Critical Capabilities for Enterprise Endpoint

Size: px
Start display at page:

Download "Critical Capabilities for Enterprise Endpoint"

Transcription

1 Página 1 de 9 Critical Capabilities for Enterprise Endpoint Backup 24 October 2013 ID:G Analyst(s): Pushan Rinnen, Dave Russell VIEW SUMMARY This research provides detailed stack ranking of seven endpoint backup products against 11 critical capabilities and across two use cases. This can help IT leaders narrow their enterprise endpoint backup product shortlists. Overview Key Findings Endpoint backup is no longer just about data protection; it also applies to reducing security risk and increasing user productivity. Endpoint backup capability gaps among leading products have narrowed in the past year, making product selection more difficult than before. While all products offer decent PC backup capabilities, key differentiations focus on performancerelated metrics, mobile device support and additional capabilities, such as integrated remote wipe and remote tracking. Almost 40% of user references surveyed reported that they have started implementing the practice of bring your own device (BYOD); however, support for integrated backup and file sync and share remains unavailable from the majority of vendors. Recommendations Procure budget for endpoint backup to protect your company's intellectual property and to increase knowledge workers' productivity. Work closely with the endpoint security/compliance team and the mobile team to design a comprehensive corporate plan for endpoint protection, including backup. Choose endpoint backup products based on employees' risk profiles. The mobile workforce tends to be more at risk than office workers, and will need a product that has stronger built-in security features and more data capture capabilities, and offers better self-service experiences. Choose endpoint backup products that offer strong mobile device support if your company is planning to introduce BYOD. What You Need to Know This document was revised on 18 July For more information, see the Corrections page. Endpoint backup is fundamentally different from server backup. Endpoint backup deals with the unpredictability of people, rather than predictability of servers. Many organizations had given up on endpoint backup because of management complexity and high failure rates. Modern endpoint backup solutions have beefed up basic backup capabilities and, more importantly, are no longer only about backup. Vendors are adding functions such as easy self-restore, mobile access, file sync, e-discovery and remote wipe to increase user productivity and reduce compliance and security risks associated with human behavior. Meanwhile, the increased mobile work options and adoption of BYOD are increasing security risks. As a result, we are seeing greater interest in deploying endpoint backup from large organizations, including well-known technology companies. These companies realize that increased workforce mobility heightens data loss risks, as more employees store their data locally on their endpoints. The old way of either ignoring endpoint backup or forcing users to write to a corporate network share is no longer valid. EVIDENCE 1 Among the 19 user references that responded to our endpoint backup survey, only five mentioned that they sometimes hear end users complaining about the performance issues when backup is initiated. Some mentioned they heard complaints when users back up huge files, such as 10GB size. CRITICAL CAPABILITIES METHODOLOGY Critical capabilities are attributes that differentiate products in a class in terms of their quality and performance. Gartner recommends that users consider the set of critical capabilities as some of the most important criteria for acquisition decisions. This methodology requires analysts to identify the critical capabilities for a class of products. Each capability is then weighted in terms of its relative importance overall, as well as for specific product use cases. Next, products are rated in terms of how well they achieve each of the critical capabilities. A score that summarizes how well they meet the critical capabilities overall, and for each use case, is then calculated for each product. Ratings and summary scores range from 1.0 to 5.0: 1 = Poor: most or all defined requirements not achieved 2 = Fair: some requirements not achieved 3 = Good: meets requirements 4 = Excellent: meets or exceeds some requirements 5 = Outstanding: significantly exceeds requirements Product viability is distinct from the critical capability scores for each product. It is our assessment of the vendor's strategy and its ability to enhance and support a product over its expected life cycle; it is not an evaluation of the vendor as a whole. Four major areas are considered: strategy, support, execution and investment. Strategy includes how a vendor's strategy for a particular product fits in relation to its other product lines, its market direction and its business overall. Support includes the quality of technical and account support as well as customer experiences for that product. Execution considers a vendor's structure and processes for sales, marketing, pricing and deal management. Investment considers the vendor's financial health and the likelihood of the individual business unit responsible for a product to continue investing in it. Each product is rated on a five-point scale from poor to outstanding for each of these four areas, and it is then assigned an overall product viability rating. The critical capabilities Gartner has selected do not represent all capabilities for any product and, therefore, may not represent those most important for a specific use situation or business objective. Clients should use a critical capabilities analysis as one of several sources of input about a product before making an acquisition decision. This updated report has several major changes compared with last year's report. We have excluded one product that is no longer available and three products that almost never show up in Gartner end-user inquiries and lack development focus on endpoints from their vendors. Good Technology acquired Copiun in 4Q12 for its file sync and share function and discontinued the backup product. The other products that are excluded are CA Technologies' CA ARCserve, EMC Avamar and IBM Tivoli Storage Manager (TSM) FastBack for Workstations and TSM with Backup/Archive Client. These vendors and their respective products have a much stronger focus than on endpoint backup development. Again, we haven't included Symantec's Desktop and Laptop Option backup product, because Symantec hasn't been focusing on endpoint backup and doesn't have a future strategy.

2 Página 2 de 9 We have modified some categories of critical capabilities based on new product developments and more logical groupings. For example, we combined last year's device diversity and content variety into one category: PC device/os diversity. We changed heterogeneous restore to PC content restore/migration. Last year, support for mobile devices, such as tablets and smartphones, were blended with PCs; this year, we created mobile device support as a separate category. Another new category is back-end server/storage capabilities, which is useful information for organizations planning to implement endpoint backup on-premises. Due to many changes in evaluation categories and what is included in each category, we advise against comparing this year's report with last year's report, as they will not be exact comparisons. Additionally, the market is changing as larger-scale deployments progress and vendors refine solutions. The two use cases remain the same mobile-workforce-centric versus office-workforce-centric although weightings for each critical capability against each use case are changed due to new capabilities created in Analysis Introduction Endpoint backup was not adopted widely because traditional products had a lot of performance issues, such as long backup windows and performance degradation during backup, as well as management limitations such as lack of silent deployment and self-restore functions. Some organizations tried and gave up on endpoint backup, while others worked around this problem by requiring users to write to network shares. However, the latter practice is typically not enforced, as many users store their data on their local drives, and road warriors, for example, don't have access to VPNs. With technology advancements, today's endpoint backup has become much more user-transparent 1 and user-friendly, and can even increase user productivity with mobile access and sync capabilities. On the security side, some products have remote wipe and geographical tracking capabilities to reduce security risks. Endpoint backup remains predominantly focused on PC backup for desktops and laptops. The need to back up mobile devices (tablets and smartphones) is limited to photos and documents. Mobile access (read and download, but not upload) to PC backup copies, however, has become widely available as a standard feature. Due to the sandboxed nature of many mobile OSs, version-based file sync has become a convenient way to offer mobile data protection. During 2012, Druva was the only vendor to offer an endpoint backup product that had a companion file sync product for business organizations. In 2013, EMC (Mozy) added file sync capability based on its previous consumer product. Code 42 Software and CommVault introduced file sync capabilities in October 2013 with different implementations, and their product ratings reflect their upcoming capabilities. When backup is file-sync-aware, files that have been synced to the server will no longer need to be transmitted over the Internet again, thus reducing network traffic. Moreover, file sync offered by backup vendors may provide the same source-side deduplication used in endpoint backup, further decreasing network traffic and increasing performance. We believe that, over time, enterprise endpoint backup will merge with access/file sync and data loss prevention (DLP) functions more seamlessly to form a total solution to prevent data loss and leak from endpoint devices, and to increase user productivity. While all products evaluated in this report offer decent PC backup capabilities, key differentiations focus on performance-related metrics, mobile device support and more advanced capabilities, such as file sync, device/os migration, e-discovery functions, and integration with DLP features, such as remote wipe and remote tracking. While a few products have proven records of large, scalable deployments, others need to improve their presence in large enterprises. Of the seven products evaluated, five introduced new or refreshed graphical user interfaces (GUIs) since our last report. The new or refreshed GUIs have a more intuitive and more modern look than their older versions, and aim to make users' experiences and the administrator's job easier. Product Class Definition Enterprise endpoint backup refers to backup of endpoint devices, such as desktops, laptops, tablets and smartphones, which can access corporate content and create business content locally. There are numerous PC backup products in the market, especially for consumers and small businesses. The focus of this report is on the products that have proven ability to meet enterprise endpoint backup support and implementation requirements. Critical Capabilities Definition All endpoint backup products profiled here share some basic features and functions, such as centralized management, user transparency in terms of agent deployment and backup, backup of files and archives, restore to a different device, support for scheduled backup and support for interrupted backup where backup jobs resume where they have stopped. We concentrate on 11 critical capabilities that differentiate competing endpoint backup products: PC OS Diversity Degree of diversity in PC OS platforms and data supported PC Content Restore/Migration Ability to restore individual files to a different OS version or platform, as well as to migrate the entire PC content to a new device Mobile Device Support The level of data protection support for mobile devices such as tablets and smartphones Scalability

3 Página 3 de 9 Size of the deployment in the real world, as well as based on product design Data Reduction Techniques Type of data reduction techniques used in the product, such as deduplication and compression, and how they are implemented Performance Performance-boosting techniques from initial seeding options to recovery, as well as default backup intervals, and network and CPU throttling Security Security features such as access control methods, encryption, remote wipe/remote tracking, and mobile containerization support User Experience Factors impacting both end-user and administrator experiences, such as user interfaces, self-restore capability, and monitoring/reporting tools Back-End Server/Storage Capability Capabilities to implement data integrity checks, high-availability for backup server and storage, and dynamic client load balancing Proven Cloud Presence Degree of supporting the vendor's cloud or third-party cloud, including cloud adoption and data center presence E-Discovery Functions Functions that allow easy e-discovery for compliance, such as full-text indexing and search, federated search, and support for legal hold Use Cases Since the use cases have to be supported by all products evaluated, we are rating the endpoint backup products for two use cases as well as the overall use case: Overall Overall use case is a generalized usage scenario and is not representative of how specific users will use or deploy a technology or service within their enterprise. Mobile-Workforce-Centric Endpoint backup software needs to cater to the dynamic and unpredictable online/offline schedules of the mobile workforce, as well as the unsecure environment outside corporate firewalls. For this use case, heterogeneous OS backup/restore and migration, security-related capabilities and support for mobile devices such as tablets and smartphones and cloud have a higher weighting than the officeworkforce-centric use case. Office-Workforce-Centric Endpoint backup software caters to a workforce that is always online during predictable business hours. These kinds of employees are typically sitting within a company's firewall (office workers) or connected via a secure corporate VPN (telecommuters). For this type of workforce, scalability, user experiences, back-end server/storage capabilities and e-discovery functions carry higher weighting. Table 1 looks at the weightings of all use cases in this research. Each use case weighs the capabilities individually based on the needs of that case, which impacts the score. Each vendor may have a different position based on its capability and the weighting for each one. The overall use case is the general scoring for the vendor's product, which is the average of the two different use cases. Inclusion Criteria The inclusion criteria for various endpoint backup products focus on enterprise-level support with proven field records and a central management console. This year, Gartner showed preference toward the products that focus on protecting endpoint data or have shown solid enhancements and road maps regarding endpoint backup/recovery. The other detailed inclusion criteria have not changed: In addition to desktop backup, the product must support portable endpoint devices (at least laptops, with tablet and smartphone support as a plus). The product targets large-enterprise customers, as well as small or midsize businesses (SMBs), with basic enterprise-class capabilities, such as a centralized common management tool for multiple devices and the capability to support at least 1,000 endpoint devices. The product is developed and owned by the vendor. If the product is sourced from an OEM partner, it is not qualified for separate evaluation. The product must have an installed base of at least 100 business customers (with at least 100 employees per customer) or have at least 100,000 endpoint devices being managed. The vendor must provide at least three reference customers who are using the product's key features.

4 Página 4 de 9 Table 1. Weighting for Critical Capabilities in Use Cases Critical Capabilities Overall Mobile-Workforce-Centric Office-Workforce-Centric PC OS Diversity 6.5% 8.0% 5.0% PC Content Restore/Migration 5.0% 7.0% 3.0% Mobile Device Support 9.0% 12.0% 6.0% Scalability 10.5% 6.0% 15.0% Data Reduction Techniques 10.0% 10.0% 10.0% Performance 15.0% 15.0% 15.0% Security 9.0% 10.0% 8.0% User Experience 12.5% 10.0% 15.0% Back-End Server/Storage Capability 9.0% 6.0% 12.0% Proven Cloud Presence 7.5% 10.0% 5.0% E-Discovery Functions 6.0% 6.0% 6.0% Total 100.0% 100.0% 100.0% As of October 2013 Critical Capabilities Rating Each of the products that meets our inclusion criteria has been evaluated on the critical capabilities, on a scale of 1.0 to 5.0 (see the Critical Capabilities Methodology section for details about out methodology): 1 = Poor or absent: Most (or all) defined requirements for a capability are not achieved. 2 = Fair: Some requirements are not achieved. 3 = Good: Meets requirements. 4 = Excellent: Meets and exceeds some requirements. 5 = Outstanding: Significantly exceeds requirements ("best in class"). The baselines for each of the capabilities are: PC OS diversity: Products that meet requirements can back up the latest versions of Windows and Mac OSs. Products that have support for open-file backup across multiple OS platforms and additional data type backup receive higher ratings. PC content restore/migration: Products that can restore files and archive files, such as personal storage table (PST) files, meet the basic requirement. Those that can restore local settings and do bare metal restore for device migration, as well as those that can restore to a different OS while maintaining existing structure, receive higher ratings. Mobile device support: Mobile access to backup data and mobile apps are basic requirements. Products that can back up select mobile content, auto prevent backup over 3G/4G networks, and/or support file sync among mobile and PC devices receive higher ratings. Scalability: Products should support at least 1,000 endpoints per server and have no practical limit on file size and count. Those that have many proven records of large customers or scalable architecture designs receive higher ratings. Data reduction techniques: Products that meet requirements support block-level incremental and source-side deduplication and compression. Those that offer target-side global deduplication and offer more efficient deduplication algorithms receive higher ratings. Performance: Products that meet basic requirements support online initial full backup, more frequent than daily backup, and backup to local disk, as well as network and CPU throttling. Those that offer additional performance-boosting techniques, such as near continuous data protection (CDP) by default or local cache, receive higher ratings. Security: Products that meet requirements support Active Directory (AD), encryption for data in flight and at rest, and VPN-less backup over the Internet. Those that have more robust implementation techniques and more security features, such as special encryption techniques, remote wipe and remote tracking, receive higher ratings. User experience: For end users, products should at least offer silent deployment and backup, simple GUI for self-service restore, and a mobile app. For administrators, products that meet requirements support solid AD integration, useful dashboard, a good monitoring/reporting tool and offline restore support. Those that support a more intuitive GUI and real-time monitoring/reporting receive higher scores. Proven cloud presence: Products that mainly are delivered via cloud services with key customers are rated higher than those that are deployed mostly on-premises. Among cloud service providers, their number of global data centers is factored into their rating as well. E-discovery functions: Products that meet requirements offer flexible retention policies. Those that offer embedded full-text indexing and search, federated search, and legal hold receive higher ratings than those that require a stand-alone product. Table 2 shows the numeric ratings for each endpoint backup product.

5 Página 5 de 9 Table 2. Product Rating on Critical Capabilities Product or Service Ratings Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) PC OS Diversity PC Content Restore/Migration Mobile Device Support Scalability Data Reduction Techniques Performance Security User Experience Back-End Server/Storage Capability Proven Cloud Presence E-Discovery Functions As of October 2013 To determine an overall score for each product in the use cases, the ratings in Table 2 are multiplied by the weightings shown in Table 1. These scores are shown in Table 3. Figure 1 shows the product ratings for the seven products in this report. Table 3. Product Score Use Cases Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) Overall Mobile- Workforce- Centric Office- Workforce- Centric As of October 2013 Figure 1. Product Rating Chart

6 Página 6 de 9 Product Viability Each product is rated on a five-point scale from poor to outstanding for each of these four areas (strategy, support, execution and investment), and is then assigned an overall product viability rating (see Table 4). Table 4. Product Viability Rating Vendor (Product Name) Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) Product Viability Good Excellent Good Good Excellent Good Good The weighted capabilities scores for all use cases are displayed as components of the overall score (see Figure 2, Figure 3 and Figure 4). Figure 2. Product Rating Chart for the Mobile-Workforce-Centric Use Case Figure 3. Product Rating Chart for the Office-Workforce-Centric Use Case

7 Página 7 de 9 Figure 4. Product Rating Chart for the Overall Use Case Vendors Asigra (Cloud Backup) Asigra, a private company based in Toronto, Canada, is known in the industry for its server and endpoint backup and recovery solutions designed for managed service providers, although a few companies also use its product as an on-premises implementation. The endpoint support of its Cloud Backup stands out in its ios and Android backup capabilities, in addition to mobile access to both PC and file server backup. Its mobile apps have native look and feel. The product supports source-side deduplication, as well as target-side global deduplication. In 2013, Asigra introduced a Windows RT/Metro style GUI for administrators. However, Asigra's customer references only have small deployments. Asigra's Cloud Backup does not have other advanced features, such as integrated file sync, remote wipe and e-discovery capabilities. A few examples of Asigra management service provider (MSP) partners that offer endpoint backup services include Data Storage in New York City, Phoenix IT Services in the U.K., and Matrix in Germany. Code 42 Software (CrashPlan) Code 42 Software (Code 42) is headquartered in Minneapolis, Minnesota. Founded in 2001, the company has raised more than $55 million in private equity. In addition to its consumer and small business offerings, it has an enterprise offering called CrashPlan PROe, with its largest customer supporting 160,000 devices. Code 42 has gained many large customers, including two leading mobile OS vendors, most of which deployed CrashPlan on their own premises. Code 42 has six global data centers (two in the U.S., one in Europe and three in Asia/Pacific and Japan), which store backup data of nearly 1 million endpoint devices, many of them from consumers or small businesses. Many customers use its default 15-minute backup intervals with little performance issues. In addition to its capability of mobile access to backup, Code 42 recently introduced a file sync and share product called SharePlan, which is integrated with backup with a single data transfer and a single management console. CrashPlan has an intuitive interface. However, unlike many competitive products, CrashPlan doesn't back up system and application settings and can't be used for PC migration or upgrades. It supports very granular source-side deduplication, but doesn't support global deduplication at the target side. Other advanced features beyond backup, such as remote wipe and full-text search, are not supported. CommVault (Simpana Edge) CommVault is best known for its Simpana enterprise server backup suite. A small percentage of its customers use Simpana Edge today, with the largest customer protecting over 28,000 laptops. Unlike many leading enterprise server backup vendors that treat endpoint backup as an afterthought, CommVault shows strong commitment to its endpoint data protection development beyond basic backup, including client access, file sync and e-discovery (additional cost) from a single data repository. CommVault's newly launched capability of mobile uploads allows documents and photos created on a

8 Página 8 de 9 mobile device to be uploaded to a PC and then to be backed up by the PC agent. Edge's Web console and mobile app can access/download backup data from Simpana Content Store (which is positioned as a personal data cloud), and the backup data could be from a PC, a file server or an Exchange server. Since our 2012 report, Simpana v.10 added enhancements to Edge, including new GUIs, workflow management and integration with Windows Explorer for user self-restore without having to open the Web console. It also supports a file modification option to enable backups to occur in a near continuous mode and when there is changed data. The new GUI has a useful preview feature before restore. On the down side, some customers commented that CommVault's Edge may require more scripting to manage endpoint backup and that some VPN remote users have performance issues. CommVault's cloud presence is relatively low, compared with competitors, as it is typically installed as an onpremises solution. Datacastle (Red) Datacastle is a private software company headquartered in Seattle, Washington. It has raised $16 million of its funding since Datacastle Red (the company's endpoint backup offering) is sold primarily to user organizations through cloud services. Its largest service provider partner supports hundreds of thousands of devices in a single vault. It has been certified by Microsoft Azure and IBM SmartCloud, and Microsoft's Enterprise Partner Group is actively selling Datacastle Red as part of its Azure solution promotions. Among the assessed products, Datacastle Red has some strong capabilities: Patented ability to encrypt data blocks before they are deduplicated; QuickCache, a centrally managed, encrypted local cache on a Windows Storage Server for fast LAN backup and restore/migration; RoamSmart, a function that can autodetect 3G/4G networks even for PCs tethered to a smartphone; and global deduplication, which could be applied across companies/tenants in the same vault with each company owning a different encryption key for the same data block. Many of these features are appealing to cloud service providers. It supports near CDP, with many customers using the recommended 15-minute intervals, and has solid remote wipe and tracking capabilities. However, it lacks support for mobile devices, as it doesn't have a mobile app and doesn't offer file sync. The Datacastle Red interface looks somewhat outdated compared with competitors' offerings, and its e-discovery/legal hold capabilities are weak. Druva (insync) Druva is a private software company located in Sunnyvale, California. It launched insync in It raised $30 million venture capital funding in October 2013 for a total of $47 million. Its largest customer has deployed more than 30,000 devices. Druva has increased its brand awareness among enterprises by leading the movement toward an integrated endpoint data protection and management solution. It was the first vendor to offer a unified platform for integrated endpoint backup, sync and share, mobile support and DLP. Its product is one of only two products among those profiled in this report that support backup of select ios and Android local content. Druva's backup is file sync aware, so data doesn't need to be sent out twice from the client, and storage quotas can be shared for backup and sync. Its DLP features, such as remote wipe and GPS tracking, and its analytics functions are now part of the standard offering. Druva's insync client-side cache and server-side cache reduce disk input/output (I/O) significantly and enables many parallel backup jobs. On the cloud front, the product is available as a service running in the Amazon cloud with single pricing for customers. In the past year, it added support for five additional Amazon international data centers. Druva doesn't support near CDP, and the default setting for backup schedule is every two hours. Although it supports object storage, such as Amazon S3, EMC Atmos and OpenStack Swift, and added dual backup destination support for high availability in 2013, it relies on back-end storage's native capabilities to do automated load balancing. EMC (Mozy) After the 2007 acquisition by EMC, Mozy experienced some uncertainties associated with internal organizational changes between EMC and VMware. Since becoming part of EMC's Backup Recovery Systems (BRS) Division, which oversees the rest of the EMC data protection products, Mozy has begun refocusing on its product development. In the past year, Mozy added pooled storage quota and caught up in the areas of AD support with federated ID and single sign-on capabilities and resuming backup where it's left off (instead of starting from the beginning). Its mobile apps for ios and Android can now upload photos to the cloud for backup via its enhanced Personal Sync function. It increased the standard 30-day retention period to 90 days. However, it still lacks important features such as CDP/near CDP scheduling and block-level deduplication and compression, as well as advanced functions such as remote wipe and e-discovery. Although Mozy offers cloud services, its global presence is limited and doesn't offer cross-geographical storage redundancy. HP (Autonomy Connected) HP's Autonomy Connected PC backup has been around for many years, and has established good enterprise presence with its Iron Mountain legacy. Iron Mountain sold this business in May 2011 to Autonomy, which was bought by HP in 4Q11. Today, Iron Mountain still offers this service as an HP reseller. However, the two ownership changes in a short period, followed by HP's internal changes, slowed down product development. As a result, the Connected product has lagged behind competition in many areas, notably the lack of CDP/near CDP, block-level deduplication, no CPU or disk I/O throttling, file size limitation, and mobile device backup capabilities. HP doesn't have advanced feature functions such as file sync and remote wipe. On the positive side, the product has proven its scalability with large deployments (HP itself is a customer backing up 250,000 devices to the Connected cloud). It offers full-text index/search and federated search through its integration with Autonomy's Intelligent Data Operating Layer, a common information platform for structured and unstructured information that provides conceptual understanding of information. Connected is also one of the data sources for Autonomy Legal Hold. In 2013, HP added federated ID support, introduced a migration mode where a user could download the newest content first to a new device for access, reducing downtime during migration. It also refreshed its GUI and updated its mobile access app for Android to support more Android OS versions Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for

9 Página 9 de 9 Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. About Gartner Careers Newsroom Policies Site Index IT Glossary Contact Gartner

Critical Capabilities for Enterprise Endpoint Backup

Critical Capabilities for Enterprise Endpoint Backup G00255640 Critical Capabilities for Enterprise Endpoint Backup Published: 24 October 2013 Analyst(s): Pushan Rinnen, Dave Russell This research provides detailed stack ranking of seven endpoint backup

More information

Critical Capabilities for Enterprise Endpoint Backup

Critical Capabilities for Enterprise Endpoint Backup G00235971 Critical Capabilities for Enterprise Endpoint Backup Published: 9 October 2012 Analyst(s): Pushan Rinnen, Dave Russell, Alan Dayley This document provides detailed stack ranking of 11 endpoint

More information

Druva insync vs. Altiris/Symantec DLO. Comparison Guide

Druva insync vs. Altiris/Symantec DLO. Comparison Guide Druva insync vs. Altiris/Symantec DLO Comparison Guide NOV 2014 Table of Contents Altiris End-of-Life...3 The Smart Choice - Druva insync...3 Product Comparison...4 Deduplication...5 Mobile Access and

More information

APRIL 2013. 8 Must-Have Features for Endpoint Backup

APRIL 2013. 8 Must-Have Features for Endpoint Backup APRIL 2013 8 Must-Have Features for Endpoint Backup Ensure corporate data is secure and protected by choosing an endpoint backup solution with the eight features below. 1. Advanced deduplication Because

More information

Howtomanage and protectend usersdata? Mati Raidma

Howtomanage and protectend usersdata? Mati Raidma Howtomanage and protectend usersdata? Mati Raidma Data Protection Has Changed Increased mobility of the workforce and business adoption of tablets are forcing organizations to face the challenge ofprotecting

More information

Druva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide

Druva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide Druva insync vs. Code42 CrashPlan for Enterprise Comparison Guide Table of Contents Executive Summary... 3 Why Switch from CrashPlan to Druva insync?... 3 Features Comparison... 4 Data Deduplication Techniques...

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise

More information

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

How To Backup From Your Computer To Your Phone Or Tablet Or Computer MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise

More information

10 Threats to Successful. Enterprise Endpoint Backup

10 Threats to Successful. Enterprise Endpoint Backup 10 Threats to Successful Enterprise Endpoint Backup Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise in endpoints,

More information

Choosing Enterprise Backup Software to Protect a Mobile World. Presented By Andrew Renz, Sr. Enterprise Engineer, Code 42

Choosing Enterprise Backup Software to Protect a Mobile World. Presented By Andrew Renz, Sr. Enterprise Engineer, Code 42 Choosing Enterprise Backup Software to Protect a Mobile World Presented By Andrew Renz, Sr. Enterprise Engineer, Code 42 codefortytwo software About Us Developing enterprise-level software since 2001 Headquartered

More information

A BUYER S CHECKLIST ENDPOINT DATA PROTECTION:

A BUYER S CHECKLIST ENDPOINT DATA PROTECTION: ENDPOINT DATA PROTECTION: A BUYER S CHECKLIST Endpoint data. It s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,

More information

Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM

Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are

More information

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Modern Data Management & Intelligent Archive Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Agenda Who is CommVault? Why CommVault? Microsoft and CommVault Cloud Use Cases A Brief History

More information

CONVERGED DATA PROTECTION. ITSA Nürnberg

CONVERGED DATA PROTECTION. ITSA Nürnberg CONVERGED DATA PROTECTION ITSA Nürnberg DRUVA Company Founded in 2008 in Pune, India Headquartered in Silicon Valley 5 Offices worldwide, 24x7 Support Backed by Sequoia and EMC End of 2014 +3000 Customers,

More information

Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:

Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports: Druva About Phoenix What is Phoenix? Druva Phoenix is a cloud based backup and archival solution aimed primarily at remote office servers. Since Phoenix is cloud-targeted backup, there is no elaborate

More information

Endpoint data protection solutions for Healthcare

Endpoint data protection solutions for Healthcare Endpoint data protection solutions for Healthcare Your patient data might be at risk Do your doctors use their smart phones, tablets, or personal computing devices for work in addition to their PC at the

More information

Securing Enterprise Mobility for Greater Competitive Advantage

Securing Enterprise Mobility for Greater Competitive Advantage SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise

More information

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst ESG Lab Review Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst Abstract: This ESG Lab review documents hands-on testing of

More information

Relentlessly Focused on All Things Data

Relentlessly Focused on All Things Data You ll never look at your protected data the same way again. Relentlessly Focused on All Things Data Data is good. There, we said it. At a time when many in the business world are wringing their hands

More information

Virtualization Support. Real Backups of Virtual Environments

Virtualization Support. Real Backups of Virtual Environments Virtualization Support. Real Backups of Virtual Environments Contents Virtualization Challenges 2 The Benefits of Agentless Backup 3 Backup and Recovery Built for Virtualized Server Environments 3 Agentless

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d f o r E d g e D a t a P r o t e c t i o n w i t

More information

COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY

COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY 20/05/14 COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY Roberto Massoli Channel Manager UNSTRUCTURED DATA FUELING COSTS 100TB =18x storage over 3 years, 100TB of production storage

More information

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

MANAGED SERVICE PROVIDERS SOLUTION BRIEF MANAGED SERVICE PROVIDERS SOLUTION BRIEF The Assured Recovery Services Platform The data protection world has drastically changed in the past few years. Protection and recovery of data and systems has

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

We look beyond IT. Cloud Offerings

We look beyond IT. Cloud Offerings Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking

More information

Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER

Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Storage I/O Performance on VMware vsphere 5.1 over 16 Gigabit Fibre Channel Table of Contents Abstract.... 3 The Problem with Windows

More information

Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments

Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments Hybrid Cloud Backup and Recovery Software Virtualization Support Asigra Inc. 1120 Finch Avenue West, Suite 400 Toronto, ON Canada M3J 3H7 tel: 416-736-8111 fax: 416-736-7120 email: info@asigra.com www.recoveryourcool.com

More information

Actual trends in backup protection solution IBM Backup Products and Services

Actual trends in backup protection solution IBM Backup Products and Services Actual trends in backup protection solution IBM Backup Products and Services Gražvydas Govaras IT Architektas 2013-03-19 Tivoli Storage Manager Fastback Continuos Data Protection solution for Windows and

More information

How To Protect Your Data From Harm

How To Protect Your Data From Harm Brochure: Comprehensive Agentless Backup and Recovery Software for the Enterprise Comprehensive Agentless Backup and Recovery Software for the Enterprise BROCHURE Your company s single most valuable asset

More information

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance

More information

Online Backup Plus Frequently Asked Questions

Online Backup Plus Frequently Asked Questions Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which

More information

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Brochure. Data Protector 9: Nine reasons to upgrade

Brochure. Data Protector 9: Nine reasons to upgrade Brochure Data Protector 9: Nine reasons to upgrade Data Protector 9: Nine reasons to upgrade Shifting data center requirements are forcing IT organizations to reassess backup and recovery processes, strategies,

More information

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and

More information

Helping MSPs protect Data Center resources

Helping MSPs protect Data Center resources Helping MSPs protect Data Center resources Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e.

More information

Jonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation

Jonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation Jonas Vercruysse Technical Pre-sales February 2013 Endpoint Management 2013 IBM Corporation Agenda 2 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up Agenda 3 Intro

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring

More information

Securing Endpoint Data While Enabling the Mobile Workforce

Securing Endpoint Data While Enabling the Mobile Workforce CODE 42 Makers of CrashPlan & SharePlan Securing Endpoint Data While Enabling the Mobile Workforce IP Expo London, Identity & Data Centric Security Theatre Presentation Andy Hardy, Managing Director EMEA

More information

How To Protect Your Endpoints From Being Stolen By A Cell Phone Or Other Device

How To Protect Your Endpoints From Being Stolen By A Cell Phone Or Other Device Whitepaper BYOD Program Best Practices for Data BYOD Program Best Practices for Data Bring your own device (BYOD) has evolved. From simply bringing a personal device to work, employees now expect the convenience

More information

Einstein Code42 Edge Data Management Overview

Einstein Code42 Edge Data Management Overview CODE 42 Einstein Code42 Edge Data Management Overview Presented by: Nick Stefanow, Account Executive Chris Gonzales, Systems Engineer The Challenges Facing the Enterprise Today Content Explosion BYOD Consumerization

More information

End-to-End Data Protection Solutions for the Enterprise

End-to-End Data Protection Solutions for the Enterprise Datasheet End-to-End Data Protection Solutions for the Enterprise From the Data Center to Endpoint Devices Your Corporate Data Might be at Risk Do your employees use their smart phones, tablets, or personal

More information

APS Connect Denver, CO

APS Connect Denver, CO New Generation Data Protection Powered by the Acronis AnyData Engine APS Connect Denver, CO Jon Farmer February 26, 2015 2015 Acronis Industry Leader in Data Protection Market Leading Solutions & Technology

More information

Backup Software 2010. Presented by W. Curtis Preston Executive Editor & Independent Backup Expert

Backup Software 2010. Presented by W. Curtis Preston Executive Editor & Independent Backup Expert Backup Software 2010 Presented by W. Curtis Preston Executive Editor & Independent Backup Expert When I was in the IT Department When I started as backup guy at $35B company in 1993: Tape Drive: QIC 80

More information

Modern Data Management. Gerry Sillars WW VP Cloud Solutions Group

Modern Data Management. Gerry Sillars WW VP Cloud Solutions Group Modern Data Management Gerry Sillars WW VP Cloud Solutions Group Company Overview Half Billion Revenue (L4Q) 25% CAGR (FY06 -FY13) #1 Storage SW Revenue Growth 18,200 Customers Worldwide 100% organic growth

More information

Reducing Costs and Complexity with CommVault

Reducing Costs and Complexity with CommVault Reducing Costs and Complexity with CommVault Agenda The CommVault approach to Data Management Infrastructure De-duplication Snapshots VM backup and recovery Reducing costs with CommVault new pricing options

More information

Smarter Endpoint Backup. This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices.

Smarter Endpoint Backup. This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices. Smarter Endpoint Backup This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices. Table of Contents Introduction... 2 Challenges of Endpoint Backup... 3 Storage Requirements

More information

CommVault Backup Appliance with NetApp

CommVault Backup Appliance with NetApp CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows

More information

Solution Overview. Jesper Schneider Nordic Distribution Manager. 14 th May 2014. Copyright 2014 CA. All rights reserved.

Solution Overview. Jesper Schneider Nordic Distribution Manager. 14 th May 2014. Copyright 2014 CA. All rights reserved. Solution Overview Jesper Schneider Nordic Distribution Manager 14 th May 2014 Copyright 2014 CA. All rights reserved. Are you in control? Backup Backup Backup Recovery point objectives Recovery time objectives

More information

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization You have critical data scattered throughout your organization on back-office servers, desktops, mobile endpoints

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

CommVault Backup Appliance with NetApp

CommVault Backup Appliance with NetApp CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

End-to-end data protection solutions

End-to-end data protection solutions Structured: Cloud Backup End-to-end data protection solutions From the data center to endpoint devices Your corporate data might be at risk Do your employees use their smart phones, tablets, or personal

More information

EMAIL ARCHIVING: A BUYER S CHECKLIST

EMAIL ARCHIVING: A BUYER S CHECKLIST EMAIL ARCHIVING: A BUYER S CHECKLIST Email is the backbone of today s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers,

More information

Symantec Desktop and Laptop Option 7.6

Symantec Desktop and Laptop Option 7.6 Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate

More information

CTERA Cloud Storage Platform Architecture

CTERA Cloud Storage Platform Architecture CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

// your essential partner CLOUD

// your essential partner CLOUD Benefit from business continuity with real-time replication of applications and data to a secure container in the cloud, which can be called into action within minutes. Protecting and ensuring the recoverability

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this

More information

COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS

COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS As cloud adoption continues to rise, so has the demand from Service Providers for software products that support their multi-tenant

More information

Veritas Enterprise Vault for Microsoft Exchange Server

Veritas Enterprise Vault for Microsoft Exchange Server Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email

More information

COMPANY PROFILE: VEMBU TECHNOLOGIES

COMPANY PROFILE: VEMBU TECHNOLOGIES COMPANY PROFILE: VEMBU TECHNOLOGIES APRIL 2013 Since its founding in 2004, Vembu Technologies has maintained a two-fold mission: innovate cloud information management for business users and accelerate

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

The Most Complete Data Protection Platform for MSPs

The Most Complete Data Protection Platform for MSPs The Most Complete Data Protection Platform for MSPs I delivers the industry s most complete Data Protection Platform today. From an easy-to-use dashboard, MSPs can efficiently manage cloud backup, disaster

More information

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage

More information

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana 2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened

More information

Introducing Arcserve Unified Data Protection

Introducing Arcserve Unified Data Protection Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured

More information

Competitive Analysis Retrospect And Our Competition

Competitive Analysis Retrospect And Our Competition Competitive Analysis And Our Competition September 2013 Competitive Analysis: for Windows and our top competitors We ve taken a hard look at our competition and how we stack up. Here is a comparison of

More information

Asigra Cloud Backup TM and Recovery Software.

Asigra Cloud Backup TM and Recovery Software. Asigra Cloud Backup TM and Recovery Software. Already Cloud Ready Unprecedented data growth is challenging companies of all sizes, placing increasing pressure on their backup and recovery initiatives.

More information

CommVault is the leading supplier of Data & Info Management Software

CommVault is the leading supplier of Data & Info Management Software CommVault is the leading supplier of Data & Info Management Software CommVault simplifies and makes it less costly to manage, access and protect information assets Headquartered in Oceanport, NJ 1,658

More information

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com BUYER CASE STUDY EMC IT Increasing Efficiency, Reducing Costs, and Optimizing IT with Data Deduplication Sponsored by: EMC Corporation Robert Amatruda February 2011 Laura DuBois Global Headquarters: 5

More information

COMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS

COMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS FACT SHEET: COMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS CommVault has introduced new Simpana software solution sets that are purpose-built to modernize

More information

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution. DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering. Easy-to-use Backup and Recovery solution. Data protection and disaster recovery in a single solution. Scalable

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING

More information

Parallels VDI Solution

Parallels VDI Solution Parallels VDI Solution White Paper Version 1.0 April 2009 Table of Contents Enterprise Desktop Computing Challenges... 3 What is Virtual Desktop Infrastructure (VDI)... 3 Benefits of Virtual Desktop Infrastructure...

More information

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today

More information

Commvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region

Commvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region Commvault - Modern Data and Information Management Aleksandar Antić Commvault Regional Sales SEE Region Snapshot of Commvault Established in 1996, headquartered in New Jersey, USA Over 2,000 employees

More information

CrashPlan PRO Enterprise Backup

CrashPlan PRO Enterprise Backup CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

CommVault Simpana. Manfredi Carissimi Pre-Sales Systems Engineer

CommVault Simpana. Manfredi Carissimi Pre-Sales Systems Engineer CommVault Simpana Manfredi Carissimi Pre-Sales Systems Engineer TRASFORMAZIONE DIGITALE 2005 2 2005 2013 3 WHO IS COMMVAULT DATA ABOUT COMMVAULT Created in 1996, spinoff of a development group of AT&T

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information