This IBM® Redpaper™ publication explains the IBM DS8000® Safeguarded Copy functions. With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization.
The paper is intended for IT security architects who plan and design an organization’s cyber security strategy, and the infrastructure technical specialists who implement them.
The content is structured into four major sections:
This edition of the paper applies to the DS8000 Release 9.3.
Chapter 1. Introduction and concepts
Chapter 2. Planning and considerations
Chapter 3. Capacity sizing by using the CSM ESESizer functions
Chapter 4. Implementation and management
Appendix A. Other Safeguarded Copy topologies
The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.