cancel
Showing results for 
Search instead for 
Did you mean: 

Role-based Access Control: A look into NetBackup 8.1.2

Samabali
Level 1
Employee

NetBackup 8.1.2 is now available!

Over the next few weeks, I will be discussing the key features we delivered in this release, starting today with Role-based Access Control.

Organizations today are becoming increasingly complex and struggle to cope with accelerating data growth, increasing numbers of next-generation workloads, as well as managing the number of users who access the data. With every user asking for more independence and control, access management has become a critical function for all IT organizations. Thus, the need to find a balance between limiting access to data, thereby limiting the risk of stolen or misused data, versus the convenience of data access for users.

With this in mind, we delivered Role-based Access Control (RBAC) in NetBackup 8.1.2. Role-based administration with access control and audit tracking enables organizations to securely scale out administration while managing who has access to NetBackup infrastructure, what they can do with it, and what areas they can access.

With the new web-based UI, NetBackup Admin can delegate responsibility but still maintain security, be informed, and in control.  This feature not only minimizes potential user errors but also increases the overall security of the NetBackup ecosystem and empowers other admins to have more direct control over the protection and recovery of their data. Out of the box, NetBackup 8.1.2 supports the roles for Backup Administrator, Security Administrator, and the Workload Administrator. These roles can perform NetBackup operations such as monitoring backup jobs, configuring NetBackup settings, configuring and managing protection for workloads/assets, and performing restores. Additionally, custom roles can be created with pre-defined access privileges.

Watch the video to learn how the new web-based NetBackup UI, enables secure self-serve access for a variety of users with different roles.

Lookout for my post next week, where I will discuss how with Instant Access, files can quickly be restored from a virtual machine.