Before we start, my only question is that we are only using the Data Protection Manager, so not the full suite. The users using the backup solution mainly consist of me and my colleague. We have integrated it into VMware, so users can restore or take backups of their own VMs, but I am not sure how many are using it because the backups are automatic, and for restores, I think some of them are using them. I would certainly recommend this product for the backup of the VMs, but for the bare metal, I recommend it a little bit less. Overall, I give this solution a rating of eight.
Data Protection Architect at a energy/utilities company with 1,001-5,000 employees
Real User
Top 20
Apr 29, 2026
Beyond just Dell PowerProtect Cyber Recovery, our company is an enterprise user of the complete Dell solution, including PowerProtect Data Domain, PowerProtect Data Manager, PowerMax, PowerStore, and VxRail solutions. All of our products and storage systems are from Dell. If companies are using the PowerProtect solutions, such as PowerProtect Data Domain and NetWorker or PPDM, then it is beneficial to connect with Dell PowerProtect Cyber Recovery for ransomware protection. I would rate this review an 8 out of 10.
The administrative interface of Dell PowerProtect Cyber Recovery is user-friendly. The ability of Dell PowerProtect Cyber Recovery to automate data recovery tasks is effective. Once a problem arises, I can restore the data directly inside the VMs in the vault due to having a clean space available. I work with data encryption in Dell PowerProtect Cyber Recovery, which is very important to ensure that only the right authorized persons are accessing the data, a very important feature for our customers. Even though I believe bundles for SMB customers and AI improvements could be developed, I still give it maximum points. I give this product a review rating of 10.
Global Head, Storage at a financial services firm with 1,001-5,000 employees
Real User
Top 10
Nov 12, 2025
My impression of the administrative interface of Dell PowerProtect Cyber Recovery is that it is very user-friendly and pretty intuitive. Regarding the solution's ability to automate data recovery tasks, we have not had to do mass recoveries yet, but we know we can do it with the tool and we do restores out of Networker. Dell PowerProtect Cyber Recovery is absolutely able to protect our company's critical data. We know how it protects our critical data because we are watching it all the time; it is locking snapshots, protecting and isolating our backups, and we know our backups are there if we need to recover. We are using the recent feature addition for enhancing data encryption. As far as I know, the feature has been good because it encrypts the data. My advice for someone or some company that is considering the solution is to understand the manpower involved because it does require a lot of attention; it does not run by itself. Once it is set up, it does run, but it requires quite a bit of admin. I would rate this product an eight out of ten overall.
Learn what your peers think about Dell PowerProtect Cyber Recovery. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
Dell PowerProtect Cyber Recovery delivers advanced data protection and cyber resilience by isolating critical data to secure it against cyber threats.Dell PowerProtect Cyber Recovery leverages an isolated recovery vault to ensure critical business data remains secure and recoverable even during cyberattacks. Its AI-driven analytics validate data integrity, allowing confidence in the reliability of backups. This approach facilitates rapid restoration of operations, helping maintain business...
Before we start, my only question is that we are only using the Data Protection Manager, so not the full suite. The users using the backup solution mainly consist of me and my colleague. We have integrated it into VMware, so users can restore or take backups of their own VMs, but I am not sure how many are using it because the backups are automatic, and for restores, I think some of them are using them. I would certainly recommend this product for the backup of the VMs, but for the bare metal, I recommend it a little bit less. Overall, I give this solution a rating of eight.
Beyond just Dell PowerProtect Cyber Recovery, our company is an enterprise user of the complete Dell solution, including PowerProtect Data Domain, PowerProtect Data Manager, PowerMax, PowerStore, and VxRail solutions. All of our products and storage systems are from Dell. If companies are using the PowerProtect solutions, such as PowerProtect Data Domain and NetWorker or PPDM, then it is beneficial to connect with Dell PowerProtect Cyber Recovery for ransomware protection. I would rate this review an 8 out of 10.
The administrative interface of Dell PowerProtect Cyber Recovery is user-friendly. The ability of Dell PowerProtect Cyber Recovery to automate data recovery tasks is effective. Once a problem arises, I can restore the data directly inside the VMs in the vault due to having a clean space available. I work with data encryption in Dell PowerProtect Cyber Recovery, which is very important to ensure that only the right authorized persons are accessing the data, a very important feature for our customers. Even though I believe bundles for SMB customers and AI improvements could be developed, I still give it maximum points. I give this product a review rating of 10.
My impression of the administrative interface of Dell PowerProtect Cyber Recovery is that it is very user-friendly and pretty intuitive. Regarding the solution's ability to automate data recovery tasks, we have not had to do mass recoveries yet, but we know we can do it with the tool and we do restores out of Networker. Dell PowerProtect Cyber Recovery is absolutely able to protect our company's critical data. We know how it protects our critical data because we are watching it all the time; it is locking snapshots, protecting and isolating our backups, and we know our backups are there if we need to recover. We are using the recent feature addition for enhancing data encryption. As far as I know, the feature has been good because it encrypts the data. My advice for someone or some company that is considering the solution is to understand the manpower involved because it does require a lot of attention; it does not run by itself. Once it is set up, it does run, but it requires quite a bit of admin. I would rate this product an eight out of ten overall.