Data protection analytics in cloud computing platform
First Claim
1. A system, comprising:
- one or more processing devices operatively coupled via a communications network;
a metadata monitor operatively coupled to a computing platform, each of the metadata monitor and the computing platform are implemented by the one or more processing devices, wherein the metadata monitor is configured to discover and manage metadata associated with a plurality of data protection mechanisms distributed and operating throughout the computing platform, and metadata representing a schema of the computing platform and one or more user applications executed on the computing platform;
a data protection analytics manager, implemented by the one or more processing devices, operatively coupled to the metadata monitor, and comprising a set of one or more data protection analytics applications configured to determine, from the metadata discovered and managed by the metadata monitor, which resources of the computing platform are protected by the plurality of data protection mechanisms and which resources of the computing platform are not protected by the plurality of data protection mechanisms; and
a user interface, implemented by the one or more processing devices;
wherein, for the protected resources, the set of one or more data protection analytics applications is configured to compute an effectiveness value attributable to the plurality of data protection mechanisms, and for the non-protected resources, the set of one or more data protection analytics applications is configured to compute an exposure value attributable to the lack of data protection mechanisms;
wherein the data protection analytics manager is further configured to adapt a data protection model defined by the plurality of data protection mechanisms in a data protection mechanism-agnostic manner based on results of executing the set of one or more data protection analytics applications;
wherein, in computing the effectiveness value attributable to the plurality of data protection mechanisms, the set of one or more data protection analytics applications is configured to;
determine dependencies of the one or more user applications on each other;
determine whether a backup configuration of the one or more dependent user applications is asymmetric; and
mark as anomalous any backup configurations determined to be asymmetric;
wherein the user interface is configured to report the anomalous backup configurations.
9 Assignments
0 Petitions
Accused Products
Abstract
A system includes a metadata monitor configured to discover and manage metadata associated with a plurality of data protection mechanisms distributed and operating throughout a computing platform, and metadata representing a schema of the computing platform and one or more user applications executed thereon. The system also includes a data protection analytics manager comprising a set of one or more data protection analytics applications configured to determine, from the metadata, which resources are and are not protected by the plurality of data protection mechanisms. For the protected resources, the data protection analytics applications are configured to compute an effectiveness value, and for the non-protected resources, the data protection analytics applications are configure to compute an exposure value. A data protection model can then be adapted in a data protection mechanism-agnostic manner.
70 Citations
20 Claims
-
1. A system, comprising:
-
one or more processing devices operatively coupled via a communications network; a metadata monitor operatively coupled to a computing platform, each of the metadata monitor and the computing platform are implemented by the one or more processing devices, wherein the metadata monitor is configured to discover and manage metadata associated with a plurality of data protection mechanisms distributed and operating throughout the computing platform, and metadata representing a schema of the computing platform and one or more user applications executed on the computing platform; a data protection analytics manager, implemented by the one or more processing devices, operatively coupled to the metadata monitor, and comprising a set of one or more data protection analytics applications configured to determine, from the metadata discovered and managed by the metadata monitor, which resources of the computing platform are protected by the plurality of data protection mechanisms and which resources of the computing platform are not protected by the plurality of data protection mechanisms; and a user interface, implemented by the one or more processing devices; wherein, for the protected resources, the set of one or more data protection analytics applications is configured to compute an effectiveness value attributable to the plurality of data protection mechanisms, and for the non-protected resources, the set of one or more data protection analytics applications is configured to compute an exposure value attributable to the lack of data protection mechanisms; wherein the data protection analytics manager is further configured to adapt a data protection model defined by the plurality of data protection mechanisms in a data protection mechanism-agnostic manner based on results of executing the set of one or more data protection analytics applications; wherein, in computing the effectiveness value attributable to the plurality of data protection mechanisms, the set of one or more data protection analytics applications is configured to; determine dependencies of the one or more user applications on each other; determine whether a backup configuration of the one or more dependent user applications is asymmetric; and mark as anomalous any backup configurations determined to be asymmetric; wherein the user interface is configured to report the anomalous backup configurations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising
discovering and managing metadata, via a metadata monitor operatively coupled to a computing platform, wherein each of the metadata monitor and the computing platform are implemented by one or more processing devices, and wherein the metadata is associated with a plurality of data protection mechanisms distributed and operating throughout the computing platform, and the metadata represents a schema of the computing platform and one or more user applications executed on the computing platform; -
executing a set of one or more data protection analytics applications, via a data protection analytics manager implemented by the one or more processing devices and operatively coupled to the metadata monitor, wherein the set of one or more data protection analytics applications are configured to determine, from the metadata discovered and managed by the metadata monitor, which resources of the computing platform are protected by the plurality of data protection mechanisms and which resources of the computing platform are not protected by the plurality of data protection mechanisms, wherein, for the protected resources, the set of one or more data protection analytics applications is configured to compute an effectiveness value attributable to the plurality of data protection mechanisms, and for the non-protected resources, the set of one or more data protection analytics applications is configured to compute an exposure value attributable to the lack of data protection mechanisms; adapting, via the data protection analytics manager, a data protection model defined by the plurality of data protection mechanisms in a data protection mechanism-agnostic manner based on results of executing the set of one or more data protection analytics applications; wherein, in computing the effectiveness value attributable to the plurality of data protection mechanisms, the set of one or more data protection analytics applications is configured to; determine dependencies of the one or more user applications on each other; determine whether a backup configuration of the one or more dependent user applications is asymmetric; and mark as anomalous any backup configurations determined to be asymmetric; reporting, via a user interface, the anomalous backup configurations.
-
-
20. An article of manufacture comprising a processor-readable storage medium having encoded therein executable code of one or more software programs, wherein the one or more software programs when executed by one or more processing devices implement the steps of:
-
discovering and managing metadata, via a metadata monitor operatively coupled to a computing platform, wherein each of the metadata monitor and the computing platform are implemented by the one or more processing devices, and wherein the metadata is associated with a plurality of data protection mechanisms distributed and operating throughout the computing platform, and the metadata represents a schema of the computing platform and one or more user applications executed on the computing platform; executing a set of one or more data protection analytics applications, via a data protection analytics manager implemented by the one or more processing devices and operatively coupled to the metadata monitor, wherein the set of one or more data protection analytics applications are configured to determine, from the metadata discovered and managed by the metadata monitor, which resources of the computing platform are protected by the plurality of data protection mechanisms and which resources of the computing platform are not protected by the plurality of data protection mechanisms, wherein, for the protected resources, the set of one or more data protection analytics applications is configured to compute an effectiveness value attributable to the plurality of data protection mechanisms, and for the non-protected resources, the set of one or more data protection analytics applications is configured to compute an exposure value attributable to the lack of data protection mechanisms; adapting, via the data protection analytics manager, a data protection model defined by the plurality of data protection mechanisms in a data protection mechanism-agnostic manner based on results of executing the set of one or more data protection analytics applications, wherein, in computing the effectiveness value attributable to the plurality of data protection mechanisms, the set of one or more data protection analytics applications is configured to; determine dependencies of the one or more user applications on each other; determine whether a backup configuration of the one or more dependent user applications is asymmetric; and mark as anomalous any backup configurations determined to be asymmetric; reporting, via a user interface, the anomalous backup configurations.
-
Specification