Critical Capabilities for Enterprise Endpoint
|
|
- Polly Mathews
- 8 years ago
- Views:
Transcription
1 Página 1 de 9 Critical Capabilities for Enterprise Endpoint Backup 24 October 2013 ID:G Analyst(s): Pushan Rinnen, Dave Russell VIEW SUMMARY This research provides detailed stack ranking of seven endpoint backup products against 11 critical capabilities and across two use cases. This can help IT leaders narrow their enterprise endpoint backup product shortlists. Overview Key Findings Endpoint backup is no longer just about data protection; it also applies to reducing security risk and increasing user productivity. Endpoint backup capability gaps among leading products have narrowed in the past year, making product selection more difficult than before. While all products offer decent PC backup capabilities, key differentiations focus on performancerelated metrics, mobile device support and additional capabilities, such as integrated remote wipe and remote tracking. Almost 40% of user references surveyed reported that they have started implementing the practice of bring your own device (BYOD); however, support for integrated backup and file sync and share remains unavailable from the majority of vendors. Recommendations Procure budget for endpoint backup to protect your company's intellectual property and to increase knowledge workers' productivity. Work closely with the endpoint security/compliance team and the mobile team to design a comprehensive corporate plan for endpoint protection, including backup. Choose endpoint backup products based on employees' risk profiles. The mobile workforce tends to be more at risk than office workers, and will need a product that has stronger built-in security features and more data capture capabilities, and offers better self-service experiences. Choose endpoint backup products that offer strong mobile device support if your company is planning to introduce BYOD. What You Need to Know This document was revised on 18 July For more information, see the Corrections page. Endpoint backup is fundamentally different from server backup. Endpoint backup deals with the unpredictability of people, rather than predictability of servers. Many organizations had given up on endpoint backup because of management complexity and high failure rates. Modern endpoint backup solutions have beefed up basic backup capabilities and, more importantly, are no longer only about backup. Vendors are adding functions such as easy self-restore, mobile access, file sync, e-discovery and remote wipe to increase user productivity and reduce compliance and security risks associated with human behavior. Meanwhile, the increased mobile work options and adoption of BYOD are increasing security risks. As a result, we are seeing greater interest in deploying endpoint backup from large organizations, including well-known technology companies. These companies realize that increased workforce mobility heightens data loss risks, as more employees store their data locally on their endpoints. The old way of either ignoring endpoint backup or forcing users to write to a corporate network share is no longer valid. EVIDENCE 1 Among the 19 user references that responded to our endpoint backup survey, only five mentioned that they sometimes hear end users complaining about the performance issues when backup is initiated. Some mentioned they heard complaints when users back up huge files, such as 10GB size. CRITICAL CAPABILITIES METHODOLOGY Critical capabilities are attributes that differentiate products in a class in terms of their quality and performance. Gartner recommends that users consider the set of critical capabilities as some of the most important criteria for acquisition decisions. This methodology requires analysts to identify the critical capabilities for a class of products. Each capability is then weighted in terms of its relative importance overall, as well as for specific product use cases. Next, products are rated in terms of how well they achieve each of the critical capabilities. A score that summarizes how well they meet the critical capabilities overall, and for each use case, is then calculated for each product. Ratings and summary scores range from 1.0 to 5.0: 1 = Poor: most or all defined requirements not achieved 2 = Fair: some requirements not achieved 3 = Good: meets requirements 4 = Excellent: meets or exceeds some requirements 5 = Outstanding: significantly exceeds requirements Product viability is distinct from the critical capability scores for each product. It is our assessment of the vendor's strategy and its ability to enhance and support a product over its expected life cycle; it is not an evaluation of the vendor as a whole. Four major areas are considered: strategy, support, execution and investment. Strategy includes how a vendor's strategy for a particular product fits in relation to its other product lines, its market direction and its business overall. Support includes the quality of technical and account support as well as customer experiences for that product. Execution considers a vendor's structure and processes for sales, marketing, pricing and deal management. Investment considers the vendor's financial health and the likelihood of the individual business unit responsible for a product to continue investing in it. Each product is rated on a five-point scale from poor to outstanding for each of these four areas, and it is then assigned an overall product viability rating. The critical capabilities Gartner has selected do not represent all capabilities for any product and, therefore, may not represent those most important for a specific use situation or business objective. Clients should use a critical capabilities analysis as one of several sources of input about a product before making an acquisition decision. This updated report has several major changes compared with last year's report. We have excluded one product that is no longer available and three products that almost never show up in Gartner end-user inquiries and lack development focus on endpoints from their vendors. Good Technology acquired Copiun in 4Q12 for its file sync and share function and discontinued the backup product. The other products that are excluded are CA Technologies' CA ARCserve, EMC Avamar and IBM Tivoli Storage Manager (TSM) FastBack for Workstations and TSM with Backup/Archive Client. These vendors and their respective products have a much stronger focus than on endpoint backup development. Again, we haven't included Symantec's Desktop and Laptop Option backup product, because Symantec hasn't been focusing on endpoint backup and doesn't have a future strategy.
2 Página 2 de 9 We have modified some categories of critical capabilities based on new product developments and more logical groupings. For example, we combined last year's device diversity and content variety into one category: PC device/os diversity. We changed heterogeneous restore to PC content restore/migration. Last year, support for mobile devices, such as tablets and smartphones, were blended with PCs; this year, we created mobile device support as a separate category. Another new category is back-end server/storage capabilities, which is useful information for organizations planning to implement endpoint backup on-premises. Due to many changes in evaluation categories and what is included in each category, we advise against comparing this year's report with last year's report, as they will not be exact comparisons. Additionally, the market is changing as larger-scale deployments progress and vendors refine solutions. The two use cases remain the same mobile-workforce-centric versus office-workforce-centric although weightings for each critical capability against each use case are changed due to new capabilities created in Analysis Introduction Endpoint backup was not adopted widely because traditional products had a lot of performance issues, such as long backup windows and performance degradation during backup, as well as management limitations such as lack of silent deployment and self-restore functions. Some organizations tried and gave up on endpoint backup, while others worked around this problem by requiring users to write to network shares. However, the latter practice is typically not enforced, as many users store their data on their local drives, and road warriors, for example, don't have access to VPNs. With technology advancements, today's endpoint backup has become much more user-transparent 1 and user-friendly, and can even increase user productivity with mobile access and sync capabilities. On the security side, some products have remote wipe and geographical tracking capabilities to reduce security risks. Endpoint backup remains predominantly focused on PC backup for desktops and laptops. The need to back up mobile devices (tablets and smartphones) is limited to photos and documents. Mobile access (read and download, but not upload) to PC backup copies, however, has become widely available as a standard feature. Due to the sandboxed nature of many mobile OSs, version-based file sync has become a convenient way to offer mobile data protection. During 2012, Druva was the only vendor to offer an endpoint backup product that had a companion file sync product for business organizations. In 2013, EMC (Mozy) added file sync capability based on its previous consumer product. Code 42 Software and CommVault introduced file sync capabilities in October 2013 with different implementations, and their product ratings reflect their upcoming capabilities. When backup is file-sync-aware, files that have been synced to the server will no longer need to be transmitted over the Internet again, thus reducing network traffic. Moreover, file sync offered by backup vendors may provide the same source-side deduplication used in endpoint backup, further decreasing network traffic and increasing performance. We believe that, over time, enterprise endpoint backup will merge with access/file sync and data loss prevention (DLP) functions more seamlessly to form a total solution to prevent data loss and leak from endpoint devices, and to increase user productivity. While all products evaluated in this report offer decent PC backup capabilities, key differentiations focus on performance-related metrics, mobile device support and more advanced capabilities, such as file sync, device/os migration, e-discovery functions, and integration with DLP features, such as remote wipe and remote tracking. While a few products have proven records of large, scalable deployments, others need to improve their presence in large enterprises. Of the seven products evaluated, five introduced new or refreshed graphical user interfaces (GUIs) since our last report. The new or refreshed GUIs have a more intuitive and more modern look than their older versions, and aim to make users' experiences and the administrator's job easier. Product Class Definition Enterprise endpoint backup refers to backup of endpoint devices, such as desktops, laptops, tablets and smartphones, which can access corporate content and create business content locally. There are numerous PC backup products in the market, especially for consumers and small businesses. The focus of this report is on the products that have proven ability to meet enterprise endpoint backup support and implementation requirements. Critical Capabilities Definition All endpoint backup products profiled here share some basic features and functions, such as centralized management, user transparency in terms of agent deployment and backup, backup of files and archives, restore to a different device, support for scheduled backup and support for interrupted backup where backup jobs resume where they have stopped. We concentrate on 11 critical capabilities that differentiate competing endpoint backup products: PC OS Diversity Degree of diversity in PC OS platforms and data supported PC Content Restore/Migration Ability to restore individual files to a different OS version or platform, as well as to migrate the entire PC content to a new device Mobile Device Support The level of data protection support for mobile devices such as tablets and smartphones Scalability
3 Página 3 de 9 Size of the deployment in the real world, as well as based on product design Data Reduction Techniques Type of data reduction techniques used in the product, such as deduplication and compression, and how they are implemented Performance Performance-boosting techniques from initial seeding options to recovery, as well as default backup intervals, and network and CPU throttling Security Security features such as access control methods, encryption, remote wipe/remote tracking, and mobile containerization support User Experience Factors impacting both end-user and administrator experiences, such as user interfaces, self-restore capability, and monitoring/reporting tools Back-End Server/Storage Capability Capabilities to implement data integrity checks, high-availability for backup server and storage, and dynamic client load balancing Proven Cloud Presence Degree of supporting the vendor's cloud or third-party cloud, including cloud adoption and data center presence E-Discovery Functions Functions that allow easy e-discovery for compliance, such as full-text indexing and search, federated search, and support for legal hold Use Cases Since the use cases have to be supported by all products evaluated, we are rating the endpoint backup products for two use cases as well as the overall use case: Overall Overall use case is a generalized usage scenario and is not representative of how specific users will use or deploy a technology or service within their enterprise. Mobile-Workforce-Centric Endpoint backup software needs to cater to the dynamic and unpredictable online/offline schedules of the mobile workforce, as well as the unsecure environment outside corporate firewalls. For this use case, heterogeneous OS backup/restore and migration, security-related capabilities and support for mobile devices such as tablets and smartphones and cloud have a higher weighting than the officeworkforce-centric use case. Office-Workforce-Centric Endpoint backup software caters to a workforce that is always online during predictable business hours. These kinds of employees are typically sitting within a company's firewall (office workers) or connected via a secure corporate VPN (telecommuters). For this type of workforce, scalability, user experiences, back-end server/storage capabilities and e-discovery functions carry higher weighting. Table 1 looks at the weightings of all use cases in this research. Each use case weighs the capabilities individually based on the needs of that case, which impacts the score. Each vendor may have a different position based on its capability and the weighting for each one. The overall use case is the general scoring for the vendor's product, which is the average of the two different use cases. Inclusion Criteria The inclusion criteria for various endpoint backup products focus on enterprise-level support with proven field records and a central management console. This year, Gartner showed preference toward the products that focus on protecting endpoint data or have shown solid enhancements and road maps regarding endpoint backup/recovery. The other detailed inclusion criteria have not changed: In addition to desktop backup, the product must support portable endpoint devices (at least laptops, with tablet and smartphone support as a plus). The product targets large-enterprise customers, as well as small or midsize businesses (SMBs), with basic enterprise-class capabilities, such as a centralized common management tool for multiple devices and the capability to support at least 1,000 endpoint devices. The product is developed and owned by the vendor. If the product is sourced from an OEM partner, it is not qualified for separate evaluation. The product must have an installed base of at least 100 business customers (with at least 100 employees per customer) or have at least 100,000 endpoint devices being managed. The vendor must provide at least three reference customers who are using the product's key features.
4 Página 4 de 9 Table 1. Weighting for Critical Capabilities in Use Cases Critical Capabilities Overall Mobile-Workforce-Centric Office-Workforce-Centric PC OS Diversity 6.5% 8.0% 5.0% PC Content Restore/Migration 5.0% 7.0% 3.0% Mobile Device Support 9.0% 12.0% 6.0% Scalability 10.5% 6.0% 15.0% Data Reduction Techniques 10.0% 10.0% 10.0% Performance 15.0% 15.0% 15.0% Security 9.0% 10.0% 8.0% User Experience 12.5% 10.0% 15.0% Back-End Server/Storage Capability 9.0% 6.0% 12.0% Proven Cloud Presence 7.5% 10.0% 5.0% E-Discovery Functions 6.0% 6.0% 6.0% Total 100.0% 100.0% 100.0% As of October 2013 Critical Capabilities Rating Each of the products that meets our inclusion criteria has been evaluated on the critical capabilities, on a scale of 1.0 to 5.0 (see the Critical Capabilities Methodology section for details about out methodology): 1 = Poor or absent: Most (or all) defined requirements for a capability are not achieved. 2 = Fair: Some requirements are not achieved. 3 = Good: Meets requirements. 4 = Excellent: Meets and exceeds some requirements. 5 = Outstanding: Significantly exceeds requirements ("best in class"). The baselines for each of the capabilities are: PC OS diversity: Products that meet requirements can back up the latest versions of Windows and Mac OSs. Products that have support for open-file backup across multiple OS platforms and additional data type backup receive higher ratings. PC content restore/migration: Products that can restore files and archive files, such as personal storage table (PST) files, meet the basic requirement. Those that can restore local settings and do bare metal restore for device migration, as well as those that can restore to a different OS while maintaining existing structure, receive higher ratings. Mobile device support: Mobile access to backup data and mobile apps are basic requirements. Products that can back up select mobile content, auto prevent backup over 3G/4G networks, and/or support file sync among mobile and PC devices receive higher ratings. Scalability: Products should support at least 1,000 endpoints per server and have no practical limit on file size and count. Those that have many proven records of large customers or scalable architecture designs receive higher ratings. Data reduction techniques: Products that meet requirements support block-level incremental and source-side deduplication and compression. Those that offer target-side global deduplication and offer more efficient deduplication algorithms receive higher ratings. Performance: Products that meet basic requirements support online initial full backup, more frequent than daily backup, and backup to local disk, as well as network and CPU throttling. Those that offer additional performance-boosting techniques, such as near continuous data protection (CDP) by default or local cache, receive higher ratings. Security: Products that meet requirements support Active Directory (AD), encryption for data in flight and at rest, and VPN-less backup over the Internet. Those that have more robust implementation techniques and more security features, such as special encryption techniques, remote wipe and remote tracking, receive higher ratings. User experience: For end users, products should at least offer silent deployment and backup, simple GUI for self-service restore, and a mobile app. For administrators, products that meet requirements support solid AD integration, useful dashboard, a good monitoring/reporting tool and offline restore support. Those that support a more intuitive GUI and real-time monitoring/reporting receive higher scores. Proven cloud presence: Products that mainly are delivered via cloud services with key customers are rated higher than those that are deployed mostly on-premises. Among cloud service providers, their number of global data centers is factored into their rating as well. E-discovery functions: Products that meet requirements offer flexible retention policies. Those that offer embedded full-text indexing and search, federated search, and legal hold receive higher ratings than those that require a stand-alone product. Table 2 shows the numeric ratings for each endpoint backup product.
5 Página 5 de 9 Table 2. Product Rating on Critical Capabilities Product or Service Ratings Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) PC OS Diversity PC Content Restore/Migration Mobile Device Support Scalability Data Reduction Techniques Performance Security User Experience Back-End Server/Storage Capability Proven Cloud Presence E-Discovery Functions As of October 2013 To determine an overall score for each product in the use cases, the ratings in Table 2 are multiplied by the weightings shown in Table 1. These scores are shown in Table 3. Figure 1 shows the product ratings for the seven products in this report. Table 3. Product Score Use Cases Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) Overall Mobile- Workforce- Centric Office- Workforce- Centric As of October 2013 Figure 1. Product Rating Chart
6 Página 6 de 9 Product Viability Each product is rated on a five-point scale from poor to outstanding for each of these four areas (strategy, support, execution and investment), and is then assigned an overall product viability rating (see Table 4). Table 4. Product Viability Rating Vendor (Product Name) Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) Product Viability Good Excellent Good Good Excellent Good Good The weighted capabilities scores for all use cases are displayed as components of the overall score (see Figure 2, Figure 3 and Figure 4). Figure 2. Product Rating Chart for the Mobile-Workforce-Centric Use Case Figure 3. Product Rating Chart for the Office-Workforce-Centric Use Case
7 Página 7 de 9 Figure 4. Product Rating Chart for the Overall Use Case Vendors Asigra (Cloud Backup) Asigra, a private company based in Toronto, Canada, is known in the industry for its server and endpoint backup and recovery solutions designed for managed service providers, although a few companies also use its product as an on-premises implementation. The endpoint support of its Cloud Backup stands out in its ios and Android backup capabilities, in addition to mobile access to both PC and file server backup. Its mobile apps have native look and feel. The product supports source-side deduplication, as well as target-side global deduplication. In 2013, Asigra introduced a Windows RT/Metro style GUI for administrators. However, Asigra's customer references only have small deployments. Asigra's Cloud Backup does not have other advanced features, such as integrated file sync, remote wipe and e-discovery capabilities. A few examples of Asigra management service provider (MSP) partners that offer endpoint backup services include Data Storage in New York City, Phoenix IT Services in the U.K., and Matrix in Germany. Code 42 Software (CrashPlan) Code 42 Software (Code 42) is headquartered in Minneapolis, Minnesota. Founded in 2001, the company has raised more than $55 million in private equity. In addition to its consumer and small business offerings, it has an enterprise offering called CrashPlan PROe, with its largest customer supporting 160,000 devices. Code 42 has gained many large customers, including two leading mobile OS vendors, most of which deployed CrashPlan on their own premises. Code 42 has six global data centers (two in the U.S., one in Europe and three in Asia/Pacific and Japan), which store backup data of nearly 1 million endpoint devices, many of them from consumers or small businesses. Many customers use its default 15-minute backup intervals with little performance issues. In addition to its capability of mobile access to backup, Code 42 recently introduced a file sync and share product called SharePlan, which is integrated with backup with a single data transfer and a single management console. CrashPlan has an intuitive interface. However, unlike many competitive products, CrashPlan doesn't back up system and application settings and can't be used for PC migration or upgrades. It supports very granular source-side deduplication, but doesn't support global deduplication at the target side. Other advanced features beyond backup, such as remote wipe and full-text search, are not supported. CommVault (Simpana Edge) CommVault is best known for its Simpana enterprise server backup suite. A small percentage of its customers use Simpana Edge today, with the largest customer protecting over 28,000 laptops. Unlike many leading enterprise server backup vendors that treat endpoint backup as an afterthought, CommVault shows strong commitment to its endpoint data protection development beyond basic backup, including client access, file sync and e-discovery (additional cost) from a single data repository. CommVault's newly launched capability of mobile uploads allows documents and photos created on a
8 Página 8 de 9 mobile device to be uploaded to a PC and then to be backed up by the PC agent. Edge's Web console and mobile app can access/download backup data from Simpana Content Store (which is positioned as a personal data cloud), and the backup data could be from a PC, a file server or an Exchange server. Since our 2012 report, Simpana v.10 added enhancements to Edge, including new GUIs, workflow management and integration with Windows Explorer for user self-restore without having to open the Web console. It also supports a file modification option to enable backups to occur in a near continuous mode and when there is changed data. The new GUI has a useful preview feature before restore. On the down side, some customers commented that CommVault's Edge may require more scripting to manage endpoint backup and that some VPN remote users have performance issues. CommVault's cloud presence is relatively low, compared with competitors, as it is typically installed as an onpremises solution. Datacastle (Red) Datacastle is a private software company headquartered in Seattle, Washington. It has raised $16 million of its funding since Datacastle Red (the company's endpoint backup offering) is sold primarily to user organizations through cloud services. Its largest service provider partner supports hundreds of thousands of devices in a single vault. It has been certified by Microsoft Azure and IBM SmartCloud, and Microsoft's Enterprise Partner Group is actively selling Datacastle Red as part of its Azure solution promotions. Among the assessed products, Datacastle Red has some strong capabilities: Patented ability to encrypt data blocks before they are deduplicated; QuickCache, a centrally managed, encrypted local cache on a Windows Storage Server for fast LAN backup and restore/migration; RoamSmart, a function that can autodetect 3G/4G networks even for PCs tethered to a smartphone; and global deduplication, which could be applied across companies/tenants in the same vault with each company owning a different encryption key for the same data block. Many of these features are appealing to cloud service providers. It supports near CDP, with many customers using the recommended 15-minute intervals, and has solid remote wipe and tracking capabilities. However, it lacks support for mobile devices, as it doesn't have a mobile app and doesn't offer file sync. The Datacastle Red interface looks somewhat outdated compared with competitors' offerings, and its e-discovery/legal hold capabilities are weak. Druva (insync) Druva is a private software company located in Sunnyvale, California. It launched insync in It raised $30 million venture capital funding in October 2013 for a total of $47 million. Its largest customer has deployed more than 30,000 devices. Druva has increased its brand awareness among enterprises by leading the movement toward an integrated endpoint data protection and management solution. It was the first vendor to offer a unified platform for integrated endpoint backup, sync and share, mobile support and DLP. Its product is one of only two products among those profiled in this report that support backup of select ios and Android local content. Druva's backup is file sync aware, so data doesn't need to be sent out twice from the client, and storage quotas can be shared for backup and sync. Its DLP features, such as remote wipe and GPS tracking, and its analytics functions are now part of the standard offering. Druva's insync client-side cache and server-side cache reduce disk input/output (I/O) significantly and enables many parallel backup jobs. On the cloud front, the product is available as a service running in the Amazon cloud with single pricing for customers. In the past year, it added support for five additional Amazon international data centers. Druva doesn't support near CDP, and the default setting for backup schedule is every two hours. Although it supports object storage, such as Amazon S3, EMC Atmos and OpenStack Swift, and added dual backup destination support for high availability in 2013, it relies on back-end storage's native capabilities to do automated load balancing. EMC (Mozy) After the 2007 acquisition by EMC, Mozy experienced some uncertainties associated with internal organizational changes between EMC and VMware. Since becoming part of EMC's Backup Recovery Systems (BRS) Division, which oversees the rest of the EMC data protection products, Mozy has begun refocusing on its product development. In the past year, Mozy added pooled storage quota and caught up in the areas of AD support with federated ID and single sign-on capabilities and resuming backup where it's left off (instead of starting from the beginning). Its mobile apps for ios and Android can now upload photos to the cloud for backup via its enhanced Personal Sync function. It increased the standard 30-day retention period to 90 days. However, it still lacks important features such as CDP/near CDP scheduling and block-level deduplication and compression, as well as advanced functions such as remote wipe and e-discovery. Although Mozy offers cloud services, its global presence is limited and doesn't offer cross-geographical storage redundancy. HP (Autonomy Connected) HP's Autonomy Connected PC backup has been around for many years, and has established good enterprise presence with its Iron Mountain legacy. Iron Mountain sold this business in May 2011 to Autonomy, which was bought by HP in 4Q11. Today, Iron Mountain still offers this service as an HP reseller. However, the two ownership changes in a short period, followed by HP's internal changes, slowed down product development. As a result, the Connected product has lagged behind competition in many areas, notably the lack of CDP/near CDP, block-level deduplication, no CPU or disk I/O throttling, file size limitation, and mobile device backup capabilities. HP doesn't have advanced feature functions such as file sync and remote wipe. On the positive side, the product has proven its scalability with large deployments (HP itself is a customer backing up 250,000 devices to the Connected cloud). It offers full-text index/search and federated search through its integration with Autonomy's Intelligent Data Operating Layer, a common information platform for structured and unstructured information that provides conceptual understanding of information. Connected is also one of the data sources for Autonomy Legal Hold. In 2013, HP added federated ID support, introduced a migration mode where a user could download the newest content first to a new device for access, reducing downtime during migration. It also refreshed its GUI and updated its mobile access app for Android to support more Android OS versions Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for
9 Página 9 de 9 Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. About Gartner Careers Newsroom Policies Site Index IT Glossary Contact Gartner
Critical Capabilities for Enterprise Endpoint Backup
G00255640 Critical Capabilities for Enterprise Endpoint Backup Published: 24 October 2013 Analyst(s): Pushan Rinnen, Dave Russell This research provides detailed stack ranking of seven endpoint backup
More informationCritical Capabilities for Enterprise Endpoint Backup
G00235971 Critical Capabilities for Enterprise Endpoint Backup Published: 9 October 2012 Analyst(s): Pushan Rinnen, Dave Russell, Alan Dayley This document provides detailed stack ranking of 11 endpoint
More informationDruva insync vs. Altiris/Symantec DLO. Comparison Guide
Druva insync vs. Altiris/Symantec DLO Comparison Guide NOV 2014 Table of Contents Altiris End-of-Life...3 The Smart Choice - Druva insync...3 Product Comparison...4 Deduplication...5 Mobile Access and
More informationAPRIL 2013. 8 Must-Have Features for Endpoint Backup
APRIL 2013 8 Must-Have Features for Endpoint Backup Ensure corporate data is secure and protected by choosing an endpoint backup solution with the eight features below. 1. Advanced deduplication Because
More informationHowtomanage and protectend usersdata? Mati Raidma
Howtomanage and protectend usersdata? Mati Raidma Data Protection Has Changed Increased mobility of the workforce and business adoption of tablets are forcing organizations to face the challenge ofprotecting
More informationDruva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide
Druva insync vs. Code42 CrashPlan for Enterprise Comparison Guide Table of Contents Executive Summary... 3 Why Switch from CrashPlan to Druva insync?... 3 Features Comparison... 4 Data Deduplication Techniques...
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More information28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
More informationHow To Backup From Your Computer To Your Phone Or Tablet Or Computer
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
More information10 Threats to Successful. Enterprise Endpoint Backup
10 Threats to Successful Enterprise Endpoint Backup Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise in endpoints,
More informationChoosing Enterprise Backup Software to Protect a Mobile World. Presented By Andrew Renz, Sr. Enterprise Engineer, Code 42
Choosing Enterprise Backup Software to Protect a Mobile World Presented By Andrew Renz, Sr. Enterprise Engineer, Code 42 codefortytwo software About Us Developing enterprise-level software since 2001 Headquartered
More informationA BUYER S CHECKLIST ENDPOINT DATA PROTECTION:
ENDPOINT DATA PROTECTION: A BUYER S CHECKLIST Endpoint data. It s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices
More informationVirtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
More informationWhitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
More informationEXECUTIVE SUMMARY Cloud Backup for Endpoint Devices
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with
More informationEfficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA
Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,
More informationComprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are
More informationModern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault
Modern Data Management & Intelligent Archive Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Agenda Who is CommVault? Why CommVault? Microsoft and CommVault Cloud Use Cases A Brief History
More informationCONVERGED DATA PROTECTION. ITSA Nürnberg
CONVERGED DATA PROTECTION ITSA Nürnberg DRUVA Company Founded in 2008 in Pune, India Headquartered in Silicon Valley 5 Offices worldwide, 24x7 Support Backed by Sequoia and EMC End of 2014 +3000 Customers,
More informationPhoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:
Druva About Phoenix What is Phoenix? Druva Phoenix is a cloud based backup and archival solution aimed primarily at remote office servers. Since Phoenix is cloud-targeted backup, there is no elaborate
More informationEndpoint data protection solutions for Healthcare
Endpoint data protection solutions for Healthcare Your patient data might be at risk Do your doctors use their smart phones, tablets, or personal computing devices for work in addition to their PC at the
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationDruva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst
ESG Lab Review Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst Abstract: This ESG Lab review documents hands-on testing of
More informationRelentlessly Focused on All Things Data
You ll never look at your protected data the same way again. Relentlessly Focused on All Things Data Data is good. There, we said it. At a time when many in the business world are wringing their hands
More informationVirtualization Support. Real Backups of Virtual Environments
Virtualization Support. Real Backups of Virtual Environments Contents Virtualization Challenges 2 The Benefits of Agentless Backup 3 Backup and Recovery Built for Virtualized Server Environments 3 Agentless
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d f o r E d g e D a t a P r o t e c t i o n w i t
More informationCOMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY
20/05/14 COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY Roberto Massoli Channel Manager UNSTRUCTURED DATA FUELING COSTS 100TB =18x storage over 3 years, 100TB of production storage
More informationMANAGED SERVICE PROVIDERS SOLUTION BRIEF
MANAGED SERVICE PROVIDERS SOLUTION BRIEF The Assured Recovery Services Platform The data protection world has drastically changed in the past few years. Protection and recovery of data and systems has
More informationThe Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
More informationIntroducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
More informationWe look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
More informationAddressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER
Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Storage I/O Performance on VMware vsphere 5.1 over 16 Gigabit Fibre Channel Table of Contents Abstract.... 3 The Problem with Windows
More informationHybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments
Hybrid Cloud Backup and Recovery Software Virtualization Support Asigra Inc. 1120 Finch Avenue West, Suite 400 Toronto, ON Canada M3J 3H7 tel: 416-736-8111 fax: 416-736-7120 email: info@asigra.com www.recoveryourcool.com
More informationActual trends in backup protection solution IBM Backup Products and Services
Actual trends in backup protection solution IBM Backup Products and Services Gražvydas Govaras IT Architektas 2013-03-19 Tivoli Storage Manager Fastback Continuos Data Protection solution for Windows and
More informationHow To Protect Your Data From Harm
Brochure: Comprehensive Agentless Backup and Recovery Software for the Enterprise Comprehensive Agentless Backup and Recovery Software for the Enterprise BROCHURE Your company s single most valuable asset
More informationOnly 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services
Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance
More informationOnline Backup Plus Frequently Asked Questions
Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which
More informationComprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationBrochure. Data Protector 9: Nine reasons to upgrade
Brochure Data Protector 9: Nine reasons to upgrade Data Protector 9: Nine reasons to upgrade Shifting data center requirements are forcing IT organizations to reassess backup and recovery processes, strategies,
More informationAsigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data
Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and
More informationHelping MSPs protect Data Center resources
Helping MSPs protect Data Center resources Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e.
More informationJonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation
Jonas Vercruysse Technical Pre-sales February 2013 Endpoint Management 2013 IBM Corporation Agenda 2 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up Agenda 3 Intro
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationIntelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring
More informationSecuring Endpoint Data While Enabling the Mobile Workforce
CODE 42 Makers of CrashPlan & SharePlan Securing Endpoint Data While Enabling the Mobile Workforce IP Expo London, Identity & Data Centric Security Theatre Presentation Andy Hardy, Managing Director EMEA
More informationHow To Protect Your Endpoints From Being Stolen By A Cell Phone Or Other Device
Whitepaper BYOD Program Best Practices for Data BYOD Program Best Practices for Data Bring your own device (BYOD) has evolved. From simply bringing a personal device to work, employees now expect the convenience
More informationEinstein Code42 Edge Data Management Overview
CODE 42 Einstein Code42 Edge Data Management Overview Presented by: Nick Stefanow, Account Executive Chris Gonzales, Systems Engineer The Challenges Facing the Enterprise Today Content Explosion BYOD Consumerization
More informationEnd-to-End Data Protection Solutions for the Enterprise
Datasheet End-to-End Data Protection Solutions for the Enterprise From the Data Center to Endpoint Devices Your Corporate Data Might be at Risk Do your employees use their smart phones, tablets, or personal
More informationAPS Connect Denver, CO
New Generation Data Protection Powered by the Acronis AnyData Engine APS Connect Denver, CO Jon Farmer February 26, 2015 2015 Acronis Industry Leader in Data Protection Market Leading Solutions & Technology
More informationBackup Software 2010. Presented by W. Curtis Preston Executive Editor & Independent Backup Expert
Backup Software 2010 Presented by W. Curtis Preston Executive Editor & Independent Backup Expert When I was in the IT Department When I started as backup guy at $35B company in 1993: Tape Drive: QIC 80
More informationModern Data Management. Gerry Sillars WW VP Cloud Solutions Group
Modern Data Management Gerry Sillars WW VP Cloud Solutions Group Company Overview Half Billion Revenue (L4Q) 25% CAGR (FY06 -FY13) #1 Storage SW Revenue Growth 18,200 Customers Worldwide 100% organic growth
More informationReducing Costs and Complexity with CommVault
Reducing Costs and Complexity with CommVault Agenda The CommVault approach to Data Management Infrastructure De-duplication Snapshots VM backup and recovery Reducing costs with CommVault new pricing options
More informationSmarter Endpoint Backup. This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices.
Smarter Endpoint Backup This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices. Table of Contents Introduction... 2 Challenges of Endpoint Backup... 3 Storage Requirements
More informationCommVault Backup Appliance with NetApp
CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows
More informationSolution Overview. Jesper Schneider Nordic Distribution Manager. 14 th May 2014. Copyright 2014 CA. All rights reserved.
Solution Overview Jesper Schneider Nordic Distribution Manager 14 th May 2014 Copyright 2014 CA. All rights reserved. Are you in control? Backup Backup Backup Recovery point objectives Recovery time objectives
More informationThe Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization
The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization You have critical data scattered throughout your organization on back-office servers, desktops, mobile endpoints
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationCommVault Backup Appliance with NetApp
CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows
More informationBackup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
More informationEnd-to-end data protection solutions
Structured: Cloud Backup End-to-end data protection solutions From the data center to endpoint devices Your corporate data might be at risk Do your employees use their smart phones, tablets, or personal
More informationEMAIL ARCHIVING: A BUYER S CHECKLIST
EMAIL ARCHIVING: A BUYER S CHECKLIST Email is the backbone of today s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers,
More informationSymantec Desktop and Laptop Option 7.6
Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate
More informationCTERA Cloud Storage Platform Architecture
CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage
More informationSecuring BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
More information// your essential partner CLOUD
Benefit from business continuity with real-time replication of applications and data to a secure container in the cloud, which can be called into action within minutes. Protecting and ensuring the recoverability
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationComprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
More informationCOMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS
COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS As cloud adoption continues to rise, so has the demand from Service Providers for software products that support their multi-tenant
More informationVeritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
More informationCOMPANY PROFILE: VEMBU TECHNOLOGIES
COMPANY PROFILE: VEMBU TECHNOLOGIES APRIL 2013 Since its founding in 2004, Vembu Technologies has maintained a two-fold mission: innovate cloud information management for business users and accelerate
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationThe Most Complete Data Protection Platform for MSPs
The Most Complete Data Protection Platform for MSPs I delivers the industry s most complete Data Protection Platform today. From an easy-to-use dashboard, MSPs can efficiently manage cloud backup, disaster
More informationCTERA Enterprise File Services Platform Architecture for HP Helion Content Depot
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage
More informationSystem Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana
2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationIntroducing Arcserve Unified Data Protection
Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured
More informationCompetitive Analysis Retrospect And Our Competition
Competitive Analysis And Our Competition September 2013 Competitive Analysis: for Windows and our top competitors We ve taken a hard look at our competition and how we stack up. Here is a comparison of
More informationAsigra Cloud Backup TM and Recovery Software.
Asigra Cloud Backup TM and Recovery Software. Already Cloud Ready Unprecedented data growth is challenging companies of all sizes, placing increasing pressure on their backup and recovery initiatives.
More informationCommVault is the leading supplier of Data & Info Management Software
CommVault is the leading supplier of Data & Info Management Software CommVault simplifies and makes it less costly to manage, access and protect information assets Headquartered in Oceanport, NJ 1,658
More informationEffective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure
Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
BUYER CASE STUDY EMC IT Increasing Efficiency, Reducing Costs, and Optimizing IT with Data Deduplication Sponsored by: EMC Corporation Robert Amatruda February 2011 Laura DuBois Global Headquarters: 5
More informationCOMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS
FACT SHEET: COMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS CommVault has introduced new Simpana software solution sets that are purpose-built to modernize
More informationBackup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.
DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering. Easy-to-use Backup and Recovery solution. Data protection and disaster recovery in a single solution. Scalable
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationThe EVault Portfolio
The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationParallels VDI Solution
Parallels VDI Solution White Paper Version 1.0 April 2009 Table of Contents Enterprise Desktop Computing Challenges... 3 What is Virtual Desktop Infrastructure (VDI)... 3 Benefits of Virtual Desktop Infrastructure...
More informationSecure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst
ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today
More informationCommvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region
Commvault - Modern Data and Information Management Aleksandar Antić Commvault Regional Sales SEE Region Snapshot of Commvault Established in 1996, headquartered in New Jersey, USA Over 2,000 employees
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationProtecting enterprise servers with StoreOnce and CommVault Simpana
Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key
More informationCommVault Simpana. Manfredi Carissimi Pre-Sales Systems Engineer
CommVault Simpana Manfredi Carissimi Pre-Sales Systems Engineer TRASFORMAZIONE DIGITALE 2005 2 2005 2013 3 WHO IS COMMVAULT DATA ABOUT COMMVAULT Created in 1996, spinoff of a development group of AT&T
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More information