Magic Quadrant for Enterprise Backup/Recovery Software

Total Page:16

File Type:pdf, Size:1020Kb

Magic Quadrant for Enterprise Backup/Recovery Software 6/10/13 Magic Quadrant for Enterprise Backup/Recovery Software Magic Quadrant for Enterprise Backup/Recovery Software 5 June 2013 ID:G00245495 Analyst(s): Dave Russell, Pushan Rinnen VIEW SUMMARY STRATEGIC PLANNING ASSUMPTIONS Through 2015, disk-to-disk-to-tape (D2D2T) Backup is among the oldest, most performed tasks in IT. The industry continues to undergo backup will remain the predominant strategy for significant change as organizations embrace new technologies and techniques and show a large enterprises. propensity to augment or switch legacy vendors and backup techniques. By the end of 2016, 40% of large enterprises, up from 20% at year-end 2012, will have eliminated tape for operational recovery. Between 2012 and 2016, one-third of Market Definition/Description organizations will change backup vendors due to frustration over cost, complexity and/or capability. This document was revised on 7 June 2013. The document you are viewing is the corrected By 2016, at least 20% of large enterprises will version. For more information, see the Corrections page on gartner.com. abandon backup/recovery solutions using a traditional methodology and adopt those that A vendor profile in this research is not entirely product-specific, but rather represents the vendor's employ only snapshot and replication techniques, up from less than 7% today. overall position in the enterprise backup/recovery software market. The emphasis of this Magic Quadrant research is on backup/recovery software (that is, backup applications). For vendors that meet the inclusion criteria (weighted heavily toward backup application software capabilities), we EVALUATION CRITERIA DEFINITIONS evaluated their entire backup/recovery software and hardware portfolio. However, hardware solutions and partner products were given a lower weighting in an attempt to focus on the Ability to Execute vendor's own backup/recovery software and intellectual property. This research emphasizes disk- Product/Service: Core goods and services based backup and server backup, although tape backup and endpoint backup will be factored into offered by the vendor that compete in/serve the the comprehensiveness of the vendor's data protection portfolio and capabilities. Although defined market. This includes current product/service capabilities, quality, feature sets Gartner believes that the appliance packaging option is often attractive for storage, particularly and skills, whether offered natively or through for backup use cases, this research is not focused on backup appliances (see "Storage Appliances OEM agreements/partnerships as defined in the May Transcend IT Silos and Incur High Cost at Scale"). market definition and detailed in the subcriteria. Overall Viability (Business Unit, Financial, The Magic Quadrant for Enterprise Backup/Recovery Software presents the next step in the Strategy, Organization): Viability includes an evolution of backup, which incorporates new products, solutions and techniques for protecting, assessment of the overall organization's financial backing up and recovering desktop, laptop, physical server and virtual server files, applications health, the financial and practical success of the and system images. These backup products provide features such as traditional backup to tape, business unit, and the likelihood that the backup to conventional disk, backup to the cloud, data reduction (compression and deduplication), individual business unit will continue investing in snapshot, heterogeneous replication, continuous data protection (CDP) and/or virtual tape library the product, will continue offering the product and will advance the state of the art within the (VTL) support, among other capabilities. organization's portfolio of products. Organizations are increasingly making their backup product selection from vendors that offer Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that expanded protection capabilities and techniques, in addition to traditional tape-based backup supports them. This includes deal management, software. Many organizations understand the value of backing up critical data via multiple pricing and negotiation, presales support, and the methods. Many of these vendors profiled here would have been considered nontraditional overall effectiveness of the sales channel. suppliers of recovery solutions only a few years ago. Market Responsiveness and Track Record: Ability to respond, change direction, be flexible and Gartner has responded to the changing enterprise backup/recovery landscape with a more achieve competitive success as opportunities comprehensive evaluation tool that better reflects the current and evolving state of the market. develop, competitors act, customer needs evolve While the origins of this Magic Quadrant are in tape-based backup application software, we also and market dynamics change. This criterion also consider vendors that produce backup software and potentially a complementary backup/recovery considers the vendor's history of responsiveness. hardware portfolio. A vendor no longer must possess tape capabilities to be included. However, Marketing Execution: The clarity, quality, vendors that do not possess a broad-based and heterogeneous backup application (for example, creativity and efficacy of programs designed to a Windows-only or a single hypervisor virtual machine [VM]-only solution) and that deliver only deliver the organization's message to influence disk-based backup appliances were not eligible for inclusion in this Magic Quadrant. It also the market, promote the brand and business, increase awareness of the products, and establish excludes backup software for a homogeneous environment, such as native tools from Microsoft or a positive identification with the product/brand VMware for their own specific platforms, as many enterprise customers prefer a single, scalable and organization in the minds of buyers. This backup product for a heterogeneous environment. Other solutions for more-specific backup use mind share can be driven by a combination of cases, such as pure-play endpoint, cloud or appliance solutions for backup, are also not included publicity, promotional initiatives, thought in this research. leadership, word-of-mouth and sales activities. Customer Experience: Relationships, products As the backup/recovery software market comprises several dozens, if not hundreds, of vendors, and services/programs that enable clients to be this report narrows it down to those that have strong presence in large-enterprise environments, successful with the products evaluated. in part measured by Gartner search analytics and Gartner end-user inquiry. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support Methodology programs (and the quality thereof), availability of user groups and SLAs. Placement on the Magic Quadrant is heavily influenced by more than 1,000 conversations Operations: The ability of the organization to conducted annually with Gartner clients on the topic of backup and recovery. In addition, the meet its goals and commitments. Factors include Magic Quadrant methodology includes a comprehensive vendor survey; several in-depth vendor the quality of the organizational structure, briefings regarding product, portfolio, strategy and messaging; and the solicitation of three or including skills, experiences, programs, systems more references from each vendor for interviews and up to seven references for electronic and other vehicles that enable the organization to surveys. Gartner also utilizes worldwide end-user surveys, Gartner conference kiosk surveys, operate effectively and efficiently on an ongoing Gartner conference session polling data, and many one-on-one conversations and backup basis. roundtable discussions from these conferences. From these and other data sources, we learn Completeness of Vision how customers are using the vendor's solutions and how prospects could potentially benefit from Market Understanding: Ability of the vendor to them, and we are also able to determine the strengths and cautions of the offering from each understand buyers' wants and needs and to provider. We learn about experiences with sales and support, acquisition and maintenance translate those into products and services. Vendors that show the highest degree of vision pricing, and opinions on vendor responsiveness to aspects such as requests for enhancements. listen to and understand buyers' wants and needs www.gartner.com/technology/reprints.do?id=1-1FWTPQY&ct=130606&st=sb 1/18 6/10/13 Magic Quadrant for Enterprise Backup/Recovery Software and can shape or enhance those with their added It is important to remember that the Magic Quadrant does not solely rate product quality or vision. capabilities and features. A Magic Quadrant is not just about a vendor's product(s); it is a scenario chart that maps a vendor's overall position in a specific market. While the product Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout portfolio is an important part of the rating, the vendor's ability to acquire customers and expand the organization and externalized through the its presence in the market is also important, as is its ability to grow product and service revenue. website, advertising, customer programs and A vendor that offers a strong, technically elegant product, but is unable or unwilling to invest in positioning statements. marketing
Recommended publications
  • HP Openview Storage Data Protector Concepts Guide
    HP OpenView Storage Data Protector Concepts Guide Manual Edition: April 2005 Manufacturing Part Number: B6960-90105 Release A.05.50 © Copyright Hewlett-Packard Development Company, L.P.2005. Legal Notices ©Copyright 2004 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. UNIX® is a registered trademark of The Open Group. Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation. Oracle® is a registered U.S. trademark of Oracle Corporation, Redwood City, California. Java™ is a U.S. trademark of Sun Microsystems, Inc. ARM® is a registered trademark of ARM Limited. ii Contents 1. About Backup and Data Protector In This Chapter . 2 About Data Protector . 3 Introducing Backups and Restores . 7 What Is a Backup? . 7 What Is a Restore? . 7 Backing Up a Network Environment . 8 Direct Backup . 9 Data Protector Architecture . 10 Operations in the Cell. 12 Backup Sessions . 12 Restore Sessions . 14 Enterprise Environments . 15 Splitting an Environment into Multiple Cells . 16 Media Management . 19 Backup Devices .
    [Show full text]
  • HP LTO Ultrium Tape Drives Overview
    QuickSpecs HP LTO Ultrium Tape Drives Overview The family of HP LTO Ultrium tape drives is HP's premier line of backup devices. Based on the LTO Ultrium format, an open standard with a well-defined six-generation roadmap, HP LTO Ultrium tape drives offer customers the best choice for investment protection. With ultimate reliability and ease of use in mind, even at 100% duty cycles, HP's rugged design builds on superior LTO technology and adds advanced features like hardware data encryption to create a new level of data protection. The tape drives employ dynamic data rate matching to adjust to the speed of the host, reducing wear and tear on both drive and media and increasing performance, even on slower hosts. HP's ultra-durable soft-load feature automatically positions the data cartridge together with the highly reliable HP leader-capture mechanism make your backup and restore operations more reliable. Support for HP One-Button Disaster Recovery provides the easiest way to restore data in the event of a disaster. The family of tape drives also features support for HP TapeAssure which provides a single application for drive management and HP Library and Tape Tools which provides diagnostics, and performance optimization. Included with the HP LTO Ultrium tape drives is Data Protector Express Basic backup and recovery software providing a backup application to protect a single server. If data is critical to your business, protect it with an HP LTO Ultrium tape drive. HP LTO Ultrium Full-Height Tape Drives HP LTO-5 Ultrium 3280 Tape Drive HP LTO-5 Ultrium 3280 Tape Drive sets new standards for capacity, performance, and manageability.
    [Show full text]
  • Quickspecs HP Data Protector for Notebooks & Desktops Software Overview
    RETIRED: Retired products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models. QuickSpecs HP Data Protector for Notebooks & Desktops software Overview HP Data Protector for Notebooks & Desktops software continuously and automatically protects users' files on networked Windows notebook and desktop computers. Continuous protection means that data files, such as Microsoft Office documents, are backed up as soon as they are saved. For the IT administrator, with data on up to 1000 end-user machines to protect, Data Protector for Notebooks and Desktops delivers an easy to manage, robust and unified solution to protecting data on the organization's notebook and desktop computers. For users it provides assurance that their data is safe should they accidentally delete it or corrupt it or should they lose or damage their computer. Protection happens invisibly to the users; there is no backup operation to be manually triggered or scheduled. User self-service data recovery saves time for both the IT administrator and that user. Data Protector for Notebooks and Desktops integrates into Windows Explorer so that a right click opens a context menu that is used to select file versions available for recovery. The multiple file versions are stored using smart differencing technology to optimize use of the available storage space. The protection extends to persistently open files such as Microsoft Outlook PST files and works when the user is connected to the network or working off-line. For added protection, HP Data Protector for Notebooks and Desktops software works with Data Protector Express backup/recovery software to allow protected data to be further protected by backup to tape or other media.
    [Show full text]
  • User's Guide and Technical Reference Data Protector Express
    User’s Guide and Technical Reference Data Protector Express ii Data Protector Express ® User’s Guide and Technical Reference Copyright Copyright © 2005/2006 by Hewlett-Packard Limited. March 2006 Part Number BB116-90023 Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard. The information contained in this document is subject to change without notice. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information is provided ”as is” without warranty of any kind and is subject to change without notice. The warranties for Hewlett-Packard Company products are set forth in the express limited warranty statements for such products. Nothing herein should be construed as constituting an additional warranty. www.hp.com Trademarks Windows® and Windows NT® are registered trademarks of Microsoft Corporation. NetWare® is a registered trademark of Novell, Inc. Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red
    [Show full text]
  • HP X3000 Network Storage Systems Product Overview
    QuickSpecs HP X3000 Network Storage Systems Product Overview IP-based gateway services for arrays/SANs and highly available shared storage solutions built on industry standards You made the decision to invest in a storage array, but now you've found that you still have file and application servers that aren't connected. So you're still spending time managing islands of storage and your array isn't meeting its full potential. Wouldn't it be nice to complete the consolidation to truly create one unified storage pool to expand and protect? HP X3000 Network Storage Systems boost the value of your array or SAN by adding Windows-powered IP-based gateway services to it. You'll spend less time and effort on maintenance and deliver a better return-on-investment for your array/SAN when you consolidate to a single, unified storage pool that can serve files to your clients and blocks to your servers via multiple protocols (FC/iSCSI or SAS/iSCSI). Industry-standards protect your investment by providing compatibility with your network and applications, and a Microsoft Cluster Server (MSCS) license is included to provide high availability and reduce downtime. What is an X3000 HP X3000 Network Storage Systems are enhanced Windows-powered gateway and shared storage Network Storage System? solutions for your medium business, workgroup, or datacenter environment. They are built on industry- standard HP ProLiant servers and come with the Microsoft® Windows Storage Server 2008 Enterprise operating system -- including cluster services -- pre-installed. They connect via Ethernet and add file, print, iSCSI, and management services to an array or SAN, or they can be used in conjunction with array storage to build an affordable and highly-available unified storage solution.
    [Show full text]
  • Emea Q1 SLO 8Strani 02 200X280 02.Pdf
    HP priporoča Windows Vista® Business NOVEMBER 2007 LJUCI ZAK LETO 2007 v Stilu i! u p nak PRENOSNI RAČUNALNIK i HP COMPAQ 6710b obr Bodite učinkoviti tudi na terenu. d Priporočena cena* (z DDV): OGLASI SE, 1. 038,00 € NAGRADA KLIČE! Procesor Intel® Core™2 Duo T7250 (2 GHz) Zaslon 15,4’’ TFT WXGA 1280 x 800 ® ® KLIKNI - Intel PRO/Wireless LAN 802.11 a/b/g Grafična kartica Intel MGA X3100 z do 384 MB www.hp.com/si/nagradnaigra Originalni Windows Vista® Business SLO deljenega pomnilnika Microsoft® Office 2007 Ready Čitalec prstnih odtisov Pomnilnik 1 GB DDR2 667 MHz (1 slot prost) Vmesnik Bluetooth Trdi disk 160 GB SATA 5400 rpm Vgrajen varnostni čip TPM Dvoslojni pogon DVD+/-RW Garancija: 1 leto Podporni paket, ki podaljša garancijo na 3 leta. HP Priporočena cena* s HP Care Packom (z DDV): Care Pack 1.181,00 € Garancija ščiti vaše izdelke HP, HP Care Pack dvigne raven naše storitve. Obiščite: www.hp.com/si/Pametneresitve Kupite: www.hp.com/si/Partnerji Vse modele predstavljenih računalnikov HP priporoča Windows Vista® Business lahko dobite tudi z operacijskim sistemom Windows® XP Professional! Pokličite svojega pooblaščenega prodajalca! VELIKE SLIKE RAČUNALNIšKI ZASLON VISOKA HP L1950T 19” LOČLJIVOST Priporočena cena*(z DDV): 274,00 € RAČUNALNIšKI ZASLON ŠIRŠI ZASLON HP L2045w 20,1” ŠIRŠE IDEJE Priporočena cena*(z DDV): 317,00 € MICROTOWER MICROTOWER NAMIZNI RAČUNALNIK NAMIZNI RAČUNALNIK HP COMPAQ dx2300 HP COMPAQ dx2300 Hiter začetek vašega posla. Profesionalna oprema, profesionalno poslovanje. Priporočena cena*(z DDV): + Priporočena cena*(z
    [Show full text]
  • County of Ventura
    COUNTY OF VENTURA COMPUTING ARCHITECTURE STANDARDS FEBRUARY 19, 2014 County of Ventura Computing Architecture Standards TABLE OF CONTENTS 1. Executive Overview ................................................................................................... 1 1.1. Purpose/Objective ............................................................................................... 1 1.2. Architecture Document Updates/Maintenance .................................................... 1 2. Standard Categories .................................................................................................. 1 2.1. Local Area Network (LAN) Servers ..................................................................... 1 2.2. Individual Personal Computer System ................................................................ 1 2.3. Application Architecture ....................................................................................... 1 2.4. Infrastructure ....................................................................................................... 2 3. Standard vs. Alternative Products .............................................................................. 2 4. Standard Adoption and Exception Approval Process ................................................. 2 5. Standards Currently Under Review ............................................................................ 3 6. Exemptions ................................................................................................................ 3 CHART I – Local Area
    [Show full text]
  • HP Data Protector Software
    QuickSpecs HP Data Protector software Overview An intelligent approach to data protection HP Data Protector is the industry's first Adaptive Backup and Recovery solution that uses an intelligent approach to data protection and management. Advanced integration with applications and infrastructure, and operational analytics to optimize backup and recovery process, help you to improve business continuity, and boost uptime within your IT environments. With HP Data Protector, you can centrally manage and protect critical data scattered across remote sites and data centers in physical, virtual, and cloud infrastructures. Today, more than 45,000 customers worldwide use HP Data Protector software to safeguard their business information. In the IT arena, shifting data center requirements are forcing organizations to reassess backup and recovery processes, strategies, and infrastructure for a number of reasons: The need to keep pace with increased data volumes, diverse data formats and complexity Advanced data center technologies such as virtualization and cloud New business models such as IT-as-a-service (ITaaS) and Bring Your Own Device (BYOD) The need to manage and protect data according to tightening internal policies and always-on 24/7 service level objectives HP Data Protector is helping organizations of every size address these challenges with software that offers advanced data protection capabilities such as HP StoreOnce federated deduplication, integrated cloud backup, Enhanced Automated Disaster Recovery (EADR), Zero Downtime Backup, Instant Recovery, advanced virtual server protection, and mission-critical application recovery down to the exact second. With HP Data Protector, you gain better transparency, predictability, and business resiliency within your IT environments. Key Product Highlights Analytical insight and adaptive intelligence Optimizing the backup and recovery process with an approach that also addresses tomorrow's needs requires the ability to derive value and insight from backup-related operational information.
    [Show full text]
  • HP Data Protector Reporter Software Overview
    QuickSpecs HP Data Protector Reporter Software Overview Introduction HP Data Protector software, used by more than 41,000 customers around the world, simplifies application protection in virtual and physical environments through unified recovery and advanced automation. Global, one-touch backup policy configuration and a wide range of disk-based recovery options across HP and non-HP arrays help you meet any SLA for up to 70% less than other backup software solutions. Only Data Protector software includes single-pass disaster recovery for no additional cost and, together with HP Storage, delivers down-to-the-second application recovery - all from a centralized console. And only HP provides you with access to decades of expertise from one of the most trusted service organizations in the world. Data Protector software provides robust reporting functionality. For customers who require more sophisticated compliance and forecast planning, especially across multiple Data Protector instances, HP offers Data Protector Reporter software. What is Data Protector Reporter The Data Protector Reporter management server's integrated storage management lowers the cost of acquiring, managing and reporting on a heterogeneous storage environment while providing a topical, graphical representation of Data Protector Cell manager to storage device connectivity information. HP Data Protector Reporter provides Data Protector administrators with a single, integrated console from which to manage critical operations as backup and recovery forecasting, planning and cost analysis, as well as activities such as storage provisioning, real-time event management, new application installation, and server and storage migration. Powerful enterprise reporting with point and click simplicity HP Data Protector Reporter (DPR) is a competitively priced application that provides a portfolio of global, enterprise-scale reporting and management enhancements for HP Data Protector software.
    [Show full text]
  • Monthly Technobrief - J
    the way we see it Changing the Game: Monthly Technology Briefs January 2012 Ten Game-Changing Technology Shifts for 2012 Read the Capgemini Chief Technology Officers’ Blog at www.capgemini.com/ctoblog Public the way we see it Ten Game-Changing Technology Shifts for 2012 There are three terms that are at the center of the hype cycle at the moment; Cloud, Mobility, and Big Data. None of these are a single technology; instead a clutch of new technologies make up these three headline changers. In addition, there is one other mega trend referred to alternatively as the ‘bring-your-own- revolution’, ‘the tablet revolution’, ‘the consumerization of IT’, or even ‘the ‘post- PC era’. It can be summed up as the shift from the computer being at the core of technology development to people becoming the central focus. It is important to align this change to Capgemini’s TechnoVision and its interpretation of the business impact of different clusters of technology under the following headings: “Invisible Infostructure,” “Sector-as-a-Service,” “Thriving on Data,” “Process-on-the-Fly,” “We Collaborate,” “You Experience,” and the complex, but important, notion of “LiberArchitecture” – the freedom to use an open and constantly available environment. The following ten technology groupings provide a view based on technology that does not necessarily align to a business driven change in the manner of TechnoVision, though there are some obvious similarities. 1. The Core Change - People rather than IT are the new focus New forms of connection and delivery enable users to drive their own choice of place and manner of working, finding information, and even in choosing what software they download and use.
    [Show full text]
  • Dossier : Un CES 2013 Riche En Annonces
    Dossier : un CES 2013 riche en annonces Le CES 2013 de Las Vegas vient de fermer ses portes. Des centaines d’annonces ont été faites dans le cadre de ce rassemblement. Pas moins de 24 ont fait l’objet d’un article au sein deSilicon.fr . Débutons notre dossier par un article de fond : «CES 2013 : une édition sous le signe de la connexion ». D’un point de vue technologique, voici les grandes stars du CES 2013 la: mobilité et les processeurs. À commencer bien entendu par le Tegra 4 de Nvidia. Les annonces de la firme ont fait l’objet de plusieurs articles sur notre site : Nvidia lance le Tegra 4, le plus puissant processeur ARM jamais conçu Tout sur le Nvidia Tegra 4 : fréquence, technologie et positionnement face à la concurrence Avec Nvidia Grid, le jeu 3D se transporte dans le cloud La technologie Grid Gaming System de Nvidia, en images Nous avons assisté à une véritable déferlante de puces ARM : ST-Ericsson pousse ses puces ARM à 2,5 GHz Qualcomm dévoile les Snapdragon 600 et 800 Puce Exynos 5 Octa, l’Hydre à 8 têtes de Samsung Broadcom se donne les moyens de percer dans la mobilité Huawei disposera d’un processeur ARM Cortex-A15 à 8 cœurs Le monde x86 n’est toutefois resté inactif : Intel lance ses nouveaux processeurs Atom et Core pour terminaux mobiles AMD présente les premiers SoC x86 quadricœurs du marché Même l’architecture MIPS a eu son mot à dire : Puce JZ4780 : le bras armé de l’architecture MIPS pour les tablettes La mobilité… avant le MWC Certains constructeurs n’ont pas attendu le Mobile World Congress 2013 de Barcelone (du 25 au 28 février) pour lancer de nouveaux terminaux mobiles.
    [Show full text]
  • Data Protector Software Licenses, Services and Warranties
    QuickSpecs Micro Focus Data Protector Overview Data Protector Enterprise-class backup and recovery software for heterogeneous environments Data Protector is a core-to-edge data protection solution that standardizes and consolidates backup processes, allowing enterprises to reduce cost and complexity of their backup operations while delivering improved reliability and business resiliency. Data Protector is an enterprise backup and disaster recovery solution for diverse, dynamic, and distributed enterprises. Its capabilities include built-in disaster recovery, advanced integrations with storage platforms and the cloud, application-consistent recovery and advanced virtual environment protection. Data Protector is offered in two editions: Data Protector Express for virtualized environments and Data Protector Premium for mixed, hybrid environments. By standardizing the protection of data spread across locations, applications, formats, storage platforms, operating systems, and hypervisors, Data Protector backup software provides business assurance needed by today’s data-driven enterprise. With build-in reporting, automation and monitoring capabilities, Data Protector becomes a solution that allows to adapt and optimize your environment at all phases of the data protection cycle in order to meet your operational and business goals. Key product features Standardized protection: A unified and scalable architecture enables centralized management across physical and virtualized environments, disparate OSs, and business applications from core data centers to remote sites. Application-consistent recovery: Leading business application integrations extend backup, automated point-in-time recovery, and granular restores to application owners enabling them to manage, drive, and service their own requirements. Advanced virtual server protection: Hypervisor integrations and support offer virtual machine protection inheritance, tiered recovery options, process automation, analytics, and visualization for virtual environments.
    [Show full text]