Are you looking to evaluate enterprise technologies faster?
Sign up to watch GigaOm's 4-part on-demand research video series that breakdowns our research methodology and what differentiates us as a leader in emerging technology research.
- Key Criteria Analysis
- Evaluation Metrics Analysis
- Bottom Line
- About Enrico Signoretti
How to read this report
The Vendor profile is part of a series of documents aimed at giving the reader the tools to better understand technology, evaluate it, and explore the market to find the best solutions for his organization.
In this context, and to get a complete view of the state of the solutions available in the market, the reader should consider the following documents:
- Key Criteria to Evaluate Hybrid Cloud Data Protection is an introduction to the technology, defines the necessary evaluation metrics, the key criteria to evaluate new solutions, and the impact of the latter on the former. It is dedicated to those end-users that are approaching a new technology for the first time, or want an update on the latest evolution.
- Vendor Profiles for Key Criteria are easy-to-read deep dive documents that cover a single vendor regarding the solutions described in the other reports. They provide more details on the solution, how the vendor approached the key criteria, and the impact that its solution has on the evaluation metrics. This document helps end-users to get a quick but complete evaluation of single vendors.
Zerto has a totally different approach to data protection than other players in this space. Started as a solution for data replication and disaster recovery for virtualized environments, it evolved by adding some traditional data protection features and becoming a compelling solution for a broader set of use cases.
Market positioning: Zerto customer base is varied. Small and medium-sized organizations usually adopt Zerto as complete data protection solutions for their virtualized environments, while larger organizations leverage the remote replication capabilities to simplify the Disaster Recovery (DR) process of complex virtualized infrastructures and cloud migrations. Internet Service Providers (ISPs) and Managed Service Providers (MSPs) very well receive Zerto solution because it enables them to build reliable data protection services for their customers.
Deployment model: Zerto is usually deployed on-premises or hosted in the cloud with the management interface that is now available in a Software as a Service (SaaS) fashion.