摘要:
A method and apparatus for remediating backup data to control access to sensitive data is described. In one embodiment, the method for facilitating sensitive data remediation from backup images without a separate data store includes examining the backup images to identify sensitive data and modifying remediation information associated with the sensitive data, wherein the remediation information restricts access to the sensitive data to at least one corresponding access group.
摘要:
A system and method is disclosed for implementing an enterprise rights management (ERM) system that enables effective data deduplication of ERM-protected data. An ERM-aware application may segment data, such as a file, into one or more data segments. The chosen segmentation boundaries may depend on data already stored on a target storage system and/or on a segmentation scheme used by a target deduplication system. An ERM-aware application may derive a respective convergent encryption key for each data segment, the convergent encryption key being dependent on the contents of the data segment, and encrypt the data segment using that key. The ERM-aware application may include the respective convergent decryption keys (which may be identical to the respective convergent encryption keys) in a publishing license of the ERM-protected file.
摘要:
A system and method for efficient transfer of encrypted data over a low-bandwidth network. A backup server and a client computer are coupled to one another via a first network. The backup server is coupled to a remote data storage via another network, such as the Internet, also referred to as a cloud. The backup server encrypts received data for backup from the client computer. Cryptography segment and sub-segment sizes may be chosen that are aligned on a byte boundary with one another and with selected backup segment and sub-segment sizes used by backup software on the remote data storage. A selected cryptography algorithm has a property of allowing a given protected sub-segment with the cryptography sub-segment size to be decrypted by initially decrypting an immediate prior protected sub-segment that has the same cryptography sub-segment size. Therefore, the size of data transmitted via the cloud may be smaller than the cryptography segment size.
摘要:
Various systems and methods to display information regarding duplication operations and to configure duplication operations. For example, information regarding policies that can be included in a duplication operation is presented via a display. The display receives selection of one or more of the policies. In response to the selection, the display updates to reflect how much of a bucket has been allocated and how much is available, where the bucket specifies an amount of time and is calculated as a function of a duplication window duration.
摘要:
Various systems and methods for configuring a duplication operation. For example, a method involves specifying a duplication window, a source storage device, and a target storage device. When a duplication operation is executed, data is copied from the source storage device to the target storage device during the duplication window. The method also involves calculating a predicted duplication rate, where the predicted duplication rate is an estimate of a rate at which data can be copied from the source storage device to the target storage device.
摘要:
A system and method is disclosed for implementing a data loss prevention (DLP) system configured to protect sensitive data in conjunction with corresponding content indexing (CI) metadata. In response to detecting a data loss risk, such as to data at rest (e.g., stored on a file system) and/or to data in motion (e.g., data being transmitted across a network) the system may perform any number of data loss prevention actions, including sequestering the data. The system may utilize an interface to a content indexing system in order to discover CI metadata associated with the data and sequester the CI metadata associated with the data. One or more common sequestration rules may be applied to the sequestration of the data and of the metadata. For example, the data and metadata may be encrypted using the same key and/or sequestered in the same location.
摘要:
A system and method is disclosed for implementing a data loss prevention (DLP) system capable of detecting transmission attempts involving encrypted data. In response to detecting that the data is encrypted, such a DLP system may perform any number of configurable DLP actions, such as blocking the data transmission attempt and/or sequestering the data. The DLP system may determine that the data is encrypted, based at least in part, on a value of a compressibility measure of the data, such as a compression ratio. The DLP system may leverage other operating system and/or file system capabilities, such as file extensions, magic numbers, or other utilities. The DLP system may determine if the data is compressed rather than encrypted by attempting to decompress the file.
摘要:
Various systems and methods to display information regarding duplication operations and to configure duplication operations. For example, information regarding policies that can be included in a duplication operation is presented via a display. The display receives selection of one or more of the policies. In response to the selection, the display updates to reflect how much of a bucket has been allocated and how much is available, where the bucket specifies an amount of time and is calculated as a function of a duplication window duration.
摘要:
Techniques for controlling data backup operations are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for data backup. The method may include receiving a minimum write speed for a plurality of tape drives. The method may further include controlling data writes for the plurality of tape drives such that data may be attempted to be written to each tape drive at or above the minimum write speed for each tape drive.