Audience

IT teams

About OpenText Data Protector

OpenText™ Data Protector standardizes and consolidates backups across multiple platforms. It provides secure, comprehensive backup protection for business-critical data and applications whether virtual, physical, or online in the cloud. Data Protector and OpenText™ Data Protector for Cloud Workloads deliver backup and disaster recovery for physical, virtual, cloud and container environments. Native application integrations make application-aware backup and recovery quick and easy. An enhanced interface provides a self-service option to recover single items. Built-in capabilities enable businesses to recover quickly, from granular file restores to automated bare metal recovery.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

OpenText
Founded: 1991
Canada
www.opentext.com/products/data-protector

Videos and Screen Captures

OpenText Data Protector Screenshot 1
Other Useful Business Software
Run applications fast and securely in a fully managed environment Icon
Run applications fast and securely in a fully managed environment

Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Try for free

Product Details

Platforms Supported
Cloud
Windows
Mac
iPhone
iPad
Android
On-Premises

OpenText Data Protector Frequently Asked Questions

Q: What kinds of users and organization types does OpenText Data Protector work with?
Q: What languages does OpenText Data Protector support in their product?
Q: Does OpenText Data Protector have a mobile app?

OpenText Data Protector Product Features

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption