Article Challenge: More Data and New Threats

Secure cloud image with locks

IT and IS managers at the world’s largest multi-nationals must manage data growth at enterprise scale, meet stringent RPO/RTO objectives, and protect data from loss or malicious attacks. Your choice of backup target is critical to meeting these data protection objectives. Traditional hardware backup targets are expensive and lack scalability. Public cloud targets can limit bandwidth, resulting in lengthy restore times. Wherever your backup data resides, a ransomware attack could render that data useless, potentially shutting down operations. Making matters more urgent, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) and Financial Crimes Enforcement Network (FinCEN) published advisories stating that making or facilitating ransomware payments may violate sanctions and be in violation of anti-money laundering (AML) regulations. This makes you liable for penalties for making ransomware payments even though you are doing so to maintain business continuity. It is therefore not surprising that a solution that keeps your data immutable has become a requirement for many enterprises to obtain and maintain a cyber insurance policy. This is because integrated, end-to-end data immutability— protecting the very backup data cybercriminals most target—can reduce your risk of losses due to a business-crippling cyber event such as a ransomware attack.

Solution

Cloudian HyperStore enterprise storage complements Veeam Availability Suite with a fast, on-premises disk-based storage and built-in ransomware protection. At 70% less cost than public cloud or traditional enterprise storage, Cloudian offers an innovative solution for better backup storage. Read more in the Cloudian the solutions brief.

How does Ransomware Protection from Veeam & Cloudian work?

  1. Backup with Object Lock is initiated by Veeam and enabled for a specific duration.
  2. This automatically creates a locked bucket on Cloudian HyperStore.
  3. The backup is made immutable for the period specified and cannot be changed or deleted.
  4. This prevents tampering or hacker encryption and ensures a reliable backup copy for recovery.

Recently Veeam & Cloudian delivered a Webinar. Watch the video.

Don’t hesitate to reach out to your account manager for more information. Or use the contact form on our website.