SYSTEM AND METHOD OF MANAGING DATA PROTECTION RESOURCES
First Claim
1. A method of computerized managing a plurality of data protection (DP) resources, the method comprising:
- a) obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting and/or automated processing of the collected data;
b) accommodating the obtained data in a data repository thus giving rise to accommodated data;
c) processing the accommodated data, said processing resulting in at least one outcome selected from a group comprising;
i) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and
ii) identifying one or more data protection (DP) gaps.
1 Assignment
0 Petitions
Accused Products
Abstract
Herewith disclosed a method and system for computerized managing a plurality of data protection (DP) resources. The computerized management comprises obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting; accommodating the obtained data in a data repository thus giving rise to accommodated data; processing the accommodated data, said processing resulting in at least one of the following: a) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) identifying one or more data protection (DP) gaps.
58 Citations
31 Claims
-
1. A method of computerized managing a plurality of data protection (DP) resources, the method comprising:
-
a) obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting and/or automated processing of the collected data; b) accommodating the obtained data in a data repository thus giving rise to accommodated data; c) processing the accommodated data, said processing resulting in at least one outcome selected from a group comprising; i) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and ii) identifying one or more data protection (DP) gaps. - View Dependent Claims (2, 3, 4, 5, 8, 10, 11, 12)
-
-
6. (canceled)
-
7. (canceled)
-
9. (canceled)
-
13. (canceled)
-
14. A method of processing data related to DP resources, said processing comprising:
-
a) running at least one rule so as to identify one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) running at least one rule so as to identify one or more DP gaps, wherein at least one DP gap is characterized by a gap profile and is identified by matching said gap profile to at least one identified DP scheme.
-
-
15. A system for computerized managing a plurality of data protection (DP) resources, the system comprising:
-
a) means for obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting and/or automated processing of the collected data; b) a data repository accommodating the obtained data thus giving rise to accommodated data; c) a processor adapted to process the accommodated data, said processing resulting in at least one outcome selected from a group comprising; i) identifying one or more data protection (DP schemes characterizing DP resources and/or relationship thereof; and ii) identifying one or more data protection (DP) gaps. - View Dependent Claims (16, 17, 18, 20, 21, 22, 24, 25, 26, 31)
-
-
19. (canceled)
-
23. (canceled)
-
27. A processor adapted for processing data related to DP resources, said processing comprising:
-
a) running at least one rule so as to identify one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) running at least one rule so as to identify one or more DP gaps, wherein at least one DP gap is characterized by a gap profile and is identified by matching said gap profile to at least one identified scheme.
-
-
28. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps of computerized managing a plurality of data protection (DP) resources, the method comprising:
-
a) obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated; collecting and/or automated processing of the collected data; b) accommodating the obtained data in a data repository thus giving rise to accommodated data; c) processing the accommodated data, said processing resulting in at least one finding selected from a group comprising; i) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and ii) identifying one or more data protection (DP) gaps.
-
-
29. A computer program product comprising a computer useable medium having computer readable program code embodied therein of computerized managing a plurality of data protection (DP) resources, the computer program product comprising:
computer readable program code for causing the computer to process the data related to DP resources, said processing resulting in at least one finding selected from a group comprising; i) computer readable program code for causing the computer to identify one or more data protection (DP) schemes characterizing DP resources and/or relationships thereof; and ii) computer readable program code for causing the computer to identify one or more data protection (DP) gaps.
-
30. A computerized service related to identifying one or more data protection (DP) gaps among a plurality of data protection (DP) resources, the service comprising:
-
a) running at least one rule so as to identify one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) running at least one rule so as to identify one or more DP gaps, wherein at least one DP gap is characterized by a gap profile and is identified by matching said gap profile to at least one identified DP scheme.
-
Specification