Glossary

Where It All Makes Sense

The industry’s most cutting-edge terms, explained. 

Starts with:
A

Air Gap Backup

Air gap backup refers to a backup system that is physically isolated from the main computer or network, creating a “gap” between the two systems. This separation ensures that the backup data is not accessible to hackers or malware that may have infected the primary system. 

B

Backup as a Service (BaaS)

Backup as a service (BaaS) solutions offer cloud-based data backup and recovery capabilities without the presence of physical, on-premises hardware or appliances to host and run the backup infrastructure.

Backup Policy

A backup policy is a set of rules and procedures that describe the enterprise’s strategy when making backup copies of data for safekeeping.

Business Continuity Disaster Recovery (BCDR)

Ideal Business Continuity Disaster Recovery strategies are designed to minimize downtown and data loss. ‘Business continuity’ delivers a proactive focus on conducting organizational procedures, while disaster recovery offers reactive controls to get systems, infrastructure, and data back online.

C

Cleanroom Recovery

Cleanroom is a specialized data recovery process that ensures the secure and reliable retrieval of critical information from damaged storage devices in environments where data breaches poses a significant risk.

Cloud Storage

Cloud storage describes an IT infrastructure deployment model where storage resources reside in the cloud instead of being housed on-premises.

Containerization

Containerization is a method of software application deployment that involves packaging an application and its dependencies into a single lightweight container. The container provides a consistent and isolated runtime environment, which allows the application to run reliably and consistently across different computing environments, such as local machines, data centers, or cloud platforms. 

Cyber Deception

Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks. Industry-leading cyber deception solutions pick up where conventional security tools leave off – employing at two-step process to slow down and surface unknown and zero-day threats.

D

Database Backup

Database backup is the process of creating a copy (backing up) of an organization’s structured data utilized by popular databases such as SAP HANA and Microsoft SQL Server.

Data Center Consolidation

Data center consolidation is an important strategy for many modern organizations. By combining multiple physical data centers into one or more larger data centers, organizations can save money, improve efficiency, and increase scalability. This process can involve a variety of technologies, such as virtualization, cloud computing, or colocation.

Data Center Migration

Data center migration is the process of moving data and applications from one physical or virtual environment to another. This process can be complex but is necessary to keep up with changing technology and customer demands. It also helps organizations save costs, improve performance, and gain greater flexibility in managing their data centers.

Data Deduplication

Data deduplication, also called “dedup”, eliminates duplicate or redundant information in a dataset. In short, dedup is a process that ensures only one copy of data exists in a particular dataset or block.

Data Encryption

Data encryption is a type of security process that converts data from a readable format called plaintext into an encoded, unreadable form called ciphertext.

Data Loss Prevention

Data loss prevention (DLP) is part of a company’s security policy to prevent the loss, leakage, misuse, or access of data by unauthorized parties.

Data Management as a Service (DMaaS)

As the amount of data businesses generate continues to grow, so too does the need for an efficient and secure way to manage that data. Data Management as a Service (DMaaS) is an innovative cloud-based solution that enables businesses to better leverage their data for maximum value.

Data Protection

Data protection refers to the practices, technologies, and policies that are used to safeguard data against unauthorized access, loss, corruption, and other threats. This includes protecting data at rest (stored data), in transit (data being transferred between systems), and in use (data being accessed by authorized users).

Data Retention Policy

An organization’s data retention policy is a set of rules that describe the types of data that will be retained by the entity and for how long.

Digital Transformation

Digital transformation is the process of using digital technologies to fundamentally change how a business operates and delivers value to its customers. It involves using digital technologies to automate processes, improve efficiency, and create new business models, products, and services. 

Disaster Recovery

Disaster recovery is the systematic approach of restoring and resuming business operations after a disruptive event, providing continuity and minimizing the impact of the incident.

Distributed File System

A distributed file system is an information technology platform that allows multiple computers in a networked environment to access the same files or directories located on different physical devices within the network.

Dynamics 365 Backup

Microsoft Dynamics 365 is a cloud-based business applications system that offers different components of customer relationship management (CRM) and enterprise resource planning (ERP).

E

eDiscovery

Electronic discovery (eDiscovery) is the process of finding and collecting ESI – typically for lawsuits, investigation, or legal purposes.

Endpoint Backup

Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today’s remote workforce.

F

File and Object Backup

File and object backup solutions offer data protection for two different unstructured data types: object storage and file systems.

H

Hybrid Cloud

Hybrid cloud is IT architecture that combines at least one private cloud, also known as an on-premises data center, with one or more public cloud services.

I

IaaS, PaaS, and SaaS

Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) – so you can determine which model works best for your organization.

K

Kubernetes Backup

Kubernetes backup is the process of backing up the components running in a Kubernetes orchestration platform, which is an abstraction layer for containerized applications and services.

M

Microsoft 365 Backup

With Microsoft 365, end users and organizations get a robust suite of productivity tools, which include Exchange, OneDrive, SharePoint, and Microsoft Teams.

O

On-premises, Cloud, and Hybrid

When it comes to choosing the right technology solution for your business, understanding the key differences between on-premises, cloud, and hybrid solutions is essential.

R

Recovery Time Objective (RTO)

RTO refers to the amount of time it takes for a business to recover and resume normal operations after a disaster or disruption. It is the target window for restoring systems and services, and it is usually expressed in hours or days. The goal of a disaster recovery plan is to minimize the RTO and ensure that the business can quickly resume normal operations.

Recovery Point Objective (RPO)

RPO, on the other hand, refers to the amount of data loss that a business can tolerate in the event of a disaster or disruption. It is the maximum acceptable amount of data loss measured in time, such as hours or days. The goal of a disaster recovery plan is to minimize the RPO and ensure that the most recent, critical data is protected and recoverable.

Ransomware Protection

Ransomware protection is the process of preventing the occurrence of a ransomware event, and/or mitigating the risk of a successful attack.

S

SaaS Data Protection

SaaS data protection offers organizations tools to manage and safeguard critical SaaS apps, endpoints, and hybrid cloud environments from data loss threats such as corruption, accidental deletion, and malicious attacks.

Salesforce Backup

Salesforce backup and recovery offers automated data protection for content, files, objects, metadata relationships, and more living in Salesforce production organizations and sandbox environments.

V

VM Backup

Virtual machine (VM) backup is the process of backing up the VMs running in an enterprise environment.

Vulnerability Network Scanning

Vulnerability network scanning is an invaluable tool for keeping networks safe from malicious actors. It is a process that involves the scanning of a network for security weaknesses or vulnerabilities, and it can be done either manually or with automated software.

VMware Data Recovery

VMware Data Recovery is designed specifically for VMware virtualized environments and enables organizations to protect and recover their virtual machines (VMs) and data efficiently and reliably.

Z

Zero Trust Security

Zero Trust Security is a security approach that assumes that all user activity on a network or system is untrusted, even from users who have already been authenticated. 

FREE SAAS TRIAL


Get Started with Cloud-Delivered Data Protection Today!

Try enterprise-grade SaaS data protection with the simplicity of the cloud free for 30-days.

Quick Links
All Resources
Case Studies
Supported Tech
Webinars & Events
Training & Education