Browse Definitions:

SearchDataBackup

The true value of SearchDataBackup.com lies in the site's dedication to providing both problem-solving advice and guidance on the deployment and use of cutting-edge backup and restore technologies such as data deduplication, continuous data protection (CDP), archiving, tape and disk options, snapshots, mirroring and more.

View the complete archive of Data Backup news, research and expert advice.

Go to:  SearchDataBackup

Recently on  SearchDataBackup

Cohesity DataPlatform now spans file, object storage

Cohesity's DataPlatform tackles unstructured data through SpanFS, which manages file and object storage and expands the vendor's converged secondary storage platform.

More Highlights
  • Veritas CloudPoint aims for multi-cloud data protection

    CloudPoint 2.0 now includes built-in content indexing from snapshots, application persistent snapshots and auto discovery of new cloud instances in Microsoft and Google clouds.

  • Latest Carbonite acquisition adds Mozy backup

    Carbonite stays busy with its pending acquisition of Mozy and a forthcoming DRaaS product. The data protection vendor also announced its revenue results.

  • Quorum OnQ 4.0

    Quorum added one-click recovery to the latest version of OnQ, as well as deduplication at the source and destination targets. OnQ appliances scale to 400 TB of raw storage.

Definitions
  • cloud backup (online backup)

    Cloud backup, also known as online backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server.

  • converged secondary storage

    Converged secondary storage is a combination of common data protection elements and non-primary storage tasks into one platform.

  • Mozy (by Dell)

    Mozy (by Dell) is a cloud backup service owned by Dell EMC that targets customers ranging from consumers through to the enterprise.

Browse Data Backup Topics

Security

Storage administrators are increasingly relying on encryption and other security technologies to guard sensitive data. Visit this topic section regularly to stay on top of the latest news and resources available.

Recent Definitions

  • encryption

    In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key.

  • Oracle RMAN (Oracle Recovery Manager)

    Oracle RMAN (Oracle Recovery Manager) is a utility built into Oracle databases to automate backup and recovery; it includes features not available in third-party backup tools.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

Highlights

Back to Top

Data reduction

Data deduplication is one of the most useful data reduction technologies in data backup and recovery today. Learn about file-level vs. block-level dedupe products, and about global vs. source dedupe in this section. Explore resources on data reduction and deduplication here, including tips and advice on choosing a data deduplication solution and about disk-to-disk backup and data dedupe. Read about the benefits of single-instance storage, data compression and other data reduction methods. Learn about how to choose a data deduplication vendor, and find news, trends and information about data reduction products. Find out about data dedupe best practices and listen to podcasts and interviews from enterprise data storage industry experts. Read data deduplication and backup tutorials, and ask our data reduction and deduplication experts your most important questions.

Recent Definitions

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and disaster recovery.

  • data deduplication hardware

    Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored. Although these products are sold as appliances or disk libraries, they include software that performs the deduplication.

  • data deduplication ratio

    To calculate the deduplication ratio, divide the capacity of backed up data before dupliates are removed by the actual capacity used once the backup is complete.

Highlights

Back to Top

Backup tools

Backup tools for enterprise data storage systems include data replication, snapshots, data backup and recovery reporting, backup testing and other backup software. Find the latest information on this topics page. Learn about the latest news on data backup and recovery tools. Listen to podcasts with data storage experts on backup tools and data protection management (DPM) tools. Get the latest tips, tutorials and learning materials on data backup and recovery tools on this page.

Recent Definitions

  • cloud backup (online backup)

    Cloud backup, also known as online backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server.

  • converged secondary storage

    Converged secondary storage is a combination of common data protection elements and non-primary storage tasks into one platform.

  • Mozy (by Dell)

    Mozy (by Dell) is a cloud backup service owned by Dell EMC that targets customers ranging from consumers through to the enterprise.

Highlights

More Backup tools Topics

Back to Top

Disk backup

Disk-based backup technology is popular for data backup and recovery applications, such as disk-to-disk-to-tape (D2D2T), continuous data protection (CDP) software, data deduplication and virtual tape libraries (VTLs). Explore resources on disk backup here, including tips and advice on migrating to disk and putting together a disk-based backup and recovery plan. Read about how disk backup can help you meet your backup recovery time objectives (RTOs) and offer better data protection. Learn about how to choose a disk backup hardware or software vendor, and find news, trends and information about the disk backup and recovery market today. Find out about disk backup best practices and listen to podcasts and interviews from storage industry experts. Read tutorials about disk backup technology strategies to help you in your enterprise data storage job, and ask our disk backup experts your most important questions.

Recent Definitions

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting SATA and PCI Express protocols simultaneously.

  • ghost imaging

    Ghost imaging, often called cloning, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image.

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to protect data in the case of a drive failure.

Highlights

Back to Top

Remote backup

Remote data protection technologies such as remote replication and mirroring are becoming an increasingly popular part of many companies' backup strategy. Stay on top of the latest information here.

Recent Definitions

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • cloud disaster recovery (cloud DR)

    Cloud DR uses an off-site cloud repository to store copies of data that can be restored on-site to keep the business running in case of an emergency.

Highlights

Back to Top

SMB backup

Small and medium-sized businesses (SMBs) often rely on their data to drive revenue and thrive. Here you can find data protection news and resources focusing on backup for small business, including tips on getting the most out of SMB backup software, data backup devices and strategies.

Highlights

Back to Top

Tape backup

Tape backup and tape libraries are essential to providing cost-effective, long-term data storage for all business types and sizes. Explore resources on backup and recovery with tape libraries here, including tutorials on LTO tape technology, recycling backup tapes and caring for your magnetic media. Stay up to date with the latest news about tape encryption and secure tape storage. Compare tape backup systems versus tape autoloaders, and compare tape library vendors. Find out about tape backup best practices and listen to podcasts and interviews from data storage industry experts. Learn how to choose the best library for your enterprise and ask our tape storage experts your most important questions.

Recent Definitions

  • LTO-7 (Linear Tape-Open 7)

    LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015.

  • tape library

    In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.

  • tape backup

    Tape can help fix an unstructured data backup issue and is a good archiving medium. Explore tape's strengths and weaknesses, plus important tips for protecting tape backups.

Highlights

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SSD TRIM

    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

  • cloud hosting

    Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close