An overview of the primary differences between replication and legacy vaulting is given in the following table. Further details are provided in the sections that follow.
Feature |
Replication |
Vaulting |
---|---|---|
Retention on target system |
Yes |
No |
Deduplication |
Yes |
Yes |
Encryption |
Yes |
Yes |
Disaster Recovery supported |
Yes |
Yes |
Granular Recovery supported |
Yes, with hot/hot restore |
Limited, backup must be present on both the source and the target |
Hot/hot restore (backups directly restorable without Disaster Recovery) |
Yes |
No |
Source user can log in on the target and browse backups |
Yes |
No |
Reporting |
Yes |
Yes |
See the following topics for details:
• Restore