Fast data recovery

Issue 3 2021 Infrastructure

Infinidat has announced fast data recovery capabilities to enhance its InfiniGuard appliance for enterprise users. The new InfiniGuard CyberRecovery capabilities provide transparent protection of the entire backup environment. It features immutable snapshots and near-instantaneous recovery to previous points-in-time based on customer-defined policies. These advancements address the threat of cyberattacks, such as ransomware, which occur on average every 14 seconds (Source: Cybersecurity Ventures).

Phil Bullinger.

“With our InfiniGuard solution, Infinidat significantly raises the bar in ransomware protection with near-instantaneous cyber recovery,” said Phil Bullinger, CEO of Infinidat. “The exciting new enhancements to our InfiniGuard platform represent superior recovery capabilities that advance data protection. We are enabling enterprise customers to establish a new line of defence for data backup that is critical in 2021 and beyond.”

When ransomware takes data hostage, it destroys backup copies of data, steals credentials, leaks stolen information and worse. It has caused businesses of all sizes to shut down operations overnight, so it is not unusual for a company to pay a large sum of money to restore their business.

“With ransomware already costing enterprises $20 billion a year, CIOs need to go beyond just backup to put a comprehensive and bulletproof cybersecurity strategy in place,” said Eric Burgener, research vice president, Infrastructure Systems, Platforms and Technologies Group, at IDC. “That strategy needs to provide transparent, policy-based workflows using immutable snapshots, air gap protection and flexible, granular and high performance recovery – all of which imply the need for a next generation data protection architecture.”

Discovering how ransomware intrudes into an enterprise IT infrastructure is extremely challenging and often happens after damage is already done to a company. The attack surface has also broadened over the past year because of the increased levels of companies’ employees working from home. The traditional line of defence has been data backup, but cyber terrorists now attack the backup and the storage that houses the backup solutions too; therefore, data backup on its own is no longer sufficient as a defence.

InfiniGuard CyberRecovery protects the backup solution itself through its transparent protection functionality, which is a new approach to defending against ransomware and other cyber threats. InfiniGuard offers immutable snapshots using WORM (write once read many) technology, ensuring that copies of data cannot be deleted, encrypted or changed.

Infinidat’s expanded cyber recovery solution also uses policy-based point-in-time recovery capabilities to enable the near-instantaneous recovery back to any point in the history of the data for data integrity and consistency. For enterprises that want to verify the data before it goes back online in a business operational environment, InfiniGuard provides an isolated test environment that is easy to use.

For more information go to

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Smart mining operations management
Mining (Industry) Infrastructure IoT & Automation
In his presentation at the recent MESA Africa conference, Neels van der Walt, Business Development Manager at Iritron, revealed the all-encompassing concept of SMOM (Smart Mining Operations Management) and why it is inextricably linked to the future of worldwide mining operations.

Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Cyber resilience – protect, defend, recover
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Top bets for backup and business continuity
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Next-gen solar-powered switches
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.