Abstract: There are provided a method, system and service for computerized managing a plurality of data protection (DP) resources. The method comprises: accommodating data related to at least part of the DP resources among said plurality of DP resources in a memory thus giving rise to accommodated data, wherein at least part of the accommodated data is obtained by automated collecting; processing by a processor operatively coupled to the memory the accommodated data, said processing resulting in identifying at least one data protection (DP) scheme characterized, at least, by a data protection technique implemented with regard to at least one DP resource related to said DP scheme; identifying by the processor one or more data protection (DP) gaps affected the at least one DP resource; and using the identified one or more DP gaps for assessing, by the processor, DP risk score to the at least one DP resource.
Abstract: Herewith disclosed a method and system for computerized managing a plurality of data protection (DP) resources. The computerized management comprises obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting; accommodating the obtained data in a data repository thus giving rise to accommodated data; processing the accommodated data, said processing resulting in at least one of the following: a) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) identifying one or more data protection (DP) gaps.
Abstract: Herewith disclosed a method and system for computerized managing a plurality of data protection (DP) resources. The computerized management comprises obtaining data related to at least part of the DP resources among said plurality of DP resources, wherein at least part of data is obtained by automated collecting; accommodating the obtained data in a data repository thus giving rise to accommodated data; processing the accommodated data, said processing resulting in at least one of the following: a) identifying one or more data protection (DP) schemes characterizing DP resources and/or relationship thereof; and b) identifying one or more data protection (DP) gaps.