Novell eDirectory Backup
Unitrends offers enterprise-class granular backup and recovery at the deep virtual and physical level for Novell eDirectory as well as virtual protection at the hypervisor level.
Deep Virtual and Physical Novell eDirectory Backup
Unitrends protects Novell eDirectory natively. Native protection means that the user has the option of deep virtual protection when Novell eDirectory is operating within a virtual machine and physical protection when Novell eDirectory is operating on a physical server. Features of our deep virtual and physical protection of Novell eDirectory include:
- Full/Differential, Full/Incremental and Forever Incremental backup schedules.
- Application-aware, adaptive deduplication for reduced footprint and backup/replication windows.
- Application consistent backups.
- Reduced snapshot overhead in virtual environments.
- Granular file and folder exclusion .
- Protection for physical RDM, iSCSI pass-through, and independent persistent disk configurations in VMware vSphere environments.
Virtual Novell eDirectory Backup
Unitrends protects Novell eDirectory in virtual environments at the hypervisor level. Features of our hypervisor-level virtual protection of Novell eDirectory include:
- Reduced management overhead via hypervisor level API integration.
- Direct SAN backup and recovery.
- Single-step, Instant Recovery for VMs.
- Rollback Recovery: Incremental data restore over existing VMs.
- Granular recovery: Virtual disks, Files, Folders.
- VM replicas.
- Global deduplication for reduced footprint and backup/replication windows.
- Automatic VM discovery.
We offer recovery assurance for deep virtual and physical Exchange environments via our auditing technology and complete automation and orchestration at the application- and operating system-level for VMware with our ReliableDR recovery assurance and disaster recovery product.
Unitrends offers its Unified Data Protection engine to provide deep virtual and physical (native) protection for over 200 different versions of applications, hypervisors, operating systems, servers, and storage. A complete listing of what we protect may be found on the What We Protect overview page.