Apparatus and method for information recovery quality assessment in a computer system
First Claim
1. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, an apparatus for the assessment of the quality of a recovery process, the apparatus comprising the elements of:
- a data protection policy builder component to create at least one data protection rule associated with an organization operating the computer network, the at least one data protection rule comprising a data protection rules repository;
a network computer-level analyzer component to compare an at least one network computer with an at least one data protection input parameter of an at least one data protection rule;
a network storage object-level analyzer component to compare an at least one network storage object with the at least one data protection input parameter of the at least one data protection rule, and with data protection result output data of the at least one data protection server index; and
a rejected objects identifier component to identify anomalous or rejected objects in accordance with the results generated by the data protection policy repository builder component or by the network computer-level analyzer component or by the network storage object-level analyzer component.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for information recovery quality assessment in a computing environment is disclosed. This includes a group of inter-related software modules and associated data structures that analyze and assess the recoverability of the network data through the data protection configuration setup and a previously performed data protection process. It examines in a comprehensive manner the recoverability perspective across a pre-defined data protection domain, such as a computer network with an organization. The results of the examination provide for the display of inconsistencies of data protection configuration and previously performed data protection processes that consequently result in problems of recovering the network objects in an appropriate manner.
72 Citations
37 Claims
-
1. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, an apparatus for the assessment of the quality of a recovery process, the apparatus comprising the elements of:
-
a data protection policy builder component to create at least one data protection rule associated with an organization operating the computer network, the at least one data protection rule comprising a data protection rules repository;
a network computer-level analyzer component to compare an at least one network computer with an at least one data protection input parameter of an at least one data protection rule;
a network storage object-level analyzer component to compare an at least one network storage object with the at least one data protection input parameter of the at least one data protection rule, and with data protection result output data of the at least one data protection server index; and
a rejected objects identifier component to identify anomalous or rejected objects in accordance with the results generated by the data protection policy repository builder component or by the network computer-level analyzer component or by the network storage object-level analyzer component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, a method for the assessment of the quality of a recovery process, the method comprising the steps of:
-
building a combined data protection policy table by obtaining and inserting into the table the at least one data protection rule;
performing a network computer-level analysis by scanning the computer network, locating an at least one network computer linked to the network, obtaining network computer-specific data to identify the at least one network computer, and comparing the network computer-specific data with the content of the combined data protection policy table; and
performing a network storage object-level analysis by locating an at least one network object associated with the at least one network computer linked to the computer network, obtaining storage object-specific data that identifies the at least one network storage, and comparing the storage object-specific data with the content of the combined data protection policy table; and
comparing an at least one first data protection input parameters with an at least one data protection rule or with an at least one second data protection input parameters to identify inconsistencies or to identify storage objects that cannot be recovered. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 30, 31, 33, 34, 35, 36, 37)
-
-
32. The method of claim 29 wherein an anomalous or rejected object is an storage object that cannot be recovered by a data protection process or an storage object that cannot be recovered by a data protection process defined by the at least one data protection rule or an storage object is inconsistent with information comprising the at least one data protection rule or the data protection input parameters of the at least one data protection rule.
Specification