Introduction
Dell EMC PowerProtect Cyber Recovery focuses on the protection and recovery pillars that are referenced in many well-known cybersecurity frameworks. This solution is a combination of professional services and technology that provides the following key elements:
- Planning and design
- Isolation and replication
- Vault analytics
- Recovery
The Cyber Recovery solution provides management tools and the technology that performs the actual data recovery. It automates the creation of the restore points that are used for recovery or security analytics. Dell Implementation Services provide Cyber Recovery vault design and implementation. Dell Advisory Services can design an effective recovery strategy. Organizations can dramatically reduce their surface of attack from inside and outside threats by removing the cyber attack recovery environment from the production network. The only required connection is a data path for periodically synchronizing the data, which is brought online only for data synchronization. This logical air gap provides another layer of defense by reducing the surface of attack. The Cyber Recovery software automates the recovery procedure for the NetWorker and PowerProtect Data Manager applications.
OpsRamp integrates with Cyber Recovery Manager through REST APIs.
Hierarchy of Dell CyberRecovery Manager resources
Dell CyberRecovery Manager
— Dell CyberRecovery Manager Jobs
Integration Version History
Click here to view the Integration Version History
Application Version | Bug fixes / Enhancements |
---|---|
3.0.1 | Enhancements related to latest snapshot, Activity Log and DebugHandler changes. |
3.0.0 | Metric data point conversion changes. |
2.0.1 | Display order changes. |
2.0.0 | Initial application of Discovery, monitoring, alerting. |
- See, Working with Dell Cyber Recovery Manager for more information on how to configure Dell Cyber Recovery Manager.
- See Supported Metrics and Default Monitoring Configuration for more information about Supported Metrics and Default Monitoring Configuration of Dell Cyber Recovery Manager.
- See Supported Alert and Resource Filter Input keys for more information about Supported Alert and Resource Filter Input keys of Dell Cyber Recovery Manager.
- See Risk, Limitations and Assumptions for more information about the Risk, Limitations and Assumptions of Dell Cyber Recovery Manager.