PROVIDING STATUS OF DATA STORAGE OPERATIONS WITHIN AN INFORMATION MANAGEMENT SYSTEM

    公开(公告)号:US20230168970A1

    公开(公告)日:2023-06-01

    申请号:US17537254

    申请日:2021-11-29

    CPC classification number: G06F11/1458 G06F16/90335

    Abstract: Systems and methods disclosed herein provide users with granular current information about backup operations that completed at their user devices, regardless of whether a backup job as a whole, which comprises a plurality of backup operations across multiple computing devices, is presently complete or incomplete. Accordingly, an illustrative information management system comprises feature enhancements that collect granular information about data storage operations occurring at a client device, so that up-to-date status thereof may be provided to querying users on demand. Thus, the illustrative system need not wait for the completion of the backup job to answer status queries about backup operations occurring before the full completion of the backup job. Moreover, data backed up in one of these backup operations may be restored on demand independently of whether the backup job as a whole is presently complete or incomplete.

    PLATFORM-AGNOSTIC CONTAINERIZED APPLICATION DATA PROTECTION

    公开(公告)号:US20210271564A1

    公开(公告)日:2021-09-02

    申请号:US16868964

    申请日:2020-05-07

    Abstract: Certain embodiments described herein relate to an improved information management system that can perform provider-specific data protection methods for cloud-stored data. In one embodiment, the information management system accesses a pod specification that indicates information usable to execute a containerized application on behalf of a user, and determines the cloud provider system configured to provide one or more computing resources for execution the containerized application. Using a provider-specific interface that is specific to the determined cloud provider system, the information management system creates a snapshot of a cloud storage volume associated with the containerized application and accesses the data inside the snapshot. The accessed data is stored onto a secondary storage device, and the snapshot is removed from the cloud provider system, thereby providing an efficient backup solution for the data used for executing the containerized application on the container orchestrator system.

    ANALYSIS OF BACKUP COPIES TO IDENTIFY MALWARE-ENCRYPTED PRIMARY DATA

    公开(公告)号:US20240143759A1

    公开(公告)日:2024-05-02

    申请号:US17975409

    申请日:2022-10-27

    CPC classification number: G06F21/566 G06F21/568

    Abstract: Backup data is leveraged to determine whether primary data has been encrypted by malware. The disclosed approach does not rely on recognizing particular malware instances or malware provenance, and thus can be applied to any body of data. Even a novel and previously unknown malware attack can be detected in this way. An illustrative data storage management system analyzes secondary copies it created over time, applies a multi-factor analysis to data recovered from the secondary copies and, based on the analysis, infers whether the primary data from which the secondary copies were created may be encrypted. The present approach uses successive versions of backup copies to find indicia of malware encryption, rather than trying to trace or identify the malware itself. Indicia of entropy correlate highly with encryption, such as encryption performed by malware attacks. Conversely, indicia of similarity correlate highly with lack of encryption of successive versions of documents.

    TRANSACTION LOG INDEX GENERATION IN AN ENTERPRISE BACKUP SYSTEM

    公开(公告)号:US20220283989A1

    公开(公告)日:2022-09-08

    申请号:US17576698

    申请日:2022-01-14

    Abstract: Certain embodiments disclosed herein reduce or eliminate a communication bottleneck at the storage manager by reducing communication with the storage manager while maintaining functionality of an information management system. In some implementations, operations performed as part of a backup process may be stored in transaction logs. These transaction logs may include information about a transaction performed between the client computing system and the network storage that hosts the backup of the client computing system. The transaction logs may be provided to a secondary storage system that can be used to form a backup index. The backup index may be used to facilitate accessing the data stored at the network storage. Advantageously, generating the transaction logs and separating the generation of the backup index from the backup process can reduce resource usage during performance of the backup and speed up the backup process while further reducing interaction with the storage manager.

    TRANSACTION LOG INDEX GENERATION IN AN ENTERPRISE BACKUP SYSTEM

    公开(公告)号:US20210034571A1

    公开(公告)日:2021-02-04

    申请号:US16526699

    申请日:2019-07-30

    Abstract: Certain embodiments disclosed herein reduce or eliminate a communication bottleneck at the storage manager by reducing communication with the storage manager while maintaining functionality of an information management system. In some implementations, operations performed as part of a backup process may be stored in transaction logs. These transaction logs may include information about a transaction performed between the client computing system and the network storage that hosts the backup of the client computing system. The transaction logs may be provided to a secondary storage system that can be used to form a backup index. The backup index may be used to facilitate accessing the data stored at the network storage. Advantageously, generating the transaction logs and separating the generation of the backup index from the backup process can reduce resource usage during performance of the backup and speed up the backup process while further reducing interaction with the storage manager.

Patent Agency Ranking