My main use case for Dell PowerProtect Cyber Recovery is total resiliency against cyber attacks.
Dell PowerProtect Cyber Recovery Solution for AWS
Dell TechnologiesReviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Recovery from cyber attacks has become faster and more reliable with strong data isolation and encryption
What is our primary use case?
What is most valuable?
The feature I like the most about Dell PowerProtect Cyber Recovery is that we get top-of-the-line cyber attack scanning, and we get total retention locking on our media.
The benefits of those features for our company are that we know we can recover from a cyber attack at any time.
What needs improvement?
As for how the solution can be improved, I would like the features to be more integrated, and I have discussed that with our account team. I would like more visibility into what is going on with the individual backup images and how they are being scanned, so there are some automation and visibility features that could be enhanced.
For how long have I used the solution?
I have been using Dell PowerProtect Cyber Recovery for just a few years.
What do I think about the stability of the solution?
The stability and reliability of Dell PowerProtect Cyber Recovery are very good, as we have not had any outages on it, just a couple of minor issues but nothing major.
What do I think about the scalability of the solution?
Our solution is scalable, and we just scaled it recently by adding memory.
How are customer service and support?
Technical support has been pretty good; however, I would like to see better integration with Dell support and the third-party integration for the scanning part of it, specifically Index Engines, but we are getting there.
I would rate the support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I was not using another solution that does the same before choosing Dell PowerProtect Cyber Recovery.
How was the initial setup?
The deployment process was straightforward because we partnered with Dell on the deployment, allowing us to get that done with Dell's assistance.
What about the implementation team?
Integrating Dell PowerProtect Cyber Recovery into our existing IT infrastructure is not that difficult because we were using Dell backups in our infrastructure.
What was our ROI?
The biggest return on investment for me when using Dell PowerProtect Cyber Recovery is that if we had an attack, we would be able to recover in hours instead of weeks or months, which is a lot of risk reduction.
What's my experience with pricing, setup cost, and licensing?
The pricing for Dell PowerProtect Cyber Recovery is acceptable due to our enterprise licensing agreement, so a lot of what we do is built into the license, although some of the licensing of the hardware could be better because as we go into the bigger hardware, the price per terabyte is a little more, but it is something we are working with our account team to address.
Which other solutions did I evaluate?
While I was using Dell PowerProtect Cyber Recovery, the team was looking at other solutions, but this was definitely the most resilient.
What other advice do I have?
My impression of the administrative interface of Dell PowerProtect Cyber Recovery is that it is very user-friendly and pretty intuitive.
Regarding the solution's ability to automate data recovery tasks, we have not had to do mass recoveries yet, but we know we can do it with the tool and we do restores out of Networker.
Dell PowerProtect Cyber Recovery is absolutely able to protect our company's critical data.
We know how it protects our critical data because we are watching it all the time; it is locking snapshots, protecting and isolating our backups, and we know our backups are there if we need to recover.
We are using the recent feature addition for enhancing data encryption.
As far as I know, the feature has been good because it encrypts the data.
My advice for someone or some company that is considering the solution is to understand the manpower involved because it does require a lot of attention; it does not run by itself. Once it is set up, it does run, but it requires quite a bit of admin.
I would rate this product an eight out of ten overall.