Introducing G2.ai, the future of software buying.Try now
Sangfor HCI
Sponsored
Sangfor HCI
Visit Website
Product Avatar Image
Purity

By Pure Storage

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Purity and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.6 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Purity?

Sangfor HCI
Sponsored
Sangfor HCI
Visit Website

Purity Reviews & Product Details

Product Avatar Image

Have you used Purity before?

Answer a few questions to help the Purity community

Purity Reviews (4)

Reviews

Purity Reviews (4)

4.6
4 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Sundaram  M.
SM
Storage Consultant
Information Technology and Services
Small-Business (50 or fewer emp.)
"Effortless Performance, Innovative Support, and Predictable TCO"
What do you like best about Purity?

its simplicity, non-disruptive upgrades (EverGreen), high performance with data efficiency (dedupe/compression), customer-obsessed support, and predictable TCO, backed by a strong culture and focus on innovation for AI/cloud Review collected by and hosted on G2.com.

What do you dislike about Purity?

Most of the commands are internal , only pure engineer perform over remotely. Review collected by and hosted on G2.com.

José Antonio G.
JG
KAM
Small-Business (50 or fewer emp.)
"Excellent storage option"
What do you like best about Purity?

I like that it is very easy to use, it has a lot of storage, and I can manage all my information. It has a very intuitive interface, and the implementation in the company was very quick. All the functions are very good. The information is always secure, it is very fast, we use it every day, and when we have any questions, the technical support helps us very quickly. Review collected by and hosted on G2.com.

What do you dislike about Purity?

I have no complaints with Purity as everything seems very good to me, I wouldn't change anything, as it seems very well developed and is very easy to use. I recommend it. Review collected by and hosted on G2.com.

JG
Systems and Database Administrator
Mid-Market (51-1000 emp.)
"A complete suite of software to manage a Pure Array"
What do you like best about Purity?

When setting up the array, I found the Pure website has extensive documentation to aid in configuration. Pure's support department is highly accessible to handle the edge conditions that come up with your unique environment's aspects. Review collected by and hosted on G2.com.

What do you dislike about Purity?

The biggest issue with Purity is that it is not intuitive and requires the previously mentioned support documentation. Review collected by and hosted on G2.com.

Vibhuti P.
VP
Small-Business (50 or fewer emp.)
"Application Review"
What do you like best about Purity?

Best user interface and user friendly. Nice suggested solutions. Great customer support. Review collected by and hosted on G2.com.

What do you dislike about Purity?

Little lagging part rest all the thing is ok. Review collected by and hosted on G2.com.

There are not enough reviews of Purity for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Unitrends Backup and Recovery Logo
Unitrends Backup and Recovery
4.2
(435)
Protects by bridging virtual, physical, and cloud. Unitrends has provided next-generation enterprise-class data protection to thousands of customers.
2
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(733)
Acronis Cyber Protect is an integrated solution that combines advanced cybersecurity, data protection, and endpoint management to safeguard businesses against modern cyber threats. By merging backup and anti-malware capabilities into a single platform, it simplifies IT operations, enhances system efficiency, and ensures comprehensive protection across physical, virtual, and cloud environments. Key Features and Functionality: - Integrated Cybersecurity and Backup: Combines AI-based anti-malware with reliable backup to streamline protection processes. - Vulnerability Assessments and Patch Management: Identifies security gaps and applies necessary patches to maintain system integrity. - Disaster Recovery: Ensures business continuity by enabling rapid recovery of data and systems in the event of a cyberattack or system failure. - Endpoint Management: Provides centralized control over all endpoints, facilitating efficient monitoring and management. - Continuous Data Protection: Safeguards critical data by continuously backing up changes, minimizing data loss risks. Primary Value and User Solutions: Acronis Cyber Protect addresses the growing complexity of managing multiple security and backup solutions by offering a unified platform. This integration reduces operational overhead, lowers total cost of ownership, and enhances protection against evolving cyber threats. Businesses benefit from streamlined operations, improved system reliability, and the assurance that their data and systems are secure and recoverable.
3
Druva Data Security Cloud Logo
Druva Data Security Cloud
4.7
(707)
Druva Data Security Cloud provides Enterprise Endpoint Backup and Protection
4
Google Cloud Storage Logo
Google Cloud Storage
4.6
(590)
Google Cloud Storage is unified object storage for developers and enterprises, from live data serving to data analytics/ML to data archiving.
5
Cove Data Protection Logo
Cove Data Protection
4.5
(409)
Cove Data Protection is a cloud-first backup and disaster recovery service for servers, workstations, and Microsoft 365 data, all managed from a single multi-tenant dashboard. Cloud storage is included, with data centers worldwide to keep backups in region and isolated from the local network.
6
CyberSentriq Logo
CyberSentriq
4.6
(380)
Cybersentriq provides Integrated Cybersecurity & Data Protection for Businesses and Managed Service Providers. Our unified AI-powered platform offers all in one email phishing and spam protection, DNS filtering, security awareness training, email archiving, M365 backup and recovery - enabling users to ensure compliance, easily store and retrieve data, and protect against online threats such as phishing and ransomware
7
Datto BCDR Logo
Datto BCDR
4.6
(268)
Datto BCDR 2 is a complete family of enterprise business continuity solutions, available in both physical and virtual platforms, built from the ground up, for businesses of every size.
8
CrashPlan Platform Logo
CrashPlan Platform
4.9
(253)
CrashPlan provides cyber-ready data resilience and governance in a single platform for organizations whose ideas power their revenue. With its comprehensive backup and recovery capabilities for data stored on servers, on endpoint devices, and in SaaS applications, CrashPlan’s solutions are trusted by entrepreneurs, professionals, and businesses of all sizes worldwide. From ransomware recovery and breaches to migrations and legal holds, CrashPlan’s suite of products ensures the safety and compliance of your data without disruption.
9
BDRShield Logo
BDRShield
4.3
(155)
BDRShield by Vembu offers comprehensive and cost-effective Backup and Disaster Recovery software tailored to meet the diverse data protection requirements of Businesses and Service Providers. BDRShield provides robust backup solutions for a wide range of IT workloads, including virtual machines, servers, endpoints, SaaS applications, cloud VMs, NAS/File Shares, and databases & applications. It offers the flexibility to store backups anywhere and centrally manage the entire backup infrastructure. BDRShield is designed to help businesses keep their data secure and ensure it is easily recoverable in the event of data loss or ransomware attacks. With BDRShield, businesses can achieve reliable data protection and ensure business continuity – all at an affordable price.
10
VMware Live Recovery Logo
VMware Live Recovery
4.4
(134)
VMware Live Recovery is a comprehensive solution designed to enhance cyber and data resiliency within VMware Cloud Foundation environments. It integrates enterprise-grade disaster recovery with specialized cyber recovery capabilities into a unified, cloud-based management interface. This integration enables organizations to effectively protect and recover their VMware-based applications and data from a wide range of threats, including ransomware attacks, infrastructure failures, and human errors. By consolidating these critical functions, VMware Live Recovery simplifies administration, reduces operational complexity, and ensures the availability and recoverability of essential assets. Key Features and Functionality: - Unified Management Interface: Provides a centralized console for managing both ransomware and disaster recovery operations across private and public cloud environments, streamlining administrative tasks. - Secure Cyber Recovery: Offers an isolated recovery environment (IRE equipped with next-generation antivirus and behavioral analysis tools to detect and mitigate fileless malware, ensuring safe restoration of infected virtual machines. - Flexible Deployment and Licensing: Utilizes a single deployment method and a flexible subscription model, allowing organizations to provision and manage VMware Live Cyber Recovery and VMware Live Site Recovery seamlessly. - Advanced Snapshot Management: Supports customizable recovery point objectives (RPOs as low as one minute when used with vSphere replication, along with elastic scaling of recovery infrastructure resources. - Enhanced Scalability: Accommodates up to four cloud filesystems per recovery SDDC, providing increased snapshot storage capacity and improved replication performance. Primary Value and Problem Solved: VMware Live Recovery addresses the critical need for a robust, integrated solution that combines disaster recovery and cyber recovery within VMware Cloud Foundation environments. By offering a unified management experience, it simplifies the complexities associated with protecting and recovering VMware-based applications and data from diverse threats. This consolidation not only reduces administrative overhead but also enhances the organization's ability to respond swiftly and effectively to incidents, thereby minimizing downtime, data loss, and business disruption. The solution's flexible licensing and deployment options further ensure that organizations can tailor their recovery strategies to meet specific business requirements, providing peace of mind in an increasingly threat-prone digital landscape.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Purity
View Alternatives