Audience

IT teams

About OpenText Data Protector

OpenText™ Data Protector standardizes and consolidates backups across multiple platforms. It provides secure, comprehensive backup protection for business-critical data and applications whether virtual, physical, or online in the cloud. Data Protector and OpenText™ Data Protector for Cloud Workloads deliver backup and disaster recovery for physical, virtual, cloud and container environments. Native application integrations make application-aware backup and recovery quick and easy. An enhanced interface provides a self-service option to recover single items. Built-in capabilities enable businesses to recover quickly, from granular file restores to automated bare metal recovery.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

OpenText
Founded: 1991
Canada
www.opentext.com/products/data-protector

Videos and Screen Captures

OpenText Data Protector Screenshot 1
Other Useful Business Software
Orchestrate Your AI Agents with Zenflow Icon
Orchestrate Your AI Agents with Zenflow

The multi-agent workflow engine for modern teams. Zenflow executes coding, testing, and verification with deep repo awareness

Zenflow orchestrates AI agents like a real engineering system. With parallel execution, spec-driven workflows, and deep multi-repo understanding, agents plan, implement, test, and verify end-to-end. Upgrade to AI workflows that work the way your team does.
Try free now

Product Details

Platforms Supported
Cloud
Windows
Mac
iPhone
iPad
Android
On-Premises

OpenText Data Protector Frequently Asked Questions

Q: What kinds of users and organization types does OpenText Data Protector work with?
Q: What languages does OpenText Data Protector support in their product?
Q: Does OpenText Data Protector have a mobile app?

OpenText Data Protector Product Features

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption