Systems and methods for protecting email data
First Claim
1. A networked data storage system for protecting email data using email protection rules, the system comprising:
- at least one client computing device comprising a first application configured to generate emails;
a second computing device comprising one or more hardware processors;
one or more email protection rules provided in at least one storage device, the email protection rules comprising criteria,wherein an email server application transmits emails generated by the first application to recipients, and additionally transmits at least some of the emails generated by the first application for processing by the one or more hardware processors of the second computing device,wherein the one or more hardware processors of the second computing device are programmed to;
receive at least a first email from the email server application; and
based at least partly on the criteria of the email protection rules, identify a secondary storage computing device of a plurality of secondary storage computing devices to which to transmit the first email received from the email server application,wherein subsequent to identification of the secondary storage computing device by the one or more hardware processors of the second computing device, the first email is transmitted to the identified secondary storage computing device for processing as part of an operation in which a secondary copy of the first email is created and stored.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspects of this disclosure relate to protecting email data. For example, email protection rules can instruct an email server to route an email to an email protection module. The one or more email rules can identify a group of one or more email addresses. The email protection module can receive an email from the email server that has an email address of the group as an intended receipt. The email protection module can route the email to secondary storage and store the email in secondary storage to create a secondary copy of the email. The secondary copy can be stored inline to persistent memory of secondary storage, according to certain embodiments. Access to the backup copy of the email stored to the persistent memory can be controlled, for example, based on whether a user had permission to access to the email when the email was sent.
-
Citations
20 Claims
-
1. A networked data storage system for protecting email data using email protection rules, the system comprising:
-
at least one client computing device comprising a first application configured to generate emails; a second computing device comprising one or more hardware processors; one or more email protection rules provided in at least one storage device, the email protection rules comprising criteria, wherein an email server application transmits emails generated by the first application to recipients, and additionally transmits at least some of the emails generated by the first application for processing by the one or more hardware processors of the second computing device, wherein the one or more hardware processors of the second computing device are programmed to; receive at least a first email from the email server application; and based at least partly on the criteria of the email protection rules, identify a secondary storage computing device of a plurality of secondary storage computing devices to which to transmit the first email received from the email server application, wherein subsequent to identification of the secondary storage computing device by the one or more hardware processors of the second computing device, the first email is transmitted to the identified secondary storage computing device for processing as part of an operation in which a secondary copy of the first email is created and stored. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method of protecting email data using email protection rules, the method comprising:
-
with an email server application, transmitting emails generated by a first application executing on at least one client computing device to one or more recipients of the emails; transmitting with the email server application a subset of the emails generated by the first application to an email protection processor which executes on one or more computer processors; with the email protection processor, receiving at least a first email from the email server application, the first email belonging to the subset of the emails; accessing from at least one storage device a set of email protection rules comprising criteria; based at least partly on the criteria of the email protection rules, identifying with the email protection processor a secondary storage computing device of a plurality of secondary storage computing devices to which to transmit the first email received from the email server application, wherein subsequent to identification of the secondary storage computing device by the email protection processor, the first email is transmitted to the identified secondary storage computing device for processing as part of an operation in which a secondary copy of the first email is created and stored. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification