Symantec Modernizes Data Protection with Integrated Backup and Deduplication Appliances

Updated: May 25, 2012

Symantec Modernizes Data Protection with Integrated Backup and Deduplication Appliances

Symantec Corp. announced updates to its backup appliances, NetBackup 5220 and Backup Exec 3600, which now include the latest NetBackup 7.5 and Backup Exec 2012 software from Symantec announced earlier this year. The new appliances deliver on Symantec’s Better Backup for All initiative to advance what Gartner has called “The Broken State of Backup.”

For many customers, the challenges with protecting virtual and physical servers have been caused by the proliferation of as many as seven different backup solutions in a single environment and the integration problems between the hardware and software. Individual point solutions for target deduplication and virtual machine backup have only added to the complexity that has forced administrators to call for a new approach. Symantec’s backup appliances deliver an end-to-end integrated backup appliance for servers, storage, and software. Gone are the days of extreme systems engineering where it was the customer’s responsibility to make all of their backup solutions work together.

NetBackup 5220 Key Features:

  • NetBackup Accelerator: Helps shrink big backups into smaller backup windows by delivering full backups at the speed of incremental backups for up to 100 times faster backup.
  • Replication Director: Brings the speed of snapshots and the recoverability of backup together to protect large volumes of data and virtual machines.
  • Symantec V-Ray Technology: Protects up to 3,000 VMware virtual machines with a single appliance while enabling fast file or image recovery with less hardware (e.g., direct VMware vSphere backups without proxy servers).
  • Auto Image Replication: Enables disaster recovery over the network by combining deduplication with replication so you can stop putting tapes on trucks or helicopters.
  • Symantec Critical System Protection: Combines security and storage to protect appliances and backup data against zero day attacks and malicious insider threats.
  • WAN Optimization: Provides reliable backups even in high latency environments.

Backup Exec 3600 Key Features:

  •  Next Gen Backup User Experience: Changes the way backups are managed by organizing them around systems and information. Optimized and priced for SMB customers, the Backup Exec 3600 appliance’s policies and settings are designed so organizations can implement expert backup policies without being experts in backup.
  • Symantec V-Ray: Unites virtual and physical backups to deliver single-pass backups of VMware, Hyper-V and the physical hosts they run on so users can recover virtual machines, applications, databases, files, folders and even granular objects in seconds.
  • Free Disaster Recovery Built-In: Integrated bare metal recovery includes Backup-to-Virtual (B2V) and Physical-to-Virtual (P2V) conversion technologies to allow users to recover a failed system to a VMware or Hyper-V guest. All Backup Exec customers who upgrade to BE 2012 have access to this at no cost, enabling businesses that thought disaster recovery was out of reach to implement a plan.
  • Tape-Out Support: Backup Exec 3600 appliance has added tape support for additional longer-term or offsite data protection.
  • Cloud Recovery as a Service: With the Cloud disaster recovery option, customers can leverage cloud recovery as a service powered by Doyenz for planned and unplanned system recovery of VMware environments.
  • Data Deduplication: Users can protect more data while reducing storage by up to 90 percent and improve backup performance through integrated deduplication and archiving technology.

Symantec’s backup appliances are unique to the market. While many solutions require the IT team to integrate multiple solutions for tape, disk, dedupe, physical, virtual snapshots and backup, Symantec appliances are typically installed in less than 30 minutes and deliver integrated hardware, software and dedupe storage, providing customers with simplicity and performance from one vendor. The NetBackup 5220 and Backup Exec 3600 are a modern approach to backup for organizations of any size.

Related Categories
Featured Research
  • Securing Enterprise Information Technology

    In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more

  • Office365 Adoption eGuide

    Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more

  • Okta Directory Integration

    For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more

  • Better BYOD with Pulse Secure and MDM Partners

    Learn how Pulse Secure and leading MDM product partners are transforming the way employees and IT benefit from the productivity and flexibility of BYOD — without compromising security or increasing management complexity. more

Related Articles