What Integrates with Recovery Point?
Find out what Recovery Point integrations exist in 2025. Learn what software and services currently integrate with Recovery Point, and sort them by reviews, cost, features, and more. Below is a list of products that Recovery Point currently integrates with:
-
1
Google Cloud Platform
Google
Free ($300 in free credits) 55,888 RatingsGoogle Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging. -
2
Microsoft 365
Microsoft
$5 per user per month 102 RatingsIntroducing Microsoft 365, previously known as Microsoft Office 365. Unlock your creativity and accomplish your goals with a suite of tools including Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. A subscription to Microsoft 365 grants you access to the latest versions of Office applications, both on your desktop and online, along with timely updates as they are released. Whether you're using a desktop, tablet, or smartphone, Microsoft 365 combined with your device and an internet connection ensures you can maintain productivity from any location. OneDrive ensures that your work is accessible from anywhere, allowing for seamless collaboration and sharing with others. Plus, support is readily available through email, chat, or phone, connecting you with a real person whenever you need assistance. Embrace the power of Office today and find the subscription plan that best suits your needs for ultimate efficiency. Now is the perfect time to elevate your productivity game. -
3
If you're in need of computing power, database solutions, content distribution, or various other functionalities, AWS offers a wide array of services designed to assist you in developing advanced applications with enhanced flexibility, scalability, and reliability. Amazon Web Services (AWS) stands as the most extensive and widely utilized cloud platform globally, boasting over 175 fully functional services spread across data centers worldwide. A diverse range of customers, from rapidly expanding startups to major corporations and prominent government bodies, are leveraging AWS to reduce expenses, enhance agility, and accelerate innovation. AWS provides a larger selection of services, along with more features within those services, compared to any other cloud provider—covering everything from fundamental infrastructure technologies like computing, storage, and databases to cutting-edge innovations such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. This breadth of offerings facilitates a quicker, simpler, and more cost-effective transition of your current applications to the cloud, ensuring that you can stay ahead in a competitive landscape while taking advantage of the latest technological advancements.
-
4
Cloudflare
Cloudflare
$20 per website 12 RatingsCloudflare is the foundation of your infrastructure, applications, teams, and software. Cloudflare protects and ensures the reliability and security of your external-facing resources like websites, APIs, applications, and other web services. It protects your internal resources, such as behind-the firewall applications, teams, devices, and devices. It is also your platform to develop globally scalable applications. Your website, APIs, applications, and other channels are key to doing business with customers and suppliers. It is essential that these resources are reliable, secure, and performant as the world shifts online. Cloudflare for Infrastructure provides a complete solution that enables this for everything connected to the Internet. Your internal teams can rely on behind-the-firewall apps and devices to support their work. Remote work is increasing rapidly and is putting a strain on many organizations' VPNs and other hardware solutions. -
5
SentinelOne Singularity
SentinelOne
$45 per user per year 6 RatingsA singularly innovative platform. Unmatched velocity. Limitless scalability. Singularity™ provides unparalleled visibility, top-tier detection capabilities, and self-sufficient response mechanisms. Experience the strength of AI-driven cybersecurity that spans across the entire enterprise. The foremost companies in the world rely on the Singularity platform to thwart, identify, and address cyber threats at remarkable speed, larger scales, and with enhanced precision across endpoints, cloud environments, and identity management. SentinelOne offers state-of-the-art security through this platform, safeguarding against malware, exploits, and scripts. The SentinelOne cloud-based solution has been meticulously designed to adhere to security industry standards while delivering high performance across various operating systems, including Windows, Mac, and Linux. With its continuous updates, proactive threat hunting, and behavioral AI, the platform is equipped to tackle any emerging threats effectively, ensuring comprehensive protection. Furthermore, its adaptive nature allows organizations to stay one step ahead of cybercriminals in an ever-evolving threat landscape. -
6
IBM Cloud® offers features that enhance both business agility and resilience, allowing users to discover a platform that provides 2.5 times the value. Tailored for various industries, it emphasizes security and the flexibility to develop and operate applications in any environment. The platform facilitates the transformation of business workflows through the integration of automation and artificial intelligence. Furthermore, it boasts a robust technology partner ecosystem that addresses specific industry demands, leveraging deep expertise and tailored solutions. Its processes are automated and auditable, ensuring compliance and efficiency. With unique functionalities ensuring top-tier cloud security and monitoring, users benefit from a uniform security and control framework across all applications. Additionally, its containerized solutions foster seamless DevOps practices, automation, data management, and security enhancements. The platform offers streamlined integration along with a consistent application development lifecycle, making it user-friendly. Beyond these features, IBM Cloud harnesses advanced technologies such as IBM Watson®, analytics, the Internet of Things (IoT), and edge computing, enabling businesses to innovate and stay ahead of the competition.
-
7
Safeguard your essential business information with reliable and straightforward data protection and recovery through automatic cloud backup. Carbonite Safe™ is a tailored data backup solution specifically designed for organizations like yours, ensuring that installation and usage are user-friendly, so you won't need any specialized IT training to keep your data secure and accessible. It enables you to protect files across servers, external storage devices, and up to 25 computers, while also offering straightforward recovery options for computers that have fallen victim to ransomware—without the need to pay a ransom. You can oversee your online backups and retrieve files from any device through a secure, web-based dashboard, helping you fulfill data retention requirements efficiently. This business cloud backup is adaptable to your specific needs; whether you're restoring an individual file or an entire directory system, it can be accomplished in just a few clicks. Advanced encryption safeguards your data during transmission and storage, ensuring it never remains in an unsecured state. Unlike many other companies that impose additional fees for support, Carbonite Safe provides assistance from our award-winning team of experts at no extra cost, ensuring you have the help you need whenever you require it. This comprehensive approach to data protection not only enhances peace of mind but also allows your business to operate smoothly, knowing that your critical information is well-protected.
-
8
Zerto helps customers accelerate IT Transformation by eliminating the complexity and risk of modernization and cloud adoption. Zerto is replacing legacy solutions with a single IT resilience platform that simplifies disaster recovery, backup, and cloud management. Zerto's software platform provides continuous availability at enterprise scale for a seamless customer experience. It also simplifies workload mobility to allow applications to be moved between hybrid and multi-clouds. Zerto is trusted worldwide by more than 6,000 customers and powers resiliency offerings for Microsoft Azure and IBM Cloud, AWS and SunGard AS, as well as over 350 cloud service providers. Visit www.zerto.com for more information
-
9
Boomi
Dell
$550.00/month Dell Boomi AtomSphere offers a seamless solution for integrating all of your business applications. As a single-instance, multi-tenant integration platform as a service (iPaaS), it empowers enterprises and their teams with a comprehensive set of features that enhance the speed of integrations while streamlining management processes. Boomi AtomSphere's user-friendly visual design interface, combined with its robust performance, guarantees scalability and high availability, catering to all your application integration requirements effectively. Additionally, its capabilities enable businesses to adapt quickly to changing needs, further solidifying its position as a leader in the integration space. -
10
Kemp LoadMaster
Progress Software
$1990.00/year The Kemp LoadMaster load balancers and extensive library with application deployment templates ensure high performance and secure delivery for application workloads from many vendors across multiple sectors. Award-winning hardware, cloud-native, and virtual deployment options, including the first per-app load balancer/ADC in the industry. Real-time network anomalies can be addressed and decisions made. Optimized load balancing hardware that delivers high-performance application experience in any environment. The most widely used virtual load balancer in the world, with more than 100,000 deployments worldwide. Cloud load balancers with full functionality that are optimized for public cloud environments. -
11
Pure Storage
Pure Storage
Initiate a transformation in IT, mitigate risks, and improve overall business results. Enjoy the assurance of uninterrupted service through our dedication to zero downtime, which is consistently monitored and managed proactively on your behalf. Remove the complexities of multi-silo systems and the uncertainties of planning. Discover a cohesive data services platform that operates seamlessly across public, on-premises, and hybrid cloud environments. It stands out as the ultimate solution for your data storage and management needs, without exception. Transitioning from traditional ownership to SLA-driven storage-as-a-service means you have complete coverage for all your data management requirements. This innovative approach allows you to focus on your core business while we handle the intricacies of your data infrastructure. -
12
Megaport
Megaport
$100 per monthYou can speed up the process of setting up and deploying connections to services that your business uses. You can quickly and easily set up a network without having to do complicated configurations or siloed tasks. Simply point and click to connect to your Megaport account. Connect to cloud services, managed service, and data centers in a matter of seconds. You can move your workloads instantly so you can concentrate on what's next. Access the cloud from anywhere you are, and easily move your data between different locations. You can get direct network access to the services that you need, even if your location is not near a cloud-on-ramp location. Find your nearest Megaport location. You can adjust the connectivity settings right away and dial up or down as needed. -
13
Elastio
Elastio
Thoroughly examine your AWS Backup data for any signs of ransomware, malware, or corruption to guarantee safe recoveries. With Elastio, you can count on your backups being ready for restoration, allowing for an effortless one-click recovery. This means you can return to your normal operations without delay. What sets Elastio apart is its unique approach of employing machine learning, signatures, and heuristics to meticulously analyze your AWS Backup data for potential threats. The seamless integration of Elastio with AWS Backup simplifies both deployment and management. It also facilitates the communication of alerts to your preferred security tools. While backups are essential for a robust recovery strategy, the risk arises when these backups themselves harbor ransomware, malware, or corruption. Given that the dwell time of ransomware may outlast the retention period, every backup copy is at risk of being tainted. Elastio not only scans AWS Backup recovery points for potential threats but also performs continuous recovery tests to pinpoint the last secure recovery point and smoothly connects with your existing alert systems for any detected ransomware or corruption issues. This proactive approach ensures that your organization remains safeguarded against potential data loss and can quickly recover from any incidents. -
14
VMware Cloud
Broadcom
Create, execute, oversee, link, and safeguard all your applications across any cloud environment. VMware's Multi-Cloud solutions provide a cloud operating framework suitable for all types of applications. Propel your digital transformation efforts with the most reliable and widely adopted cloud infrastructure available today. Utilize the same expertise you apply in your data center while accessing a vast network of six major hyperscale public cloud providers and over 4,000 VMware Cloud Provider Partners. By employing a hybrid cloud approach through VMware Cloud Foundation, you can achieve uniform infrastructure and operations for both new and existing cloud-native applications, spanning from the data center to the cloud and extending to the edge. This uniformity fosters enhanced agility while minimizing complexity, expenses, and risks. You can develop, run, and manage contemporary applications across any cloud, addressing various demands with resources from both on-premises and public cloud environments. Furthermore, you have the capability to manage both containerized workloads and traditional VM-based workloads seamlessly on one cohesive platform, ensuring efficiency and adaptability. -
15
Tenable One
Tenable
Tenable One offers a groundbreaking solution that consolidates security visibility, insights, and actions across the entire attack surface, empowering contemporary organizations to identify and eliminate critical cyber risks spanning IT infrastructure, cloud systems, essential infrastructure, and beyond. It stands as the only AI-driven platform for managing exposures in the market today. With Tenable's advanced vulnerability management sensors, you can gain a comprehensive view of every asset within your attack surface, including cloud systems, operational technologies, infrastructure, containers, remote employees, and modern web applications. By analyzing over 20 trillion components related to threats, vulnerabilities, misconfigurations, and asset data, Tenable’s machine-learning capabilities streamline remediation efforts by allowing you to prioritize the most significant risks first. This focused approach fosters necessary enhancements to minimize the likelihood of serious cyber incidents while providing clear and objective assessments of risk levels. In this rapidly evolving digital landscape, having such precise visibility and predictive power is essential for safeguarding organizational assets. -
16
Palo Alto Networks Threat Prevention
Palo Alto Networks
Organizations are increasingly confronted with a diverse range of attacks from threat actors motivated by factors such as financial gain, ideological beliefs, or dissatisfaction within their own ranks. The methods employed by these attackers are continuously advancing, rendering traditional Intrusion Prevention Systems (IPS) inadequate in safeguarding organizations effectively. To combat intrusions, malware, and command-and-control operations throughout their lifecycle, Threat Prevention enhances the security features of our next-generation firewalls, which defend the network from sophisticated threats by meticulously identifying and examining all traffic, applications, users, and content, across every port and protocol. Daily updates from threat intelligence are systematically gathered, sent to the next-generation firewall, and acted upon by Threat Prevention to neutralize all potential threats. By automatically blocking known malware, vulnerability exploits, and command-and-control activities, organizations can minimize resource expenditure, complexity, and latency while leveraging their existing hardware and security teams. With these robust measures in place, organizations can significantly bolster their defense against the ever-evolving landscape of cyber threats. -
17
HP-UX
Hewlett Packard Enterprise
Experience a robust UNIX operating system and its associated tools that ensure unparalleled availability, reliability, and security for mission-critical HPE Integrity servers. By leveraging this highly integrated UNIX platform, you can enhance operational efficiency while maintaining the highest standards of reliability and security for your essential HPE Integrity servers. HP-UX creates a dynamic and secure environment, seamlessly integrated into mission-critical HPE Integrity servers, allowing you to address your specific UNIX demands. With four distinct operating environments, HP-UX is designed to cater to diverse needs effectively. The system also emphasizes comprehensive server security and management, incorporating HPE Systems Insight Manager, which provides essential functionalities such as power management, health monitoring, and deployment tools. Furthermore, it includes extensive performance analysis resources for both kernel processes and applications, ensuring optimal functionality. Safeguarding your organization’s most vital applications and services is crucial in maintaining your business's trajectory toward success. With these capabilities, you can confidently navigate the complexities of modern computing environments. -
18
Nutanix Cloud Manager
Nutanix
An all-encompassing solution designed to deliver intelligent operations, self-service capabilities, orchestration, security compliance, visibility, and effective management of cloud expenses is offered by Nutanix Cloud Manager. This platform simplifies the process of creating and overseeing cloud environments, enabling customers to realize value more swiftly. It enhances management efficiency, deployment processes, and application scalability through a self-service model combined with centralized role-based IT governance. Additionally, it fosters financial accountability and integrates security operations by providing intelligent analytics and adherence to regulatory standards. IT teams can effortlessly automate routine operational tasks with just a few clicks, facilitating automation and boosting operational productivity without requiring any coding expertise. Moreover, it automatically triggers anomaly alerts whenever there is a significant deviation in a VM’s performance from its established norms, all without necessitating any configuration adjustments. This seamless functionality allows organizations to maintain optimal cloud performance with minimal effort. -
19
Cisco CX Cloud
Cisco
Cisco CX Cloud serves as a comprehensive hub where users can tap into the knowledge and best practices of Cisco and its partners. This platform offers a seamless digital experience aimed at facilitating growth at a pace that suits your needs, guiding you toward success through a structured approach. The lifecycle journey is organized around specific use cases, complete with checklists and straightforward steps designed to expedite your journey toward realizing business value. It offers contextual learning opportunities to enhance knowledge and empower your workforce effectively. By utilizing actionable telemetry, it connects customers, partners, and Cisco, leveraging AI and ML to unveil distinct insights. CX Cloud stands as the digital foundation for Success Tracks, providing use case-driven guidance that enables you to reach your business objectives swiftly and at scale. Additionally, it offers enhanced visibility into expansive network infrastructures, improving both security and performance. This transformation of enterprise networks is pivotal for fostering global innovation and growth, paving the way for partners to lead in delivering transformative outcomes for clients. Ultimately, CX Cloud is not just a tool; it’s a catalyst for driving significant change in the digital landscape. -
20
Rubrik
Rubrik
An attacker cannot discover your backups because of a logical air gap. Our append-only file system makes backup data inaccessible to hackers. Multi-factor authentication can be enforced globally to keep unauthorized users from accessing your backups. You can replace hundreds of backup jobs, or even thousands, with just a few policies. The same policies should be applied to all workloads, both on-premises as well as in the cloud. Archive your data to your cloud provider's blob storage. With real-time predictive searching, you can quickly access archived data. You can search across your entire environment down to the file level and choose the right time to recover. Recoveries can be done in a matter of hours, instead of days or weeks. Microsoft and Rubrik have joined forces to help businesses build cyber-resilience. You can reduce the risk of data loss, theft, and backup data breaches by storing immutable copies in a Rubrik-hosted cloud environment that is isolated from your core workloads.
- Previous
- You're on page 1
- Next