
- 352 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined.
The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are:
• Data protection as a storage and recovery activity
• Data protection as a security activity
• Data protection as a privacy activity
These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing.
This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business.
About the Author
Preston de Guise has been working with data recovery products for his entire career—designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title
- Title
- Copyright
- Dedication
- Contents
- Preface
- Acknowledgments
- 1 Introduction
- 2 Contextualizing Data Protection
- 3 Data Lifecycle
- 4 Elements of a Protection System
- 5 IT Governance and Data Protection
- 6 Monitoring and Reporting
- 7 Business Continuity
- 8 Data Discovery
- 9 Security, Privacy, Ethical, and Legal Considerations
- 10 Continuous Availability, Replication, and CDP
- 11 Snapshots
- 12 Backup and Recovery
- 13 Deduplication
- 14 The Cloud
- 15 Protecting Virtual Infrastructure
- 16 Big Data
- 17 Protecting the Edge
- 18 Data Storage Fault Tolerance
- 19 Tape
- 20 Converged Infrastructure
- 21 Data Protection Service Catalogs
- 22 Holistic Data Protection Strategies
- 23 Making Data Protection Smarter
- 24 Data Recovery
- 25 Long-Term Retention Considerations
- 26 Choosing Protection Infrastructure
- 27 The Impact of Flash on Data Protection
- 28 In Closing
- Appendix A: Glossary of Terms
- Appendix B: Notes on Self-Reflection
- Index