Sold Out
Book Categories |
Acknowledgements xi
Introduction xiii
An Introduction to Data Protection Today 1
Introduction 1
Traditional Backup and Recovery 1
Hierarchical Storage Migration (HSM) 5
Disaster Recovery 6
Vaulting 7
Offsiting Original Backup 10
Create Multiple Copies of the Backup 10
Duplicate the Original Backup 10
Encryption 11
Client Side Encryption 11
Media Server Encryption 12
Encryption Appliance 12
Management and Reporting 12
Service Level Management 13
Summary 14
The Evolution 15
Introduction 15
Storage Virtualization 15
Why Storage Virtualization? 16
RAID 17
So What Does This Really Mean? 18
RAID Levels 19
What Mirroring and RAID Do Not Do 22
Which RAID Should I Use When? 23
Replication 24
Host-Based Replication 27
RAID System Replication 27
Standby orDR Site 28
Summary 29
Backup Integration 31
Introduction 31
Snapshots 31
Mirror 32
Mirror as an instant recovery mechanism 32
Mirror as a backup object, either by the application server or by a backup server 32
Mirror resynchronization 33
COW Snapshot 35
Replication 37
Applications 38
Summary 39
Bare Metal Restore 41
Introduction 41
Background 41
Why BMR? 42
Why Has This Taken So Long? 43
The Evolution of BMR Capabilities 44
The Manual Reinstall-and-Restore Method 45
Limitations of the manual reinstall-and-restore method 45
Operating System Provided Recovery Solutions 48
Limitations of operating system provided recovery solutions 49
Hybrid or Home-Grown Recovery Solutions 50
Filling the Gap - Integrated BMR 53
The Bar Rises 54
The Problem of Dissimilar Disk Recovery 55
Approach 1: Changing the Disk and Volume Configuration Information 55
Approach 2: Adjusting the Volumes and File Systems During Recovery 56
The Problem of Automating Disk Mapping 56
The Problem of Dissimilar System Recovery 58
Windows Dissimilar System Restore Issues 59
UNIX Dissimilar System Restore Issues 60
The Current State of Integrated BMR 61
The Future of BMR 62
Enterprise Data Protection Server Self-Restore 62
Automated Dissimilar Disk Restore 63
Automated Dissimilar System Recovery 63
Network Integration 64
New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery 64
Continuous Data Protection (CDP) 64
Single Instance Store (SIS) 64
Storage Area Network (SAN) 65
Large-Scale Automated Bare Metal Recovery 65
Summary 66
Management 67
Introduction 67
Protecting Data Throughout Its Life Cycle 69
Architecting for Efficient Management 71
Reporting 78
Backup Operations Reporting 79
Alerting and Notification 81
Backup Reporting to Business Units 83
Business Unit Chargeback 86
Backup Service Providers 86
Conclusion 87
Security 89
Introduction 89
Encryption and Data Protection 90
Encryption Overview 90
Encryption and Key Management 91
Encryption Use in Data Protection 92
Data Protection Application Security 94
Terminology 95
Authentication 95
Authorization 95
Access control 96
Role-Based Security 96
Audit Trails 97
Firewalls 97
Security Vulnerabilities in Data Protection Applications 98
Vulnerability Detection and Fix Process 99
Types of Vulnerabilities 100
Conclusion 101
New Features in Data Protection 103
Introduction 103
Synthetic Backups 104
Evolution of Synthetic Backups 106
Benefits of Synthetic Backups 106
Building a Synthetic Backup 108
Technical Considerations and Limitations 109
File-Based Versus Block-Based Synthetics 109
File Types and File Change Frequency 109
Media Considerations 110
Disk-Based Solutions 110
Disk to Disk 111
Disk Staging 112
Early Implementations 113
Later Implementations 114
Commercial Implementations 116
Virtual Tape 116
Advantages of Virtual Tape 117
Technical Considerations and Limitations 118
Disk-Based Data Protection Implementation Issues 118
Conclusion 119
Disk-Based Protection Technologies 121
Introduction 121
Disk Synthetic Backup 122
Online Protection: CDP 123
A CDP Definition 124
CDP Using Byte Level Replication 125
CDP or 'Near' CDP Using Snapshot Technology 126
Benefits and Technical Considerations of CDP 127
Data Reduction: SIS 128
Primary Data Growth and Secondary Data Explosion 129
Issues With Today's Secondary Data Storage 130
Growth of the Geographically Dispersed Business Model 131
Issues with Remote Office Backups in the Traditional Data Protection Model 131
SIS as a Solution to Remote Office and Data Redundancy 132
Data Redundancy Elimination Using SIS 133
Benefits and Technical Considerations of SIS 134
New Pricing Paradigms for Disk-Based Protection 137
Source Versus Target 138
Tiered Versus Nontiered 139
Size of the Increments 140
Conclusion 141
Managing Data Life Cycle and Storage 143
Introduction 143
Issues Surrounding Data Life Cycle 143
Data Life Cycle Management 145
Hierarchical Storage Management (HSM) as a Space Management Tool 146
Space management example 147
Archive Management 148
Archive and Space Management Together 151
Application Considerations 152
Email as a Driving Force 152
Instant Messaging 153
Business Portals 154
Applying an Application Strategy 155
Content Indexing 156
Additional Considerations 157
File System Intelligence 157
File Blocking 157
Backup Integration 159
Security 160
Public Disclosure 161
Archive as a Secondary Target 161
Compliance 162
Record Deletion 163
Conclusion 165
Quality Control 167
Introduction 167
Quality Control as a Framework 168
Managing the Service Level Agreements (SLAs) 172
Protection by Business Unit 173
Storage Resource Management (SRM) 174
Application Considerations 175
Corrective Action 176
Patching 177
Policy and Compliance 178
Cost Modelling 179
Security 181
Conclusion 182
Tools for the System 185
Introduction 185
HA 185
Protecting Data that is Part of a Cluster 186
Clustering a Data Protection Application so that It can be Highly Available 187
Provisioning 188
Growing Environments 189
From Test to Production 190
Virtualization 190
Summary 191
Conclusion 193
Glossary 199
Appendix A 207
Appendix B 219
Index 239
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDigital Data Integrity: Evolution from Passive Protection to Active Management
X
This Item is in Your InventoryDigital Data Integrity: Evolution from Passive Protection to Active Management
X
You must be logged in to review the productsX
X
X
Add Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management to the inventory that you are selling on WonderClubX
X
Add Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management to your collection on WonderClub |