Storage is essential for a comprehensive cybersecurity strategy

Issue 3 2022 Integrated Solutions, Information Security


Eric Herzog.

The sophistication and scale of cyberattacks will continue to increase exponentially around the globe, with experts expecting to see a huge increase in the number of ransomware and mobile attacks in the coming months.

Research by Cybersecurity Ventures predicts that global cybercrime costs will reach $10,5 trillion annually by 2025, up from $3 trillion in 2015. Check Point Research (CPR), in its cybersecurity predictions for 2022, finds that ransom amounts demanded by attackers are predicted to increase in 2022. It further predicts that data breaches will be on a larger scale, with attackers targeting an organisation’s customers and/or business partners for ransoms too.

In light of this fast-growing cyberthreat landscape, industry experts are increasingly urging businesses to turn their focus to developing cyber resilience, which is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Least amount of disruption

The ultimate goal of cyber resiliency is to help an organisation thrive in the face of adverse conditions, including an ever-evolving and complex cyberthreat environment. The concept brings together the areas of information security, business continuity and organisational resilience. Essentially, cyber resilience enables an enterprise to continue to function with the least amount of disruption in the face of increasingly prevalent and sophisticated cyberattacks.

Thus, to safeguard against sophisticated and increasing cyberthreats, organisations need to implement comprehensive enterprise storage cyber resilience solutions with innovative capabilities and enhanced performance for modern data protection, backup, disaster recovery and business continuity.

A state-of-the-art, cyber-resilient enterprise storage solution would therefore ensure that an enterprise is protected against ransomware, malware, internal threats and other potential cyberattacks by accelerating replication to alternative sites, as well as transforming what is possible for modern data protection and backup. This sets a new standard for preparedness in the defence against increasingly dangerous cyberattacks by combining immutable snapshots, logical air-gapping, fenced forensic environments and virtually instantaneous data recovery into a single, high-performance platform.

Restoration in minutes

Logical local and remote air-gapping creates a gap between the management plane and the immutable snapshots of the backup dataset, while remote air-gapping sends data to a remote storage system. The fenced forensic environment provides a safe location to provide forensic analysis of backup datasets, to identify a copy of the data that is free from malware or ransomware and can be safely restored. When a backup dataset without malware or ransomware has been identified, the data can be recovered. Regardless of the size of the dataset, it can be made fully available to the backup software for restoration in minutes.

By using immutable snapshots, cyber-resilient storage platforms ensure that the copies of the data cannot be altered, deleted or edited in any way. This ensures the integrity of the data while reducing recovery time to minutes, rather than hours or days. Together, the immutable snapshots, air-gapping, fenced forensic environment and rapid recovery time are enabled by state-of-the-art technology that was developed to bring a new level of enterprise-grade cyber resilience to enterprises.

Reduced backup windows

With recent enhancements to cyber-resilient enterprise storage platforms, increased system performance means that backup windows can be reduced by as much as 50%. This reduces the impact of the backup process on applications, primary storage and primary servers, while the improved system performance can also reduce the time it takes to perform remote replication. Ultimately, with optimised performance and target-side storage processing, cyber-resilient storage platforms offer unmatched speed and reliability in data backup and maximise effective capacity for petabyte-scale environments.

Another significant benefit of leveraging a cyber-resilient enterprise storage platform is its ability to lower total cost of ownership (TCO). By supporting multiple protocols, these solutions simplify the process to consolidate data protection for multiple systems in a single high-capacity solution. In turn, consolidation reduces the data centre footprint and lowers power and cooling costs, which significantly reduces an enterprise’s data protection TCO without sacrificing performance.

The storage of an organisation’s data, considered to be among its most valuable assets, can no longer be seen as separate from a comprehensive cybersecurity strategy. If an enterprise or service provider does not deploy cyber-resilient storage, the damage that cyber criminals can do could be devastating.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Kaspersky detects over 1 million daily tracking attempts
Kaspersky News & Events Information Security
Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...