Dell EMC PowerProtect Data Manager Description

Protect data and provide governance control for modern cloud workloads in your evolving physical, virtual, and cloud environments. The software-defined data protection platform from Dell EMC helps you address IT complexity and ever-changing growth. PowerProtect Data Manager provides next-generation data protection that allows faster IT transformation and gives you the assurance that your data can be easily protected and quickly unlocked. Dell EMC PowerProtect Data Manager offers software-defined data protection, automated discovery and deduplication, operational agility and IT governance for physical, cloud, and virtual environments. PowerProtect Data Manager provides data protection capabilities that leverage the latest Dell EMC trusted storage architecture.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Dell Technologies
Year Founded:
1984
Headquarters:
United States
Website:
www.delltechnologies.com/en-us/data-protection/powerprotect-data-manager.htm

Media

Recommended Products
Top Rated Business VoIP Provider for 2024 for as low as $20/mo*! Icon
Top Rated Business VoIP Provider for 2024 for as low as $20/mo*!

Message, video, and phone on any device. Trusted by over 400,000 businesses.

- Includes 100+ Premium Features
- Unlimited Calling, Faxing, SMS, Conferencing.

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
Online

Dell EMC PowerProtect Data Manager Features and Options

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance