Dell EMC Cyber Recovery software, along with Dell EMC Cyber Recovery Services, is designed to help provide a last line of data protection defence against ransomware and destructive cyber attacks.
The new software includes innovative automation, workflow and security analytics tools to ensure gold copies of critical data are isolated yet available so business processes can be resumed as quickly as possible in the event of a destructive cyber attack.
Cyber attacks have become a common occurrence, the worst of which often result in extended downtime that can bring business operations to a standstill for days and even weeks – costing millions of dollars. While many large organisations have strong cyber security and anti-malware detection capabilities in place, the impact of not being able to recover business processes and data in the event of a successful ransomware or destructive cyber attack can be devastating.
“Malicious insiders and sophisticated cyber attackers, especially those that employ ransomware, are known to deliberately target data protection and backup infrastructure,” says Beth Phalen, president: data protection at Dell EMC. “We take a layered approach to data protection within the portfolio and with our Dell EMC Cyber Recovery software and Services, helping ensure true data isolation and a last line of data protection defence for business-critical data from a variety cyber threats.”
Dell EMC Cyber Recovery is new software that integrates with Dell EMC Data Domain protection storage hardware. It provides a solution that combines the benefits of data isolation and business continuity to help minimise the impact of a cyber attack, while providing a faster and higher likelihood of success in the recovery of critical data and systems.
Dell EMC Cyber Recovery automates the retention of isolated secure copies of critical data within a Cyber Recovery Vault (CR Vault), removing them from the attack surface.
Serving as the ideal test bed, the CR Vault allows customers to perform security analytics on the retained data without having to perform a restore and potentially activating malware that may be present in the protected dataset. A new REST API automation framework provides seamless integration with security analytics software packages such as Index Engines CyberSense which applies over 40 heuristics to determine indicators of compromise.
Dell EMC also offers Cyber Recovery Services focused on providing a solution which is tailored to the customer’s exact data protection and cyber security requirements. This is accomplished through an expanded set of services including:
* Workshop: During this one-day workshop, consultants share Dell EMC best practices for business resiliency with a strong focus on cyber recovery.
* Advisory: The advisory service builds on the workshop by adding development of a high level cyber recovery strategy. The customer’s current and desired state is analysed to create a tailored strategy for cyber recovery preparedness.
* Advisory & Roadmap: The advisory & roadmap builds on the advisory service with a deeper dive into customer’s cyber recovery strategy to recommend an optimised implementation roadmap. This includes developing a cyber recovery maturity model report, which benchmarks the customer’s current state against industry best practices. Also included is a critical materials workshop and information session to collect data on the customer’s applications to understand criticality to the business. These considerations will help drive recommendations of data and applications which should be protected by the Cyber Recovery Vault.
* Deployment: New deployment services help maximise the capabilities of Dell EMC Cyber Recovery Solutions. They can be added to the ProDeploy Enterprise Suite or purchased separately and are available in two variations to fit customer needs.
* Implementation: Dell EMC Services can also customise the implementation of the Cyber Recovery Solution to account for a variety of additional use cases. This can include hardening of additional Dell EMC technology, developing detailed operational procedures and implementing custom dashboards and reporting.