SlideShare a Scribd company logo
A new route to reliable
backup and recovery.
Smoothly navigate your backup
and recovery environment.

40

%

Data projected to grow at 40

Traditional backups for
multi-TB datasets can
exceed 12 hours

percent per year1

Average number of
backup and recovery
solutions in use

28%

Only

Four for physical systems and
three for virtual2

Of IT professionals
are completely
confident that
they could recover
all their backed
up data4

IT professionals say
they have too many
backup and recovery
solutions3

SIMPLICITY

1

1 vendor.
1 support call.
1 SKU.

EXIT COMPLEXITY
Reduce costs and increase confidence when
you simplify your backup and recovery
journey with a single solution.

The shortest route
to simplicity

Unified Backup and Recovery with the Symantec
Backup Exec™ 3600 Appliance combines expertise
from Intel and Symantec into an optimized
appliance form factor.

1 > Many

90%

One device to set up versus
multiple stitched components

Reduction in
backup storage

Granular insight into
VMs through V-Ray

Comprehensive solution
backs up physical and
virtual systems

Simple file-level
recovery

Intelligent deduplication
at source and target

Symantec Backup Exec™ 2012
backs up virtual and physical environments,
simplifies both backup and recovery, and
offers unmatched recovery capabilities.

SIMPLICITY

1

Intel® server products feature integrated
hardware components that are optimized
for purpose-built environments such as
appliances.

The shortest route to
backup and recovery.
The first step is right here: intel.symantec.com

1

Recent estimates by the McKinsey Global Institute. See “Big data: The next frontier for innovation, competition, and productivity.”
May 2011. http://www.mckinsey.com/~/media/McKinsey/dotcom/Insights and pubs/MGI/Research/Technology and Innovation/Big
Data/MGI_big_data_full_report.ashx

2

Symantec. Backup and Recovery Flash Poll. October 2011.

3

Symantec. Backup and Recovery Flash Poll. October 2011.

4

Symantec. Backup and Recovery Flash Poll. October 2011.

5

Symantec. Backup and Recovery Flash Poll. October 2011.

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec, the
Symantec logo, and Backup Exec are trademarks of Symantec Corporation or
its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
Copyright © 2013 Intel Corporation. All rights reserved. Intel and the Intel logo
are trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Printed in USA 0313 /MS/PRW/PDF Please Recycle 328833-001US

More Related Content

What's hot

Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its RelevanceRevolucion
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
Gary Fincher
 
Agile beyond it case study sanika bhide
Agile beyond it case study sanika bhideAgile beyond it case study sanika bhide
Agile beyond it case study sanika bhide
apgionline
 
Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...
Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...
Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...
jameshub12
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Shahid Shah
 
The First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology PlatformThe First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology Platform
xmeteorite
 
TED Talk – Govers – IT Impact on Relational Work
TED Talk – Govers – IT Impact on Relational WorkTED Talk – Govers – IT Impact on Relational Work
TED Talk – Govers – IT Impact on Relational Work
Sociotechnical Roundtable
 
Energy points for masstlc edit
Energy points for masstlc editEnergy points for masstlc edit
Energy points for masstlc editMassTLC
 
3 reasons to modernize your data estate
3 reasons to modernize your data estate3 reasons to modernize your data estate
3 reasons to modernize your data estate
Server Consultancy
 
S dillon mtlc 5-02-2013
S dillon   mtlc 5-02-2013S dillon   mtlc 5-02-2013
S dillon mtlc 5-02-2013MassTLC
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALJason Bowne
 
The Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster RecoveryThe Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster Recovery
NetEnrich, Inc.
 
Mass tlc big data presentation from enernoc
Mass tlc big data presentation from enernocMass tlc big data presentation from enernoc
Mass tlc big data presentation from enernocMassTLC
 

What's hot (14)

Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
 
IT Guy's Journey Through the New IT World
IT Guy's Journey Through the New IT WorldIT Guy's Journey Through the New IT World
IT Guy's Journey Through the New IT World
 
Agile beyond it case study sanika bhide
Agile beyond it case study sanika bhideAgile beyond it case study sanika bhide
Agile beyond it case study sanika bhide
 
Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...
Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...
Keynote Presentation: Overcoming Storage Challenges Associated With Server Vi...
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
 
The First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology PlatformThe First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology Platform
 
TED Talk – Govers – IT Impact on Relational Work
TED Talk – Govers – IT Impact on Relational WorkTED Talk – Govers – IT Impact on Relational Work
TED Talk – Govers – IT Impact on Relational Work
 
Energy points for masstlc edit
Energy points for masstlc editEnergy points for masstlc edit
Energy points for masstlc edit
 
3 reasons to modernize your data estate
3 reasons to modernize your data estate3 reasons to modernize your data estate
3 reasons to modernize your data estate
 
S dillon mtlc 5-02-2013
S dillon   mtlc 5-02-2013S dillon   mtlc 5-02-2013
S dillon mtlc 5-02-2013
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINAL
 
The Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster RecoveryThe Importance of Backup and Disaster Recovery
The Importance of Backup and Disaster Recovery
 
Mass tlc big data presentation from enernoc
Mass tlc big data presentation from enernocMass tlc big data presentation from enernoc
Mass tlc big data presentation from enernoc
 

Similar to Smoothly Navigate Your Backup & Recover Environment - Infographic

Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
EMC
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with SymantecArrow ECS UK
 
ESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPX
Catalogic Software
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
csandit
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
Storage Switzerland
 
ESG Lab validation report on Virident’s FlashMaxII
ESG Lab validation report on Virident’s FlashMaxIIESG Lab validation report on Virident’s FlashMaxII
ESG Lab validation report on Virident’s FlashMaxII
Virident
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
GovLoop
 
Backup exec 2015 end user presentation
Backup exec 2015 end user presentationBackup exec 2015 end user presentation
Backup exec 2015 end user presentation
Tania Macarlupú
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android System
IRJET Journal
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
Symantec
 
Native Replication for IBM ProtecTIER Deduplication Solutions
Native Replication for IBM ProtecTIER Deduplication SolutionsNative Replication for IBM ProtecTIER Deduplication Solutions
Native Replication for IBM ProtecTIER Deduplication Solutions
IBM India Smarter Computing
 
More data, more backups, more strain on the organisation (UK)
More data, more backups, more strain on the organisation (UK)More data, more backups, more strain on the organisation (UK)
More data, more backups, more strain on the organisation (UK)
Symantec
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
Michael Hudak
 
More data, more backups, more strain on the organisation - EN
More data, more backups, more strain on the organisation - ENMore data, more backups, more strain on the organisation - EN
More data, more backups, more strain on the organisation - EN
Symantec
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
MaryJWilliams2
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
Storage Switzerland
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM India Smarter Computing
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
IBM ProtecTIER Deduplication for Symantec OpenStorage
IBM ProtecTIER Deduplication for Symantec OpenStorageIBM ProtecTIER Deduplication for Symantec OpenStorage
IBM ProtecTIER Deduplication for Symantec OpenStorage
IBM India Smarter Computing
 

Similar to Smoothly Navigate Your Backup & Recover Environment - Infographic (20)

Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with Symantec
 
ESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPXESG Lab Report - Catalogic Software DPX
ESG Lab Report - Catalogic Software DPX
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
 
ESG Lab validation report on Virident’s FlashMaxII
ESG Lab validation report on Virident’s FlashMaxIIESG Lab validation report on Virident’s FlashMaxII
ESG Lab validation report on Virident’s FlashMaxII
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
Backup exec 2015 end user presentation
Backup exec 2015 end user presentationBackup exec 2015 end user presentation
Backup exec 2015 end user presentation
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android System
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
Native Replication for IBM ProtecTIER Deduplication Solutions
Native Replication for IBM ProtecTIER Deduplication SolutionsNative Replication for IBM ProtecTIER Deduplication Solutions
Native Replication for IBM ProtecTIER Deduplication Solutions
 
More data, more backups, more strain on the organisation (UK)
More data, more backups, more strain on the organisation (UK)More data, more backups, more strain on the organisation (UK)
More data, more backups, more strain on the organisation (UK)
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
More data, more backups, more strain on the organisation - EN
More data, more backups, more strain on the organisation - ENMore data, more backups, more strain on the organisation - EN
More data, more backups, more strain on the organisation - EN
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
IBM ProtecTIER Deduplication for Symantec OpenStorage
IBM ProtecTIER Deduplication for Symantec OpenStorageIBM ProtecTIER Deduplication for Symantec OpenStorage
IBM ProtecTIER Deduplication for Symantec OpenStorage
 

More from David Martin

Malaware - Stay Ahead Of The Threats
Malaware - Stay Ahead Of The ThreatsMalaware - Stay Ahead Of The Threats
Malaware - Stay Ahead Of The ThreatsDavid Martin
 
Charting The Rise Of a CyberCriminal - Infographic
Charting The Rise Of a CyberCriminal - InfographicCharting The Rise Of a CyberCriminal - Infographic
Charting The Rise Of a CyberCriminal - InfographicDavid Martin
 
Symantec Infogrphic - SSL Certificate Management
Symantec Infogrphic - SSL Certificate ManagementSymantec Infogrphic - SSL Certificate Management
Symantec Infogrphic - SSL Certificate ManagementDavid Martin
 
Symantec Survey: Cybersecurity Threats! Are You Prepared?
Symantec Survey: Cybersecurity Threats! Are You Prepared?Symantec Survey: Cybersecurity Threats! Are You Prepared?
Symantec Survey: Cybersecurity Threats! Are You Prepared?David Martin
 
Increasing Cyber Attacks On The Energy Sector
Increasing Cyber Attacks On The Energy SectorIncreasing Cyber Attacks On The Energy Sector
Increasing Cyber Attacks On The Energy SectorDavid Martin
 
2014 Security Predictions from Symantec - Infographic
2014 Security Predictions from Symantec - Infographic2014 Security Predictions from Symantec - Infographic
2014 Security Predictions from Symantec - InfographicDavid Martin
 

More from David Martin (6)

Malaware - Stay Ahead Of The Threats
Malaware - Stay Ahead Of The ThreatsMalaware - Stay Ahead Of The Threats
Malaware - Stay Ahead Of The Threats
 
Charting The Rise Of a CyberCriminal - Infographic
Charting The Rise Of a CyberCriminal - InfographicCharting The Rise Of a CyberCriminal - Infographic
Charting The Rise Of a CyberCriminal - Infographic
 
Symantec Infogrphic - SSL Certificate Management
Symantec Infogrphic - SSL Certificate ManagementSymantec Infogrphic - SSL Certificate Management
Symantec Infogrphic - SSL Certificate Management
 
Symantec Survey: Cybersecurity Threats! Are You Prepared?
Symantec Survey: Cybersecurity Threats! Are You Prepared?Symantec Survey: Cybersecurity Threats! Are You Prepared?
Symantec Survey: Cybersecurity Threats! Are You Prepared?
 
Increasing Cyber Attacks On The Energy Sector
Increasing Cyber Attacks On The Energy SectorIncreasing Cyber Attacks On The Energy Sector
Increasing Cyber Attacks On The Energy Sector
 
2014 Security Predictions from Symantec - Infographic
2014 Security Predictions from Symantec - Infographic2014 Security Predictions from Symantec - Infographic
2014 Security Predictions from Symantec - Infographic
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Smoothly Navigate Your Backup & Recover Environment - Infographic

  • 1. A new route to reliable backup and recovery. Smoothly navigate your backup and recovery environment. 40 % Data projected to grow at 40 Traditional backups for multi-TB datasets can exceed 12 hours percent per year1 Average number of backup and recovery solutions in use 28% Only Four for physical systems and three for virtual2 Of IT professionals are completely confident that they could recover all their backed up data4 IT professionals say they have too many backup and recovery solutions3 SIMPLICITY 1 1 vendor. 1 support call. 1 SKU. EXIT COMPLEXITY Reduce costs and increase confidence when you simplify your backup and recovery journey with a single solution. The shortest route to simplicity Unified Backup and Recovery with the Symantec Backup Exec™ 3600 Appliance combines expertise from Intel and Symantec into an optimized appliance form factor. 1 > Many 90% One device to set up versus multiple stitched components Reduction in backup storage Granular insight into VMs through V-Ray Comprehensive solution backs up physical and virtual systems Simple file-level recovery Intelligent deduplication at source and target Symantec Backup Exec™ 2012 backs up virtual and physical environments, simplifies both backup and recovery, and offers unmatched recovery capabilities. SIMPLICITY 1 Intel® server products feature integrated hardware components that are optimized for purpose-built environments such as appliances. The shortest route to backup and recovery. The first step is right here: intel.symantec.com 1 Recent estimates by the McKinsey Global Institute. See “Big data: The next frontier for innovation, competition, and productivity.” May 2011. http://www.mckinsey.com/~/media/McKinsey/dotcom/Insights and pubs/MGI/Research/Technology and Innovation/Big Data/MGI_big_data_full_report.ashx 2 Symantec. Backup and Recovery Flash Poll. October 2011. 3 Symantec. Backup and Recovery Flash Poll. October 2011. 4 Symantec. Backup and Recovery Flash Poll. October 2011. 5 Symantec. Backup and Recovery Flash Poll. October 2011. Copyright © 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, and Backup Exec are trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Copyright © 2013 Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Printed in USA 0313 /MS/PRW/PDF Please Recycle 328833-001US