You are on page 1of 2

DATA PROTECTION HUB

All things data protection


Data Protection refers to techniques to either prevent, or recover from data loss
situations. Data protection techniques can be proactive – engaging continuous copy
systems, performing snapshots, replication, and backups. They can also
be reactive – recovering data, performing log replays, and rolling back snapshots,
etc.

Data protection can also mean security, and of course security is important as well
when we consider holistic care of data. Good security processes will also help to
prevent data loss situations, though in the security context, data loss might mean
data theft as much as corruption or deletion.

More recently, data protection is taking on a new meaning – data privacy. In that


context, data protection doesn't necessarily refer to data loss, or data theft, but
data ownership. Data protection as a privacy function refers to the rights of an
individual to assert ownership and control over data about her or himself.

Here at the Data Protection Hub, data protection means all of the above. While
there will remain a strong emphasis on data storage protection, data protection as
it applies to privacy and security will also be covered where possible.

Click here if you want to jump straight to the Data Protection Blog.
Data Protection: Ensuring Data Availability
(Second Edition)
Published May 2020, Data Protection: Ensuring Data Availability is the latest data
protection title by Preston de Guise.

Updated and expanded from the first edition, this release goes beyond the
traditional topics including deduplication, continuous availability, snapshots,
replication, backup, and recovery, and explores such additional considerations as
legal, privacy, and ethical issues. A new model is presented for understanding and
planning the various aspects of data protection, which is essential to developing
holistic strategies. The second edition also addresses the cloud and the growing
adoption of software and function as a service, as well as effectively planning over
the lifespan of a workload: what the best mix of traditional and cloud native data
protection services might be. Virtualization continues to present new challenges to
data protection, and the impact of containerization is examined.
© 2020 PRESTON DE GUISE CONTACT ME

You might also like