Veeam Backup & Replication Vs Veritas NetBackup

What are the advantages of Veeam over Veritas NetBackup?

Complexity

  • Requires more time to manage backups.
  • NetBackup is more cumbersome to implement and configure advanced features.
  • Management is more complex due to the multiple consoles required (Java, web, restoration, and CMD) compared to Veeam's single console.
  • Backup and restore agents increase administrative overhead.
  • The lack of features forces you to perform manual tasks or use scripts (recovery verification, instant recovery, etc.).

Expensive licenses

  • Higher cost to protect the same amount of data due to capacity-based licensing.
  • Data grows faster than instances, forcing you to purchase more licenses than with Veeam.
  • The list price of NetBackup is several times higher than that of Veeam instance-based licenses.
  • Risk of audits and unexpected charges for accidental use of additional licenses.

Lack of functionality

  • Increases the risk of extended downtime due to a lack of adequate recovery options.
  • Fewer restoration features: no cross-platform restoration, complex bare-metal restoration, no instant recovery for Hyper-V.

Focus on applications

  • Dependence on NetBackup devices for certain functions (Oracle co-pilot, WAN optimization).
  • The device portfolio can be confusing.

Backup Administrator Unit

  • Heavy reliance on administrators specializing in NetBackup.
  • Without an expert, it is difficult to restore data due to the complexity of consoles.
  • If the specialist leaves, data protection remains vulnerable until another administrator learns the ropes.

What are the benefits that Veeam can bring to your environment?

Veeam Single Platform

Simplicity

  • Easy to configure, even for advanced features.
  • Delete task

More articles that may interest you

RHEL vs SUSE

In this article, we compare the two enterprise Linux distributions to find out what are the similarities and differences between them.

Log4j2 vulnerability: How to mitigate it?

If your company uses Java-based software that uses Log4j you should immediately read the section on how to mitigate and protect your systems before reading the rest.

Go to Top