Storage is essential for a comprehensive cybersecurity strategy

Issue 3 2022 Integrated Solutions, Information Security


Eric Herzog.

The sophistication and scale of cyberattacks will continue to increase exponentially around the globe, with experts expecting to see a huge increase in the number of ransomware and mobile attacks in the coming months.

Research by Cybersecurity Ventures predicts that global cybercrime costs will reach $10,5 trillion annually by 2025, up from $3 trillion in 2015. Check Point Research (CPR), in its cybersecurity predictions for 2022, finds that ransom amounts demanded by attackers are predicted to increase in 2022. It further predicts that data breaches will be on a larger scale, with attackers targeting an organisation’s customers and/or business partners for ransoms too.

In light of this fast-growing cyberthreat landscape, industry experts are increasingly urging businesses to turn their focus to developing cyber resilience, which is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Least amount of disruption

The ultimate goal of cyber resiliency is to help an organisation thrive in the face of adverse conditions, including an ever-evolving and complex cyberthreat environment. The concept brings together the areas of information security, business continuity and organisational resilience. Essentially, cyber resilience enables an enterprise to continue to function with the least amount of disruption in the face of increasingly prevalent and sophisticated cyberattacks.

Thus, to safeguard against sophisticated and increasing cyberthreats, organisations need to implement comprehensive enterprise storage cyber resilience solutions with innovative capabilities and enhanced performance for modern data protection, backup, disaster recovery and business continuity.

A state-of-the-art, cyber-resilient enterprise storage solution would therefore ensure that an enterprise is protected against ransomware, malware, internal threats and other potential cyberattacks by accelerating replication to alternative sites, as well as transforming what is possible for modern data protection and backup. This sets a new standard for preparedness in the defence against increasingly dangerous cyberattacks by combining immutable snapshots, logical air-gapping, fenced forensic environments and virtually instantaneous data recovery into a single, high-performance platform.

Restoration in minutes

Logical local and remote air-gapping creates a gap between the management plane and the immutable snapshots of the backup dataset, while remote air-gapping sends data to a remote storage system. The fenced forensic environment provides a safe location to provide forensic analysis of backup datasets, to identify a copy of the data that is free from malware or ransomware and can be safely restored. When a backup dataset without malware or ransomware has been identified, the data can be recovered. Regardless of the size of the dataset, it can be made fully available to the backup software for restoration in minutes.

By using immutable snapshots, cyber-resilient storage platforms ensure that the copies of the data cannot be altered, deleted or edited in any way. This ensures the integrity of the data while reducing recovery time to minutes, rather than hours or days. Together, the immutable snapshots, air-gapping, fenced forensic environment and rapid recovery time are enabled by state-of-the-art technology that was developed to bring a new level of enterprise-grade cyber resilience to enterprises.

Reduced backup windows

With recent enhancements to cyber-resilient enterprise storage platforms, increased system performance means that backup windows can be reduced by as much as 50%. This reduces the impact of the backup process on applications, primary storage and primary servers, while the improved system performance can also reduce the time it takes to perform remote replication. Ultimately, with optimised performance and target-side storage processing, cyber-resilient storage platforms offer unmatched speed and reliability in data backup and maximise effective capacity for petabyte-scale environments.

Another significant benefit of leveraging a cyber-resilient enterprise storage platform is its ability to lower total cost of ownership (TCO). By supporting multiple protocols, these solutions simplify the process to consolidate data protection for multiple systems in a single high-capacity solution. In turn, consolidation reduces the data centre footprint and lowers power and cooling costs, which significantly reduces an enterprise’s data protection TCO without sacrificing performance.

The storage of an organisation’s data, considered to be among its most valuable assets, can no longer be seen as separate from a comprehensive cybersecurity strategy. If an enterprise or service provider does not deploy cyber-resilient storage, the damage that cyber criminals can do could be devastating.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...