Skip to main content

Data Resiliency Designs: A Deep Dive into IBM Storage Safeguarded Snapshots

A draft IBM Redpaper publication

thumbnail 

Last updated on 15 July 2024

  1. .PDF (6.1 MB)

Share this page:   

IBM Form #: REDP-5737-00


Authors: Denis Olshanskiy, John Nycz, Nezih Boyacioglu, Jonathan Wilkie, Vasfi Gucer and Vineet Sharma

    menu icon

    Abstract

    In today's digital landscape, ensuring the integrity and recoverability of critical data is paramount. This IBM® Redpaper delves into this essential concept, providing a comprehensive exploration of IBM's Safeguarded Snapshot solution for data protection.

    Safeguarded Snapshot (called Safeguarded Copy prior to IBM Storage Virtualize 8.7) works by creating snapshots of your data volumes. These snapshots are then stored in a logically separate location, isolated from the original data. This isolation is key to its security; even if your main system is compromised, the attackers cannot get to the backups.

    This book serves as a valuable resource for IT professionals seeking to safeguard their organization's information against various threats, including accidental deletions, ransomware attacks, and system malfunctions.

    The target audience of this book is IT managers and directors, storage administrators, system administrators, storage solution architects and business continuity and disaster recovery (BCDR) professionals

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. Safeguarded Snapshot: Redefining data protection

    Chapter 3. Designing with Safeguarded Snapshot: Tailored solutions

    Chapter 4. Implementing Safeguarded Snapshot

    Chapter 5. Advanced considerations

     

    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.