Veeam Data Platform works
September 28, 2023

Veeam Data Platform works

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

Veeam Backup & Replication

Overall Satisfaction with Veeam Data Platform

We leverage Veeam Data Platform to backup our critical virtual environment to an offsite location. We use the tools within the software to reduce recovery time and increase business continuity of our systems.
  • Virtualized workloads
  • Endpoints and physical servers running Windows & Linux
  • In addition to back up, we also replicate some of these workloads
  • Application-centric recovery using Veeam Explorers (for Exchange, SQL, Sharepoint, etc)
  • License portability as your environment needs change
  • Utilizing backup copies for secondary purposes via DataLabs
  • Automating test restores to validate recoverability
  • Immutable storage to protect against ransomware
  • “Instant” recovery or portability between platforms (physical > virtual > cloud-hosted)
  • Failover or recovery scripts/plans for orchestrated recovery
  • Immutable storage to protect against ransomware
  • Keeps accurate backup chains
  • Does restores quickly
  • Easy to update and manage
  • In my experience, when backup chains have issues Veeam Data Platform support is mostly useless. Be prepared to rebuild your backup environment.

Do you think Veeam Data Platform delivers good value for the price?

Yes

Are you happy with Veeam Data Platform's feature set?

Yes

Did Veeam Data Platform live up to sales and marketing promises?

Yes

Did implementation of Veeam Data Platform go as expected?

Yes

Would you buy Veeam Data Platform again?

Yes

50 virtual machines, 3 physical.
The product is easy to adapt to our growth.
We had Veeam when I started. Veeam is much better than any of the other solutions I have used in the past.
We write our own software for this use case.
In my opinion, Veeam Data Platform is great for ransomware protection. Organizations can use Veeam Data Platform to create isolated and immutable backups, making it difficult for ransomware attackers to compromise data integrity.