Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Rocket Servergraph

5.0
(3)

Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.

Work for Rocket Servergraph?

Learning about Rocket Servergraph?

We can help you find the solution that fits you best.

Rocket Servergraph Reviews

Ask Rocket Servergraph a Question
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 3 Rocket Servergraph reviews
LinkedIn Connections
Rocket Servergraph review by Parul P.
Parul P.
Validated Reviewer
Verified Current User
Review Source
content

"Great software"

What do you like best?

New installation up and running less than 30 Mins. Start collecting information right away. Great GUI tool for TSM admin who does not like command line. It gives great stats. Database usage is less compare to other DB. I use this software everyday. Great Dashboard. Constant update. Support is also great. Very telanted staff

What do you dislike?

Not running on windows. No other Cons. I will recommend this software to anybody. SG admin is web base. In future TSM Admin like to be web based instead of Java

Recommendations to others considering the product

Try before buy. you will love during POC

What business problems are you solving with the product? What benefits have you realized?

Daily reporting percentage. From the percentage, management know how well we are doing on backup

Sign in to G2 to see what your connections have to say about Rocket Servergraph
Rocket Servergraph review by Mike B.
Mike B.
Validated Reviewer
Verified Current User
Review Source
content

"Great Software - Great support"

What do you like best?

It works very well! It has really simplified many of our daily tasks and in some cases, it is just so much more useful than the interface provided by the original equipment manufacturer.

What do you dislike?

In the earlier versions, the scripting part was a little difficult to use, but that has really come a log way.

Recommendations to others considering the product

Great Product - Great Support

What business problems are you solving with the product? What benefits have you realized?

Monitoring all the backups has never been a popular task, but this product allows 1 person to do the work that used to tie up several for many hours and easily accomplish it remotely or from home.

What Other IT Security solution do you use?

Thanks for letting us know!
Rocket Servergraph review by John M.
John M.
Validated Reviewer
Review Source
content

"Best in class for TSM now Spectrum Protect"

What do you like best?

Having a reporting and management server all in one is a big plus for me. In addition I can monitor and manage multiple locations and TSM instances from one central location. Their support is the best and the product is constantly enhanced. Aside from TSM we also report on Networker and Datadomain which is far superior to the vendor supplied reports.

What do you dislike?

I would like to see a console or admin function for Networker or Datadomain

What business problems are you solving with the product? What benefits have you realized?

We rely heavily on Servergraph to actively monitor our critical backups and success reports to the users. This in turn reduces the time spent by the administrators to free them up for other work. We have found the alerting process of pre-defined events to be invaluable.

There are not enough reviews of Rocket Servergraph for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Google Cloud Resource Manager Logo
Google Cloud Resource Manager
4.1
(27)
Google Cloud Platform provides resource containers such as organizations, folders, and projects, that allow users to group and hierarchically organize other Cloud Platform resources.
2
Open DNS Personal Internet Security Logo
Open DNS Personal Internet Security
4.5
(23)
The easiest way to make your Internet safer, faster and more reliable.
3
Darktrace Logo
Darktrace
4.1
(24)
The enterprise immune system
4
Esker on Demand Logo
Esker on Demand
4.6
(16)
Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
5
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(14)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
6
Apple Support Number Logo
Apple Support Number
4.4
(14)
Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
7
Qihoo 360 Logo
Qihoo 360
4.2
(14)
360 Total Security offers your PC complete protection from Viruses, Trojans and other emerging threats. Whether you are shopping online, downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized.
8
Outlook Password Recovery Logo
Outlook Password Recovery
3.7
(7)
Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
9
Prey Logo
Prey
4.6
(6)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
10
Palo Alto Networks URL Filtering PAN-DB Logo
Palo Alto Networks URL Filtering PAN-DB
4.9
(5)
The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
Show more
Kate from G2

Learning about Rocket Servergraph?

I can help.
* We monitor all Rocket Servergraph reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.