SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Industry Leader
Millions of deployments worldwide
VMware® ready and Microsoft® certified
Continued product innovation /
improvements
Technology that you can count on to
protect your organization’s critical data
and systems
Seamless Upgrades and Migrations
Seamless, worry free upgrades - upgrade
faster by maintaining single backup policies
for multiple servers, and their configuration
settings, when upgrading from a previous
version of Backup Exec
12.5/2010/2012
Storage Agnostic: Superior support for disk,
tape, and cloud storage media
Local Disk
eSATA, SAS, PCIn
Network Disk
UNC, CIFS
Deduplication Disk
Local/Shared, OST
Shared Storage
FC, iSCSI
Tape Drives
FC, SAS, SCSI,
NDMP
Tape Libraries
with Drives
FC, SAS, SCSI
Virtual Tape
Libraries
FC, SCSI, NDMP
3
rd
-Party
Appliances
OST/Ethernet, NDMP
Backup Exec
3600 Appliance
Deduplication, SAS
Quantum
Q- Cloud storage
Private Cloud Services
Ethernet/VPN
Integrated simplified disaster
recovery
Integrate disaster recovery and reduce downtime with
integrated bare-metal and hardware independent
disaster recovery. Restore entire server and host
machine to the same or dissimilar hardware.
Faster backups and restores than previous versions to help
meet recovery SLAs / RPOs / RTOs and dramatically minimize
downtime
A backup and recovery engine designed to achieve Advanced and modern protection
technology designed specifically for
virtual environments
Unify virtual and physical backups with
Symantec V-Ray technology, a patent pending
technology that lets you see deeper into your
VMware and Hyper-V machines for better
virtual backup
True Global Deduplication
Deduplicate data across all of your backup jobs
regardless of location
Dedupe at the client, media server or 3rd party
appliance
Client Server Appliance
Enhanced usability: A user
interface that simplifies backup
and recovery
Job monitor is back: Monitor all of your
backup jobs in a single view
Multi-server backup: Backup multiple
servers in a single backup job
Support for the Latest and the
Widest-range of Platforms and
Applications
Windows 2012 & 2012 R2
(Server & Client)
Windows 8.0 & 8.1
(Client & RAC)
Exchange 2013
CU3 & SP1
(includes GRT)
SharePoint 2013
& 2013 SP1
(includes GRT)
SQL Server 2008/R2
2012, 2012 SP1, &
2014
VMware 5.1, 5.5
& 5.5 Update 1
Hyper-V 2012 &
2012 R2
RHEL 5.8, 5.9,
6.0 – 6.5
Ubuntu 12.04,
12.10, and 14.10
SLES 11 SP2, OES 11
Macintosh OS X
10.5 – 10.9
Oracle 11g, R1/R2 Lotus Domino 8.5
.1/.2/.3 & 9
EV 10 SP3/SP4,
EV 11
This is a list of newly added platforms and applications in Backup
Exec 2014. Refer to the Backup Exec Software Compatibility List
for complete details on supported platforms. This list is current at
the time of publication and may change subsequently.
2014 Amazon
Cloud Gateway VTL
www.backupexec.com
Reducing Costs: Lowering costs and simplifying backup tasks starts with deploying a single solution that can protect
a hybrid physical and virtual infrastructure. Deeply integrated with VMware, Microsoft and Linux platforms, Backup
Exec can protect from one to thousands of servers and virtual machines all from the same user console, providing
optimal performance and efficiency.
Meeting backup windows: Backup Exec helps you meet critical backup windows by delivering backups that are up to
100% faster* than previous versions. In addition, by executing post-processing tasks that don’t impact the backup
window, such as log truncation, collection of metadata, and searchable catalogs, Backup Exec delivers highly
optimized backup.
Keeping pace with the capacity of data to protect: Backup Exec’s flexible block-level data deduplication helps you
keep pace with growing data by minimizing backup windows, decreasing network traffic, and reducing the disk
space required for storing backup files by up to 90%**. Backup Exec can deduplicate at the client, media server or
appliance across all physical and virtual backup jobs.
Improving backup reliability: Backup Exec’s integration with Microsoft® Volume Shadow Copy Service (VSS) and
VMware’s vStorage APIs for Data Protection (VADP) provides reliable and consistent application-aware backups for
all your virtual machines. Additionally, upon successful completion of each virtual or physical backup job, you can
automatically verify the recoverability of each and every backup.
How Backup Exec 2014 addresses customer IT challenges:
Symantec Backup Exec™ 2014 delivers up to 100% faster backups*, recovers anything in just minutes, and is easy to use and manage
across both virtual and physical environments. Learn how it can solve your customers’ challenges at symantec.com/backup-exec
When you can do it simply, you can do it all.
*Backup Exec Backup Performance, Symantec Testing, January 2014.
**Based on Internal Testing
Additional Resources:
SKUs, licenses, and sales tools: https://partnernet.symantec.com
SKU tool site: http://www.backupexec.com/skugenerator.com
Full product details: http://www.backupexec.com
60-day trialware: http://www.backupexec.com/trybe
Connect with Backup Exec:
Introducing the faster, stronger backup solution.
Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, and Backup Exec are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Más contenido relacionado

Más de Symantec

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 

Más de Symantec (20)

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

What's New in Symantec Backup Exec 2014? It's Faster. It's Stronger. It's Better.

  • 1. Industry Leader Millions of deployments worldwide VMware® ready and Microsoft® certified Continued product innovation / improvements Technology that you can count on to protect your organization’s critical data and systems Seamless Upgrades and Migrations Seamless, worry free upgrades - upgrade faster by maintaining single backup policies for multiple servers, and their configuration settings, when upgrading from a previous version of Backup Exec 12.5/2010/2012 Storage Agnostic: Superior support for disk, tape, and cloud storage media Local Disk eSATA, SAS, PCIn Network Disk UNC, CIFS Deduplication Disk Local/Shared, OST Shared Storage FC, iSCSI Tape Drives FC, SAS, SCSI, NDMP Tape Libraries with Drives FC, SAS, SCSI Virtual Tape Libraries FC, SCSI, NDMP 3 rd -Party Appliances OST/Ethernet, NDMP Backup Exec 3600 Appliance Deduplication, SAS Quantum Q- Cloud storage Private Cloud Services Ethernet/VPN Integrated simplified disaster recovery Integrate disaster recovery and reduce downtime with integrated bare-metal and hardware independent disaster recovery. Restore entire server and host machine to the same or dissimilar hardware. Faster backups and restores than previous versions to help meet recovery SLAs / RPOs / RTOs and dramatically minimize downtime A backup and recovery engine designed to achieve Advanced and modern protection technology designed specifically for virtual environments Unify virtual and physical backups with Symantec V-Ray technology, a patent pending technology that lets you see deeper into your VMware and Hyper-V machines for better virtual backup True Global Deduplication Deduplicate data across all of your backup jobs regardless of location Dedupe at the client, media server or 3rd party appliance Client Server Appliance Enhanced usability: A user interface that simplifies backup and recovery Job monitor is back: Monitor all of your backup jobs in a single view Multi-server backup: Backup multiple servers in a single backup job Support for the Latest and the Widest-range of Platforms and Applications Windows 2012 & 2012 R2 (Server & Client) Windows 8.0 & 8.1 (Client & RAC) Exchange 2013 CU3 & SP1 (includes GRT) SharePoint 2013 & 2013 SP1 (includes GRT) SQL Server 2008/R2 2012, 2012 SP1, & 2014 VMware 5.1, 5.5 & 5.5 Update 1 Hyper-V 2012 & 2012 R2 RHEL 5.8, 5.9, 6.0 – 6.5 Ubuntu 12.04, 12.10, and 14.10 SLES 11 SP2, OES 11 Macintosh OS X 10.5 – 10.9 Oracle 11g, R1/R2 Lotus Domino 8.5 .1/.2/.3 & 9 EV 10 SP3/SP4, EV 11 This is a list of newly added platforms and applications in Backup Exec 2014. Refer to the Backup Exec Software Compatibility List for complete details on supported platforms. This list is current at the time of publication and may change subsequently. 2014 Amazon Cloud Gateway VTL www.backupexec.com Reducing Costs: Lowering costs and simplifying backup tasks starts with deploying a single solution that can protect a hybrid physical and virtual infrastructure. Deeply integrated with VMware, Microsoft and Linux platforms, Backup Exec can protect from one to thousands of servers and virtual machines all from the same user console, providing optimal performance and efficiency. Meeting backup windows: Backup Exec helps you meet critical backup windows by delivering backups that are up to 100% faster* than previous versions. In addition, by executing post-processing tasks that don’t impact the backup window, such as log truncation, collection of metadata, and searchable catalogs, Backup Exec delivers highly optimized backup. Keeping pace with the capacity of data to protect: Backup Exec’s flexible block-level data deduplication helps you keep pace with growing data by minimizing backup windows, decreasing network traffic, and reducing the disk space required for storing backup files by up to 90%**. Backup Exec can deduplicate at the client, media server or appliance across all physical and virtual backup jobs. Improving backup reliability: Backup Exec’s integration with Microsoft® Volume Shadow Copy Service (VSS) and VMware’s vStorage APIs for Data Protection (VADP) provides reliable and consistent application-aware backups for all your virtual machines. Additionally, upon successful completion of each virtual or physical backup job, you can automatically verify the recoverability of each and every backup. How Backup Exec 2014 addresses customer IT challenges: Symantec Backup Exec™ 2014 delivers up to 100% faster backups*, recovers anything in just minutes, and is easy to use and manage across both virtual and physical environments. Learn how it can solve your customers’ challenges at symantec.com/backup-exec When you can do it simply, you can do it all. *Backup Exec Backup Performance, Symantec Testing, January 2014. **Based on Internal Testing Additional Resources: SKUs, licenses, and sales tools: https://partnernet.symantec.com SKU tool site: http://www.backupexec.com/skugenerator.com Full product details: http://www.backupexec.com 60-day trialware: http://www.backupexec.com/trybe Connect with Backup Exec: Introducing the faster, stronger backup solution. Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, and Backup Exec are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.