Our Dell Cyber Recovery Vault solution is offline from the network and air-gapped to remove it from the surface of attack. It is only accessible to users who have proper clearance.
The cyber vault solution includes management tools that operationalize data recovery, starting with the creation and automation of recovery restore points.
– Backup: Bad actors can mount, delete, or encrypt backup data or catalogs, and often destroy the backup server.
– Snaps: Advanced cyber attackers can accumulate credentials and will often log in and delete snaps. They may destroy the entire platform, and there are “sleeperware” issues.
– Immutable Snaps: Despite the name, immutable copies can often be deleted or compromised, especially by insiders. So be careful of the definition. Snaps also tend to be platform-specific.
– Retention Lock: This is a good hardening technique, but users still need to protect the catalog. A failure or loss of the platform also compromises the whole structure.
– Honey Pot: End-users setting up a sting operation for malicious activity by displaying data that appears to be a legitimate part of the infrastructure – but is isolated and monitored. Great, you have a small chance of finding the malicious activity – so if you get lucky, what do you do? How do you handle false positives?
Security analytics capabilities allow data in the Cyber Recovery Vault to be analyzed in a secure environment, while the data is offline.
Optional solutions planning is available, where we deliver advanced consulting assistance to assist with the identification of business-critical systems/applications, current infrastructure, dependencies, recovery time and recovery point objectives, and other considerations.Contact sales