Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 AWS Deployment Guide

PDF

What is the Dell PowerProtect Cyber Recovery solution?

The Cyber Recovery solution maintains mission-critical business data and technology configurations in a secure, air-gapped 'vault' environment that can be used for recovery or analysis. The Cyber Recovery vault is physically or virtually isolated from the production system or the network, depending on the type of deployment.

The Cyber Recovery solution enables access to the Cyber Recovery vault only long enough to replicate data from the production system. At all other times, the Cyber Recovery vault is secured and is disconnected from the production network. A DD deduplication process is performed in the production environment to expedite the replication process so that connection time to the Cyber Recovery vault is as short as possible.

Within the Cyber Recovery vault, the Cyber Recovery software creates point-in-time (PIT) retention-locked copies that can be validated and then used for recovery of the production system.

Figure 1. High-level solution architecture
This figure shows the production side and the CR Vault side with an arrow that indicates synchronization between the two.
NOTE:PowerProtect DD Retention Lock software provides data immutability for a specified time. Retention Lock functionality is enabled on a per-MTree basis, and the retention time is set on a per-file basis. Retention Lock is required for a vaulted environment.

A policy, which can be scheduled, orchestrates the workflow between the production environment and the Cyber Recovery vault. A policy is a combination of objects (such as PowerProtect DD storage and applications) and jobs (such as synchronization, copy, and lock).

NOTE: References to DD systems in this documentation, in the Cyber Recovery UI, and elsewhere in the product include DD systems and Data Domain systems.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\