Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Microsoft

Five Windows Server backup tools you can count on

By Jack Wallen February 19, 2012, 11:17 PM PST

Image
1
of 7

00symantec_1.png
00symantec_1.png
Five Windows Server backup tools you can count on

Introduction

Introduction

ntIf you have a Windows server and you’re not backing it up, you are tempting fate. It’s only a matter of time before something brings that server down and takes your data with it.

n

ntLuckily, several reliable backup solutions are available for the Windows Server environment. They aren’t perfect, but they can be depended upon to keep your data safe.

n

ntNote: If you’d prefer to view this information as a blog post, check out this entry in our Five Apps blog.

Five Windows Server backup tools you can count on

Acronis Backup and Restore

Acronis Backup and Restore

ntAcronis Backup and Restore is the backup tool I use the most. It’s costly but well worth it. The newer version does a great job of ensuring that there is room on your external drive for your latest backup. You can overwrite the old backup or go by the traditional cleanup rules established in Acronis Echo.

Five Windows Server backup tools you can count on

Acronis Backup and Restore

Acronis Backup and Restore

ntIf you decide to use Acronis, you should also get the Universal Restore feature. It lets you take a full image of a backup and restore it to any hardware that meets the requirements of your platform. Acronis also has add-ons for Exchange and SQL Servers.

Five Windows Server backup tools you can count on

Symantec Backup Exec

Symantec Backup Exec

ntLike Acronis, Symantec offers solutions for Exchange and SQL. And its ability to manage Vaults (backup destinations) is superb. Just make sure that if a Vault is physically (and permanently) removed, you remove it from within the backup software. Otherwise, it will cause problems.

Five Windows Server backup tools you can count on

Windows NT Backup

Windows NT Backup

ntI always set up an NT Backup to run once a week (or month, depending upon the needs), just to have it clear the Exchange logs. Otherwise, a lot of unnecessary data would be included in my backups, and their size would get out of hand.

Five Windows Server backup tools you can count on

ShadowProtect 4 (Server)

ShadowProtect 4 (Server)

ntShadowProtect 4 is probably the least-known product in this list. But it falls into place next to Acronis as a feature-rich tool that can do everything — including recover to dissimilar hardware. ShadowProtect 4 also includes an easy-to-use tool that allows you to consolidate backup image files and convert the backups to either .VHD or .VMDK virtual machines.

Five Windows Server backup tools you can count on

ShadowProtect 4 (Server)

ShadowProtect 4 (Server)

ntShadowProtect 4 offers granular recovery, so you can quickly recover individual files from within a backup. And unique to ShadowProtect is the Virtual Boot technology, which provides for automatic failover to a virtual server.

  • Microsoft
  • Account Information

    Share with Your Friends

    Five Windows Server backup tools you can count on

    Your email has been sent

Share: Five Windows Server backup tools you can count on
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Office relocation checklist

    PURPOSE New office launches and site relocations run the range from straightforward to overly complex. For intricate, sophisticated new office deployments and larger site moves, TechRepublic Premium’s Office relocation checklist can help plan, monitor and execute such projects. From the checklist: LIST REQUIRED OF EQUIPMENT AND SERVICES Begin by creating a simple list of required ...

    Downloads
    Published:  May 25, 2023, 4:00 PM EDT Modified:  May 26, 2023, 11:17 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Onboarding and offboarding IT staff checklist

    PURPOSE Onboarding and offboarding employees requires careful attention. Otherwise, team members may receive insufficient permissions to perform their jobs or continue to have access long after their employment’s termination. Given the stakes, the problem is even worse when managing IT staff permissions, so it’s imperative that your company adopts a system to ensure consistency. Employees, ...

    Downloads
    Published:  May 24, 2023, 4:00 PM EDT Modified:  May 25, 2023, 9:19 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    10 must-know Firefox tips

    PURPOSE TechRepublic Premium presents 10 tips for the Firefox open-source browser. Even if you only follow some of these, you’ll find your browser experience to be much improved. From the article: 1. USE CAUTION WITH ADD-ONS AND THEMES This is one of the first tips I always offer. I’ve seen web browsers with so many ...

    Downloads
    Published:  May 23, 2023, 4:00 PM EDT Modified:  May 24, 2023, 6:46 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Bring your own device policy

    PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems ...

    Downloads
    Published:  May 22, 2023, 4:00 PM EDT Modified:  May 23, 2023, 7:26 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice