RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Dell EMC Cyber Recovery

Product
Developers: Dell EMC
Date of the premiere of the system: 2018/11/12
Technology: Cybersecurity - Backup and data storage

2018: Release of the software

On November 12, 2018 the Dell EMC company announced release of the software of Dell EMC Cyber Recovery and also provided services of Dell EMC Cyber Recovery Services. These offers are designed to help customers to build a reliable defense line of data from programs racketeers and destructive cyber attacks.

Software interface Dell EMC Cyber Recovery

As noted in Dell EMC, cyber attacks became an everyday occurrence, and their worst effects — increase in a downtime that can lead to a stop of business operations for several days and even weeks, and it quite often costs millions of dollars. Though many large organizations have potential of ensuring cyber security and protection against malware, the inability to recover business processes and data in case of the successful attack of programs racketeers or destructive cyber attack can have serious effects.

File:Aquote1.png
"It is known that malicious actions of insiders and difficult cyber attacks, especially when are used programs racketeers, are aimed at infrastructure of protection and data backup. In the product portfolio we apply multilevel approach to data protection that allows to provide original isolation of data and to create a reliable defense line of data, crucial for business, from different cyberthreats".

Beth Phalen, the president of Dell EMC in the direction of data protection
File:Aquote2.png

Dell EMC Cyber Recovery is the software which is integrated with data storage equipment of Dell EMC Data Domain. This solution combines advantages of isolation of data and ensuring continuity of business processes. It minimizes cyber attack effects, providing at the same time a high probability of success at recovery of crucial data and systems, claim in Dell EMC.

According to the statement of the developer, software of Dell EMC Cyber Recovery automates preserving of the isolated protected copies of crucial data in the Cyber Recovery Vault system (CR Vault), excepting them from the surface of the attack. Acting as the test stand, the CR Vault storage allows clients to analyze security of the saved data without the need for recovery and potential activation of the malware which can be present at the protected data set. Infrastructure of automation of REST API provides seamless integration with software packages of analytics of security, such as Index Engines CyberSense which applies more than 40 heuristic rules for identification of signs of a compromise of data.

Services of Dell EMC Cyber Recovery

Dell EMC also offers services of Cyber Recovery Services which are aimed at providing to customers the solution adapted to their specific requirements in the field of data protection and ensuring cyber security. It is reached at the expense of an expanded set of services, including:

  • Seminar: at a one-day seminar consultants are divided recommendations and practicians of Dell EMC by business stabilization, paying special attention to recovery.
  • Consulting: consulting services complement a seminar with development of high-level strategy of recovery. For creation of individual strategy of increase in readiness for recovery the current and desirable status of the circle of the client is analyzed.
  • Recommendations and road map: are based on service of consulting with deeper immersion in the strategy of recovery for drawing up the optimized road map of implementation of process of recovery. It includes development of the report on model of a maturity of processes of recovery in which the current status of the circle of the client is compared to the best industry practices and also a seminar with important materials and information session for collection of data on applications of the client and understanding of their importance for business. These data will help to develop recommendations about data protection and applications using Cyber Recovery Vault.
  • Deployment: services of deployment help to use possibilities of the solutions Dell EMC Cyber Recovery as much as possible. They can join in services of ProDeploy Enterprise Suite or are purchased separately and are available in two options corresponding to customer needs.
  • Customization: services of Dell EMC Services can also include customization of the solution Cyber Recovery taking into account a set of additional scenarios of use. It can provide gain of protection using additional Dell EMC technologies, development of detailed working procedures and implementation of the user dashboards for monitoring and obtaining reports.

For November, 2018 software of Dell EMC Cyber Recovery can already be purchased around the world. Upon purchase of Dell EMC Data Domain (DDOS 6.0.x above) it is offered free of charge. Services of Dell EMC Cyber Recovery Services are also available to the order.

File:Aquote1.png
"Nobody can guarantee absolute protection against cyber attacks. When there are attacks and data are damaged, in order to avoid interruption of business processes it is important to define quickly an attack vector and to replace bad files. The solution Dell EMC Cyber Recovery copes with this task using integration with the product Index Engine CyberSense. Means of CyberSense for detection of programs racketeers and the analysis of integrity of data use model of machine learning which allows to define with big confidence figure whether data were successfully attacked. After attack detection analytical tools will help to reveal the compromised accounts of users and potentially malware. Using CyberSense of an effect of cyber attacks it is possible to minimize, and the organizations will be sure of a possibility of recovery for only one cycle of backup".

Tim Williams, chief executive officer of Index Engines
File:Aquote2.png