• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

What EMC’s DP Search and Superheroes Have in Common

Today’s businesses back up a dizzying amount of data. Sifting through that amassed information to find and restore a specific file accidentally deleted by an end user is no small undertaking. close up of a hand with magifying glassHowever, limitations such as an inability to search cross-server or cross-platform only further complicate the process for those tasked with managing backups.

What would it take to condense the arduous process of finding that file? It’s doable with EMC’s Data Protection (DP) Search, which is part of EMC’s Data Protection Suite. Think of it as a Google search for the backup environment. DP Search examines the content and metadata of backed-up files to locate the end user’s mistakenly deleted document. Not only can it execute this search in a matter of seconds, it can do so while also looking across platforms and servers.

How? Let’s take a closer look at the inner workings of DP Search.

‘Google search for your data center’

DP Search consists of a single virtual appliance or a cluster of replicating appliances (depending on the businesses’ needs) deployed in the data center. Once the initial deployment is complete, IT must decide which backup devices it wants DP Search to engage with, a la Avamar, Networker, CloudBoost, etc. IT must then provide DP Search with the credentials needed to access the information contained on those devices.

Linking DP Search and backup devices is only part of the process. The next step is creating an index populated with the source servers that will make up the searchable content. This index allows IT to direct which data sources DP Search will catalog – and later search.

With these directives in hand, DP Search, either scheduled or on demand, will read the metadata for all index sources and organize it into searchable content. When a keyword search is executed, DP Search will parse through this information to find files and content that matches the given search criteria.

Right from the search results page, IT will be able to:

  • see the location of the file
  • view a file’s metadata
  • see all of the backups the document has been included in
  • tell which backup schedule a file is on
  • preview the document
  • restore the file

Harnessing the power of DP Search

With great power comes great responsibility. It’s true for superheroes and it’s true for those managing a company’s backups. DP Search puts a tremendous amount of power in the hands of backup admins and IT. Without the proper settings and restrictions in place, this power could go beyond providing value and instead invite controversy.

For example: What would pop up if someone used the word “salary” as a keyword? Or consider the unintentional complications that could arise if employees’ laptops were all being backed up to a server that DP Search could access?

That’s why it’s not enough to just deploy powerful data protection offerings like DP Search. Instead, it’s essential to harness that power so it provides the highest possible value back to the business. Attendees will learn how to do both of those things during Two Essential Pieces of the Data Protection Puzzle, one of the courses at the 2016 Arraya Tech Summit. However, that’s only the beginning of what they’ll experience during this course. It will also walk them through how backup and recovery tools, like DP Search, work together to keep a business’ data safe.

Data protection is one of the focus areas of the Tech Summit. The free event, which will be held on June 9th at the Sheraton Valley Forge in King of Prussia, PA, features a full day of technical deep dives into the subjects today’s IT pros care about most. This includes security, cloud, enterprise mobility, and many more.

Have a question about DP Search (or data protection in general) that won’t wait until the Tech Summit? Click HERE to reach out to our team today. Also, follow us on social media – Twitter, LinkedIn, and Facebook – to stay updated on all of our Tech Summit and company news and insights.

Register Now for the 2016 Arraya Tech Summit

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}