Oracle Database

Oracle Database Backup

Unitrends offers enterprise-class granular backup and recovery at the deep virtual and physical level for Oracle Database on Windows, Linux and Solaris as well as virtual protection at the hypervisor level.

Deep Virtual and Physical Oracle Backup

Unitrends protects Oracle Database natively. Native protection means that the user has the option of deep virtual protection when Oracle is operating within a virtual machine and physical protection when Oracle Database is operating on a physical server. Features of our deep virtual and physical protection of Oracle include:

  • Supports Oracle RMAN for backup and recovery operations.
  • Full, differential, and transaction log backups for Oracle.
  • Application-aware, adaptive deduplication for reduced footprint and backup/replication windows.
  • Reduced snapshot overhead in virtual environments.
  • Application consistency Automatic exclusions of Oracle data during file level backups.
  • Protection for physical RDM, iSCSI pass-through, and independent persistent disk configurations in VMware vSphere environments.
  • Protection for shared VHDX configurations in Microsoft Hyper-V environments.
  • No need to disable UAC (User Account Control) settings.

Virtual Oracle Backup

Unitrends protects Oracle in virtual environments at the hypervisor level. Features of our hypervisor-level virtual protection of Oracle include:

  • Full/Differential backup schedules.
  • Decreased RPOs through integration with Changed Block Tracking.
  • Application consistency.

Recovery Assurance

We offer recovery assurance for deep virtual and physical Exchange environments via our auditing technology and complete automation and orchestration at the application- and operating system-level for VMware with our ReliableDR recovery assurance and disaster recovery product.

All-in-One Protection

Unitrends offers its Unified Data Protection engine to provide deep virtual and physical (native) protection for over 200 different versions of applications, hypervisors, operating systems, servers, and storage. A complete listing of what we protect may be found on the What We Protect overview page.