Browse Definitions :

Data backup - disaster recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.

3-2 - FLO

  • 3-2-1 Backup Strategy - The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • Actifio - Actifio is a software vendor in Waltham, Mass.
  • active archive - An active archive is a collection of data that is too valuable for a company to discard, but only needs to be accessed occasionally.
  • agentless backup - Agentless backup is the replication of data that is performed without the use of a service, daemon or process (AKA an agent) running in the background to facilitate the process.
  • AlwaysOn Availability Groups - AlwaysOn Availability Groups is a database mirroring technique for Microsoft SQL Server that allows administrators to pull together a group of user databases that can fail over together.
  • Amazon Cloud Drive - Amazon Cloud Drive is an online storage service that allows users to upload and access music, videos, documents and photos from Web-connected devices.
  • Amazon Glacier - Amazon Glacier is a low-cost cloud storage service for data with longer retrieval times offered by Amazon Web Services (AWS).
  • Amazon S3 - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service designed for online backup and archiving of data and applications on Amazon Web Services.
  • application-aware storage - Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization patterns.
  • archival storage - In computers, archival storage is storage for data that may not be actively needed but is kept for possible future use or for record-keeping purposes.
  • Arcserve UDP (Arcserve Unified Data Protection) - Arcserve Unified Data Protection is a data backup and recovery software product.
  • array-based replication - Array-based replication applies the functionality of data replication across one or more storage controllers, which eliminates the processing overhead from servers and makes it easier to copy large amounts of data.
  • asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
  • automatic backup - Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction.
  • AWS Snowmobile - AWS Snowmobile is an Amazon Web Services (AWS) cloud storage service designed to transfer huge amounts of data by truck.
  • Backblaze - Backblaze backs up data that cannot be retrieved if a computer breaks or is lost.
  • backup - Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.
  • backup and recovery testing - A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.
  • backup as a service (BaaS) - Backup as a service uses external providers to deliver cloud-based backup services to an enterprise.
  • backup log - Backup log is a feature of backup applications that records the events that occur during a backup process.
  • backup storage device - A data storage device for backup makes copies of data actively in use.
  • backup utility (BU) - A backup utility is a program that is designed to create a copy of data in a secondary location for safekeeping.
  • bidirectional replication - Bidirectional replication is a method of replication between storage media such as hard disks or virtual disks in different locations, in which data can be transmitted in either direction.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • Business Continuity Institute (BCI) - The Business Continuity Institute, which was started in 1994 and is headquartered out of the United Kingdom, is an international organization that offers accreditation and certification, networking, published resources, training and guidance for business continuity professionals.
  • capacity optimization (CO) - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • Carbonite - Carbonite Inc.
  • CD-R shelf life - CD-R shelf life refers to the length of time that a burned compact disc will remain viable once data has been burned onto it.
  • centralized backup - Centralized backup is a process that involves automatically replicating data from remote sites and sending it over a network to a main (centralized) location for storage.
  • checkpoint - A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.
  • cloud drive - A cloud drive is an umbrella term used to describe any Web-based service that provides storage space on a remote server.
  • cloud drive storage - Cloud drive storage is a term that refers to the ability to mount the storage capacity provided by a cloud storage service so that it appears to the server as a normal drive letter.
  • cloud encryption (cloud storage encryption) - Cloud encryption is a service offered by cloud storage providers whereby data, or text, is transformed using encryption algorithms and is then placed on a storage cloud.
  • cloud file storage - Cloud file storage is a storage service that is delivered over the Internet, billed on a pay-per-use basis and has an architecture based on common file level protocols such as Server Message Block (SMB), Common Internet File System (CIFS) and Network File System (NFS).
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • cloud storage - Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet).
  • cloud storage appliance - A cloud storage appliance is a stand-alone computing device or virtual machine (VM) image used to move data from a local site to a remote cloud storage service provider.
  • cloud storage backup - Cloud storage backup involves moving data offsite to a managed service provider for protection.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • Cloud-to-Cloud Backup (C2C Backup) - Cloud-to-cloud backup, or C2C backup, is the practice of copying data stored on one cloud backup service, commonly referred to as software as a service (SaaS), to another cloud.
  • cold backup (offline backup) - Cold backups are ideal for disaster recovery because they protect important data.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • contingency plan - In business continuity and risk management, a contingency plan is a process that prepares an organization to respond coherently to an unplanned event.
  • continuous data protection (storage convergence) - Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made.
  • CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
  • crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
  • CRUD cycle (Create, Read, Update and Delete Cycle) - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.
  • D2D2C (disk-to-disk-to-cloud) - D2D2C (disk-to-disk-to-cloud) is an approach to hybrid cloud backup that involves using local storage for staging data that will eventually be sent to a third-part cloud storage service provider.
  • dark backup - A dark backup is one that can be run automatically without manual intervention.
  • DAT USB drive - A DAT USB drive is a tape drive with digital audio tape (DAT) that can be plugged into a Universal Serial Bus (USB) connection as a simple and relatively low-cost way to back up data routinely, especially on servers.
  • data backup software - Backup software makes a duplicate copy of data to protect it and enable recovery if the data is lost or corrupted due to equipment failure or some other catastrophic event.
  • data life cycle management (DLM) - Data life cycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted.
  • data loss - Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization.
  • data protection management (DPM) - Data protection management (DPM) is the administration of backup processes to ensure that tasks run on schedule, and that data is securely backed up and recoverable.
  • data recovery - Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible.
  • data reduction - Data reduction is the process of reducing the amount of capacity required to store data.
  • data restore - Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.
  • data streaming - Data streaming is the continuous transfer of data at a steady, high-speed rate.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • database mirroring - Database mirroring is the maintenance of redundant copies of a database to ensure continuous data availability and minimize or avoid downtime that might otherwise result from data corruption or loss, or when the operation of a network is partially compromised.
  • Datto - Datto Inc. is a backup, recovery and business continuity vendor with headquarters in Norwalk, Conn.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC NetWorker - Dell EMC NetWorker is a backup software platform for the enterprise.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • Disaster Recovery as a Service (DRaaS) - Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.
  • disaster recovery plan (DRP) - A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.
  • disaster recovery site (DR site) - An organization uses a disaster recovery (DR) site to recover and restore its technology infrastructure and operations when its primary facility becomes unavailable.
  • disaster recovery team - A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization’s procedures for business continuity (BC) and recovery.
  • disk backup or disk-based backup - Disk backup, or disk-based backup, is a data backup and recovery method that backs data up to hard disk storage.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • disk mirroring (RAID 1) - RAID 1 is one of the most common RAID levels and the most reliable.
  • disk-to-disk-to-tape (D2D2T) - Disk-to-disk-to-tape (D2D2T) is an approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk and then later on copied again to tape.
  • domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
  • dual-layer magnetic tape (dual-side magnetic tape) - Dual-layer magnetic tape, also known as dual-side magnetic tape, is a high-density storage medium capable of holding far more data than conventional tape backup.
  • encoding and decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • enterprise data replication (EDR) - Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another.
  • enterprise MLC (eMLC) - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • enterprise risk management (ERM) - Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
  • failback - Failback is the process of restoring operations to a primary machine or facility after they have been shifted to a secondary machine or facility during failover.
  • flash storage - Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.
  • flat backup - Flat backup uses snapshots to protect data without traditional backup software.
  • floating gate transistor (FGT) - A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close