0% found this document useful (0 votes)
39 views2 pages

h1767 Data Protection Advisor Data Sheet

Uploaded by

amineki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

h1767 Data Protection Advisor Data Sheet

Uploaded by

amineki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Data Sheet

Dell Data Protection Advisor


Visibility and predictability across your data protection environment

Improve recoverability confidence and ensure service levels


Essentials
Effectively managing your data protection environment is labor intensive and
• Unify data protection visibility by complex. It requires knowledge of backup applications, replication technologies,
monitoring, alerting and reporting and the entire supporting infrastructure. Adding to the complexity are varying
across a broad spectrum of Dell service-level objectives for backup and recovery, replication, and virtualization,
Technologies and third-party as well as audit and compliance requirements to consider. And, with many IT
applications, data sources and organizations managing multiple data centers, combined with new computing
environments models, data is often spread across a mix of on-premises and cloud resources.
• Monitor applications and data on- With Data Protection Advisor, you can automate and centralize the collection,
premises and in the cloud monitoring and reporting of this data—and get a single, comprehensive view of
your data protection environment. With clear visibility, you can effectively
• Eliminate manual effort and improve
manage service levels while reducing costs and complexity.
predictability through automated
processes for real-time protection
assurance

• Spot potential cyber attacks through


alert rules and the Data Protection
Advisor Analysis Engine
• Reduce spending and improve
performance by analyzing and
optimizing under-utilized resources

• Improve service level compliance


while reducing cost, risk and
complexity

• Efficiently plan and manage storage


Reduce costs
growth and purchases
Imagine having a 24x7 watchdog for your IT environment. Data Protection
• Intuitive, easy to use interface
Advisor proactively monitors conditions and automatically tells you if a process
will break a policy or service level objective based on current trends. You also
have insight into situations that may result in an unsuccessful backup, the ability
to automate processes so you can appropriately staff IT projects, and how to
more efficiently implement resources to reduce your data protection costs.
You also gain insights from Data Protection Advisor’s cross-domain event
correlation analysis, which provides a clear view into the entire data protection
path to ensure each component is working correctly. And that provides higher-
level decision support based on defined policies.

Spot potential cyber threats


To keep pace with constantly evolving ransomware and other cyber threats,
Data Protection Advisor’s Analysis Engine enables a proactive approach to
anomaly and possible threat detection. With Data Protection Advisor, you can
leverage built-in rules and policies to look for and alert you to common cyber
attack precursors, such as unusually high data movement, unauthorized
changes to backup configurations or increases in network utilization. This
visibility can keep you one step ahead of bad actors.

© 2024 Dell Inc. or its subsidiaries.


Supported Technologies Cloud enabled
Dell Technologies: Whether backup applications are running on-premises or in cloud
PowerProtect Data Manager environments, Data Protection Advisor provides the same level of visibility.
Avamar Data Protection Advisor offers scalable, centralized multi-tenant data
NetWorker protection management. This ensures service level attainment by enabling
PowerProtect DD administrators to maintain performance as resource requirements change.
PowerProtect DP Provide the right information to the right people
Cloud Tier
RecoverPoint/RecoverPoint for VMs With a single view into your backup infrastructure, every stakeholder has
access to the information they need. Via customizable dashboards with role-
Other applications: based access control or running a specific report, viewing the most
CA Arcserve important, yet environment-wide, information on one screen enables better
Oracle RMAN operational decisions.
Commvault With a robust reporting engine, Data Protection Advisor offers an extensive
Veritas NetBackup set of report templates from which to choose across multiple categories,
Veritas Backup Exec including Dashboard, Report Card, Backup / Management Operations
HP Data Protector Overview, Virtual Machines Not Protected, Client Deduplication Details, and
IBM TSM Resource Utilization. With pre-configured reports you can simplify common
VMware VDP tasks or customize your own. A flexible tenancy structure also allows end
Physical Tape Library/VTL users to match and create reporting groups according to their own
requirements or customize individual reports.
Virtual environments:
VMware

Enterprise applications
Microsoft Exchange
Microsoft SQL Server
Oracle
SAP HANA
PostgreSQL
DB2

Comply with audits


Unexpected, or expected, audits can take IT administrators out of their
primary role for many hours or even days to verify compliance with a
regulatory guideline. Remove this manual effort with rapid access to key
indicators of protection and enable stakeholders to validate status and service
levels themselves.
Data Protection Advisor provides you with insight and visibility into your data
protection environment, making backups easier and more efficient, while also
providing a foundation on which to plan.

Learn More about


Data Protection Contact a Dell Technologies Expert
Advisor

© 2024 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies and other trademarks are
trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective
owners.

You might also like