sb-au logo
Story image

Veritas and Pure Storage team up to reduce downtime for applications and services

19 Sep 2019

Today Pure Storage’s annual user conference, enterprise data protection and software-defined storage company Veritas Technologies announced an expansion of its collaborative solutions for customers that include application resiliency, data analytics, and long-term retention.

These solutions provide customers with business continuity for mission-critical applications, and storage optimisation using Veritas data analytics and long-term retention solutions.

Since announcing their collaboration in October 2018, Veritas and Pure Storage have provided joint customers with backup and recovery for both on-premises and cloud environments.

Veritas’ NetBackup integrated snapshot-based protection for Pure Storage’s FlashArray has helped customers guard against ransomware and data loss.

The integration of the Pure Storage FlashBlade as a storage target to Veritas enables data protection and rapid restore for mission-critical workloads.

In addition, shared customers can leverage FlashBlade as a Data Hub for streaming analytics and AI cluster projects with Veritas NetBackup providing data protection.

Three new integrations just announced extend the collaboration across the Veritas Enterprise Data Services platform providing Veritas and Pure Storage customers with business continuity for mission-critical apps and unprecedented insights into data and infrastructure.

  • The Pure Storage FlashArray now integrates with Veritas InfoScale to deliver performance and round-the-clock availability for the most demanding applications.
  • Pure Storage products now integrate with Veritas APTARE IT Analytics, providing customers with data insights to optimise capacity, utilisation and performance and streamline compliance with an increasing number of data regulations.
  • The Veritas Access Appliance provides a resilient and cost-effective solution for the preservation of FlashArray data snapshots for long-term retention.

“Enterprises today need the agility to scale, analyse and protect data critical to their businesses,” says Pure Storage FlashArray general manager Prakash Darji.

“Integrating our services and solutions with Veritas will continue to provide our customers with access to the information they need to run business efficiently.”

Since the partnership began, customers have seen optimised RPO and RTO for critical and highly transactional applications through Pure Storage’s architecture.

Veritas integration with Pure Storage has provided customers with consistent, reliable data recovery with point-in-time copies, and faster backups at peak performance without lengthy snapshot windows and application time-outs.

“Data is paramount to the success of modern businesses, but as IT environments grow in complexity, and more and more data is filtered in, businesses struggle to align infrastructure spend with the right data protection,” says Veritas global cloud and technology alliances vice president Peter McNamara.

Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More
Story image
Interview: Blockchain's opportunities for NGOs, charities & not-for-profits
The third ledger' could transform the way that organisations interact with each other, says Dr Sanjaya Kuruppu.More
Story image
Report: Brute-force attacks feed on remote working vulnerabilities
A new report from ESET has detailed the extent to which attackers employ brute-force tactics to infiltrate remote desktop protocols.More
Story image
Research: Rapid growth of embedded security market inevitable
With the rise of IoT, as cybercriminals find new ways to gain access to devices, new secure embedded hardware can block their points of entry.More
Link image
Network on TAP: Visibility made easy
Test Access Points (TAPS) connect to cabling infrastructure to conduct packet monitoring – and they’re the most effective way to copy traffic across a system. Put this tried-and-true visibility device to work for you today.More