System and method of managing data protection resources
First Claim
1. A method of computerized managing a plurality of data protection (DP) resources by a processor coupled to a non-transitory computer readable memory, the method comprising:
- a) obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting and/or automated processing of the collected data;
b) accommodating the obtained data in the memory thus giving rise to accommodated data;
c) processing the accommodated data by the processor, said processing resulting in identifying at least one data protection (DP) scheme characterizing a combination of DP resources and a relationship thereof, wherein said relationship is characterized, at least, by a data protection technique implemented with regard to, at least said combination of DP resources; and
d) identifying at least one data protection (DP) gap with regard to at least one group of DP resources in said identified DP scheme by the processor, wherein said group of DP resources is other than a layout path characterized by a sequence of storage replication techniques used between a source and a target data accommodating resources, and wherein said DP gap is characterized by a gap profile specified as a combination of said group of DP resources and a condition indicative of one or more predefined DP violations in said group of DP resources.
1 Assignment
0 Petitions
Accused Products
Abstract
Herewith disclosed a method and system for computerized managing a plurality of data protection (DP) resources. The computerized management comprises obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting; accommodating the obtained data in a data repository thus giving rise to accommodated data; processing the accommodated data, said processing resulting in at least one of the following: a) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) identifying one or more data protection (DP) gaps.
27 Citations
17 Claims
-
1. A method of computerized managing a plurality of data protection (DP) resources by a processor coupled to a non-transitory computer readable memory, the method comprising:
-
a) obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting and/or automated processing of the collected data; b) accommodating the obtained data in the memory thus giving rise to accommodated data; c) processing the accommodated data by the processor, said processing resulting in identifying at least one data protection (DP) scheme characterizing a combination of DP resources and a relationship thereof, wherein said relationship is characterized, at least, by a data protection technique implemented with regard to, at least said combination of DP resources; and d) identifying at least one data protection (DP) gap with regard to at least one group of DP resources in said identified DP scheme by the processor, wherein said group of DP resources is other than a layout path characterized by a sequence of storage replication techniques used between a source and a target data accommodating resources, and wherein said DP gap is characterized by a gap profile specified as a combination of said group of DP resources and a condition indicative of one or more predefined DP violations in said group of DP resources. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computerized method of processing data related to DP resources by a processor coupled to a non-transitory computer readable memory, said processing comprising:
-
a) running by the processor at least one rule so as to identify at least one data protection (DP) scheme characterizing a combination of DP resources and a relationship thereof, wherein said relationship is characterized, at least, by a data protection technique implemented with regard to, at least, said combination of DP resources; and b) running by the processor at least one rule so as to identify at least one DP gaps with regard to at least one group of DP resources in said at least one identified DP scheme, wherein said group of DP resources is other than a layout path characterized by a sequence of storage replication techniques used between a source and a target data accommodating resources, wherein said DP gap is characterized by a gap profile specified as a combination of said group of DP resources and a condition indicative of one or more predefined DP violations in said group of DP resources.
-
-
8. A system for computerized managing a plurality of data protection (DP) resources, the system comprising:
- )
a non-transitory computer readable memory adapted to accommodate data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting and/or automated processing of the collected data, thus giving rise to accommodated data; a processor operatively coupled to the memory and adapted to process the accommodated data, said processing resulting in identifying at least one data protection (DP) scheme characterizing a combination of DP resources and/ relationship thereof, wherein said relationship is characterized, at least, by a data protection technique implemented with regard to, at least said combination of DP resources; and wherein the processor is further configured to identify at least one data protection (DP) gap with regard to at least one group of DP resources in said identified DP scheme, wherein said group of DP resources is other than a layout path characterized by a sequence of storage replication techniques used between a source and a target data accommodating resources; and
wherein said DP gap is characterized by a gap profile specified as a combination of said group of DP resources and a condition indicative of one or more predefined DP violations in said group of DP resources. - View Dependent Claims (9, 10, 11, 12, 13, 14)
- )
-
15. A computer adapted for processing data related to DP resources, said computer comprising a processor operatively coupled to a memory accommodating a plurality of rules, wherein the processor is configured:
-
to run at least one rule from said plurality of rules so as to identify at least one data protection (DP) scheme characterizing a combination of DP resources and relationship thereof, wherein said relationship is characterized, at least, by a data protection technique implemented with regard to, at least said combination of DP resources; and to run at least one rule from said plurality of rules so as to identify at least one DP gap with regard to said identified at least one DP scheme, wherein said at least one DP gap is characterized by a gap profile specified as a combination of said at least one identified DP scheme, and a condition indicative of one or more predefined DP violations in said DP scheme, said one or more predefined DP violations other than violations related to a sequence of storage replication techniques used between a source and a target data accommodating resources.
-
-
16. A computer program product comprising a non-transitory computer readable medium storing computer readable program code for a computer managing a plurality of data protection (DP) resources, the computer program product comprising:
-
i) computer readable program code for causing the computer to identify at least one data protection (DP) scheme characterizing a combination of DP resources and relationships thereof, wherein said relationship is characterized, at least, by a data protection technique implemented with regard to, at least said combination of DP resources; and ii) computer readable program code for causing the computer to identify at least one data protection (DP) gap with regard to at least one group of DP resources in said identified data protection scheme, wherein said group of DP resources is other than a layout path characterized by a sequence of storage replication techniques used between a source and a target data accommodating resources;
wherein said DP gap is characterized by a gap profile specified as a combination of said at least one group of DP resources, and a condition indicative of one or more predefined DP violations in said group of DP resources.
-
-
17. A computerized method of providing a service related to identifying one or more data protection (DP) gaps among a plurality of data protection (DP) resources by a hardware processor, the method comprising:
-
a) running by the processor, at least one rule so as to identify at least one data protection (DP) scheme characterizing a combination of DP resources and a relationship thereof, wherein said relationship is characterized, at least, by data protection technique implemented with regard to, at least said combination of DP resources; and b) running by the processor, at least one rule so as to identify at least one DP gap, wherein said at least one DP gap is characterized by a gap profile specified as a combination of said at least one identified DP scheme, and a condition indicative of one or more predefined DP violations in said DP scheme, said one or more predefined DP violations other than violations related to a sequence of storage replication techniques used between a source and a target data accommodating resources.
-
Specification