Earlier this month sources in the channel leaked that EMC and VMware will make a move to align their data center software agendas by integrating the storage vendor’s Avamar DR software with the 5.1 ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. EMC is getting busy cross-pollinating more of its storage ...
EMC today introduced the first major upgrade to its Avamar deduplication backup software since 2009, which integrates with the company’s Data Domain appliances to give administrators a single view of ...
The deal is expected to close within 30 days. Irvine, Calif.-based Avamar is one of a growing number of developers of data de-duplication technology. Also called "data de-dupe," it removes duplicate ...
06 May 2011 Major New Release Provides First Integration with Data Domain, Powerful Capabilities for VMware Backup and Recovery and Increased Scalability News Summary: First leverage of Data Domain ...
EMC on Tuesday acquired Avamar Technologies for $165 million to bolster its data protection portfolio. EMC on Tuesday acquired Avamar Technologies for $165 million to bolster its data-protection ...
EMC has announced upgrades to its data protection offerings that include integration with applications and hypervisor platforms for Avamar and Networker backup products, Data Domain disk backup ...
SUNNYVALE, Calif.--(BUSINESS WIRE)--Druva, Inc., the leader in Cloud Data Protection and Management, today announced that Premiere Networks, the largest radio syndicator in the US, has selected Druva ...
ORLANDO — EMC Corp. announced at Storage Networking World today that it is acquiring data backup and deduplication software vendor Avamar Technologies Inc. and is looking to help customers cut their ...
EMC’s upgrades to its Data Domain boxes and backup software products this week came wrapped in a strategic vision that says traditional backup will soon become a thing of the past; a world of ...
Businesses who run a wide range of mission-critical applications at different configurations are at risk of losing their data and jeopardizing their workflow in instances of data breaches or crashes.