Subscription plans

We’ve got subscriptions plans to suit every business. From our free Insights & Cyber Benchmarking subscription for businesses looking to better understand their backup and recovery risks to our Ultimate subscription, for businesses striving for ultimate cyber resiliency from their backup and recovery.

insights icon

Insights & Cyber Benchmarking

Free Forever! Our entry-level option is perfect for business looking to better understand their backup and recovery risks.

backup icon

Backup Analytics & Automation

Best for businesses looking for deep insights into their backup environment with customisable dashboards and automated reporting.

Available
from IBM

cyber recovery icon

Cyber Recovery Orchestration*

Best for businesses looking to automate the testing and cleaning of backups for cyber resilient recovery.

ultimate sub icon

Ultimate Subscription

For businesses that want it all. The ultimate solution for cyber resilient backup and recovery.

Metadata Retention Period

Metadata Retention Period

Predatar doesn’t read your backup data. It reads data about your data. The more metadata Predatar holds, the more accurate the analysis and insights will be. With all of our ‘paid-for’ subscriptions Predatar will store and utilise all of your metadata from the day you joined.

90 Days

Metadata Retention Period

Metadata Retention Period

Predatar doesn’t read your backup data. It reads data about your data. The more metadata Predatar holds, the more accurate the analysis and insights will be. With all of our ‘paid-for’ subscriptions Predatar will store and utilise all of your metadata from the day you joined.

Unlimited

Metadata Retention Period

Metadata Retention Period

Predatar doesn’t read your backup data. It reads data about your data. The more metadata Predatar holds, the more accurate the analysis and insights will be. With all of our ‘paid-for’ subscriptions Predatar will store and utilise all of your metadata from the day you joined.

Unlimited

Metadata Retention Period

Metadata Retention Period

Predatar doesn’t read your backup data. It reads data about your data. The more metadata Predatar holds, the more accurate the analysis and insights will be. With all of our ‘paid-for’ subscriptions Predatar will store and utilise all of your metadata from the day you joined.

Unlimited

Automated Cyber Benchmarking

Automated Cyber Benchmarking

Predatar continually monitors the workloads in your backup estate and provides a real-time cyber grade from A+ to D based on 26 data points. The grade gives users an ‘at a glance’ indication of their ability to recover at any given moment.

tick

Automated Cyber Benchmarking

Automated Cyber Benchmarking

Predatar continually monitors the workloads in your backup estate and provides a real-time cyber grade from A+ to D based on 26 data points. The grade gives users an ‘at a glance’ indication of their ability to recover at any given moment.

tick

Automated Cyber Benchmarking

Automated Cyber Benchmarking

Predatar continually monitors the workloads in your backup estate and provides a real-time cyber grade from A+ to D based on 26 data points. The grade gives users an ‘at a glance’ indication of their ability to recover at any given moment.

tick

Automated Cyber Benchmarking

Automated Cyber Benchmarking

Predatar continually monitors the workloads in your backup estate and provides a real-time cyber grade from A+ to D based on 26 data points. The grade gives users an ‘at a glance’ indication of their ability to recover at any given moment.

tick

Backup Analytics & Insights

Backup Analytics & Insights

Successful recovery starts with successful backups. Predatar Backup Analytics and Insights gives backup and infrastructure teams a clear view of their backups through customisable analytics and reports.

tick

Backup Analytics & Insights

Backup Analytics & Insights

Successful recovery starts with successful backups. Predatar Backup Analytics and Insights gives backup and infrastructure teams a clear view of their backups through customisable analytics and reports.

tick

Backup Analytics & Insights

Backup Analytics & Insights

Successful recovery starts with successful backups. Predatar Backup Analytics and Insights gives backup and infrastructure teams a clear view of their backups through customisable analytics and reports.

no tick

Backup Analytics & Insights

Backup Analytics & Insights

Successful recovery starts with successful backups. Predatar Backup Analytics and Insights gives backup and infrastructure teams a clear view of their backups through customisable analytics and reports.

tick

Signal (Anomaly Detection & SIEM Integration)

Signal (Anomaly Detection & SIEM Integration)

Predatar Signal is the decision engine that sits at the heart of Predatar’s cyber recovery capabilities. By monitoring multiple inputs including backup behaviour and SIEM events, then applying machine-learning principles – Predatar Signal identifies the workloads at the highest risk of infection or recovery failure.

no tick

Signal (Anomaly Detection & SIEM Integration)

Signal (Anomaly Detection & SIEM Integration)

Predatar Signal is the decision engine that sits at the heart of Predatar’s cyber recovery capabilities. By monitoring multiple inputs including backup behaviour and SIEM events, then applying machine-learning principles – Predatar Signal identifies the workloads at the highest risk of infection or recovery failure.

no tick

Signal (Anomaly Detection & SIEM Integration)

Signal (Anomaly Detection & SIEM Integration)

Predatar Signal is the decision engine that sits at the heart of Predatar’s cyber recovery capabilities. By monitoring multiple inputs including backup behaviour and SIEM events, then applying machine-learning principles – Predatar Signal identifies the workloads at the highest risk of infection or recovery failure.

tick

Signal (Anomaly Detection & SIEM Integration)

Signal (Anomaly Detection & SIEM Integration)

Predatar Signal is the decision engine that sits at the heart of Predatar’s cyber recovery capabilities. By monitoring multiple inputs including backup behaviour and SIEM events, then applying machine-learning principles – Predatar Signal identifies the workloads at the highest risk of infection or recovery failure.

tick

Disaster Recovery Testing Automation

Disaster Recovery Testing Automation

Predatar takes the time and complexity out of DR testing with intelligent automation that continuously recovers workloads in the background. What’s more, Predatar Disaster Recovery testing prioritises the most important workloads, and those that are at the highest risk of recovery failure.

no tick

Disaster Recovery Testing Automation

Disaster Recovery Testing Automation

Predatar takes the time and complexity out of DR testing with intelligent automation that continuously recovers workloads in the background. What’s more, Predatar Disaster Recovery testing prioritises the most important workloads, and those that are at the highest risk of recovery failure.

no tick

Disaster Recovery Testing Automation

Disaster Recovery Testing Automation

Predatar takes the time and complexity out of DR testing with intelligent automation that continuously recovers workloads in the background. What’s more, Predatar Disaster Recovery testing prioritises the most important workloads, and those that are at the highest risk of recovery failure.

tick

Disaster Recovery Testing Automation

Disaster Recovery Testing Automation

Predatar takes the time and complexity out of DR testing with intelligent automation that continuously recovers workloads in the background. What’s more, Predatar Disaster Recovery testing prioritises the most important workloads, and those that are at the highest risk of recovery failure.

tick

Cyber Recovery Orchestration & Scanning

Cyber Recovery Orchestration & Scanning

Using best-in-class antivirus tools, Predatar scans your backup workloads for hidden malware. If any infections are found, Predatar removes them and replaces the infected nodes with cleaned ones.

no tick

Cyber Recovery Orchestration & Scanning

Cyber Recovery Orchestration & Scanning

Using best-in-class antivirus tools, Predatar scans your backup workloads for hidden malware. If any infections are found, Predatar removes them and replaces the infected nodes with cleaned ones.

no tick

Cyber Recovery Orchestration & Scanning

Cyber Recovery Orchestration & Scanning

Using best-in-class antivirus tools, Predatar scans your backup workloads for hidden malware. If any infections are found, Predatar removes them and replaces the infected nodes with cleaned ones.

tick

Cyber Recovery Orchestration & Scanning

Cyber Recovery Orchestration & Scanning

Using best-in-class antivirus tools, Predatar scans your backup workloads for hidden malware. If any infections are found, Predatar removes them and replaces the infected nodes with cleaned ones.

tick

Automated 105 Point Backup Health Checks

Automated 105 Point Backup Health Checks

Predatar runs a daily health check on your backup estate to provide users with an early-warning of any potential issues.

no tick

Automated 105 Point Backup Health Checks

Automated 105 Point Backup Health Checks

Predatar runs a daily health check on your backup estate to provide users with an early-warning of any potential issues.

tick

Automated 105 Point Backup Health Checks

Automated 105 Point Backup Health Checks

Predatar runs a daily health check on your backup estate to provide users with an early-warning of any potential issues.

no tick

Automated 105 Point Backup Health Checks

Automated 105 Point Backup Health Checks

Predatar runs a daily health check on your backup estate to provide users with an early-warning of any potential issues.

tick

Backup Server & Client Event Management

Backup Server & Client Event Management

Predatar allows users to set custom alerts and actions in response to server and client events

no tick

Backup Server & Client Event Management

Backup Server & Client Event Management

Predatar allows users to set custom alerts and actions in response to server and client events

tick

Backup Server & Client Event Management

Backup Server & Client Event Management

Predatar allows users to set custom alerts and actions in response to server and client events

no tick

Backup Server & Client Event Management

Backup Server & Client Event Management

Predatar allows users to set custom alerts and actions in response to server and client events

tick

Automated Backup Reruns

Automated Backup Reruns

Predatar includes the ability to automatically re-run failed and interrupted backup runs.

no tick

Automated Backup Reruns

Automated Backup Reruns

Predatar includes the ability to automatically re-run failed and interrupted backup runs.

tick

Automated Backup Reruns

Automated Backup Reruns

Predatar includes the ability to automatically re-run failed and interrupted backup runs.

no tick

Automated Backup Reruns

Automated Backup Reruns

Predatar includes the ability to automatically re-run failed and interrupted backup runs.

tick

Business Line Reporting & Self Service

Business Line Reporting & Self Service

Predatar allows users to easily configure reports that focus on what matters most to them without the need for technical expertise.

no tick

Business Line Reporting & Self Service

Business Line Reporting & Self Service

Predatar allows users to easily configure reports that focus on what matters most to them without the need for technical expertise.

tick

Business Line Reporting & Self Service

Business Line Reporting & Self Service

Predatar allows users to easily configure reports that focus on what matters most to them without the need for technical expertise.

no tick

Business Line Reporting & Self Service

Business Line Reporting & Self Service

Predatar allows users to easily configure reports that focus on what matters most to them without the need for technical expertise.

tick

Exclusive Discounts & Subscription Benefits

Exclusive Discounts & Subscription Benefits

Predatar Ultimate customers benefit from subscription discounts and exclusive promotions.

no tick

Exclusive Discounts & Subscription Benefits

Exclusive Discounts & Subscription Benefits

Predatar Ultimate customers benefit from subscription discounts and exclusive promotions.

no tick

Exclusive Discounts & Subscription Benefits

Exclusive Discounts & Subscription Benefits

Predatar Ultimate customers benefit from subscription discounts and exclusive promotions.

no tick

Exclusive Discounts & Subscription Benefits

Exclusive Discounts & Subscription Benefits

Predatar Ultimate customers benefit from subscription discounts and exclusive promotions.

tick

Predatar Vault

Predatar Vault

Predatar Vault gives users an easy way to boost resiliency by storing an additional copy of their backups on an access-controlled, hardened Predatar appliance in the IBM cloud.

Optional

Predatar Vault

Predatar Vault

Predatar Vault gives users an easy way to boost resiliency by storing an additional copy of their backups on an access-controlled, hardened Predatar appliance in the IBM cloud.

Optional

Predatar Vault

Predatar Vault

Predatar Vault gives users an easy way to boost resiliency by storing an additional copy of their backups on an access-controlled, hardened Predatar appliance in the IBM cloud.

Optional

Predatar Vault

Predatar Vault

Predatar Vault gives users an easy way to boost resiliency by storing an additional copy of their backups on an access-controlled, hardened Predatar appliance in the IBM cloud.

Optional

Cloud CleanRoom

Cloud CleanRoom

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. Built in the IBM Cloud, Cleanrooms are available in small, medium, and large configurations based on your requirements.

no tick

Cloud CleanRoom

Cloud CleanRoom

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. Built in the IBM Cloud, Cleanrooms are available in small, medium, and large configurations based on your requirements.

no tick

Cloud CleanRoom

Cloud CleanRoom

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. Built in the IBM Cloud, Cleanrooms are available in small, medium, and large configurations based on your requirements.

Optional

Cloud CleanRoom

Cloud CleanRoom

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. Built in the IBM Cloud, Cleanrooms are available in small, medium, and large configurations based on your requirements.

Optional

CleanRoom Appliance

CleanRoom Appliance

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. On Premise Cleanrooms can be built by IBM Lab Services and selected Predatar Partners in small, medium, and large configurations based on your requirements.

no tick

CleanRoom Appliance

CleanRoom Appliance

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. On Premise Cleanrooms can be built by IBM Lab Services and selected Predatar Partners in small, medium, and large configurations based on your requirements.

no tick

CleanRoom Appliance

CleanRoom Appliance

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. On Premise Cleanrooms can be built by IBM Lab Services and selected Predatar Partners in small, medium, and large configurations based on your requirements.

Optional

CleanRoom Appliance

CleanRoom Appliance

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. On Premise Cleanrooms can be built by IBM Lab Services and selected Predatar Partners in small, medium, and large configurations based on your requirements.

Optional

CleanRoom Blueprint (Build your own)

CleanRoom Blueprint (Build your own)

Cleanroom Blueprints are available for free to allow users to configure their own Cleanroom in the Cloud or on premise.

no tick

CleanRoom Blueprint (Build your own)

CleanRoom Blueprint (Build your own)

Cleanroom Blueprints are available for free to allow users to configure their own Cleanroom in the Cloud or on premise.

no tick

CleanRoom Blueprint (Build your own)

CleanRoom Blueprint (Build your own)

Cleanroom Blueprints are available for free to allow users to configure their own Cleanroom in the Cloud or on premise.

Included

CleanRoom Blueprint (Build your own)

CleanRoom Blueprint (Build your own)

Cleanroom Blueprints are available for free to allow users to configure their own Cleanroom in the Cloud or on premise.

Included

Control User Conference Tickets

Control User Conference Tickets

Control is Predatar’s annual user conference hosted in partnership with IBM. Places are limited, but all Ultimate subscribers receive complimentary tickets and a guaranteed space at the event.

Optional

Control User Conference Tickets

Control User Conference Tickets

Control is Predatar’s annual user conference hosted in partnership with IBM. Places are limited, but all Ultimate subscribers receive complimentary tickets and a guaranteed space at the event.

Optional

Control User Conference Tickets

Control User Conference Tickets

Control is Predatar’s annual user conference hosted in partnership with IBM. Places are limited, but all Ultimate subscribers receive complimentary tickets and a guaranteed space at the event.

Optional

Control User Conference Tickets

Control User Conference Tickets

Control is Predatar’s annual user conference hosted in partnership with IBM. Places are limited, but all Ultimate subscribers receive complimentary tickets and a guaranteed space at the event.

Included

insights icon

Insights & Cyber Benchmarking

Free Forever! Our entry-level option is perfect for business looking to better understand their backup and recovery risks.

backup icon

Backup Analytics & Automation

Best for businesses looking for deep insights into their backup environment with customisable dashboards and automated reporting.

Available
from IBM

cyber recovery icon

Cyber Recovery Orchestration*

Best for businesses looking to automate the testing and cleaning of backups for cyber resilient recovery.

ultimate sub icon

Ultimate Subscription

For businesses that want it all. The ultimate solution for cyber resilient backup and recovery.

Metadata Retention Period

Metadata Retention Period

Predatar doesn’t read your backup data. It reads data about your data. The more metadata Predatar holds, the more accurate the analysis and insights will be. With all of our ‘paid-for’ subscriptions Predatar will store and utilise all of your metadata from the day you joined.

90 Days

Unlimited

Unlimited

Unlimited

Automated Cyber Benchmarking

Automated Cyber Benchmarking

Predatar continually monitors the workloads in your backup estate and provides a real-time cyber grade from A+ to D based on 26 data points. The grade gives users an ‘at a glance’ indication of their ability to recover at any given moment.

tick
tick
tick
tick

Backup Analytics & Insights

Backup Analytics & Insights

Successful recovery starts with successful backups. Predatar Backup Analytics and Insights gives backup and infrastructure teams a clear view of their backups through customisable analytics and reports.

tick
tick
no tick
tick

Signal (Anomaly Detection & SIEM Integration)

Signal (Anomaly Detection & SIEM Integration)

Predatar Signal is the decision engine that sits at the heart of Predatar’s cyber recovery capabilities. By monitoring multiple inputs including backup behaviour and SIEM events, then applying machine-learning principles – Predatar Signal identifies the workloads at the highest risk of infection or recovery failure.

no tick
no tick
tick
tick

Disaster Recovery Testing Automation

Disaster Recovery Testing Automation

Predatar takes the time and complexity out of DR testing with intelligent automation that continuously recovers workloads in the background. What’s more, Predatar Disaster Recovery testing prioritises the most important workloads, and those that are at the highest risk of recovery failure.

no tick
no tick
tick
tick

Cyber Recovery Orchestration & Scanning

Cyber Recovery Orchestration & Scanning

Using best-in-class antivirus tools, Predatar scans your backup workloads for hidden malware. If any infections are found, Predatar removes them and replaces the infected nodes with cleaned ones.

no tick
no tick
tick
tick

Automated 105 Point Backup Health Checks

Automated 105 Point Backup Health Checks

Predatar runs a daily health check on your backup estate to provide users with an early-warning of any potential issues.

no tick
tick
no tick
tick

Backup Server & Client Event Management

Backup Server & Client Event Management

Predatar allows users to set custom alerts and actions in response to server and client events

no tick
tick
no tick
tick

Automated Backup Reruns

Automated Backup Reruns

Predatar includes the ability to automatically re-run failed and interrupted backup runs.

no tick
tick
no tick
tick

Business Line Reporting & Self Service

Business Line Reporting & Self Service

Predatar allows users to easily configure reports that focus on what matters most to them without the need for technical expertise.

no tick
tick
no tick
tick

Exclusive Discounts & Subscription Benefits

Exclusive Discounts & Subscription Benefits

Predatar Ultimate customers benefit from subscription discounts and exclusive promotions.

no tick
no tick
no tick
tick

Bolt-Ons

Predatar Vault

Predatar Vault

Predatar Vault gives users an easy way to boost resiliency by storing an additional copy of their backups on an access-controlled, hardened Predatar appliance in the IBM cloud.

Optional

Optional

Optional

Optional

Cloud CleanRoom

Cloud CleanRoom

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. Built in the IBM Cloud, Cleanrooms are available in small, medium, and large configurations based on your requirements.

no tick
no tick

Optional

Optional

CleanRoom Appliance

CleanRoom Appliance

The Predatar Cleanroom is a secure, segregated environment including hardware, software, and compute. A Cleanroom is essential for performing malware scanning and cleaning with Predatar. On Premise Cleanrooms can be built by IBM Lab Services and selected Predatar Partners in small, medium, and large configurations based on your requirements.

no tick
no tick

Optional

Optional

CleanRoom Blueprint (Build your own)

CleanRoom Blueprint (Build your own)

Cleanroom Blueprints are available for free to allow users to configure their own Cleanroom in the Cloud or on premise.

no tick
no tick

Included

Included

Control User Conference Tickets

Control User Conference Tickets

Control is Predatar’s annual user conference hosted in partnership with IBM. Places are limited, but all Ultimate subscribers receive complimentary tickets and a guaranteed space at the event.

Optional

Optional

Optional

Included

Not sure which subscription is right for you? Let’s talk.

Contact the team