IBM DS8000 Safeguarded Copy (Updated for DS8000 R9.1)

A draft IBM Redpaper publication

Updated 21 January 2021

cover image

IBM Form #: REDP-5506-01

More options

Rate and comment

Authors: Michael Frankenberg, Nick Clayton, Rick Pekosh, Mark Wells


This IBM® Redpaper™ publication explains the IBM DS8000 Safeguarded Copy functionality.
With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization.

The paper introduces Safeguarded Copy and discusses the need for logical corruption protection (LCP) and information about regulatory requirements. It presents the general concepts of LCP, and then explore various use cases for recovery.

The paper is intended for IT security architects, who plan and design an organization's cyber security strategy, as well as the infrastructure technical specialists who implement them.

This edition applies to DS8000 Release 9.1

Table of contents

Chapter 1. Safeguarded Copy introduction and concepts
Chapter 2. Safeguarded Copy planning and considerations
Chapter 3. Safeguarded Copy capacity sizing by using the CSM ESESizer functionality
Chapter 4. Safeguarded Copy implementation and management
Appendix A. Additional Topologies

These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors. This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.

Follow IBM Redbooks

Follow IBM Redbooks