Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
What's new and why it matters to your security posture.
NetBackup Flex Appliance is a turnkey cyber-hardened appliance platform that offers scalable, and cyber-resilient backup storage. Now generally available, Flex 7.0 builds on that foundation with stronger security controls, enhanced governance and even more consistent protection across core data center, departmental, and edge environments.
According to the recent Cohesity Cyber Resilience survey report, only 54% of organizations apply their backup policies and controls the same way everywhere. This inconsistency can create gaps that attackers are quick to exploit. Flex 7.0 helps close those gaps by embedding zero-trust principles directly into the appliance. It delivers built-in protection you can rely on, and greater confidence when recovery matters most.
Flex 7.0 enforces secure-by-default behaviors that must be intentionally overridden, helping to close the gaps most commonly exploited by social engineering, credential theft, and insider threats.
Flex 7.0 arrives alongside two new appliance platforms, the Flex 5270 and Flex 5372, both powered by Intel's latest Emerald Rapids processor generation. Faster backup completion and accelerated recovery times help strengthen your resilience posture, protecting critical data quickly and getting it back in production when you need it most.
Security and operational resilience are not separate concerns. Every hour your team spends manually patching, configuring firewalls, or managing scanner infrastructure is an hour they aren't spending on threat response. Flex 7.0 deliberately reduces that overhead.
If you're running NetBackup on your own infrastructure with separate primary servers, media servers, and third-party storage—you already know the operational cost. Sometimes referred to as BYO (Bring Your Own) infrastructure, every component requires its own hardening, patching, monitoring, and skills.
The security controls in Flex 7.0 including multi-person authorization, Network Access Control, integrated malware scanning, and SED enterprise lockdown by default—are all platform behaviors, not software features you can retrofit onto a fragmented stack. They work because the hardware, OS, networking, and NetBackup software are integrated and governed together.
The question isn't whether BYO can be made secure and continuously maintained. It can, but at a significant ongoing cost and complexity.
Many organizations are now exploring ways to simplify operations and reduce the effort required to manage multiple layers of infrastructure. Flex 7.0 brings these capabilities together in a converged, hardened system where many security and operational controls are already built in. With the latest 5270 and 5372 generation, the TCO equation has evolved, making it worth revisiting how Flex can streamline operations while maintaining the control teams expect.
Flex 7.0 is the answer to a specific question security teams are increasingly being asked: Can you prove that a compromised backup admin account cannot destroy your recovery capability?
The answer with Flex 7.0 is yes. It builds the auditable governance layer that makes the foundation laid by previous generations defensible. If your backup infrastructure isn't there yet, now is the time to consider Flex-based appliances to close the gap.
Written By
Vaishnavi Nambiar
Product Marketing Manager
Siddharth Deokar
Sr. Staff Product Manager