Data Protection And Information Lifecycle Management

Overview

This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. ...
See more details below
Paperback
$37.86
BN.com price
(Save 24%)$49.99 List Price
Other sellers (Paperback)
  • All (24) from $2.84   
  • New (10) from $2.96   
  • Used (14) from $2.84   
Sending request ...

Overview

This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy.
Read More Show Less

Product Details

  • ISBN-13: 9780131927575
  • Publisher: Pearson Technology Group 2
  • Publication date: 2/9/2011
  • Pages: 290
  • Product dimensions: 7.50 (w) x 9.25 (h) x 0.61 (d)

Meet the Author

Tom Petrocelli is president and chief analyst at Technology Alignment Partners, Inc., and a recognized expert in data protection issues, especially those involving data movement and security. He has published articles in nearly all of the major data storage industry publications and speaks frequently at industry conferences and events, including Storage Networking World. A twenty-one-year veteran of the IT industries, his wide-ranging background comprises technical, marketing, product-management, and business-development experience.

Read More Show Less

Read an Excerpt

Data protection is like buying insurance or executing a will: It's something we all know we should do but often put off. We are forced to think about all the unpleasant scenarios that force us to do it in the first place. The process can be complex, even daunting to most people. We forge ahead because we know it's important. Ultimately, we sleep better knowing that we have a safe haven in the face of disaster.

New storage technology, such as storage networks, has allowed organizations to collect and store massive amounts of information about customers, suppliers, and operations. Along with this ballooning of stored data has come a new threat to the organization: loss of key information assets. IT managers now realize that these enormous storehouses of information are often left inadequately protected. At the same time, the ramifications of data loss are increasing. Shareholder lawsuits, government regulation, and extreme financial losses are driving changes in the way data is stored and managed.

The techniques, methods, and technology available to the IT professional have expanded greatly. In the past, backup to tape was pretty much all that was available. Disk-to-disk and disk-to-disk-to-tape systems have expanded the options for backup. Remote copy and replication have enabled organizations to constantly move data off-site, far from harm. As more storage systems are networked, storage security is becoming an important tool for protecting data from harm.

It's not only technology that now sits in the data protection bag of tricks. Strategic methodologies such as Data Lifecycle Management and Information Lifecycle Management add new dimensions to the data protection landscape. Both are policy-based processes for managing data and information according to a lifecycle. While data lifecycle management deals with data on a time-based cycle, information lifecycle management is used to manage information assets in an event-driven fashion. Both promise to allow for better data protection at a lower cost.

Data and information are now recognized as core assets that need to be valued and secured like other assets. This book is a guide to protecting data assets in the enterprise. It presents the technology, techniques, strategies, and best practices used to safeguard data. It may even help you sleep better at night.

Who Is This Book For?

This book covers topics useful to many people. The primary audience is the IT professional, especially CIOs, managers, and system architects. System administrators, storage administrators, network administrators, database administrators, systems analysts, and business analysts who are involved in storing and protecting critical business data will also find this book to be a vital resource.

Product managers, consultants, technical marketing specialists, and technicians, as well as engineers at value-added resellers, OEMs, ISVs, and service providers, will also be interested in this book. It provides general knowledge about emerging areas of interest to their customers. Marketing communications specialists, PR agents, venture capitalists, analysts, editors, trainers, professors, and students will also find value in this book. It provides these professionals with a general overview of data protection technology and practice in plain language.

How This Book Is Arranged

This book takes a progressive approach to understanding data protection. Starting with the most basic topics, each chapter builds on the previous ones. Some chapters are overviews for those who are not well acquainted with important base technologies and practices. Others are more involved, presenting the major ideas, techniques, processes, and technology associated with data protection. Those chapters also end with a case study about real IT professionals and the techniques they have used to solve data protection problems. Finally, the book ends with several appendixes, a bibliography, and a glossary, all designed to enhance your understanding of other parts of the book.

The chapters of Data Protection and Information Lifecycle Management are:

Chapter 1: Introduction to Data Protection. This chapter lays the foundation for understanding data protection, introducing the major drivers and techniques behind data protection. It discusses the reasons that organizations spend time and money on data protection and presents a framework for understanding the ensuing topics.

Chapter 2: An Overview of Storage Technology. Chapter 2 provides the technological underpinnings of most data protection. Written for those who may not have a deep knowledge of storage technology, it contains something for everyone. The chapter discusses the basics of data storage necessary to understanding data protection. Furthermore, the chapter presents some of the new technology and practices that impact data protection strategies today.

Chapter 3: Backup and Restore. The classic data protection strategy just keeps getting better. Chapter 3 outlines the most common techniques, such as tape backup, as well as the more recent additions to the backup bag of tricks. The emphasis is on architecture and practices.

Chapter 4: Remote Copy and Replication: Moving Data to a Safe Location. Chapter 4 kicks it up a notch, exploring remote copy and replication—ways of constantly duplicating data in a network. With data synchronized constantly, hot sites can be used that provide immediate failover in case of disaster.

Chapter 5: Basic Security Concepts. This chapter provides the necessary underpinnings for the next chapter, which deals with storage security. It is a quick reference to basic computer security concepts and strategies.

Chapter 6: Storage System Security. Chapter 6 describes a new area of security: storage security. Until recently, the security of the storage system was ignored, since it was safe behind the server security screen. That's no longer true, and data protection demands a new focus on securing the storage infrastructure.

Chapter 7: Policy-Based Data Protection. This chapter outlines the emerging area of policy-driven data protection, especially Data Lifecycle Management (DLM). These techniques are some of the most powerful in the data protection toolbox.

Chapter 8: Information Lifecycle Management. This chapter explores how Information Lifecycle Management (ILM) can be used to enhance data protection. The book takes a detailed look at ILM and shows how it can be used to further information assurance and data protection.

Appendix A

Appendix B: Resources. This appendix lists other resources that are helpful to those entrusted with data protection plans: industry groups, conferences, books, and web sites. They provide additional insights into the technology and regulations that are important to data protection.

Appendix C: Acronyms. This appendix lists the acronyms used in the book.Data Protection and Information Lifecycle Management is chock full of acronyms. Acronyms are important shortcuts that save us from having to say the same thing over and over again, but they work only if you know what they are.

Glossary. The glossary lists the major terms used throughout the book, along with their definitions.

Bibliography. The bibliography lists the books that provided references for the author while writing this book.

What You Will Take Away from This Book

After reading this book, you will have a better understanding of how to protect critical corporate data. The techniques, practices, and technology are a mixture of tried and true and the brand new. There are some new takes on older methods, as well as new ideas for old problems. In the end, you will have not only new information to manage, but also better ways of doing it.

Read More Show Less

Table of Contents

Acknowledgments.

About the Author.

Preface.

Who Is This Book For?

How This Book Is Arranged.

What You Will Take Away from This Book.

1. Introduction to Data Protection.

What Does Data Protection Mean?

A Model for Information, Data, and Storage.

Why Is Data Protection Important to the Enterprise?

Data Loss and Business Risk.

Connectivity: The Risk Multiplier.

Business Continuity: The Importance of Data Availability to Business Operations.

The Changing Face of Data Protection.

Key Points.

2. An Overview of Storage Technology.

A Quick History of Data Storage.

Storage I/O Basics.

The I/O Stack.

Direct Attach Storage.

Network Attached Storage (NAS).

Storage Area Networks.

Extending SANs over MAN and WAN.

Key Points.

3. Backup and Restore.

The First Line of Defense.

Designing Storage Systems for Backup and Recovery.

Recovering from Disaster: Restoring Data.

Things That Go Wrong with Restore Operations.

Tape Backup.

Disk-to-Disk Backup.

Disk-to-Disk to Tape.

Backup and Restore Practices.

Application-Level Backup and Recovery.

Case Study: Bingham McCutchen.

Key Points.

4. Remote Copy and Replication: Moving Data to a Safe Location.

How Remote Copy and Replication Are Different from Backup.

Remote Copy.

Design Considerations for Remote Copy.

Replication.

Case Study: PdMain.

Key Points.

5. Basic Security Concepts.

Least Privilege.

Defense in Depth.

Diversity of Defense.

Encryption.

Typical Attacks.

Key Points.

6. Storage System Security.

The Role of Storage Security in Enterprise Data Protection.

DAS Security.

SAN Security.

Internal and External Vectors.

Risk.

Security Practices for Storage.

Secure Fibre Channel Protocols: FC-SP and FCAP.

Case Study: Transend Services.

Key Points.

7. Policy-Based Data Protection.

Difficulties with Data Protection Strategies.

Data Lifecycle Management (DLM).

Key Points.

8. Information Lifecycle Management.

Information Assurance and Data Protection.

What Is Information Lifecycle Management?

Unstructured and Structured Information.

The Importance of Context.

Determining and Managing Information Context.

Location and the Information Perimeter.

The Information Lifecycle.

An ILM Schema.

Matching Information Value to Protection Options.

The Changing Value of Information.

Regulatory Concerns.

Protecting Information Using ILM Policies.

Controlling Information Protection Costs.

Automating ILM.

Case Study: MidAmerica Bank.

Key Points.

Appendix A: XML Schemas and Document Type Definitions for Policy Statements.

Appendix B: Resources.

Books Worth Reading.

Organizations and Conferences.

Web Sites Worth Visiting.

Government Documents and Resources.

Appendix C: Acronyms.

Glossary.

Bibliography.

Index.

Read More Show Less

Preface

Data protection is like buying insurance or executing a will: It's something we all know we should do but often put off. We are forced to think about all the unpleasant scenarios that force us to do it in the first place. The process can be complex, even daunting to most people. We forge ahead because we know it's important. Ultimately, we sleep better knowing that we have a safe haven in the face of disaster.

New storage technology, such as storage networks, has allowed organizations to collect and store massive amounts of information about customers, suppliers, and operations. Along with this ballooning of stored data has come a new threat to the organization: loss of key information assets. IT managers now realize that these enormous storehouses of information are often left inadequately protected. At the same time, the ramifications of data loss are increasing. Shareholder lawsuits, government regulation, and extreme financial losses are driving changes in the way data is stored and managed.

The techniques, methods, and technology available to the IT professional have expanded greatly. In the past, backup to tape was pretty much all that was available. Disk-to-disk and disk-to-disk-to-tape systems have expanded the options for backup. Remote copy and replication have enabled organizations to constantly move data off-site, far from harm. As more storage systems are networked, storage security is becoming an important tool for protecting data from harm.

It's not only technology that now sits in the data protection bag of tricks. Strategic methodologies such as Data Lifecycle Management and Information Lifecycle Management add new dimensions to the data protection landscape. Both are policy-based processes for managing data and information according to a lifecycle. While data lifecycle management deals with data on a time-based cycle, information lifecycle management is used to manage information assets in an event-driven fashion. Both promise to allow for better data protection at a lower cost.

Data and information are now recognized as core assets that need to be valued and secured like other assets. This book is a guide to protecting data assets in the enterprise. It presents the technology, techniques, strategies, and best practices used to safeguard data. It may even help you sleep better at night.

Who Is This Book For?

This book covers topics useful to many people. The primary audience is the IT professional, especially CIOs, managers, and system architects. System administrators, storage administrators, network administrators, database administrators, systems analysts, and business analysts who are involved in storing and protecting critical business data will also find this book to be a vital resource.

Product managers, consultants, technical marketing specialists, and technicians, as well as engineers at value-added resellers, OEMs, ISVs, and service providers, will also be interested in this book. It provides general knowledge about emerging areas of interest to their customers. Marketing communications specialists, PR agents, venture capitalists, analysts, editors, trainers, professors, and students will also find value in this book. It provides these professionals with a general overview of data protection technology and practice in plain language.

How This Book Is Arranged

This book takes a progressive approach to understanding data protection. Starting with the most basic topics, each chapter builds on the previous ones. Some chapters are overviews for those who are not well acquainted with important base technologies and practices. Others are more involved, presenting the major ideas, techniques, processes, and technology associated with data protection. Those chapters also end with a case study about real IT professionals and the techniques they have used to solve data protection problems. Finally, the book ends with several appendixes, a bibliography, and a glossary, all designed to enhance your understanding of other parts of the book.

The chapters of Data Protection and Information Lifecycle Management are:

Chapter 1: Introduction to Data Protection. This chapter lays the foundation for understanding data protection, introducing the major drivers and techniques behind data protection. It discusses the reasons that organizations spend time and money on data protection and presents a framework for understanding the ensuing topics.

Chapter 2: An Overview of Storage Technology. Chapter 2 provides the technological underpinnings of most data protection. Written for those who may not have a deep knowledge of storage technology, it contains something for everyone. The chapter discusses the basics of data storage necessary to understanding data protection. Furthermore, the chapter presents some of the new technology and practices that impact data protection strategies today.

Chapter 3: Backup and Restore. The classic data protection strategy just keeps getting better. Chapter 3 outlines the most common techniques, such as tape backup, as well as the more recent additions to the backup bag of tricks. The emphasis is on architecture and practices.

Chapter 4: Remote Copy and Replication: Moving Data to a Safe Location. Chapter 4 kicks it up a notch, exploring remote copy and replication--ways of constantly duplicating data in a network. With data synchronized constantly, hot sites can be used that provide immediate failover in case of disaster.

Chapter 5: Basic Security Concepts. This chapter provides the necessary underpinnings for the next chapter, which deals with storage security. It is a quick reference to basic computer security concepts and strategies.

Chapter 6: Storage System Security. Chapter 6 describes a new area of security: storage security. Until recently, the security of the storage system was ignored, since it was safe behind the server security screen. That's no longer true, and data protection demands a new focus on securing the storage infrastructure.

Chapter 7: Policy-Based Data Protection. This chapter outlines the emerging area of policy-driven data protection, especially Data Lifecycle Management (DLM). These techniques are some of the most powerful in the data protection toolbox.

Chapter 8: Information Lifecycle Management. This chapter explores how Information Lifecycle Management (ILM) can be used to enhance data protection. The book takes a detailed look at ILM and shows how it can be used to further information assurance and data protection.

Appendix A: XML Schemas and Document Type Definitions for Policy Statements. The XML schemas and DTDs for the policy examples in Chapters 7 and 8 are listed here, with some additional thoughts on how XML can be used to describe DLM and ILM policies.

Appendix B: Resources. This appendix lists other resources that are helpful to those entrusted with data protection plans: industry groups, conferences, books, and web sites. They provide additional insights into the technology and regulations that are important to data protection.

Appendix C: Acronyms. This appendix lists the acronyms used in the book. Data Protection and Information Lifecycle Management is chock full of acronyms. Acronyms are important shortcuts that save us from having to say the same thing over and over again, but they work only if you know what they are.

Glossary. The glossary lists the major terms used throughout the book, along with their definitions.

Bibliography. The bibliography lists the books that provided references for the author while writing this book.

What You Will Take Away from This Book

After reading this book, you will have a better understanding of how to protect critical corporate data. The techniques, practices, and technology are a mixture of tried and true and the brand new. There are some new takes on older methods, as well as new ideas for old problems. In the end, you will have not only new information to manage, but also better ways of doing it.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)