management capabilitiesContext-dependent

Scalability and performance

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T2.1Horizontal scalingAddition of capacity through additional nodes rather than larger hardwareFull: scale-out architecture, load distribution. Partial: limited scale-out. None: scale-up only.Review scaling documentation; verify architectureImportant
T2.2Large file handlingEfficient backup of files exceeding 1TB in sizeFull: streaming backup, chunked processing. Partial: memory-constrained. None: size limitations.Review large file documentation; test with TB-scale filesContext-dependent
T2.3High file count handlingEfficient backup of sources with millions of filesFull: optimised metadata handling, parallel scanning. Partial: performance degradation. None: practical limits.Review file count documentation; benchmark with millions of filesImportant
T2.4Network efficiencyOptimisation of backup traffic over constrained networksFull: bandwidth throttling, WAN optimisation, delta sync. Partial: basic throttling. None: no optimisation.Review network documentation; test on bandwidth-limited connectionsImportant
T2.5Resource managementControl over CPU, memory, and I/O consumption during backup operationsFull: configurable resource limits per job. Partial: global limits only. None: no resource control.Review resource documentation; verify enforcementImportant

Integration architecture

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T3.1REST APIProgrammatic access to backup operations and managementFull: comprehensive API, documented, versioned. Partial: limited operations. None: no API.Review API documentation; assess coverageImportant
T3.2CLI interfaceCommand-line access for scripting and automationFull: complete CLI parity with GUI. Partial: limited commands. None: GUI only.Review CLI documentation; compare with GUI capabilitiesEssential
T3.3Pre/post scriptsExecution of custom scripts before and after backup operationsFull: configurable hooks with error handling. Partial: basic script support. None: no hooks.Review script documentation; test error scenariosImportant
T3.4Monitoring integrationExport of metrics and events to monitoring systemsFull: Prometheus/SNMP/syslog export. Partial: built-in monitoring only. None: no export.Review monitoring documentation; verify export formatsImportant
T3.5Hypervisor integrationNative integration with virtualisation platformsFull: agentless VM backup, CBT support. Partial: agent-required. None: no hypervisor awareness.Review hypervisor documentation; verify CBT supportImportant

Security requirements

Security controls and data protection capabilities.

Encryption

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S1.1Client-side encryptionData encrypted before leaving the backup clientFull: client-side encryption, key never transmitted. Partial: server-side encryption. None: unencrypted transfer.Review encryption documentation; verify key handlingEssential
S1.2Encryption algorithmCryptographic algorithm used for data protectionAES-256-GCM or equivalent authenticated encryption. AES-256-CBC acceptable. Weaker algorithms inadequate.Review encryption documentation; verify algorithm and modeEssential
S1.3Key managementControl over encryption keys including generation, storage, and rotationFull: user-controlled keys, KMS integration, rotation support. Partial: vendor-managed keys. None: no key management.Review key management documentation; verify rotation proceduresEssential
S1.4Encryption at restProtection of stored backup dataFull: mandatory encryption of repository. Partial: optional encryption. None: unencrypted storage.Review storage documentation; verify encryption enforcementEssential
S1.5Transport encryptionProtection of data during network transferFull: TLS 1.3 or TLS 1.2 with strong ciphers. Partial: TLS 1.2 minimum. None: unencrypted transport.Review transport documentation; test cipher negotiationEssential

Authentication and access control

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S2.1Role-based access controlGranular permissions based on user rolesFull: custom roles, granular permissions, delegation. Partial: fixed roles. Limited: admin/user only.Review RBAC documentation; assess granularityImportant
S2.2Multi-factor authenticationMFA support for administrative accessFull: TOTP, WebAuthn, push notification support. Partial: single MFA method. None: password only.Review MFA documentation; verify supported methodsImportant
S2.3SSO integrationFederation with identity providersFull: SAML 2.0 and OIDC support. Partial: single protocol. None: local authentication only.Review SSO documentation; verify IdP compatibilityImportant
S2.4Audit loggingComprehensive logging of administrative and backup operationsFull: immutable audit logs, configurable retention, export. Partial: basic logging. None: no audit trail.Review audit documentation; assess log completenessEssential
S2.5Separation of dutiesPrevention of single administrator having complete controlFull: segregated backup and restore permissions, dual control options. Partial: basic separation. None: no separation.Review access control documentation; verify separation optionsImportant

Security certifications and compliance

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S3.1SOC 2 Type IIIndependent audit of security controls (commercial vendors)Full: current certification for relevant services. Partial: Type I only. None: no certification.Request SOC 2 report; verify audit scopeImportant
S3.2Security track recordHistory of vulnerability handling and security incidentsFull: responsible disclosure programme, timely patches, CVE tracking. Partial: reactive patches. Poor: unaddressed vulnerabilities.Review security advisories; check CVE databaseImportant
S3.3Code auditabilityAbility to review source code for security assessmentFull: open source with complete source access. Partial: source available for review. None: closed source.Review licence terms; assess audit optionsContext-dependent

Operational requirements

Day-to-day administration and management considerations.

Administration

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O1.1Web management interfaceBrowser-based administration consoleFull: comprehensive web UI, responsive design. Partial: limited web UI. None: CLI/desktop only.Review UI documentation; assess during trialImportant
O1.2Centralised managementSingle console for managing multiple backup servers or clientsFull: centralised policy, monitoring, reporting. Partial: basic aggregation. None: per-instance management.Review central management documentationImportant
O1.3Policy-based managementDefinition and application of backup policies across multiple sourcesFull: hierarchical policies, inheritance, exceptions. Partial: flat policies. None: per-source configuration.Review policy documentation; test inheritanceImportant
O1.4Scheduling flexibilityControl over backup timing and frequencyFull: flexible schedules, calendar integration, timezone support. Partial: basic cron-style. Limited: fixed intervals.Review scheduling documentation; assess flexibilityEssential
O1.5Notifications and alertingProactive notification of backup status and issuesFull: multi-channel alerts, customisable thresholds, escalation. Partial: email only. None: log review required.Review alerting documentation; verify channelsImportant

Monitoring and reporting

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O2.1Backup job monitoringReal-time visibility into backup job status and progressFull: live progress, detailed status, historical trends. Partial: completion status only.Review monitoring documentation; assess visibilityEssential
O2.2Capacity reportingTracking and forecasting of storage consumptionFull: deduplication ratios, growth trends, forecasting. Partial: current usage only.Review reporting documentation; verify forecastingImportant
O2.3Compliance reportingReports demonstrating backup policy complianceFull: SLA compliance, audit reports, scheduled delivery. Partial: manual report generation. None: no compliance reports.Review compliance documentation; assess report templatesImportant
O2.4Health monitoringProactive detection of backup infrastructure issuesFull: component health, predictive alerts, self-healing. Partial: reactive alerts. None: manual monitoring.Review health documentation; verify alertingImportant

Maintenance and support

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O3.1Documentation qualityCompleteness and accuracy of technical documentationExcellent: comprehensive, current, searchable, tutorials. Good: complete reference. Adequate: basic coverage. Poor: minimal.Assess documentation during evaluationEssential
O3.2Update mechanismProcess for applying updates and patchesFull: in-place updates, rollback support, staged rollout. Partial: manual update process. None: reinstallation required.Review update documentation; verify rollbackImportant
O3.3Backup of backup infrastructureProtection of backup server configuration and metadataFull: integrated backup of catalogue/config. Partial: manual export. None: no metadata backup.Review self-backup documentation; verify recoveryImportant
O3.4Community or vendor supportAvailable support channels and response capabilitiesDocument channels: community forum, email, phone, premium support. Note response commitments.Review support options; check SLA termsImportant

Data management requirements

Data handling, portability, and lifecycle.

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
D1.1Repository format documentationPublic documentation of backup storage formatFull: open, documented format enabling third-party tools. Partial: documented but proprietary. None: undocumented format.Review format documentation; assess opennessImportant
D1.2Repository portabilityAbility to move backup repositories between systemsFull: platform-independent repositories, documented migration. Partial: same-platform portability. None: tied to installation.Review portability documentation; test migrationImportant
D1.3Integrity verificationDetection of backup corruption or tamperingFull: cryptographic integrity checks, periodic verification. Partial: basic checksums. None: no verification.Review integrity documentation; verify check mechanismsEssential
D1.4Repository maintenanceTools for repository health and optimisationFull: automated maintenance, space reclamation, consistency checks. Partial: manual tools. None: no maintenance.Review maintenance documentation; assess automationImportant

Commercial and contractual requirements

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
C1.1Pricing modelStructure of licensing or subscription costsPer-socket, per-TB, per-workload, or subscription models. Assess predictability and scale impact.Review pricing documentation; model costs at scaleImportant
C1.2Nonprofit pricingDiscounted licensing for qualifying organisationsFull: established programme, significant discount. Partial: ad-hoc discounts. None: standard pricing.Research nonprofit programmes; verify eligibilityImportant
C1.3Open source licenceLicence terms for FOSS optionsBSD/MIT (permissive), AGPL (copyleft, network use triggers), proprietary components.Review licence terms; assess compliance requirementsEssential for FOSS
C1.4Vendor stabilityOrganisation financial health and longevityAssess: funding, revenue model, market position, community health (FOSS).Research organisation; review governanceImportant

Accessibility requirements

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
A1.1Web UI accessibilityAccessibility of browser-based management interfaceFull: WCAG 2.1 AA compliance. Partial: basic keyboard navigation. None: mouse-dependent.Test with screen reader; review accessibility statementImportant
A1.2CLI accessibilityCommand-line interface for visually impaired administratorsFull: complete CLI with accessible output formats. Partial: limited CLI. None: GUI only.Review CLI documentation; test output formatsImportant

Assessment methodology

Tools are assessed against each requirement using the following scale:

RatingSymbolDefinition
Full supportRequirement fully met with documented, production-ready capability
Partial supportRequirement partially met; limitations documented in notes
Minimal supportBasic capability exists but significant gaps
Not supportedCapability not available
Not applicable-Requirement not relevant to this tool
Not assessed?Insufficient documentation to assess

Additional notation:

  • $ indicates feature requires paid tier or add-on
  • E indicates enterprise tier only
  • P indicates plugin or extension required

Functional capability comparison

Backup operations

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
F1.1File-level backup
F1.2Image-based backup●P
F1.3Incremental backup
F1.4Synthetic full backup
F1.5CDP●$●$
F1.6Application-consistent
F1.7Parallel streams

Assessment notes:

  • restic F1.6: Supports pre/post backup hooks for application quiescing; no native VSS integration
  • BorgBackup F1.6: Pre/post hooks available; VSS through external scripting only
  • restic/BorgBackup F1.2: File-level only; image backup requires separate imaging tool

Deduplication and storage efficiency

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
F2.1Content-defined chunking●P
F2.2Global deduplication
F2.3Compression
F2.4Source-side deduplication
F2.5Storage backend flexibility

Assessment notes:

  • restic F2.5: Supports local, SFTP, REST, S3, Azure, GCS, Backblaze B2, and other backends
  • BorgBackup F2.5: Local and SSH/SFTP; cloud via rclone mount or borg-specific repos
  • Proxmox Backup Server F2.5: Local, S3 (technology preview in v4.0+), remote PBS sync
  • Bareos F2.1: Dedupable storage backend added in version 24; requires compatible storage (ZFS, VDO, btrfs)

Recovery operations

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
F3.1Granular file recovery
F3.2Point-in-time recovery
F3.3Bare-metal recovery
F3.4Instant recovery
F3.5Cross-platform recovery
F3.6Recovery verification

Assessment notes:

  • restic F3.6: Repository integrity checks with restic check; no automated recovery testing
  • Proxmox Backup Server F3.3: Bare-metal for Proxmox VE guests; limited for physical systems
  • Proxmox Backup Server F3.5: VM recovery between Proxmox clusters; no cross-hypervisor

Disaster recovery

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
F4.1Replication
F4.2Failover automation●$●$
F4.3Recovery orchestration●$●$
F4.4RTO/RPO monitoring
F4.5DR testing

Assessment notes:

  • restic F4.1: Copy command for repository-to-repository transfer; no continuous replication
  • BorgBackup F4.1: Repository sync via borg transfer; manual scheduling
  • Proxmox Backup Server F4.1: Built-in sync jobs between PBS instances with bandwidth control

Archiving and retention

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
F5.1Retention policies
F5.2Legal hold
F5.3Immutable backups
F5.4Archive tiering
F5.5Long-term format stability

Assessment notes:

  • restic F5.3: Object lock support on compatible S3 backends (experimental in 0.18+)
  • BorgBackup F5.3: Append-only mode prevents modification; deletion requires separate key
  • Proxmox Backup Server F5.3: S3 object lock support in technology preview
  • restic/BorgBackup F5.5: Documented repository formats with strong backward compatibility commitments

Technical capability comparison

Deployment and hosting

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
T1.1Self-hosted
T1.2Container deployment
T1.3High availability--
T1.4Air-gapped deployment
T1.5Multi-site architecture

Deployment details:

ToolInfrastructureContainer supportMinimum resourcesStorage requirements
resticSingle binary, no server requiredOfficial Docker images512MB RAM, 1 CPURepository-dependent
BorgBackupPython application, optional serverCommunity Docker images1GB RAM, 1 CPURepository-dependent
Proxmox Backup ServerDebian-based appliance or packagesLXC container option2GB RAM, 2 CPU, 8GB OS diskZFS recommended
BareosLinux (RHEL, Ubuntu, SUSE, Debian)Official Docker images4GB RAM, 2 CPUPostgreSQL database + storage
VeeamWindows Server 2019+ or Veeam applianceHardened Linux appliance8GB RAM, 4 CPUSQL Server database + repository
AcronisWindows/Linux server or cloudManagement Server in Docker8GB RAM, 4 CPUPostgreSQL/SQL Server + storage

Integration architecture

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
T3.1REST API
T3.2CLI interface
T3.3Pre/post scripts
T3.4Monitoring integration
T3.5Hypervisor integration●P

API and integration details:

ToolAPI typeAuthenticationRate limitsSDK availability
resticREST (rest-server)Basic auth, TLSConfigurableGo library
BorgBackupCLI onlySSH keysN/APython library
Proxmox Backup ServerRESTAPI tokens, TLSConfigurableRust library, CLI
BareosREST, CLIPAM, LDAP, internalNone documentedPython SDK
VeeamREST, PowerShellOAuth 2.0, API keysPer-tier limitsPowerShell, .NET
AcronisRESTOAuth 2.0, API keysTier-dependentPython, Go SDKs

Security capability comparison

Encryption

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
S1.1Client-side encryption
S1.2Encryption algorithmAES-256-CTR + Poly1305AES-256-CTR + HMAC-SHA256 or BLAKE2bAES-256-GCMAES-128/256-CBCAES-256AES-256
S1.3Key management
S1.4Encryption at rest
S1.5Transport encryptionTLS 1.2+SSHTLS 1.2+TLS 1.2+TLS 1.2+TLS 1.2+

Encryption details:

  • restic: Uses scrypt for key derivation; repository password encrypts master key; supports multiple passwords via key files
  • BorgBackup 1.x: Uses HMAC-SHA256 for authentication; BorgBackup 2.x uses BLAKE2b AEAD
  • Proxmox Backup Server: GCM mode provides authenticated encryption; key management per datastore
  • Bareos: Encryption optional, configured per FileSet; keys stored in director configuration

Authentication and access control

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
S2.1RBAC--
S2.2MFA--
S2.3SSO integration--
S2.4Audit logging
S2.5Separation of duties--

Authentication notes:

  • restic: Repository-level password authentication; no built-in user management
  • BorgBackup: SSH key authentication; append-only mode provides operational separation
  • Proxmox Backup Server: Realms (PAM, LDAP, AD, OpenID Connect), namespaces for isolation, granular ACLs
  • Bareos: PAM integration, LDAP/AD support, role-based console permissions

Security certifications

CertificationresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
SOC 2 Type II----
ISO 27001----
Open source audit--
CVE tracking

Operational capability comparison

Administration

Req IDRequirementresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
O1.1Web interface
O1.2Centralised management
O1.3Policy-based management
O1.4Scheduling flexibilityExternalExternal
O1.5NotificationsExternalExternal

Administration notes:

  • restic/BorgBackup: CLI tools require external scheduling (cron, systemd timers) and notification (scripts, monitoring integration)
  • Third-party wrappers provide enhanced management: resticprofile, autorestic, borgmatic, vorta (BorgBackup GUI)

Support comparison

AspectresticBorgBackupProxmox Backup ServerBareosVeeamAcronis
DocumentationExcellentExcellentExcellentGoodExcellentGood
Community forum● Active● Active● Active● Active● Active◐ Limited
Commercial support●$●$
Response time (critical)CommunityCommunity2-4 hours$4 hours$1 hour1 hour

Commercial comparison

Pricing models

ToolTypeModelFree tierNonprofit programmeEstimated cost (50 workloads)
resticOpen sourceFree● Full productN/A£0 + infrastructure
BorgBackupOpen sourceFree● Full productN/A£0 + infrastructure
Proxmox Backup ServerOpen sourceFree + support subscription● Full productN/A£0-2,000/year (support)
BareosOpen sourceFree + subscription● Community editionN/A£0-8,000/year (subscription)
VeeamCommercialPer-workload licence◐ Community (10 workloads)● Significant discount£3,000-15,000/year
AcronisCommercialPer-workload subscription◐ Partner discounts£4,000-20,000/year

Cost notes:

  • Open source infrastructure costs (storage, compute, network) vary by scale and provider
  • Veeam Community Edition: Free for up to 10 workloads with some feature limitations
  • Proxmox and Bareos subscriptions provide enterprise repositories and support; software is functionally identical
  • Commercial pricing varies significantly by workload type (VM, physical, cloud) and edition

Vendor details

ToolOrganisationFoundedHQ locationBusiness model
resticCommunity project2014Germany (primary maintainer)Donations, sponsorships
BorgBackupBorg Collective2010 (attic), 2015 (borg)Community distributedDonations, sponsorships
Proxmox Backup ServerProxmox Server Solutions GmbH2020 (PBS), 2005 (company)Austria (EU)Support subscriptions
BareosBareos GmbH & Co. KG2012Germany (EU)Support subscriptions
VeeamVeeam Software (Insight Partners)2006US (Switzerland HQ)Licence/subscription
AcronisAcronis International GmbH2003SwitzerlandSubscription

Jurisdictional considerations:

  • restic, BorgBackup: Community projects; no corporate jurisdiction; data stored per user configuration
  • Proxmox, Bareos: EU-based companies; GDPR as primary framework; no CLOUD Act exposure
  • Veeam: US ownership (Insight Partners); subject to CLOUD Act for cloud services; self-hosted deployments under customer control
  • Acronis: Swiss headquarters; offers regional data centres; cloud services subject to local jurisdiction

Detailed tool assessments

restic

Type
Open source
Licence
BSD 2-Clause -permissive licence allowing commercial use and modification without disclosure requirements
Current version
0.18.1 (released September 2025)
Deployment options
Single binary (Linux, Windows, macOS, BSD); no server component required
Source repository
https://github.com/restic/restic
Documentation
https://restic.readthedocs.io

restic provides fast, secure, deduplicated backups using content-defined chunking and client-side encryption. The tool operates as a standalone binary without requiring a separate server component, connecting directly to storage backends including local filesystem, SFTP, REST servers, and cloud object storage (S3, Azure Blob, Google Cloud Storage, Backblaze B2).

The architecture prioritises simplicity and security. All data is encrypted with AES-256 before leaving the client, using a repository password that never leaves the local system. The chunking algorithm (Rabin fingerprinting) provides efficient deduplication across files and backups. Repositories are self-contained and portable, storing all metadata alongside backup data.

Key strengths:

  • Single binary deployment with no server dependencies simplifies installation across platforms
  • Direct cloud storage support eliminates need for intermediate servers or gateways
  • Cryptographic integrity verification detects corruption or tampering
  • Reproducible builds enable verification of official binaries
  • Backward compatibility commitment ensures long-term data accessibility

Key limitations:

  • No built-in scheduling, monitoring, or alerting; requires external tools (cron, systemd, monitoring stack)
  • No graphical interface; CLI-only operation may challenge less technical administrators
  • No native bare-metal or image-based backup; file-level only
  • No centralised management for multiple clients; each instance operates independently
  • Pre-1.0 version numbering, though repository format is stable and documented

Deployment and operations:

restic installs as a single binary (approximately 25MB) with no external dependencies. Self-update capability downloads and verifies new versions automatically.

Deployment typeProcedure
Linux/macOSDownload binary or install via package manager (apt, dnf, brew, nix)
WindowsDownload binary, Chocolatey, Scoop, or WinGet
ContainerOfficial Docker images at docker.io/restic/restic

Resource requirements:

ScaleRAMCPUNotes
Small (<100GB)512MB1 coreMemory scales with repository size during operations
Medium (<1TB)1-2GB2 coresParallel backup streams increase CPU usage
Large (>1TB)4GB+4+ coresIndex operations require memory proportional to repository size

Storage backend configuration example (S3):

# Initialise repository
export AWS_ACCESS_KEY_ID=your-access-key
export AWS_SECRET_ACCESS_KEY=your-secret-key
restic -r s3:s3.eu-west-2.amazonaws.com/bucket-name init
# Backup with retention policy
restic -r s3:s3.eu-west-2.amazonaws.com/bucket-name backup /data
restic -r s3:s3.eu-west-2.amazonaws.com/bucket-name forget --keep-daily 7 --keep-weekly 4 --keep-monthly 12 --prune

Organisational fit:

Best suited for:

  • Organisations with Linux/Unix administration skills comfortable with CLI tools
  • Environments requiring direct cloud storage backup without intermediate servers
  • Distributed teams needing portable, self-contained backups
  • Budgets prioritising zero licensing cost with infrastructure investment

Less suitable for:

  • Organisations requiring graphical management interfaces
  • Environments needing VM-level or image-based backup
  • Teams without capacity to integrate scheduling and monitoring externally

BorgBackup

Type
Open source
Licence
BSD 3-Clause -permissive licence allowing commercial use and modification
Current version
1.4.3 (stable, December 2025); 2.0.0b20 (beta, December 2025)
Deployment options
Python application; Linux, macOS, BSD, Windows (via WSL)
Source repository
https://github.com/borgbackup/borg
Documentation
https://borgbackup.readthedocs.io

BorgBackup delivers deduplicating backup with strong encryption and compression. Forked from Attic in 2015, the project has matured into a widely-deployed backup solution, particularly in Linux server environments. The tool supports local and SSH-based remote repositories, with cloud storage accessible through filesystem mounts (rclone, s3fs) or dedicated hosting services.

The deduplication mechanism uses content-defined chunking with configurable chunk sizes. Compression options include lz4 (fast), zstd (balanced), and zlib (maximum compression). Encryption uses AES-256-CTR with HMAC-SHA256 (1.x) or authenticated AEAD modes (2.x), with keys derived from a passphrase using Argon2.

Key strengths:

  • Mature, battle-tested codebase with extensive deployment history
  • Excellent compression ratios with multiple algorithm options
  • Append-only repository mode prevents ransomware from deleting backups
  • Strong backward compatibility within major version series
  • Active community with comprehensive documentation

Key limitations:

  • SSH-only remote access; no native cloud storage support (requires filesystem mounts)
  • Python dependency adds complexity compared to single-binary tools
  • Version 2.x repositories incompatible with 1.x; migration required via transfer command
  • No graphical interface in core project (Vorta provides third-party GUI)
  • Windows support limited to WSL; no native Windows client

Deployment and operations:

BorgBackup requires Python 3.10+ and compilation of C extensions. Pre-built binaries simplify installation on common platforms.

Deployment typeProcedure
LinuxPackage manager (apt, dnf, pacman) or pip
macOSHomebrew or pip
WindowsWSL with Linux package
ServerStandalone or with borgmatic wrapper

Retention policy example:

# Initialise encrypted repository
borg init --encryption=repokey-blake2 /backup/repo
# Backup with archive naming
borg create /backup/repo::{hostname}-{now:%Y-%m-%d} /data
# Prune with retention policy
borg prune --keep-daily=7 --keep-weekly=4 --keep-monthly=6 /backup/repo

Organisational fit:

Best suited for:

  • Linux-focused environments with SSH infrastructure
  • Organisations prioritising compression efficiency
  • Scenarios requiring append-only repositories for ransomware protection
  • Teams comfortable with Python-based tooling

Less suitable for:

  • Windows-centric environments
  • Organisations requiring native cloud storage integration
  • Teams needing graphical management interfaces

Proxmox Backup Server

Type
Open source
Licence
AGPL-3.0 -copyleft licence requiring source disclosure for networked services
Current version
4.1 (released November 2025)
Deployment options
Debian-based appliance, packages for Debian 13, LXC container
Source repository
https://git.proxmox.com
Documentation
https://pbs.proxmox.com/docs/

Proxmox Backup Server (PBS) provides enterprise backup for virtual machines, containers, and physical hosts with deduplication, compression, and encryption. Developed by Proxmox Server Solutions, PBS integrates natively with Proxmox VE but supports standalone use for any Linux system via the backup client.

The architecture uses a content-addressable storage format with variable-length chunks. The web interface provides datastore management, backup job monitoring, and tape library support. Version 4.0 introduced S3-compatible object storage as a backend (technology preview), expanding deployment options beyond local and remote PBS instances.

Key strengths:

  • Native integration with Proxmox VE virtualisation platform
  • Web-based management interface with comprehensive monitoring
  • Built-in sync jobs for multi-site replication
  • Efficient changed-block tracking for VM backups
  • Support for tape libraries and offline media
  • S3 storage backend (technology preview v4.0+)

Key limitations:

  • Optimal performance tied to Proxmox VE; other hypervisors require agent backup
  • AGPL licence requires source disclosure for modifications to networked service
  • Physical server backup limited to Linux systems (client not available for Windows)
  • S3 backend in technology preview; not yet production-ready
  • Smaller ecosystem compared to established enterprise solutions

Deployment and operations:

PBS deploys as a dedicated appliance or packages on Debian 13. ZFS is recommended for optimal deduplication and data integrity.

ComponentMinimumRecommended
CPU2 cores4+ cores (verification jobs CPU-intensive)
RAM2GB8GB+ (1GB per TB of deduplication index)
OS disk8GB32GB SSD
DatastoreHDD/SSDZFS mirror or RAID-Z

Backup job configuration:

PBS supports scheduling through the web interface with sync jobs for replication:

# Client backup (CLI)
proxmox-backup-client backup root.pxar:/ --repository pbs.example.org:datastore1
# Sync job between PBS instances (configured in web UI)
# Source: remote PBS, Target: local datastore
# Schedule: daily at 02:00, bandwidth limit: 50 MB/s

Organisational fit:

Best suited for:

  • Proxmox VE virtualisation environments
  • Organisations with Linux server administration capacity
  • Environments requiring integrated web management
  • Multi-site deployments with replication requirements

Less suitable for:

  • VMware or Hyper-V primary environments
  • Windows-heavy infrastructure
  • Organisations requiring commercial support guarantees

Bareos

Type
Open source
Licence
AGPL-3.0 -copyleft licence requiring source disclosure for networked services
Current version
25 (December 2025); 24.0.6 (October 2025 maintenance)
Deployment options
Linux (RHEL, Ubuntu, SUSE, Debian), packages and containers
Source repository
https://github.com/bareos/bareos
Documentation
https://docs.bareos.org

Bareos (Backup Archiving Recovery Open Sourced) is an enterprise backup solution forked from Bacula in 2010. The platform supports diverse workloads including file servers, databases, virtual machines, and cloud storage, with particular strength in tape library management and large-scale deployments. Bareos GmbH provides commercial support and subscription services while maintaining the open source community edition.

The architecture follows a director-storage-client model. The Director daemon orchestrates backup operations, Storage daemons manage media, and File daemons run on protected systems. This distributed architecture scales to thousands of clients and petabytes of data.

Key strengths:

  • Proven scalability to exabyte-class deployments
  • Comprehensive tape library support including WORM media
  • Native plugins for VMware, Hyper-V, Proxmox, databases
  • Flexible storage options including deduplication (v24+)
  • SUSE and Red Hat certified
  • Windows disaster recovery (v25)

Key limitations:

  • Complexity of director-storage-client architecture increases administrative overhead
  • PostgreSQL database dependency adds infrastructure requirements
  • Web UI less polished than commercial alternatives
  • Deduplication requires compatible storage backend (ZFS, VDO, btrfs)
  • Learning curve steeper than simpler tools

Deployment and operations:

Bareos requires PostgreSQL for its catalogue database. Typical deployment includes Director, Storage Daemon, and WebUI on a central server, with File Daemons on protected systems.

ComponentPurposeResource requirements
DirectorJob orchestration, scheduling2GB RAM, 2 CPU
Storage DaemonMedia management4GB RAM, 2 CPU, storage devices
File DaemonClient backup agent512MB RAM, 1 CPU
WebUIManagement interface1GB RAM, 1 CPU
PostgreSQLCatalogue database4GB RAM, SSD storage

Job configuration example:

# FileSet definition
FileSet {
Name = "ServerData"
Include {
Options {
Signature = SHA256
Compression = LZ4
}
File = /var/data
File = /etc
}
Exclude {
File = /var/data/cache
}
}
# Job definition
Job {
Name = "BackupServer1"
Type = Backup
Client = server1-fd
FileSet = "ServerData"
Schedule = "WeeklyCycle"
Pool = "Full"
Storage = "File1"
}

Organisational fit:

Best suited for:

  • Large-scale deployments with diverse workloads
  • Environments with tape library requirements
  • Organisations with dedicated backup administrators
  • VMware and Hyper-V virtualisation (with plugins)

Less suitable for:

  • Small deployments where architecture complexity exceeds requirements
  • Teams without Linux administration experience
  • Organisations seeking simple, appliance-style deployment

Veeam Backup and Replication

Type
Commercial
Licence
Proprietary -per-workload or per-socket licensing
Current version
13.0.1 Patch 1 (January 2026)
Deployment options
Windows Server, Veeam Hardened Linux Appliance
Documentation
https://helpcenter.veeam.com

Veeam Backup and Replication provides comprehensive data protection for virtual, physical, and cloud workloads. The platform dominates the VMware and Hyper-V backup market, with extensive features for disaster recovery, replication, and cloud mobility. Version 13 introduced enhanced ransomware protection, AI-driven anomaly detection, and expanded Kubernetes support.

The architecture centres on a backup server managing jobs, with proxy servers handling data movement and repository servers storing backups. This distributed model scales across data centres with centralised management through Veeam Backup Enterprise Manager.

Key strengths:

  • Market-leading VMware and Hyper-V integration with CBT support
  • Instant VM recovery enabling immediate workload availability
  • Comprehensive disaster recovery orchestration
  • Extensive cloud integration (AWS, Azure, GCP)
  • Robust ransomware protection with immutable backups
  • Large partner and integration ecosystem

Key limitations:

  • Licensing costs significant for large deployments
  • Windows Server dependency for backup server (Linux appliance available)
  • Complexity increases with full feature deployment
  • Domain-joined installations have elevated security considerations
  • Proprietary format limits long-term portability

Deployment and operations:

Veeam deploys on Windows Server or as a pre-configured hardened Linux appliance. SQL Server (Express included, Standard/Enterprise for scale) stores configuration data.

ComponentMinimumRecommended
CPU4 cores8+ cores
RAM8GB16GB+ (4GB per 10 concurrent jobs)
OS disk60GB100GB SSD
SQL ServerExpress (10GB limit)Standard for >500 VMs

Licensing models:

EditionModelIncludes
CommunityFree10 workloads, limited features
FoundationPer-workloadCore backup and recovery
AdvancedPer-workload+ Monitoring, orchestration
PremiumPer-workload+ Recovery orchestration, CDP

Nonprofit programme: Veeam offers significant discounts (reported 50%+) through technology donation programmes. Eligibility requires verification through designated partners.

Organisational fit:

Best suited for:

  • VMware and Hyper-V virtualisation environments
  • Organisations requiring enterprise disaster recovery
  • Environments with budget for commercial licensing
  • Teams benefiting from graphical management and wizards

Less suitable for:

  • Linux-only infrastructure
  • Organisations prioritising open source
  • Budget-constrained environments without nonprofit eligibility

Acronis Cyber Protect

Type
Commercial
Licence
Proprietary -per-workload subscription
Current version
16 (February 2024 base, ongoing updates)
Deployment options
Windows/Linux server, cloud-hosted, appliance
Documentation
https://dl.managed-protection.com/u/cyberprotect/

Acronis Cyber Protect integrates backup, disaster recovery, and endpoint security in a unified platform. The product targets organisations seeking consolidated data protection and cybersecurity, with AI-powered anti-malware, patch management, and vulnerability assessment alongside traditional backup capabilities. The architecture supports on-premises, cloud, and hybrid deployments.

Key strengths:

  • Integrated backup and security reduces tool sprawl
  • Broad platform support including Windows, Linux, macOS, mobile
  • Global data centre network for cloud backup and DR
  • Bare-metal recovery with dissimilar hardware support
  • Ransomware protection with behavioural detection
  • MSP-focused cloud platform (Cyber Protect Cloud)

Key limitations:

  • Security features may overlap with existing endpoint protection
  • Subscription model increases long-term costs versus perpetual licences
  • Complexity of integrated platform requires broader expertise
  • Performance overhead from security scanning during backup
  • Cloud dependency for some features

Deployment and operations:

Acronis Management Server deploys on Windows or Linux, with agents on protected workloads. Cloud deployment eliminates infrastructure requirements.

DeploymentUse caseInfrastructure
On-premisesData sovereignty, air-gappedManagement server + storage
CloudSimplified managementAcronis Cloud subscription
HybridFlexibility, DR to cloudOn-premises + cloud storage

Organisational fit:

Best suited for:

  • Organisations consolidating backup and endpoint security
  • MSP and service provider environments (Cyber Protect Cloud)
  • Distributed organisations with remote endpoint protection needs
  • Environments requiring integrated anti-ransomware

Less suitable for:

  • Organisations with established, separate backup and security stacks
  • Purely Linux/open source environments
  • Budget-constrained organisations (subscription costs accumulate)

Selection guidance

Decision framework

+------------------+
| Primary |
| requirement? |
+--------+---------+
|
+--------------------------+---------------------------+
| | |
v v v
+--------+--------+ +---------+--------+ +---------+--------+
| VM/hypervisor | | File-level | | Enterprise |
| backup | | backup | | features |
+--------+--------+ +---------+--------+ +---------+--------+
| | |
+-----+-----+ +-----+-----+ +-----+-----+
| | | | | |
v v v v v v
+--+---+ +---+---+ +----+---+ +----+---+ +-----+--+ +-----+--+
|Proxmox| |VMware/| |Minimal | |Central | |Veeam | |Bareos |
|VE | |Hyper-V| |infra | |mgmt | |Acronis | | |
+--+---+ +---+---+ +----+---+ +----+---+ +--------+ +--------+
| | | |
v v v v
PBS Veeam/ restic/ Bareos/
Acronis Borg PBS

Recommendations by organisational context

Minimal IT capacity (no dedicated IT staff)

Primary recommendation: restic with cloud storage

restic’s single-binary deployment and direct cloud storage support minimise infrastructure requirements. Configure with systemd timers or scheduled tasks for automated backups. Cloud storage eliminates local storage management.

Implementation approach:

  1. Deploy restic binary on systems requiring backup
  2. Configure cloud storage backend (Backblaze B2, Wasabi, or S3-compatible)
  3. Create systemd timer or cron job for daily backups
  4. Configure retention policy (7 daily, 4 weekly, 12 monthly typical)
  5. Set up email notifications via script wrapper
  6. Document recovery procedures; test quarterly

Alternative: BorgBackup with borgmatic wrapper provides similar simplicity with enhanced compression.

Established IT function (dedicated IT team)

Primary recommendation: Proxmox Backup Server (virtualised environments) or Bareos (diverse infrastructure)

For Proxmox VE environments, PBS provides native integration with minimal additional infrastructure. For heterogeneous environments including physical servers, multiple hypervisors, and tape libraries, Bareos offers comprehensive coverage.

Implementation approach (PBS):

  1. Deploy PBS as dedicated VM or physical appliance
  2. Configure ZFS storage pool for datastores
  3. Integrate with Proxmox VE cluster
  4. Configure sync jobs to secondary site
  5. Establish verification schedule
  6. Document and test DR procedures

Implementation approach (Bareos):

  1. Deploy Director with PostgreSQL on dedicated server
  2. Configure Storage Daemon(s) based on storage architecture
  3. Deploy File Daemons on protected systems
  4. Define FileSets, Schedules, and Pools
  5. Configure WebUI for operations team
  6. Establish monitoring integration

Specific constraints

Data sovereignty requirements: restic, BorgBackup, Proxmox Backup Server, or Bareos with self-hosted storage. Avoid cloud services from US-headquartered vendors for sensitive data.

Windows-centric environment: Veeam (budget permitting) or Acronis. restic supports Windows but lacks native VSS integration; Bareos Windows agent provides full support.

Tape library requirements: Bareos (strongest tape support) or Veeam. Neither restic nor BorgBackup support tape natively.

Compliance-driven (audit requirements): Veeam or Acronis provide compliance reporting, certifications, and legal hold. Open source tools require building compliance documentation manually.

Migration paths

FromToComplexityApproachTimeline
Manual scriptsrestic/BorgLowParallel run, gradual transition2-4 weeks
resticBorgBackupMediumNew repository, historical data via archive4-8 weeks
BorgBackupresticMediumNew repository, historical data via archive4-8 weeks
Legacy BaculaBareosLowIn-place upgrade path documented2-4 weeks
VeeamBareosHighParallel infrastructure, phased migration3-6 months
AnyVeeam/AcronisMediumParallel run, import tools for some formats4-8 weeks

External resources

Official documentation

ToolDocumentationAPI referenceRelease notes
restichttps://restic.readthedocs.iohttps://restic.readthedocs.io/en/latest/100_references.htmlhttps://github.com/restic/restic/releases
BorgBackuphttps://borgbackup.readthedocs.iohttps://borgbackup.readthedocs.io/en/stable/internals.htmlhttps://github.com/borgbackup/borg/releases
Proxmox Backup Serverhttps://pbs.proxmox.com/docs/https://pbs.proxmox.com/docs/api-viewer/https://pbs.proxmox.com/wiki/Roadmap
Bareoshttps://docs.bareos.orghttps://docs.bareos.org/DeveloperGuide/https://docs.bareos.org/Appendix/ReleaseNotes.html
Veeamhttps://helpcenter.veeam.comhttps://helpcenter.veeam.com/docs/backup/rest/https://www.veeam.com/kb4738
Acronishttps://dl.managed-protection.com/u/cyberprotect/https://developer.acronis.comPer-version release notes

Relevant standards

StandardRelevanceURL
ISO 27001Information security managementhttps://www.iso.org/iso-27001-information-security.html
NIST SP 800-184Cyber security recovery guidehttps://csrc.nist.gov/publications/detail/sp/800-184/final
GDPR Article 32Security of processing (backup encryption)https://gdpr-info.eu/art-32-gdpr/

See also