×

Data protection analytics in cloud computing platform

  • US 10,270,796 B1
  • Filed: 03/25/2016
  • Issued: 04/23/2019
  • Est. Priority Date: 03/25/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • one or more processing devices operatively coupled via a communications network;

    a metadata monitor operatively coupled to a computing platform, each of the metadata monitor and the computing platform are implemented by the one or more processing devices, wherein the metadata monitor is configured to discover and manage metadata associated with a plurality of data protection mechanisms distributed and operating throughout the computing platform, and metadata representing a schema of the computing platform and one or more user applications executed on the computing platform;

    a data protection analytics manager, implemented by the one or more processing devices, operatively coupled to the metadata monitor, and comprising a set of one or more data protection analytics applications configured to determine, from the metadata discovered and managed by the metadata monitor, which resources of the computing platform are protected by the plurality of data protection mechanisms and which resources of the computing platform are not protected by the plurality of data protection mechanisms; and

    a user interface, implemented by the one or more processing devices;

    wherein, for the protected resources, the set of one or more data protection analytics applications is configured to compute an effectiveness value attributable to the plurality of data protection mechanisms, and for the non-protected resources, the set of one or more data protection analytics applications is configured to compute an exposure value attributable to the lack of data protection mechanisms;

    wherein the data protection analytics manager is further configured to adapt a data protection model defined by the plurality of data protection mechanisms in a data protection mechanism-agnostic manner based on results of executing the set of one or more data protection analytics applications;

    wherein, in computing the effectiveness value attributable to the plurality of data protection mechanisms, the set of one or more data protection analytics applications is configured to;

    determine dependencies of the one or more user applications on each other;

    determine whether a backup configuration of the one or more dependent user applications is asymmetric; and

    mark as anomalous any backup configurations determined to be asymmetric;

    wherein the user interface is configured to report the anomalous backup configurations.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×