Browse Definitions :

Data backup and disaster recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.

3-2 - FAI

  • 3-2-1 Backup Strategy - The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • Actifio - Actifio is a software vendor in Waltham, Mass.
  • active archive - An active archive is a collection of data that is too valuable for a company to discard, but only needs to be accessed occasionally.
  • Amazon Cloud Drive - Amazon Cloud Drive is an online storage service that allows users to upload and access music, videos, documents and photos from Web-connected devices.
  • Amazon Glacier - Amazon Glacier, also known as Amazon Simple Storage Service (S3) Glacier, is a low-cost cloud storage service for data with longer retrieval times offered by Amazon Web Services (AWS).
  • Amazon Simple Storage Service (Amazon S3) - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.
  • application-aware storage - Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization patterns.
  • archival storage - In computers, archival storage is storage for data that may not be actively needed but is kept for possible future use or for record-keeping purposes.
  • Arcserve UDP (Arcserve Unified Data Protection) - Arcserve Unified Data Protection is a data backup and recovery software product.
  • array-based replication - Array-based replication applies the functionality of data replication across one or more storage controllers, which eliminates the processing overhead from servers and makes it easier to copy large amounts of data.
  • asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
  • Backblaze - Backblaze backs up data that cannot be retrieved if a computer breaks or is lost.
  • backup - Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.
  • backup and recovery testing - A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.
  • backup as a service (BaaS) - Backup as a service uses external providers to deliver cloud-based backup services to an enterprise.
  • backup log - Backup log is a feature of backup applications that records the events that occur during a backup process.
  • backup storage device - A backup storage device is used to make copies of data that is actively in use.
  • bare-metal restore - A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business continuity plan (BCP) - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
  • business impact analysis (BIA) - A business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • call tree - A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.
  • Carbonite - Carbonite Inc.
  • centralized backup - Centralized backup is a process that involves automatically replicating data from remote sites and sending it over a network to a main (centralized) location for storage.
  • checkpoint - A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
  • cloud drive - A cloud drive is an umbrella term used to describe any Web-based service that provides storage space on a remote server.
  • cloud encryption (cloud storage encryption) - Cloud encryption is a service offered by cloud storage providers whereby a customer's data is transformed using encryption algorithms into ciphertext and stored in the cloud.
  • cloud file sharing - Cloud file sharing is a method of allowing multiple users to access data within a public cloud, private cloud or hybrid cloud.
  • cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • cold backup (offline backup) - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • computer worm - A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
  • contingency plan - A contingency plan is a course of action designed to help an organization respond effectively to a significant future incident, event or situation that may or may not happen.
  • continuous data protection - Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
  • CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
  • crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
  • crisis management plan (CMP) - A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.
  • CRUD cycle (Create, Read, Update and Delete Cycle) - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.
  • D2D2C (disk-to-disk-to-cloud) - D2D2C (disk-to-disk-to-cloud) is an approach to hybrid cloud backup that involves using local storage for staging data that will eventually be sent to a third-part cloud storage service provider.
  • data archiving - Data archiving migrates infrequently used data to low-cost, high-capacity archive storage for long-term retention.
  • data at rest - Data at rest is a term that is sometimes used to refer to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated.
  • data backup software - Backup software makes a duplicate copy of data to protect it and enable recovery if the data is lost or corrupted due to equipment failure or some other catastrophic event.
  • data center - A data center -- also known as a datacenter or data centre -- is a facility composed of networked computers, storage systems and computing infrastructure that organizations use to organize, process, store and disseminate large amounts of data.
  • data cleansing (data cleaning, data scrubbing) - Data cleansing, also referred to as data cleaning or data scrubbing, is the process of fixing incorrect, incomplete, duplicate or otherwise erroneous data in a data set.
  • data deduplication - Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant copies of data and reduces storage overhead.
  • data deduplication hardware - Data deduplication hardware is disk storage that eliminates redundant copies of data and retains one instance to be stored.
  • data deduplication ratio - To calculate the deduplication ratio, divide the capacity of backed up data before duplicates are removed by the actual capacity used once the backup is complete.
  • data federation software - Data federation software is programming that provides an organization with the ability to collect data from disparate sources and aggregate it in a virtual database where it can be used for business intelligence (BI) or other analysis.
  • data lifecycle management (DLM) - Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.
  • data loss - Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization.
  • data protection management (DPM) - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data recovery - Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible.
  • data recovery agent (DRA) - A data recovery agent (DRA) is a Microsoft Windows user account with the ability to decrypt data that was encrypted by other users.
  • data reduction - Data reduction is the process of reducing the amount of capacity required to store data.
  • data replication - Data replication copies data from one location to another using a SAN, LAN or local WAN.
  • data restore - Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.
  • data retention policy - A data retention policy, or records retention policy, is an organization's established protocol for retaining information for operational or regulatory compliance needs.
  • data streaming - Data streaming is the continuous transfer of data at a steady, high-speed rate.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • Datto - Datto Inc. is a backup, recovery and business continuity vendor with headquarters in Norwalk, Conn.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC NetWorker - Dell EMC NetWorker is a backup software platform for the enterprise.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • disaster recovery (DR) - Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.
  • disaster recovery (DR) test - A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's business continuity/disaster recovery (BCDR) planning process.
  • Disaster Recovery as a Service (DRaaS) - Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a natural catastrophe, power outage or another type of business disruption.
  • disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • disaster recovery site (DR site) - An organization uses a disaster recovery (DR) site to recover and restore its technology infrastructure and operations when its primary facility becomes unavailable.
  • disaster recovery team - A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization’s procedures for business continuity (BC) and recovery.
  • disk backup or disk-based backup - Disk backup, or disk-based backup, is a data backup and recovery method that backs data up to hard disk storage.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • disk mirroring (RAID 1) - RAID 1 is one of the most common RAID levels and the most reliable.
  • disk-to-disk-to-tape (D2D2T) - Disk-to-disk-to-tape (D2D2T) is an approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk and then later on copied again to tape.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • enterprise data replication (EDR) - Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another.
  • enterprise MLC (eMLC) - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • enterprise risk management (ERM) - Enterprise risk management is the process of planning, organizing, directing and controlling the activities of an organization to minimize the deleterious effects of risk on its capital and earnings.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
  • failback - Failback is the process of restoring operations to a primary machine or facility after they have been shifted to a secondary machine or facility during failover.
SearchNetworking
  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close