One use case was with a public sector company with a lot of Dell infrastructure and choosing to use Dell Data Protection. They also used other data services for analytics. They could connect and integrate both systems, but it was not easy, especially when extracting data from SAP. Integrating data extracted from SAP with Dell Protection was complicated, but it was possible.
Find out what your peers are saying about Dell Technologies, BlackBerry, Trellix and others in Endpoint Protection Platform (EPP). Updated: November 2024.
A business endpoint is any device (such as mobile phone, desktop, laptop, tablet, server, or any virtual environment) that is physically an endpoint on a business’s enterprise computer network.
One use case was with a public sector company with a lot of Dell infrastructure and choosing to use Dell Data Protection. They also used other data services for analytics. They could connect and integrate both systems, but it was not easy, especially when extracting data from SAP. Integrating data extracted from SAP with Dell Protection was complicated, but it was possible.
We use the solution to protect the customers' data from malware attacks.
In our company, we use Dell Data Protection with Dell Data Domain for the backup of our infrastructure.
We use Dell Data Protection for full backup restore.
We use the on-prem deployment model. The primary use case is for virtual machines.