Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software

Hall 6 / Booth Number 6-138

Dell Cyber Recovery

Categories

Planning of data centers and IT infrastructures Data protection, data security Data recovery Penetration tests Data center security Hardware security Application security

Key Facts

  • Cyber Recovery is included with the latest data domain systems
  • Option of a cyber vault for additional protection
  • Use of the BOOST protocol (non-attackable) & "Retention Lock" function: Data is written away in "WORM mode" (write once read many) and cannot be encrypted

Product Description

A SECURE VAULT FOR YOUR COMPANY DATA

The pattern varies. Companies are often first encrypted in the backup and then the cyber criminal systematically moves on to the primary systems. Depending on when the attack is detected, the company can rescue its data: pull the plug, prepare an emergency manual, determine the damage, procure equipment, rebuild the system, etc. In many cases, the BSI (German Federal Office for Information Security) must be notified, which means that the affected systems must first be investigated to identify the perpetrators and may not be used until the investigation has been completed. This can sometimes take several days.

The experience with Cyber Recovery from Dell Technologies has been very positive. Customers who use the solution consisting of PowerProtect Data Domain and a cyber vault have had a great opportunity to get back online very quickly. If companies use a Data Domain as the target storage for the backup in an initial expansion stage, they were able to take advantage of two benefits that make it more difficult for attackers to encrypt the systems. The first is the so-called BOOST protocol, which could not be hacked so far, the second is the "Retention Lock" function, in which the data is written away in a "WORM mode" (write once read many) and therefore cannot be encrypted. Companies that place a second or third Data Domain in a cyber vault behind another firewall are even better protected. The cyber vault can only be accessed via an air gap - a process that physically and logically separates two IT systems but still allows data to be transferred. In the maximum expansion stage, a backup server is also located behind this firewall and can be used directly for the recovery/restoration of non-encrypted data if the primary systems are no longer usable.

UNIQUE PROTECTION SOFTWARE

Due to the increasing threat of ransomware attacks, Dell Technologies has developed protection software that is currently unique in its concept and capabilities. Cyber Recovery is included with the newer Data Domain systems and forms a kind of last line of defense against malware attacks of all kinds. Retention Lock can be used as a governance or compliance mode. This data cannot be changed, overwritten or deleted for the period of time specified in the retention lock. Compliance mode is used for strict company regulatory standards and secures the data domain system against internal and external attacks via a security officer. Once the security officer has been created, all other users only have operational rights and cannot exclude users, delete, change or encrypt data.

Based on the observation that modern ransomware is increasingly targeting companies' backup systems and seeking to disable or control them, Dell Technologies developed the concept of a vault that is completely inaccessible to attackers. This Cyber Recovery Vault stores a kind of gold copy of the company's data so that the previous data status can be restored at any time. And there's more: the Cyber Recovery Vault can also store the backup server itself, thus ensuring the functionality of the recovery routines. With the Dell NetWorker and Data Manager backup solutions, this process can even be automated; with other backup products, the administrator has to set up the server manually. It is then possible to restore not only the data records blocked by the malware, but also the fully configured server, thus restoring a clean and functioning production environment in the shortest possible time.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.