Online Backup

Using Online Backup

To make sure you do not lose critically important data, you can use the iDrive Online Backup to regularly back it up to a secure remote server. When you install ZoneAlarm 2018 software, you automatically receive 5 GB of storage space on a secure remote site. In case your computer is lost or stolen, or in case of a hardware malfunction, you can easily restore your backed-up data. For more information on iDrive, go to ZoneAlarm iDrive web home page

Activating Secure Online Data Backup

To use Online Backup, you must first activate it.

To activate Online Backup:

  1. Click in the MOBILITY & DATA panel of the ZoneAlarm 2018 software client.
  2. Click Activate in the Online Backup section.
    The ZoneAlarm Online Backup web page opens.
  3. Click Install Your Online Backup.
    A status bar appears and asks you if you want to run or to save the ZoneAlarmBackupWinSetup.exe file.
  4. Click Run.
    If you want to run the installation later, click Save.
  5. In the MS Windows User Account Control window that opens, click Yes.
    The installation begins.
  6. In the window that opens, enter information to create an IDrive account:
    • First Name
    • Last Name
    • Email address
    • Password
  7. Click Create My Account.
  8. On the next webpage, select Configure your iDrive account with encryption!
  9. Click Continue.
    The iDrive Online Backup application is installed on your computer and this message shows: Your iDrive account has been created successful.
    A confirmation email is sent to the email address you used to sign up.

Changing Online Backup Settings

Once activated, Online Backup will save your critical data according to the schedule. You can change the schedule and the critical data folders as needed.

To change online backup settings:

  1. Click in the MOBILITY & DATA panel of the ZoneAlarm 2018 software client.
  2. Click Settings in the Online Backup section.
    The ZoneAlarm Backup window opens.
  3. See the online iDrive ZoneAlarm Backup User Manual for further instructions.
© 2018 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.


Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.


Refer to the Copyright page for a list of our trademarks.

Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.