Abstract: An information management system creates a modified representation of backup files in a backup copy on restore to overcome the difficulties and challenges imposed by the legal and administrative requirements on the handling of personally information without making changes to the backup copy. In an example, a restore modification component searches backup data files as they are restored from a backup copy but before the restored data files are written into the primary storage system. When the restore modification component identifies a backup data file with a record that matches search criteria defined in the modification repository, the restore modification component replaces one or more of the restored data field values in the record with replacement data values obtained from the modification repository according to respective replacement rules. In this way, the information management system can create a modified representation of the backup copy data without modifying the backup copy.
Abstract: Methods, apparatuses and computer program products implement embodiments of the present invention that include capturing a series of point-in-time images of a database including one or more tables, each of the tables including one or more fields. Upon receiving, from a user, a query with respect to a variation of a given field over a specified period of time, the point-in-time images are analyzed in order to extract the variation; and the extracted variation is presented to the user.
Type:
Grant
Filed:
September 18, 2023
Date of Patent:
December 17, 2024
Assignee:
OWN DATA COMPANY LTD.
Inventors:
Yehonatan Mazar, Ori Yankelev, Roi Dover, Adrian Kunzle
Abstract: Methods, storage systems and computer program products implement embodiments of the present invention for controlling execution of automations that are associated with a table in a database. To implement these embodiments, respective bypass flags are defined in the automations, and an input indicating a bypass setting is received. In response to initiating execution of process for managing the table, the bypass flags are compared to the bypass setting so as to determine whether to permit or to bypass each given automation. Finally, during execution of the process, execution of the permitted automations is allowed, and execution of the bypassed automations is prevented.