Centralized protection against ransomware
Consolidate backups from fleets of workstations, servers, virtual machines, and cloud applications. Optimize storage consumption and avoid bandwidth bottlenecks with data deduplication and incremental backup technologies. Learn more
Physical workloads
Protect endpoints in the event of malicious attacks with comprehensive bare-metal backup and flexible file-level recovery.
Virtual infrastructure
Back up VMware® vSphere™, Microsoft® Hyper-V® VMs, and LUNs with powerful data reduction technologies.
SaaS accounts
Enable continuous protection for data stored on the cloud, with automatic detection of newly added accounts.

Efficient recovery
Minimize downtime for critical production systems by rapidly restoring backups from a local or off-site Synology system.
Near-zero RTO
Mount backup images on VMware®, Hyper-V®, or Synology Virtual Machine Manager to resume work as quickly as possible. Restore VMs to an alternative hypervisor to avoid service disruption.
Minimal RPO
Configure backup frequency according to your needs, minimizing the amount of data potentially affected during an attack. Protect systems fast thanks to incremental backups and deduplication technology.
Intuitive operation
Let employees browse and preview emails, contacts, and files from a convenient portal before restoring them, delivering a more user-friendly experience and reducing the burden on IT teams.

Trusted across different industries

"Thanks to Active Backup for Business, all our backups are now centralized and available 24/7, which helps us minimize downtime and stay compliant with FERPA's regulations."

"[…] Active Backup for Business has astonishing backup speeds and works wonders on deleting duplicate data — it only took up 28 TB out of the total 58 TB on the server. […]"

"[…] Active Backup for Business […] allows us to centralize and manage all the backup tasks from a single console. Fast and reliable recovery also ensures business continuity."
Frequently Asked Questions
- Encrypting ransomware — The most common type of ransomware encrypts the victim's files so that they cannot be accessed without the decryption key. Attackers then demand a ransom payment in exchange for the key
- Locker ransomware — A type of ransomware locks victims out of their computer by changing the login credentials or displaying a message that prevents the victim from accessing their system. Attackers then demand a ransom payment to unlock the computer
- Ransomware-as-a-Service (RaaS) — A business model in which attackers offer ransomware to other individuals or groups who want to carry out attacks. The former will typically provide the ransomware and handle payments, while the latter receive a percentage of the ransom payments
- Scareware — Ransomware designed to scare victims into paying the ransom. It typically involves displaying fake security warnings or messages that claim the victim's computer is infected with a virus. The attacker will then demand a ransom payment to remove the supposed infection
- The attacker gains access to a victim's computer, either by sending a phishing email or by exploiting a vulnerability in the system
- Once the attacker has access to the victim's computer, they will install the ransomware on the system
- The ransomware will then encrypt the victim's files, making them inaccessible to the user
- The attacker will then demand a ransom from the victim, typically in the form of a digital currency like Bitcoin, in exchange for the decryption key that will unlock the encrypted files
- If the victim pays the ransom, the attacker will provide the decryption key and the victim will be able to access their files again. However, there is no guarantee that the attacker will actually provide the key, and even if they do, the victim's files may be damaged or corrupted as a result of the encryption process
- There is no guarantee that the attacker will actually provide the decryption key. In many cases, victims who pay the ransom never receive the key and remain unable to access their files
- Paying the ransom may encourage attackers to continue their campaign of attacks. If attackers know that victims are willing to pay the ransom, they may be more likely to carry out more attacks in the future
- Paying the ransom may make you a target for future attacks. If the attacker knows that you are willing to pay a ransom, you may be more likely to be targeted in the future
- Paying the ransom may be illegal. In some cases, paying a ransom to a criminal organization may be considered a form of funding terrorism or other illegal activities
- Your files are encrypted and you are unable to access them
- You receive a message from the attacker demanding a ransom payment in exchange for the decryption key
- You see unfamiliar programs or processes running on your computer
- Your computer becomes slow or unresponsive
- Your computer displays unusual error messages or pop-up windows
- Use reputable antivirus or security software and keep it up-to-date. This can help protect your computer from ransomware and other types of malware
- Be cautious when opening email attachments or links. Ransomware is often delivered through phishing emails, so it is important to be careful about what you click on
- Keep your operating system and other software up-to-date. Software updates often include security patches that can help protect your computer from ransomware and other threats
- Back up your files regularly. This can help protect your data if your computer is infected with ransomware. Make sure to adhere to one of the recommended backup strategies, such as the 3-2-1 backup strategy
- Be aware of the risks of ransomware and educate others in your organization about these threats. This can help prevent ransomware attacks and make it easier to detect and respond to them if they do occur
- Prevent access — Reduce the spread of ransomware by setting file, application, and access permissions, and configure secure login credentials using Secure SignIn and C2 Password
- Protect devices — Outdated systems are at greater risk. Update all your NAS at once with Synology Central Management System (CMS), and safeguard other devices using group policies in Synology Directory Server and C2 Identity
- Avoid suspicious files — Spam and phishing emails containing suspicious files are common methods of spreading ransomware. Synology MailPlus provides strong anti-malware protection and spam prevention
- Check for vulnerabilities — Use Synology Security Advisor to routinely scan for malware, vulnerabilities, and abnormal login activities. Implement recommended changes to improve your NAS security. Learn more