Macrium Reflect Home
Use Macrium Reflect’s innovative scheduling tools to create regular backups at times when you’re not using your computer or by selecting times when CPU utilization is low, combined with the ability to create full, incremental or differential backups and other tools that accelerate the backup process help minimize disruption during backups, ensuring seamless daily operations
Knowing Macrium Reflect is taking care of your computer backups provides a degree of assurance, but even better are our verification and restore virtualization, which allows you to be confident that your images provide the insurance policy against disaster that you need.
Macrium Reflect is designed for ‘offline’ backups, which means in the event of a disaster, your backup images are right where you need them. In addition, Reflect optimizes the storage of your data with retention rules, data compression, and multiple destination options, efficiently managing backup space. For peace of mind and security, Macrium provides image encryption and password protection to ensure that should someone steal your image, data remains safe and inaccessible to anyone else but you.
With an easy-to-use interface, responsive and knowledgeable email support, extensive online resources, and multi-language interfaces, Macrium simplifies the backup process for home users. At the same time, Macrium makes it easy for you to decide what and when to backup - from single files or folders to an entire operating system, you’re in control of the backup process.
Best Value: 50% DISCOUNT off Annual Plan 4-packs!
Direct access to our experts
Access all future releases and updates
We help you get setup
Ransomware is one of the most familiar and insidious cybersecurity threats today. One of the most powerful features of Reflect Home is Macrium Image Guardian.
Our software stops ransomware from targeting backup files, making data recovery a breeze. By granting write access only to Macrium-specific file types, it’s nearly impossible for any unauthorized modifications - like encryption by ransomware - to take place.