Secure Online Backup with unparalleled support

Release Date: June 12, 2018


Enveloc announces its patent ­pending SplitKey™ System for managing client encryption keys – keeping the key available to the client without revealing the key to Enveloc or to anyone else.  The SplitKey system is managed in cooperation with Friedman CyZen LLC, New York, who supervise and maintain one of the system nodes.


Friedman CyZen’s Managing Director, Jacob Lehmann, said, “With rampant growing threats such as Ransomware, backing up your business’s data in a secure manner is more critical than ever.  Safeguarding encryption keys is a challenging process, Enveloc’s SplitKey solution makes it easier than ever. The SplitKey solution ensures that there is no single point of failure when it comes to storing your company’s keys.“


“With this system, companies can have peace of mind knowing their backups are fully protected and so are the keys that secure them,” said Ross Jaburg, VP of Technical Operations for Enveloc. “Over the last twenty years we’ve seen a number of customers frustrated because of a lost key. That won’t happen with our new system.”


Guy Stone, COO of San Diego’s Blue Tech Inc., said, “Enveloc is an easy­to­use, inexpensive,  encrypted backup to the Fed Ramp Azure Cloud. We recommend it for all of our Federal, State and Local government customers.  Enveloc is currently listed on our Federal Government SEWP V and CIO­CS GWAC contracts.”


The SplitKey System is included at no additional charge with the current version of Enveloc’s Remote Backup client software. The company has developed and operated its proprietary system since 1996 and serves businesses throughout the country.



For more information, contact William W. Oppenheimer at Enveloc





Enveloc, Inc.
USA Technology and Research Park  775 N. University Blvd., Suite 110      Mobile, Alabama 36608
(p) 877.368.3562    (f) 516.704.2131
The Enveloc Name and Logo are Registered Trademarks of Enveloc, Inc. All Rights Reserved. ©2015 Enveloc, Inc.

Is your Data Important?

June 4th, 2018 | Posted by enveloc in Uncategorized - (0 Comments)

Not only does Enveloc permanently secure your data with AES 256 bit encryption before it leaves your machine, we secure your key with SplitKey™  protection  – we can’t read it and you’ll never lose it.


FedRamp Storage for Enveloc Backups

December 15th, 2017 | Posted by enveloc in Uncategorized - (0 Comments)

Enveloc announces availability of storage in the FedRamp approved Microsoft Azure Government Cloud. By installing our special edition, backups created with Enveloc are securely transmitted using SSH protocol to Enveloc’s server in the Azure Government Cloud.

The Government Cloud Edition of Enveloc Remote Backup is available at:

Notice the Window Caption at the top and the “Government Cloud” symbol lower left. All Government Cloud Edition Machine ID’s start with the letter “Z”.

The backup code is identical to our standard edition. The only communication protocol we support on this edition is AES encrypted SSH. All client operations are identical to the standard edition.  Offsite data redundancy is provided by Microsoft Azure Government Cloud Services. All backups, including initial seeds and large restores, are through the internet – no media seeds nor restores.

Pricing per Gigabyte for Pro is $1.05 and for LocalRemote is $0.75. Per machine fees remain the same. For clients with large capacity requirements (over 500GB), please contact Enveloc for custom rates.


 You  can be confident in your  backups with Enveloc.  We have restored data backups since 1996, through such storms as Opal, George, Ike, Ivan, Katrina, and Wilma.  We will be safeguarding client data through Irma and the others as well.



Many ask, “How do I know my backup is current?”  Simple – open Enveloc, click Logs/Backup Logs and full details of all backups are visible.  Click Backup/Regular Backup Now and data will be backed up to the present moment.

Others ask, “How do I know I can restore my data?”  Just as easy.  Click Restore/Request Files and click OK until the file list is displayed in a treeview.  Select a file or group of files and let them be retrieved from the server.  Be sure to specify an alternate path under “Destination Drive,” for example, “C:\temp” to avoid overwriting current data.

If anyone needs assistance or has other questions stand ready to assist, 24/7/365, storm or no storm.  With prayers and best wishes for safety if you’re in the path of a hurricane.

Click here for support


Yet Another Victim of Ransomware!

February 20th, 2017 | Posted by enveloc in Uncategorized - (0 Comments)

Today we received a call from yet another victim of Ransomware,   This long-time client is in Louisiana in the Energy field, and we are now preparing to provide a full recovery set of their critical data, which has been stored safely on our duplicate server systems in Alabama and California.  Their call makes about 131 such calls in recent months.  A secure backup is the ONLY certain protection against Ransomware.  We at Enveloc have made our system even more secure by introducing our DiskAppear technology, as described in our post from last week “Remote Backup Version 10 New Features“.



Why settle for consumer-grade backup software masquerading as a business class system when you could have the real thing?  Call Enveloc at 1-251-476-8258 for more information.



Remote Backup Version 10 New Features   February, 2017    


Enveloc is proud to announce release of its much-anticipated Version 10.  An innovator since 1996, Enveloc now offers enhanced security and protection against malware, especially the pernicious Ransomware which has become epidemic in our country.

DiskAppear  The Enveloc DiskAppear feature is designed to make locally USB attached external drives invisible to viruses and Trojans, especially Ransomware.  Please see the attached DiskAppear guide.

Google Drive  Enveloc can back up Google Drive documents.  Best practice is to use the Archive Bit option on Main Settings.  You may include Google Drive documents and folders in your regular backup selection, or configure a WireBack.  Wirebacks may also be set for “New and Changed Files Only” if you wish to WireBack the Google Drive incrementally.

No Windows Folders  By default, Enveloc will stop analyzing files or folders in the Windows operating system folder.  Virtually no programs save data in the \Windows folder.  If your system is one that does, the setting may be overridden with the following command in \enveloc\config.txt:


No AppData Folders   Enveloc will no longer include the AppData folder by default in new installations.  Firefox and Thunderbird email users need to select the appropriate folder for their favorites and email messages, respectively.

 The new release is available for manual download and will create a new installation or update any previous version.  Automatic update for existing installations will be enabled in approximately ten days.


Technical Documents





Many backup systems are useless against Crypto Malware because the backups are really just synchronizations (in which case the backups become copies of cryptolocked files) or the backups reside on the protected machine (and become cryptolocked directly) or are on the network automatically accessible by the protected machiEnveloc's Outlook Agent - Brick level backup and (and become cryptolocked as the malware travels through the network).

Enveloc uses an out-of-channel system for storage and retrieval of backed up data.  Anything stored on Enveloc’s remote servers is thus completely protected from Cryptolocker attacks on our clients’ machines.

20th year in business!

July 8th, 2016 | Posted by enveloc in Uncategorized - (0 Comments)

Enveloc Celebrates 20 Years of Remote Backup!


        20 years ago this week Enveloc started its Remote Backup system with its first customer “Norman,” whose Windows 95 computer installed Enveloc software on July 14th, 1996. It is surprising to say now with the 4 terabyte hard drives, 16 gigs of memory and 100 megabit per second internet speeds of today, that our process was to send a technician  to the site to backup the initial seed to a 20 megabytes portable tape drive. Once we completed that initial seed we used our proprietary software in conjunction with high speed 14.4 baud rate modems. Yes we were “High-Tech” or at least for those days we were… Soon we were writing the initial seed to a CD, and then directly over the internet or to a USB hard drive.

       Fast forward 20 years and the world of technology has changed but Enveloc still follows its same model. We strive to over-service each and every client. We still promise and deliver that you will always get a support person on the phone. We also still strive to provide the security, dependability and recoverability for which Enveloc is known.

       Why? because we want each and every “Norman” to be happy and trust in Enveloc with their valuable and irreplaceable data. And yes, Norman of 20 years ago is still our client!








Enveloc’s 20 years experience teaches us…

   Enveloc celebrates 20 years of continuous remote backup this month. In those twenty years, we at Enveloc have learned to resolve many critical backup issues. They range from the most common reason for data loss – user error – to virus infiltration, lightning strikes, theft, windstorms, and more recently, ransomware. Enveloc has striven to be at the forefront in protecting our users against malware. Our solution completely separates the computer from the backup data so that if a virus attacks your computer your backup data is not affected even if the computer is totally compromised. Unlike other cloud backup systems, which are often simply synched copies, Enveloc provides a year or more of recovery over multiple versions.

In her article below, Leslie (not affiliated with Enveloc) expands on the reasons for data loss and further explains the importance of a cloud based backup.

6 Reasons Why Offsite Backup in the Cloud is 100% Critical to Save Your Business

July 27, 2015/0 Comments/in Blog /by leslie

Many times, businesses suffer not only the financial devastations caused by data loss, but they suffer the loss of client confidence. Both are equally devastating and determine whether a business can survive.The industries that typically suffer the most frequent and expensive breaches are healthcare, financial, pharmaceuticals, transportation and communications. More than one-third of attacks are on businesses with fewer than 250 employees.There’s a lot at risk when a business fails to implement a successful and thorough off-site data backup plan. Some companies never recover from the blow.

After a major data loss, only 6% of those businesses will survive, studies show. A whopping 51% go out of business within two years, while a sober 43% are gone immediately. We all know that off-site data backup is something we should be doing. But, it’s not something that we all do. Cloud backup services are an insurance policy to protect your data from any number of data loss threats. It gives you peace of mind.

Consider the following data loss situations. They are all too common and could send your business down the drain if an off-site backup solution is not in place.

1. Deleting files: Updating files or deleting them are common activities. We often lose data simply because we don’t have proper work-flow procedures and backup strategies. More efficient procedures for saving work and making backups regularly will definitely save time.

2. Viruses & malware: New viruses attack computers every day. Damages greatly differ, but most viruses affect operational systems and damage stored data. Making regular backups of your data and storing the data safely off-site allows you to access it after severe virus attacks.

3. Mechanical damages: Computer hardware is a fragile part of business networks. There are ways to recover data, but this service can be costly. There’s no guarantee you can totally recover your important data. Regular off-site backups help in case of hardware troubles and keeps the latest version of your data in safe storage.

4. Power failures: Power failures affect operation systems and computer hardware. Suddenly shutting your computer or business systems down without proper procedures causes problems. This leads to a chain reaction, and your data is gone. Offsite data backups makes you feel better and more secure, keeping data in a safe place where you can recover it.

5. Computer theft: It’s a tragedy to lose both your computer and data at the same time. While traveling, you may leave your laptop unattended, lose it in an airport, conference center, coffee shop or any other crowded place. New computers cost money, but the data lost is even more expensive. If you use a proper off-site data backup strategy, you can recover your data even after your computer is long gone.

6. Fire & explosions: Explosions rarely happen, but fire mostly likely destroys both your computer and data. Fire is also dangerous when backups are stored in the same location. The safest practice against fire is to make regular backups and keep them in the cloud.

In all these cases, another factor to consider is the cost of data recovery. The cost of professional recovery can be considerably more than maintaining an off-site backup. The best data recovery case is one that uses a reliable, off-site backup solution.

It’s the last stop to preventing complete business failure.

Connect With Us

Enveloc, Inc.

(251) 476-8258



Enveloc, Inc.

USA Technology and Research Park   775 N. University Blvd., Suite 110     Mobile, Alabama 36608

(p) 877.368.3562     (f) 516.704.2131



Keeping Up To Date

December 20th, 2012 | Posted by rossjaburg in Uncategorized - (0 Comments)

For computer security, keeping your Windows operating system software up-to-date is a must. No operating system is perfect, and hackers are constantly discovering security holes or devising new attacks. As the bad guys discover weaknesses, Microsoft engineers fix the security gaps or create barriers to stop them. These fixes are provided in the form of patches or replacements for system applications or application libraries (for example, .exe or .dll files).

Microsoft has made implementing these fixes very easy for Windows users with their automatic update system. On your Windows 7 or Windows Server 2008 or later machine, click the Start icon and type “Windows Update.” On the left you’ll see, among other things, “Change Settings.” You’ll see several options you can customize to suit your particular needs. A lot of people choose “Download updates but let me choose whether to install them” so that they can choose to run the installation process at a convenient time. Whatever you choose, be sure that something happens automatically so that at least you know updates are available.

In addition to Security Updates, there routine updates to fix bugs or improve software performance. Microsoft will rate each update as “Important,” “Recommended,” or “Optional,” and will note if an update is a “Security” update and if so whether the severity is “Critical,” “Important,” “Moderate,” or “Low.”

Sometimes updates can be applied without rebooting the computer but sometimes a reboot is necessary. Whatever the situation, do not fail to update promptly, especially for Critical Security updates, because your data and your computer could be at risk.

For more information about Microsoft’s Windows Update System: