G2 Crowd Acquires Siftery to Create a New Way to Buy and Manage Software Spend šŸš€

Veritas Backup Exec

3.7
(102)

Backup Exec is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and offers unmatched recovery capabilities

Work for Veritas Backup Exec?

Learning about Backup Exec?

We can help you find the solution that fits you best.

Veritas Backup Exec Features

Compatibility

File Server Backup

The ability to store information from filesystems.

Not enough data available

Database Server Backup

The ability to backup data from relational and NoSQL databases.

Not enough data available

Virtual Machines

Support for secure virtualized tape or disk storage.

Not enough data available

Repository Models

Support for various backup storage and operational processes. Examples include system imaging, incremental backup, or differential backup.

Not enough data available

Management

Disaster Recovery

Delegate backup settings to facilitate specific recovery in the result of a disaster.

84%
(Based on 32 reviews)

Remote Backup

Provide remote access dashboards designed to manage and store data from familiar applications.

n/a

Storage Formats

The ability to store multiple types of file formats or convert files to proper format.

82%
(Based on 29 reviews)

Scheduled Backups

The abillity to automate backups or have backup storage updated continuously.

n/a

On-Demand Restoration

The ability to restore files to its original location or alternative sources on-demand.

86%
(Based on 28 reviews)

Management

Continuous Backup

The abillity to automate backups or have backup storage updated continuously.

Not enough data available

Disaster Recovery

Delegate backup settings to facilitate specific recovery in the result of a disaster.

Not enough data available

Storage Capacity

The ability to store large amounts of data or scale capacity to fit storage needs.

Not enough data available

Remote Backup

Provides remote access dashboards designed to manage and store data from familiar applications.

Not enough data available

Activity Monitoring

Actively monitor status of work stations either on-premise or remote.

Not enough data available

Reporting

Activity Monitoring

Actively monitor status of work stations either on-premise or remote.

81%
(Based on 28 reviews)

Documentation

Reporting abilities to assess data quality and activity.

82%
(Based on 28 reviews)

Alerts/Notifications

Send summary, update, or actionable alerts to administrators to detail activity.

85%
(Based on 31 reviews)

Compliance

Security Standards

The ability to set standards for asset and risk management.

Not enough data available

Cloud Data Protection

Provides high quality and wide scope of in-cloud and offline data security capabilities.

Not enough data available

Data Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

Not enough data available

Security

Data Encryption

Provide some level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

82%
(Based on 27 reviews)

Security and Compliance

Abilities to set standards for asset and risk management.

83%
(Based on 28 reviews)

Deduplication

Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.

72%
(Based on 27 reviews)