Browse Definitions:

SearchDataBackup

The true value of SearchDataBackup.com lies in the site's dedication to providing both problem-solving advice and guidance on the deployment and use of cutting-edge backup and restore technologies such as data deduplication, continuous data protection (CDP), archiving, tape and disk options, snapshots, mirroring and more.

View the complete archive of Data Backup news, research and expert advice.

Go to:  SearchDataBackup

Recently on  SearchDataBackup

Actifio backup makes the grade for digital learning provider

With cyberattacks a constant threat, Actifio provides protection through a data-centric approach and an air gap. Customers can recover to a safe point in time in minutes.

More Highlights
Definitions
  • cloud-to-cloud backup (C2C backup)

    Cloud-to-cloud backup, or C2C backup, is the practice of copying data stored on one cloud backup service -- commonly referred to as software as a service (SaaS) -- to another cloud.

  • Veritas NetBackup (Symantec NetBackup)

    Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.

  • inline deduplication

    Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.

Browse Data Backup Topics

Security

Storage administrators are increasingly relying on encryption and other security technologies to guard sensitive data. Visit this topic section regularly to stay on top of the latest news and resources available.

Recent Definitions

  • encryption

    In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key.

  • Oracle RMAN (Oracle Recovery Manager)

    Oracle RMAN (Oracle Recovery Manager) is a utility built into Oracle databases to automate backup and recovery; it includes features not available in third-party backup tools.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

Highlights

Back to Top

Data reduction

Data deduplication is one of the most useful data reduction technologies in data backup and recovery today. Learn about file-level vs. block-level dedupe products, and about global vs. source dedupe in this section. Explore resources on data reduction and deduplication here, including tips and advice on choosing a data deduplication solution and about disk-to-disk backup and data dedupe. Read about the benefits of single-instance storage, data compression and other data reduction methods. Learn about how to choose a data deduplication vendor, and find news, trends and information about data reduction products. Find out about data dedupe best practices and listen to podcasts and interviews from enterprise data storage industry experts. Read data deduplication and backup tutorials, and ask our data reduction and deduplication experts your most important questions.

Recent Definitions

  • inline deduplication

    Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.

  • global deduplication

    Global deduplication is a method of preventing redundant data when backing up data to multiple deduplication devices.

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and disaster recovery.

Highlights

Back to Top

Backup tools

Backup tools for enterprise data storage systems include data replication, snapshots, data backup and recovery reporting, backup testing and other backup software. Find the latest information on this topics page. Learn about the latest news on data backup and recovery tools. Listen to podcasts with data storage experts on backup tools and data protection management (DPM) tools. Get the latest tips, tutorials and learning materials on data backup and recovery tools on this page.

Recent Definitions

  • cloud-to-cloud backup (C2C backup)

    Cloud-to-cloud backup, or C2C backup, is the practice of copying data stored on one cloud backup service -- commonly referred to as software as a service (SaaS) -- to another cloud.

  • Veritas NetBackup (Symantec NetBackup)

    Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.

  • Datto

    Datto Inc. is a backup, recovery and business continuity vendor with headquarters in Norwalk, Conn.

Highlights

More Backup tools Topics

Back to Top

Disk backup

Disk-based backup technology is popular for data backup and recovery applications, such as disk-to-disk-to-tape (D2D2T), continuous data protection (CDP) software, data deduplication and virtual tape libraries (VTLs). Explore resources on disk backup here, including tips and advice on migrating to disk and putting together a disk-based backup and recovery plan. Read about how disk backup can help you meet your backup recovery time objectives (RTOs) and offer better data protection. Learn about how to choose a disk backup hardware or software vendor, and find news, trends and information about the disk backup and recovery market today. Find out about disk backup best practices and listen to podcasts and interviews from storage industry experts. Read tutorials about disk backup technology strategies to help you in your enterprise data storage job, and ask our disk backup experts your most important questions.

Recent Definitions

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting SATA and PCI Express protocols simultaneously.

  • ghost imaging

    Ghost imaging, often called cloning, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image.

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to protect data in the case of a drive failure.

Highlights

Back to Top

Remote backup

Remote data protection technologies such as remote replication and mirroring are becoming an increasingly popular part of many companies' backup strategy. Stay on top of the latest information here.

Recent Definitions

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.

Highlights

Back to Top

SMB backup

Small and medium-sized businesses (SMBs) often rely on their data to drive revenue and thrive. Here you can find data protection news and resources focusing on backup for small business, including tips on getting the most out of SMB backup software, data backup devices and strategies.

Recent Definitions

  • Datto

    Datto Inc. is a backup, recovery and business continuity vendor with headquarters in Norwalk, Conn.

Highlights

Back to Top

Tape backup

Tape backup and tape libraries are essential to providing cost-effective, long-term data storage for all business types and sizes. Explore resources on backup and recovery with tape libraries here, including tutorials on LTO tape technology, recycling backup tapes and caring for your magnetic media. Stay up to date with the latest news about tape encryption and secure tape storage. Compare tape backup systems versus tape autoloaders, and compare tape library vendors. Find out about tape backup best practices and listen to podcasts and interviews from data storage industry experts. Learn how to choose the best library for your enterprise and ask our tape storage experts your most important questions.

Recent Definitions

  • LTO-5

    LTO-5 is a tape format released in 2010 by the Linear Tape-Open Consortium.

  • LTO-8 (Linear Tape-Open 8)

    LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017. It succeeded the LTO-7 version, which launched in 2015.

  • LTO-7 (Linear Tape-Open 7)

    LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015.

Highlights

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close