Jump to content

OpenText Data Protector

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by JLRedperson (talk | contribs) at 16:03, 1 June 2010 (Creating new HP Data Protector software page with references). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)
HP Data Protector
Developer(s)Hewlett-Packard, HP Software & Solutions division
Stable release
6.11
Operating systemMicrosoft Windows, UNIX, Linux
TypeBackup and recovery software
LicenseProprietary
WebsiteHP Data Protector software web page


HP Data Protector software is automated Backup and recovery software for single-server to enterprise environments, supporting Disk storage or tape storage targets. It provides cross-platform, online backup of data for Microsoft Windows, Unix, and Linux operating systems.

For business- and mission-critical applications, HP Data Protector Zero Downtime Backup leverages array-based solutions to offload processing from the server and perform Backup operations on a copy of the production data. HP Data Protector Instant Recovery retrieves data from the replicated images on disk for recovery to specific points in time.[1]

HP Data Protector originated as OmniBack. Older versions of OmniBack were retired in 2004, and the functionality was added in Data Protector 5.1.[2]

History

HP announced OmniBack II on March 4, 1996, as part of its HP OpenView family of management software.[3] In 2006, OmniBack functionality was combined with Data Protector 5.0 into Data Protector 5.1.[4]

Since then, the product has been called HP Openview Storage Data Protector and HP StorageWorks Data Protector.[5] The product is now called HP Data Protector software and is part of the HP Software & Solutions division. The current version is 6.11, released in September 2009.[6]


Architecture

The HP Data Protector architecture is based on the concept of a cell: a network environment that contains a Cell Manager, clients, and backup devices.

The Cell Manager is the main system that centrally controls and manages the cell. It contains a database, runs the core software, and runs the backup and restore sessions, writing session information to the database.

A client can be any system within the cell. Clients that are to be backed up require the installation of a Disk Agent. Clients that control the backup and restore data require the installation of a Media Agent.[7]

For multi-site operations, the Data Protector Manager of Managers (MoM) allows local administrators to control data backup and restore, operating from centralized policies and centralized enterprise monitoring. In this configuration, multiple Data Protector cells are grouped, configured and managed from the MoM, which acts as the Cell Manager.[8]


Data Deduplication

HP Data Protector offers Data deduplication capabilities with the ability to compare blocks of data being written to a backup device with data blocks previously stored on the device. For data deduplication, HP Data Protector allows any data storage to be the target storage.[9]


Virtual Server Protection

HP Data Protector supports Backup and restore of virtual servers, including protection for the whole Virtual machine and its application data.[10] Supported virtual environments include VMware, Windows 2008 Hyper-V, Microsoft Virtual Server 2005, Citrix XenServer, and HP Integrity Virtual Machines.[11]


Centralization Encryption

HP Data Protector includes automated key management for software and Linear Tape-Open LTO-4 Encryption. Users have the choice of client-based encryption for data security, or they can use the encryption functionality in LTO-4 tape drives.[12]


Data Protector Notebook Extension

In November 2009, HP began offering HP Data Protector Notebook Extension.[13] HP Data Protector Notebook Extension enables users to back up and recover data while working remotely and offline. With HP Data Protector Notebook Extension, data is captured and backed up automatically each time a user changes, creates or receives a file. These processes are transparent to the user and do no impact laptop or desktop performance. The data is then stored temporarily in a local repository pending transfer to the network data vault for full backup and restore capabilities. Key features include end-user single-click recovery, encryption and compression techniques.[14]


References