SlideShare a Scribd company logo
1 of 6
Download to read offline
NEC UNIVERGE BLUE BACKUP & RECOVER
Product Brief
Evaluator Series Research - May 19, 2021
Page
1 of 6
© 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form
without prior written permission is prohibited.
Overview – NEC UNIVERGE BLUE BACKUP &
RECOVER
NEC UNIVERGE BLUE is a suite of cloud-delivered managed services, ranging from Unified
Communications such a voice, video conferencing and messaging to Data Services such as contact
center, and Backup and Disaster Recovery services. From a data protection standpoint, NEC UNIVERGE
BLUE offers backup and recovery-as-a-service (UNIVERGE BLUE BACKUP) and disaster recovery-as-a-
service (UNIVERGE BLUE RECOVER).
Technology
• Overview:
o NEC UNIVERGE BLUE managed data protection services leverage industry leading data
protection software, and NEC hardware infrastructure (HYDRAstor® systems often serve
as the storage target). Both the industry leading backup software and NEC HYDRAstor are
covered in depth in Evaluator Group’s Data Protection Software and Systems coverage,
respectively.
o Rather than being one-size-fits-all, supporting infrastructure, including servers required
to run the backup software and target storage systems, is configured per customers’
specific requirements. The infrastructure is hosted in a wide range of data centers
including Iron Mountain data centers, which are geographically dispersed and located 220
feet underground in western Pennsylvania and northern Virginia. Additional details on
Iron Mountain’s security and data escrow services offered under UNIVERGE BLUE
BACKUP & RECOVER are included in the “Security and Compliance” and “Data
Management” section of this document.
• Supported sources for protection:
o Windows®, Linux® and UNIX® physical systems
o Entire VMs (KVM, Microsoft Hyper-V, VMware ESXi)
o Files and folders
o Active Directory objects
o Microsoft Exchange and SQL; MySQL; SAP HANA; and Oracle databases
o Microsoft 365 and Salesforce (via API plugins)
 Microsoft 365 sources include mailboxes (and entire folders, entire calendars, or
individual contacts, calendar entries, or messages), OneDrive and SharePoint.
o HPE Nimble and NetApp storage systems
 Snapshots can be controlled and orchestrated to another storage system
o Kubernetes and Red Hat Openshift clusters
• Cloud Support and Replication:
o Via the backup software, complete on-premises data and entire VMs can be backed up to
and recovered from the cloud. Additionally, complete off-premises data can be backed up
NEC UNIVERGE BLUE BACKUP & RECOVER
Product Brief
Evaluator Series Research - May 19, 2021
Page
2 of 6
© 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form
without prior written permission is prohibited.
within Google, AWS and Azure clouds, and restored to same Clouds, and other locations
as well as to NEC RECOVER resources. VM snapshots can be replicated in AWS and Azure,
between regions – and across clouds as well. This means that a major outage in one cloud
would not preclude access to the data/workload (a key concern that customers
frequently raise to Evaluator Group). Additionally, in the event of a disaster – such as the
customer’s entire cloud data store being wiped out – the workload can be spun up in the
NEC Iron Mountain data center as a Best Effort or under a Service Level Agreement.
o Via the Backup software, NEC’s service supports VMware-to-VMware VM replication,
leveraging either a secondary on-premises data center, cloud data center, or the NEC Iron
Mountain data center as the target. Recovery points are still retained, so that the failback
point is preserved. In the event of a ransomware attack, the solution communicates
between two disconnected sites by using backup software gateways/proxies, as opposed
to requiring a VPN connection.
o Most major databases, including SQL and HANA, can also be replicated. Application and
file replication features may be used to do a migration.
o AWS Glacier, Azure Blob,GCP and NEC BACKUP/S3 cloud storage can be used for data
retention. Meanwhile, the NEC Iron Mountain data center can serve as an offsite,
disconnected copy for protection against ransomware and other malicious attacks and for
adherence to “3-2-1” backup best practices. The Backup software provides analytics to
understand data that has not been accessed for a specified period of time and
automatically offload that data (deleting or leaving a stub behind for the on-premises
production system) – and to be able to analyze for risky data, as well.
• Security and Compliance:
o NEC Iron Mountain data centers are energy efficient and comply with a range of security
regulations, including:
 Data Center Level 4 Security as defined by the U.S. Department of Justice
 HIPAA, ISO 27001, PCI-DSS 3.1, SOC 2 Type II, FCC and FINRA information security
standards
 FISMA High-Security for Federal Clients
 SOC 2 certification
o For additional security, access control lists are documented and provided to customers,
and Iron Mountain is leveraged for SoC audits and Cyber Security Insurance.
Furthermore, NEC proactively audits metrics such as backup failures so that the customer
does not have to. Anomaly detection for the identification of unexpected activity that
could signify a ransomware attack (and proactive notification to customers of any
anomalies), as well as Advanced Encryption Standard (AES) encryption of data in flight
and at rest, are also included. For customers with large environments and limited
network bandwidth, NEC will deploy a dedicated UNIVERGE BLUE BACKUP Virtual or
Physical Appliance for the customer (as opposed to a multitenant model). This ensures
that local data is deduplicated before secure transmission reducing network bandwidth
requirements, as well as delivers a local short-term copy of data.
NEC UNIVERGE BLUE BACKUP & RECOVER
Product Brief
Evaluator Series Research - May 19, 2021
Page
3 of 6
© 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form
without prior written permission is prohibited.
Management
NEC UNIVERGE BLUE data protection services may be customer-operated, or they can be delivered as a
fully managed service from NEC or an NEC partner. This research focuses on the latter delivery model, in
which hardware and software are deployed, operated, and maintained (including upgrades) by NEC.
Additionally, NEC handles the configuration for all backup jobs (which are automated), and recoveries
can occur as an explicitly triggered event, executed either directly by the customer, or by NEC jobs. The
customer designates customized recovery point objectives (RPOs) and recovery time objectives (RTOs)
for both backup and archive data. When NEC handles the execution of recoveries, service levels may
range from guaranteed real-time (highest cost), to best efforts (lowest cost). Tracking is available for
audit and compliance purposes. Status and performance reports are delivered on a daily or monthly
basis to the customer and available through the NEC UNIVEGE BLUE COMMAND Portal.
Support
NEC manages protection jobs and provides recovery services via its Network Operations Center (NOC),
which is fully staffed and available for customer assistance 24 hours per day, seven days per week, 365
days per year. Customers and Channel Partners have the option to call directly into the NOC or email for
support and restoration services. Additionally, NEC offers a self-help portal to provide guidance on how
to utilize the UNIVERGE BLUE COMMAND Portal to restore data. According to NEC, a ticket is created
upon the email request, phone request or by NEC in the event a failure occurred in a backup job (a
differentiator when other service providers might require multiple hours or a full day to begin working
on a request from when the ticket is created.
Additionally, NEC, in partnership with Iron Mountain Escrow services, offer software and business
continuity escrow, whereby if the channel or SaaS provider experiences a defined Escrow event (for
example, due to bankruptcy, obsolescence, merger or acquisition), the End User customer continues to
have access to the technology and to their data.
Acquisition Model and Availability
The UNIVERGE BLUE go-to-market model was initially established in 2011 as a direct sales model by
NEC, and in 2020 was introduced to NEC’s channel , leveraging thousands of resellers and systems
integrators.
Add-on Services
NEC offers additional managed data center infrastructure solutions, including rental of Enterprise Class
HYDRAstor Storage Systems, and a suite of Cyber Security services which BACKUP & RECOVER is a part
of.
NEC UNIVERGE BLUE BACKUP & RECOVER
Product Brief
Evaluator Series Research - May 19, 2021
Page
4 of 6
© 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form
without prior written permission is prohibited.
Pricing
NEC offers a variety of pricing options designed to meet any BACKUP and RECOVER requirement and
promotes Deduplicated storage usage as the underlying basis for the bill. Pricing includes options for
fixed or monthly variable storage consumption, as well as VM, File, Application and HYBRID Cloud API
charges. The customers have the option to hold Monthly, Annual, 3-Year and 5-Year contract terms –
each of which present a lower price for longer term commitments. NEC also offers discounts for pre-
payment for the service in advance. On occasion, NEC offers UNIVERGE BLUE BACKUP bundled with
other UNIVERGE BLUE CLOUD SERVICES.
Evaluator Group EvaluScale™: NEC UNIVERGE BLUE BACKUP
& RECOVER
Criteria Description
EG View of NEC
UNIVERGE BLUE
BACKUP &
RECOVER
Explanation for NEC UNIVERGE BLUE
BACKUP & RECOVER
1
Services Offered
Breadth of installation,
management, and data
protection services offered
by vendor. Includes
geographic availability and
optional, add-on services.
Meets
Requirements
Full deployment and management
including status and performance reporting
to the customer. U.S. availability via
Magna5, with a range of available add-on
services.
2
Vendor Support
Level of responsiveness;
single-vendor support. Exceeds
Requirements
Can be managed by the customer or fully
managed by NEC, with 24/7/365 support by
NEC. Per NEC, typically starts working on
customer requests within 15 minutes.
3 Contract Flexibility
and Minimum
Commitments
Commitments (e.g.,
minimum dollar volume) and
other contract terms
required.
Meets
Requirements
Contracts are minimum one year,
maximum five year. Requires 60 day
cancellation.
4
Infrastructure
Flexibility
Variety of configuration
options for supporting
infrastructure.
Exceeds
Requirements
Custom infrastructure integration based on
a variety of configurations. No need to
upgrade hardware and software.
5
Supported Sources
and Targets
Variety and
comprehensiveness of data
sources that can be
protected – as well as of
backup and archive/LTR
targets supported.
Exceeds
Requirements
Supports public clouds, virtual machines
(VMs), NAS arrays, block storage arrays, file
servers, and data in persistent containers.
Supported storage targets includes NAS,
VTL, tape devices, block storage arrays,
object storage, and public clouds.
6
Disaster Recovery
and Data Resiliency
Backup and recovery,
replication, HA, RAID,
erasure coding, recovery
testing, data integrity.
Exceeds
Requirements
RPOs and RTOs are customizable by the
customer. Backups and recoveries are
executed automatically or manually.
Includes a variety of replication capabilities
and options for recovery location. High
NEC UNIVERGE BLUE BACKUP & RECOVER
Product Brief
Evaluator Series Research - May 19, 2021
Page
5 of 6
© 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form
without prior written permission is prohibited.
availability (HA) operation is possible with
specific configuration. Can automatically
test and verify backups of physical servers
for restorability. Can also automatically test
failover and failback.
7
Economics
Licensing options and data
reduction (e.g., compression,
deduplication).
Exceeds
Requirements
Compression, global dedupe, ability to
optimize for network bandwidth
consumption. The customer pays for
deduped data stored.
8
Data Management
Services
Data cataloging, the ability to
search for and identify
specific files, policy-based
automation.
Technology and DRaaS
Escrow Service
Exceeds
Requirements
Protection policies can be applied
automatically across the resources under
management. Can automatically tier data
to archive/long-term retention storage
using NEC BACKUP/S3 or other storage
targets. Metadata cataloging, mapping, and
search across locations. Policy-based
automation of protection and lifecycle
management.
Business Continuity option where NEC and
Iron Mountain utilize Technology Escrow
Agreements to transfer ownership of
software and end user data, as a disaster
recovery event.
9
Security and
Compliance
Encryption, immutability,
authentication and access
control, documented ability
to facilitate compliance with
required regulations,
anomaly detection.
Meets
Requirements
Encryption, anomaly detection. Satisfies 3-
2-1 requirements (immutability and
isolation. Analytics and
oversight/governance for compliance data.
Facilitates compliance with a range of
security regulations.
10 Billing/
Procurement
Variety of options (fixed or
variable pricing, pay-as-you-
go, etc.).
Meets
Requirements
Option for fixed or variable pricing. Pay as
you go for storage consumed.
Evaluator Group Opinion:
In a market looking to streamline data protection operations as much as possible, NEC UNIVERGE BLUE
BACKUP & RECOVER is truly a managed service, offloading management of protection jobs and
infrastructure alike as well as highly responsive support. Its underlying infrastructure support – including
for the hardware used to run the backup software – is flexible, allowing the service to meet a variety of
budgets and protection levels. Additionally, its collaboration with Iron Mountain for escrow support is a
differentiator among peers.
Copyright 2021 Evaluator Group, Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying and recording, or stored in a database or retrieval system for any purpose without the express written consent of Evaluator
NEC UNIVERGE BLUE BACKUP & RECOVER
Product Brief
Evaluator Series Research - May 19, 2021
Page
6 of 6
© 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form
without prior written permission is prohibited.
Group Inc. The information contained in this document is subject to change without notice. Evaluator Group assumes no responsibility for
errors or omissions. Evaluator Group makes no expressed or implied warranties in this document relating to the use or operation of the
products described herein. In no event shall Evaluator Group be liable for any indirect, special, inconsequential or incidental damages
arising out of or associated with any aspect of this publication, even if advised of the possibility of such damages. The Evaluator Series is a
trademark of Evaluator Group, Inc. All other trademarks are the property of their respective companies.
EvaluScale™ is a methodology developed by Evaluator Group to determine the value offered by a product within a technology
area. Evaluation criteria are developed through IT client engagements and an understanding system usage. The definitions of the criteria
and explanations of how products are reviewed can be found in the Evaluator Group Evaluation Guide, which is reflected in the EvaluScale
published in individual Product Briefs. The EvaluScale for each product is determined through in-depth review and analysis attained from
vendor interviews, reviews of user / administration guides, hands-on testing and/or client engagements.

More Related Content

What's hot

Xeon e5-cloud-solution-brief
Xeon e5-cloud-solution-briefXeon e5-cloud-solution-brief
Xeon e5-cloud-solution-brief
iforeman
 
Broadview-Networks-Brochure
Broadview-Networks-BrochureBroadview-Networks-Brochure
Broadview-Networks-Brochure
Pat McMichael
 

What's hot (20)

NEC’s Smart Enterprise Solutions - Did You Know That…
NEC’s Smart Enterprise Solutions - Did You Know That…NEC’s Smart Enterprise Solutions - Did You Know That…
NEC’s Smart Enterprise Solutions - Did You Know That…
 
Dimension Data Cloud Demo
Dimension Data Cloud DemoDimension Data Cloud Demo
Dimension Data Cloud Demo
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
SoftwareONE case study
SoftwareONE case studySoftwareONE case study
SoftwareONE case study
 
VMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonVMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware Horizon
 
Dimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingDimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution Offering
 
Bilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business Growth
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 
Dataplex MS UC Event Presentation 22062010
Dataplex MS UC Event Presentation 22062010Dataplex MS UC Event Presentation 22062010
Dataplex MS UC Event Presentation 22062010
 
VDI Cost benefit analysis
VDI Cost benefit analysisVDI Cost benefit analysis
VDI Cost benefit analysis
 
MT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch OfficeMT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch Office
 
iland Cloud Infrastructure
iland Cloud Infrastructureiland Cloud Infrastructure
iland Cloud Infrastructure
 
Xeon e5-cloud-solution-brief
Xeon e5-cloud-solution-briefXeon e5-cloud-solution-brief
Xeon e5-cloud-solution-brief
 
Broadview-Networks-Brochure
Broadview-Networks-BrochureBroadview-Networks-Brochure
Broadview-Networks-Brochure
 
Data160910 dataplex and ip expo
Data160910   dataplex and ip expoData160910   dataplex and ip expo
Data160910 dataplex and ip expo
 
Citrix synergy updates 2010
Citrix synergy updates 2010Citrix synergy updates 2010
Citrix synergy updates 2010
 
MT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of viewMT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of view
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
 
Mt14 building your cloud
Mt14 building your cloudMt14 building your cloud
Mt14 building your cloud
 

Similar to Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief

Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
Symantec
 
twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633
Arush Jain
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
Mike Alvarado
 
Discover Neo4j Aura Workshop (9.27.23).pptx
Discover Neo4j Aura Workshop (9.27.23).pptxDiscover Neo4j Aura Workshop (9.27.23).pptx
Discover Neo4j Aura Workshop (9.27.23).pptx
Neo4j
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
Symantec
 

Similar to Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief (20)

NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupDATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633
 
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX	CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
 
Keeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads ProtectedKeeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads Protected
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
KastenVeeam-5kubernetes-backup-best-practices-final.pdf
KastenVeeam-5kubernetes-backup-best-practices-final.pdfKastenVeeam-5kubernetes-backup-best-practices-final.pdf
KastenVeeam-5kubernetes-backup-best-practices-final.pdf
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
 
High Res CIO Review Article
High Res CIO Review ArticleHigh Res CIO Review Article
High Res CIO Review Article
 
Discover Neo4j Aura Workshop (9.27.23).pptx
Discover Neo4j Aura Workshop (9.27.23).pptxDiscover Neo4j Aura Workshop (9.27.23).pptx
Discover Neo4j Aura Workshop (9.27.23).pptx
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
B.А.А.Е.R. Oracle Cloud Services 2017
B.А.А.Е.R. Oracle Cloud Services 2017B.А.А.Е.R. Oracle Cloud Services 2017
B.А.А.Е.R. Oracle Cloud Services 2017
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 

More from InteractiveNEC

Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023
InteractiveNEC
 

More from InteractiveNEC (20)

Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)
 
Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023
 
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
 
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
 
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
 
Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.
 
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
 
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
 
Creating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkCreating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid Work
 
(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments
 
UNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelUNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work model
 
Smart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceSmart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest Experience
 
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
 
Preview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsPreview: Taking Travel to New Heights
Preview: Taking Travel to New Heights
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
 
5 Must-Have Productivity Tools to Support Your Modern Workforce
5 Must-Have Productivity Tools to Support Your Modern Workforce 5 Must-Have Productivity Tools to Support Your Modern Workforce
5 Must-Have Productivity Tools to Support Your Modern Workforce
 
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief

  • 1. NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief Evaluator Series Research - May 19, 2021 Page 1 of 6 © 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited. Overview – NEC UNIVERGE BLUE BACKUP & RECOVER NEC UNIVERGE BLUE is a suite of cloud-delivered managed services, ranging from Unified Communications such a voice, video conferencing and messaging to Data Services such as contact center, and Backup and Disaster Recovery services. From a data protection standpoint, NEC UNIVERGE BLUE offers backup and recovery-as-a-service (UNIVERGE BLUE BACKUP) and disaster recovery-as-a- service (UNIVERGE BLUE RECOVER). Technology • Overview: o NEC UNIVERGE BLUE managed data protection services leverage industry leading data protection software, and NEC hardware infrastructure (HYDRAstor® systems often serve as the storage target). Both the industry leading backup software and NEC HYDRAstor are covered in depth in Evaluator Group’s Data Protection Software and Systems coverage, respectively. o Rather than being one-size-fits-all, supporting infrastructure, including servers required to run the backup software and target storage systems, is configured per customers’ specific requirements. The infrastructure is hosted in a wide range of data centers including Iron Mountain data centers, which are geographically dispersed and located 220 feet underground in western Pennsylvania and northern Virginia. Additional details on Iron Mountain’s security and data escrow services offered under UNIVERGE BLUE BACKUP & RECOVER are included in the “Security and Compliance” and “Data Management” section of this document. • Supported sources for protection: o Windows®, Linux® and UNIX® physical systems o Entire VMs (KVM, Microsoft Hyper-V, VMware ESXi) o Files and folders o Active Directory objects o Microsoft Exchange and SQL; MySQL; SAP HANA; and Oracle databases o Microsoft 365 and Salesforce (via API plugins)  Microsoft 365 sources include mailboxes (and entire folders, entire calendars, or individual contacts, calendar entries, or messages), OneDrive and SharePoint. o HPE Nimble and NetApp storage systems  Snapshots can be controlled and orchestrated to another storage system o Kubernetes and Red Hat Openshift clusters • Cloud Support and Replication: o Via the backup software, complete on-premises data and entire VMs can be backed up to and recovered from the cloud. Additionally, complete off-premises data can be backed up
  • 2. NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief Evaluator Series Research - May 19, 2021 Page 2 of 6 © 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited. within Google, AWS and Azure clouds, and restored to same Clouds, and other locations as well as to NEC RECOVER resources. VM snapshots can be replicated in AWS and Azure, between regions – and across clouds as well. This means that a major outage in one cloud would not preclude access to the data/workload (a key concern that customers frequently raise to Evaluator Group). Additionally, in the event of a disaster – such as the customer’s entire cloud data store being wiped out – the workload can be spun up in the NEC Iron Mountain data center as a Best Effort or under a Service Level Agreement. o Via the Backup software, NEC’s service supports VMware-to-VMware VM replication, leveraging either a secondary on-premises data center, cloud data center, or the NEC Iron Mountain data center as the target. Recovery points are still retained, so that the failback point is preserved. In the event of a ransomware attack, the solution communicates between two disconnected sites by using backup software gateways/proxies, as opposed to requiring a VPN connection. o Most major databases, including SQL and HANA, can also be replicated. Application and file replication features may be used to do a migration. o AWS Glacier, Azure Blob,GCP and NEC BACKUP/S3 cloud storage can be used for data retention. Meanwhile, the NEC Iron Mountain data center can serve as an offsite, disconnected copy for protection against ransomware and other malicious attacks and for adherence to “3-2-1” backup best practices. The Backup software provides analytics to understand data that has not been accessed for a specified period of time and automatically offload that data (deleting or leaving a stub behind for the on-premises production system) – and to be able to analyze for risky data, as well. • Security and Compliance: o NEC Iron Mountain data centers are energy efficient and comply with a range of security regulations, including:  Data Center Level 4 Security as defined by the U.S. Department of Justice  HIPAA, ISO 27001, PCI-DSS 3.1, SOC 2 Type II, FCC and FINRA information security standards  FISMA High-Security for Federal Clients  SOC 2 certification o For additional security, access control lists are documented and provided to customers, and Iron Mountain is leveraged for SoC audits and Cyber Security Insurance. Furthermore, NEC proactively audits metrics such as backup failures so that the customer does not have to. Anomaly detection for the identification of unexpected activity that could signify a ransomware attack (and proactive notification to customers of any anomalies), as well as Advanced Encryption Standard (AES) encryption of data in flight and at rest, are also included. For customers with large environments and limited network bandwidth, NEC will deploy a dedicated UNIVERGE BLUE BACKUP Virtual or Physical Appliance for the customer (as opposed to a multitenant model). This ensures that local data is deduplicated before secure transmission reducing network bandwidth requirements, as well as delivers a local short-term copy of data.
  • 3. NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief Evaluator Series Research - May 19, 2021 Page 3 of 6 © 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited. Management NEC UNIVERGE BLUE data protection services may be customer-operated, or they can be delivered as a fully managed service from NEC or an NEC partner. This research focuses on the latter delivery model, in which hardware and software are deployed, operated, and maintained (including upgrades) by NEC. Additionally, NEC handles the configuration for all backup jobs (which are automated), and recoveries can occur as an explicitly triggered event, executed either directly by the customer, or by NEC jobs. The customer designates customized recovery point objectives (RPOs) and recovery time objectives (RTOs) for both backup and archive data. When NEC handles the execution of recoveries, service levels may range from guaranteed real-time (highest cost), to best efforts (lowest cost). Tracking is available for audit and compliance purposes. Status and performance reports are delivered on a daily or monthly basis to the customer and available through the NEC UNIVEGE BLUE COMMAND Portal. Support NEC manages protection jobs and provides recovery services via its Network Operations Center (NOC), which is fully staffed and available for customer assistance 24 hours per day, seven days per week, 365 days per year. Customers and Channel Partners have the option to call directly into the NOC or email for support and restoration services. Additionally, NEC offers a self-help portal to provide guidance on how to utilize the UNIVERGE BLUE COMMAND Portal to restore data. According to NEC, a ticket is created upon the email request, phone request or by NEC in the event a failure occurred in a backup job (a differentiator when other service providers might require multiple hours or a full day to begin working on a request from when the ticket is created. Additionally, NEC, in partnership with Iron Mountain Escrow services, offer software and business continuity escrow, whereby if the channel or SaaS provider experiences a defined Escrow event (for example, due to bankruptcy, obsolescence, merger or acquisition), the End User customer continues to have access to the technology and to their data. Acquisition Model and Availability The UNIVERGE BLUE go-to-market model was initially established in 2011 as a direct sales model by NEC, and in 2020 was introduced to NEC’s channel , leveraging thousands of resellers and systems integrators. Add-on Services NEC offers additional managed data center infrastructure solutions, including rental of Enterprise Class HYDRAstor Storage Systems, and a suite of Cyber Security services which BACKUP & RECOVER is a part of.
  • 4. NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief Evaluator Series Research - May 19, 2021 Page 4 of 6 © 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited. Pricing NEC offers a variety of pricing options designed to meet any BACKUP and RECOVER requirement and promotes Deduplicated storage usage as the underlying basis for the bill. Pricing includes options for fixed or monthly variable storage consumption, as well as VM, File, Application and HYBRID Cloud API charges. The customers have the option to hold Monthly, Annual, 3-Year and 5-Year contract terms – each of which present a lower price for longer term commitments. NEC also offers discounts for pre- payment for the service in advance. On occasion, NEC offers UNIVERGE BLUE BACKUP bundled with other UNIVERGE BLUE CLOUD SERVICES. Evaluator Group EvaluScale™: NEC UNIVERGE BLUE BACKUP & RECOVER Criteria Description EG View of NEC UNIVERGE BLUE BACKUP & RECOVER Explanation for NEC UNIVERGE BLUE BACKUP & RECOVER 1 Services Offered Breadth of installation, management, and data protection services offered by vendor. Includes geographic availability and optional, add-on services. Meets Requirements Full deployment and management including status and performance reporting to the customer. U.S. availability via Magna5, with a range of available add-on services. 2 Vendor Support Level of responsiveness; single-vendor support. Exceeds Requirements Can be managed by the customer or fully managed by NEC, with 24/7/365 support by NEC. Per NEC, typically starts working on customer requests within 15 minutes. 3 Contract Flexibility and Minimum Commitments Commitments (e.g., minimum dollar volume) and other contract terms required. Meets Requirements Contracts are minimum one year, maximum five year. Requires 60 day cancellation. 4 Infrastructure Flexibility Variety of configuration options for supporting infrastructure. Exceeds Requirements Custom infrastructure integration based on a variety of configurations. No need to upgrade hardware and software. 5 Supported Sources and Targets Variety and comprehensiveness of data sources that can be protected – as well as of backup and archive/LTR targets supported. Exceeds Requirements Supports public clouds, virtual machines (VMs), NAS arrays, block storage arrays, file servers, and data in persistent containers. Supported storage targets includes NAS, VTL, tape devices, block storage arrays, object storage, and public clouds. 6 Disaster Recovery and Data Resiliency Backup and recovery, replication, HA, RAID, erasure coding, recovery testing, data integrity. Exceeds Requirements RPOs and RTOs are customizable by the customer. Backups and recoveries are executed automatically or manually. Includes a variety of replication capabilities and options for recovery location. High
  • 5. NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief Evaluator Series Research - May 19, 2021 Page 5 of 6 © 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited. availability (HA) operation is possible with specific configuration. Can automatically test and verify backups of physical servers for restorability. Can also automatically test failover and failback. 7 Economics Licensing options and data reduction (e.g., compression, deduplication). Exceeds Requirements Compression, global dedupe, ability to optimize for network bandwidth consumption. The customer pays for deduped data stored. 8 Data Management Services Data cataloging, the ability to search for and identify specific files, policy-based automation. Technology and DRaaS Escrow Service Exceeds Requirements Protection policies can be applied automatically across the resources under management. Can automatically tier data to archive/long-term retention storage using NEC BACKUP/S3 or other storage targets. Metadata cataloging, mapping, and search across locations. Policy-based automation of protection and lifecycle management. Business Continuity option where NEC and Iron Mountain utilize Technology Escrow Agreements to transfer ownership of software and end user data, as a disaster recovery event. 9 Security and Compliance Encryption, immutability, authentication and access control, documented ability to facilitate compliance with required regulations, anomaly detection. Meets Requirements Encryption, anomaly detection. Satisfies 3- 2-1 requirements (immutability and isolation. Analytics and oversight/governance for compliance data. Facilitates compliance with a range of security regulations. 10 Billing/ Procurement Variety of options (fixed or variable pricing, pay-as-you- go, etc.). Meets Requirements Option for fixed or variable pricing. Pay as you go for storage consumed. Evaluator Group Opinion: In a market looking to streamline data protection operations as much as possible, NEC UNIVERGE BLUE BACKUP & RECOVER is truly a managed service, offloading management of protection jobs and infrastructure alike as well as highly responsive support. Its underlying infrastructure support – including for the hardware used to run the backup software – is flexible, allowing the service to meet a variety of budgets and protection levels. Additionally, its collaboration with Iron Mountain for escrow support is a differentiator among peers. Copyright 2021 Evaluator Group, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written consent of Evaluator
  • 6. NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief Evaluator Series Research - May 19, 2021 Page 6 of 6 © 2021 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited. Group Inc. The information contained in this document is subject to change without notice. Evaluator Group assumes no responsibility for errors or omissions. Evaluator Group makes no expressed or implied warranties in this document relating to the use or operation of the products described herein. In no event shall Evaluator Group be liable for any indirect, special, inconsequential or incidental damages arising out of or associated with any aspect of this publication, even if advised of the possibility of such damages. The Evaluator Series is a trademark of Evaluator Group, Inc. All other trademarks are the property of their respective companies. EvaluScale™ is a methodology developed by Evaluator Group to determine the value offered by a product within a technology area. Evaluation criteria are developed through IT client engagements and an understanding system usage. The definitions of the criteria and explanations of how products are reviewed can be found in the Evaluator Group Evaluation Guide, which is reflected in the EvaluScale published in individual Product Briefs. The EvaluScale for each product is determined through in-depth review and analysis attained from vendor interviews, reviews of user / administration guides, hands-on testing and/or client engagements.