Veritas Flex Appliance: Product Overview and Insight

See the full list of Top 10 Leading Backup Products 

Company description:  Veritas is a private company, used by 86% of Fortune 500 companies. Veritas recently acquired fluid Operations AG, known as fluidOps, a privately-held software company based in Walldorf, Gremany. Operations AG is said to empower organizations to orchestrate, integrate, manage and optimize structured and unstructured data sources housed in silos across on-premises, private, public and hybrid cloud environments.

“The acquisition was aimed at accelerating Veritas’ mission to enable customers to harness the power of data—regardless of where it is housed—while driving insights that can lead to competitive advantage,” said Eric Seidman, senior director, Solutions Marketing, Veritas. “Additionally, the acquisition brings additional capabilities in the areas of AI and machine learning.”

Product description: Veritas Flex Appliance can consolidate multiple data protection software offerings on one device. The microservices-based approach delivers on-demand, enterprise-wide backup and recovery, long-term retention and cloud tiering. It uses container technology to consolidate multiple data management software deployments.


·  On-demand deployment of Veritas’ NetBackup data protection solutions in the Flex Appliance in minutes.

·  Simplified infrastructure and reduced cost by consolidating multiple Veritas NetBackup and NetBackup CloudCatalyst deployments (domains) on a single appliance.

·  Enterprise-wide on premise and cloud data protection delivered on-demand with the ability to adapt to meet the changing requirements of the business.

·  Adapts to business needs through microservices-based apps.

Analysis and Insight: According to research firm ESG, “Some solutions rely on complex and costly configurations, consisting of many converged or single function backup, data deduplication, cloud tiering and storage silos spread across the enterprise. In contrast, Veritas Flex Appliance is a single, scalable hardware solution to meet the same needs.” 

While the appliance uses a software-defined approach, it is still tied to a specific hardware appliance. Those wishing to be completely hardware independent may prefer an alternative backup solution.

Implementation: The Flex Appliance enables multiple data protection software to be deployed and changed on-demand by selecting and configuring the microservices needed. Once the microservices are selected and configured, they are deployed into production across the business.

Delivery: Veritas Flex Appliance is a hardware appliance designed with a software-defined approach, where the data management software is decoupled from the underlying hardware.

Markets and Use Cases: Veritas Flex Appliance is designed for large organizations including healthcare entities, financial institutions, insurance companies, government agencies, retailers and service providers.

Agents: No.

Pricing: The starting price point for the Flex Appliance is $510,484 for 240 TB of storage, and that includes installation, and one year of maintenance/support.   

Drew Robb
Drew Robb
Drew Robb has been a full-time professional writer and editor for more than twenty years. He currently works freelance for a number of IT publications, including eSecurity Planet and CIO Insight. He is also the editor-in-chief of an international engineering magazine.
Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.

Latest Articles

Stateful vs Stateless Firewalls: Comparing the Differences

Stateful and stateless firewalls have several core differences. Learn how stateful and stateless firewalls differ now.

10 Best Open Source Storage Software for Enterprises in 2023

These 64 Open Source Storage Projects help you create a NAS/SAN device, set up cloud storage, backup your system & more. Click here now.

How to Do a Vulnerability Scan Effectively in 6 Steps

Vulnerability scans are the process of examining and scrutinizing a piece of digital infrastructure — software or hardware — in order to locate and...