Dell EMC Strengthens Last Line of Data Protection Defense Against Cyber Attacks With New Cyber Recovery Software

SHARE:
Copied!

We have all seen the headlines with increasing frequency this past year and know them all too well. And because October is National Cybersecurity Awareness Month, we’re reminded that ransomware and cyber attacks have cost business billions, affected government and public services, and provided IT headaches to organizations. These sophisticated attacks use malware and methods that can quickly bring global operations to a standstill while encrypting or destroying critical data.

While these threats are increasing and getting more dangerous, customers are not always confident their runbooks and infrastructure are equipped with the right incident response and recovery procedures to bounce back from one of these attacks.

Data Protection infrastructure and architectures, commonplace in IT, are optimized for Operational Recovery, as well as Disaster Recovery providing excellent results and added business resiliency in scenarios such as natural disasters, system, or human error. However, counter to what other solution vendors in the marketplace would like you to believe, these systems are not a sufficient defense for sophisticated cyber attacks.

Disaster recovery does not equal cyber attack recovery

According to Gartner, traditional backup services are not designed for recovery from cyber attacks1. Gartner, along with other industry analysts, and several government agencies, recommend making backup images or gold copies inaccessible from the network through air-gapped media. Keeping gold copies of your essential business data protected away from the surface of attack is key to quicker business recovery and better resiliency.

The Cyber Recovery Solution from Dell EMC – a combination of hardware, software and professional services, assumes that you as a customer have optimized backup and disaster recovery infrastructure and procedures in place. Augmenting these optimized aspects of your data protection strategy with a Cyber Recovery Vault and automated data isolation workflow gives customers a last line of defense against ransomware and destructive cyber threats.

Introducing Dell EMC Cyber Recovery software

Today, Dell EMC is announcing further innovation and building upon the current Cyber Recovery Solution with the release of Dell EMC Cyber Recovery, which is easy-to-deploy management and automation software. Under the covers, Dell Cyber Recovery leverages industry-leading back-up technology from Dell EMC Data Domain including secure replication, data invulnerability architecture, retention lock, and data efficiency.

Modern UI/UX for management and automation

Dell EMC Cyber Recovery software provides a framework which automates workflows end-to-end, protects critical data within the Cyber Recovery Vault, helps identify malicious cyber-threats, and performs recovery when needed. At the center of this solution, a new REST API automation framework, provides seamless integration with a modern UI/UX.

The intuitive and clean design of the UI provides for faster environment status and easier orchestration of key workflow management tasks. Management and access via the UI and/or REST API is done from within the CR Vault, again keeping the solution’s management points away from the surface of attack.

Proactive analytics in the Vault

Customers can realize even greater benefit from our data isolation approach over other ransomware recovery solutions by performing security analytics on the retained data. Serving as the ideal test bed, the CR Vault allows customers to perform security analytics without having to perform a restore and potentially activating the malware. Dell EMC Cyber Recovery software was designed with flexibility rather than incorporating a proprietary and monolithic data analytics engine. It integrates with analytics tools that perform data scanning and early malware detection and reporting. Within the automation framework, analytics can be automatically performed on a scheduled basis.

Incorporating the power of Dell Technologies and its ecosystem partners further increases the value and power of Dell EMC Cyber Recovery through its flexibility. One example of this is Dell EMC’s partnership with Index Engines and its CyberSense security analytics tool.

CyberSense applies over 40 heuristics to determine indicators of compromise and can alert the user of potential problems. The rapidly changing threat landscape demands an adaptive analytics framework, so the solution stays ahead of the bad actor by enabling tools that incorporate Artificial Intelligence (AI) and Machine Learning (ML) analytics methods to the CR Vault.

Take your business resiliency to the next level

Dell EMC Data Protection, along with Dell EMC Consulting and Implementation Services, continues to innovate and adapt to our customer’s needs with simple and powerful approaches to making them more resilient in today’s complex digital world.

The best way to understand the value is to hear directly from our customers who have put the solution into practice. One such customer is Bob Bender, Chief Technology Officer at Founders Federal Credit Union, who describes in this video how Dell EMC Cyber Recovery has helped his organization:

Dell EMC Cyber Recovery software and its complementary services offerings (as detailed in this Infocus Blog Post), are a true testament to how Dell EMC continues innovating to give you the tools required to maintain a competitive advantage over your competition and maintain your end customer’s trust.

Learn more about Dell EMC Cyber Recovery software by visiting the Dell EMC Cyber Recovery website.

 

 

1Gartner: Backup and Recovery Best Practices for Cyberattacks, Author: Ray Schafer, Published: 22 June 2017

Continue Reading
Would you like to read more like this?

Related Posts

XtremIO X2 v6.2 : Full Steam Ahead!

When we released XtremIO X2 with XIOS v6.1 at Dell Technologies World 2018, we delivered XtremIO metadata-aware replication – the industry’s most efficient replication across a wide area network (WAN). … READ MORE

Dan Inbar September 24th, 2018
Click to Load More
All comments are moderated. Unrelated comments or requests for service will not be published, nor will any content deemed inappropriate, including but not limited to promotional and offensive comments. Please post your technical questions in the Support Forums or for customer service and technical support contact Dell EMC Support.