Chapters
Executive summary
Introduction
Protection Policy for replicating the PowerStore backups to the Cyber Recovery vault
Performing PowerProtect Data Manager automated recovery
Recovering the PowerStore backup copies from the Cyber Recovery vault
References