Data backup and disaster recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.
  • organization resilience - Organizational resilience is an organization's ability to anticipate issues ahead of time and develop a plan for handling identified problems.
  • pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
  • personal health record (PHR) - A personal health record (PHR) is an electronic summary of health information that a patient maintains control of themselves, as opposed to their healthcare provider.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • ransomware recovery - Ransomware recovery is the process of resuming operations following a cyberattack that demands payment in exchange for unlocking encrypted data.
  • recovery point objective (RPO) - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system or network goes down as a result of a hardware, program or communications failure.
  • recovery time objective (RTO) - The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote office/branch office (ROBO) - A remote office/branch office (ROBO) is a corporate business site located at some distance from the organization's headquarters or main office.
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • secondary storage - Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary storage or that doesn't have the same performance or availability requirements.
  • security incident - A security incident is an event that could indicate that an organization's systems or data have been compromised or that security measures put in place to protect them have failed.
  • security operations center (SOC) - A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.
  • software redundant array of independent disk (software RAID) - Software RAID, also known as virtual RAID, is a form of RAID (software redundant array of independent disk) performed on an internal server.
  • solid-state storage - Solid-state storage is a type of computer storage media that stores data electronically and has no moving parts.
  • storage capacity planning - Storage capacity planning is the practice of assessing current data storage needs and forecasting future storage requirements.
  • storage filer - A storage filer is a type of file server designed and programmed for high-volume data storage, backup and archiving.
  • storage snapshot - A storage snapshot is a set of reference markers for data at a particular point in time (PIT).
  • synchronous replication - Synchronous replication is the process of copying data over a network to create multiple current copies of the data.
  • System Restore (Windows) - System Restore is a Microsoft Windows utility designed to protect and revert the operating system (OS) to a previous state.
  • tabletop exercise (TTX) - A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.
  • tape backup - Tape backup is the practice of periodically copying data from a primary storage device to a tape cartridge.
  • tape drive - A tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes.
  • tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • triage in IT - Triage is a term referring to the assignment of priority levels to tasks or individuals to determine the most effective order in which to deal with them.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, organization or business unit on a pay-per-use basis.
  • value-based healthcare - Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing quality care to patients.
  • Veeam Backup & Replication - Veeam Backup & Replication is a software product developed by Veeam Software to back up, restore and replicate data on virtual machines (VMs).
  • Veritas NetBackup (Symantec NetBackup) - Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.
  • virtual disaster recovery - Virtual disaster recovery is a type of DR that typically involves replication and enables a user to fail over to virtualized workloads.
  • virtual hard disk (VHD) - A virtual hard disk (VHD) is a disk image file format for storing the entire contents of a computer's hard drive.
  • virtual machine replication - Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • warm site - A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.
  • What is a business continuity plan (BCP)? - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • What is an NVDIMM (non-volatile dual in-line memory module)? - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.
  • What is BCDR? Business continuity and disaster recovery guide - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • What is cloud backup and how does it work? - Cloud backup, also known as online backup or remote backup, is a strategy for sending a copy of a physical or virtual file or database to a secondary, off-site location for preservation in case of equipment failure, site catastrophe or human malfeasance.
  • What is continuous data protection (CDP)? - Continuous data protection (CDP), also known as 'continuous backup,' is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
  • What is data backup? An in-depth guide - Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
  • What is data protection and why is it important? - Data protection is the process of safeguarding data and restoring important information in the event the data is corrupted, compromised or lost due to cyberattacks, shutdowns, intentional harm or human error.
  • What is incident response? A complete guide - Incident response is an organized, strategic approach to detecting and managing cyberattacks in ways that minimize damage, recovery time and total costs.
  • What is National Electrical Code (NEC)? - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the Americas.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • What is risk mitigation? Strategies, plan and best practices - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
  • What is software resilience testing? - Software resilience testing is a method of software testing that focuses on ensuring that applications perform well in real-life or chaotic conditions.
  • What is the CIA triad (confidentiality, integrity and availability)? - The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security within an organization.
  • What is wbadmin? - Wbadmin is an elevated command prompt that allows administrators or backup operators to backup and restore an operating system (OS), volume, file, folder or application.
  • Windows file share witness (FSW) - A Windows file share witness is a file share that is available to all nodes in a high-availability cluster.
  • write-back - Write-back is a technique used to cache data between the local processor or central processing unit and the final storage location, which is typically either main memory -- RAM -- or disk.
  • write-through - Write-through is a storage method in which data is written into the cache and the corresponding main memory location at the same time.
  • Zerto - Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.
Networking
Security
CIO
HRSoftware
Customer Experience
Close