Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

PowerProtect Data Manager 19.11 Cyber Recovery User Guide

What is the Dell PowerProtect Cyber Recovery solution?

The Cyber Recovery solution maintains mission-critical business data and technology configurations in a secure, air-gapped 'vault' environment that can be used for recovery or analysis. The Cyber Recovery vault is physically or virtually isolated from the production system or the network, depending on the type of deployment.

NOTE You can deploy the Cyber Recovery vault on Amazon Web Services (AWS) or Microsoft Azure.

The Cyber Recovery solution enables access to the Cyber Recovery vault only long enough to replicate data from the production system. At all other times, the Cyber Recovery vault is secured and off the network. A deduplication process is performed in the production environment to expedite the replication process so that connection time to the Cyber Recovery vault is as short as possible.

Within the Cyber Recovery vault, the Cyber Recovery software creates point-in-time (PIT) retention-locked copies that can be validated and then used for recovery of the production system.

Figure 1. High-level solution architecture
This figure shows the production side and the CR Vault side with an arrow that indicates synchronization between the two.
NOTEPowerProtect DD Retention Lock software provides data immutability for a specified time. Retention Lock functionality is enabled on a per-MTree basis, and the retention time is set on a per-file basis. Retention Lock is not required for Cyber Recovery but is strongly recommended as an additional cyber-resiliency measure.

A policy, which can be scheduled, orchestrates the workflow between the production environment and the Cyber Recovery vault. A policy is a combination of objects (such as PowerProtect DD storage and applications) and jobs (such as synchronization, copy, and lock).

NOTE References to DD systems in this documentation, in the Cyber Recovery UI, and elsewhere in the product include DD systems and Data Domain systems.

  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\