Comprehensive
Comprehensive
Data Security
Without data masking, sensitive
Mask sensitive data prior to
information, such as personal
external transfer from the backup
identifiable information (PII),
repository. Data masking
financial data, and protected
effectively protects sensitive data
health information (PHI),
stored in backups, reducing the
remains unencrypted and
risk of data breaches and
4 Data Masking exposed in backups. This can
unauthorized access. By replacing
make backups a prime target for
sensitive information with
cyberattacks, increasing the risk
fictitious or randomized data,
of data breaches. Note: A script
organizations can safeguard
to anonymize VBR log has been
Data Security confidential information even if
created by a user in Veeam
backups fall into the wrong hands.
Community but not by the OEM
TCO
Commvault offers flexible, granular Veeam also offers flexible,
licensing of specific data services granular licensing aligned to use
aligned to use cases. cases.
Commvault allows customers to
TCO
enable specific capabilities
matched to immediate needs, with
20 Licensing Veeam's similar modular
the flexibility to adopt additional
approach provides better total
services over time.
cost alignment as customers
Commvault's modular approach only pay for the capabilities
provides better total cost used.
alignment as customers only pay
for the capabilities used.
Commvault can perform warm site
recovery where it can replicates a
Veeam will need 1:1 capacity at
source VM without creating a
each replication site resulting in
21 Site Recovery destination VM on the disaster
very high TCO compared to
recovery (DR) site.
Commvault.
No usage of DR site resources and
cost until failover.
22 DD boost Integration Supported Supported
23 Client Side deduplication DD boost SDK Veeam Client side dedup