Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

Hall 7A / Booth Number 7A-402

Backup & Recovery

Categories

Backup solutions

Product Description

Attacks on company data by ransomware have been in the news for years. A ransomware attack can cause devastating damage to companies: from financial losses, damage to reputation, loss of confidentiality of confidential data to insolvency. The aim of a cyber attack is to extort as much money as possible in a short space of time. This is particularly successful if there is no way for companies to restore critical data on their own. Cyber criminals therefore first try to penetrate and destroy the backup environment before launching an encryption attack against productive data.A cyber-resilient backup environment offers a high level of protection against this threat. The factors required to protect a backup environment against ransomware attacks are

- Limitation of rights

- 2-factor authentication

- Encryption of data at the backup destination and on the way there

- Storage of unalterable data copies

- Integrity, reliability and availability throughout the entire backup and recovery process

- Reliable monitoring

- Creation of an air gap for a 3-2-1-1-0 backup strategy

- Forensic analysis of backed-up data for changes to metadata and file content

For our backup & recovery area, we rely on a good and long-standing co-operation with various manufacturers and can use them for our customers as required. Our proven core vendors have been leaders in the Gartner Magic Quadrant for many years.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.