VM PROTECTION WITH TRUE ZERO RTO
    85.
    发明申请

    公开(公告)号:US20210263650A1

    公开(公告)日:2021-08-26

    申请号:US16802120

    申请日:2020-02-26

    Abstract: One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.

    Fast key-value storage for continuous data protection systems

    公开(公告)号:US11086837B2

    公开(公告)日:2021-08-10

    申请号:US16248690

    申请日:2019-01-15

    Abstract: Embodiments for providing memory for continuous data protection in a data storage system by storing a first key-value map as a data structure wherein the key is an address of a volume and the value comprises timestamp and hash value pairs for each time the address had data written thereto, and corresponding hash values of the written data, and storing a second key-value map as a data structure wherein the key comprises the hash value and the value comprises the written data. The first key-value map and second key-value map are implemented as a driver component in a server computer of the data storage system. The driver exposes a block device protocol on the server computer and leverages the key-value data structures for use with a deduplication storage system.

    DATACENTER PREEMPTIVE MEASURES FOR IMPROVING PROTECTION USING IOT SENSORS

    公开(公告)号:US20210165710A1

    公开(公告)日:2021-06-03

    申请号:US17168423

    申请日:2021-02-05

    Abstract: One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state. The threat may be a natural disaster, or a human-caused condition, for example.

    Moving target defense with network level changes providing substantially continuous access to applications

    公开(公告)号:US11005886B2

    公开(公告)日:2021-05-11

    申请号:US16145529

    申请日:2018-09-28

    Abstract: Network level Moving Target Defense techniques are provided with substantially continuous access to protected applications. An exemplary method comprises identifying a first application listening to a first port or a first network address; notifying the first application to listen to a second port or a second network address; notifying at least one additional application that the first application is listening to the second port or the second network address; and notifying the first application to unlisten to the first port or the first network address, wherein the first application operates in a substantially continuous manner during a change from listening to one or more of the first port and the first network address and listening to one or more of the second port and the second network address. The first application can be a stateful application having persistent storage.

    ANY POINT IN TIME REPLICATION TO THE CLOUD

    公开(公告)号:US20210081431A1

    公开(公告)日:2021-03-18

    申请号:US17107393

    申请日:2020-11-30

    Abstract: Systems, apparatus, and methods for any point in time replication to the cloud. Data is replicated by replicating data to a remote storage or a data bucket in the cloud. At the same time, a metadata stream is generated and stored. The metadata stream establishes a relationship between the data and offsets of the data in the production volume. This allows continuous replication without having to maintain a replica volume. The replica volume can be generated during a rehydration operation that uses the metadata stream to construct the production volume from the cloud data.

    MALICIOUS DATA MANIPULATION USING MARKERS AND THE DATA PROTECTION LAYER

    公开(公告)号:US20200344264A1

    公开(公告)日:2020-10-29

    申请号:US16395847

    申请日:2019-04-26

    Abstract: Embodiments for detecting malicious modification of data in a network, by: setting, by a first layer of network resources, a number of markers associated with input/output (I/O) operations of the network; saving the markers, location, and associated metadata in a marker database; reading, by a second layer of the network resources, the markers corresponding to relevant I/O operations; and verifying each scanned I/O operation against a corresponding marker to determine whether or not data for a scanned specific I/O operation has been improperly modified for the first and second layers and any intermediate layer resulting in a fault condition, and if so, taking remedial action to flag or abort the specific I/O operation.

Patent Agency Ranking