Storage is essential for a comprehensive cybersecurity strategy

Issue 3 2022 Integrated Solutions, Information Security


Eric Herzog.

The sophistication and scale of cyberattacks will continue to increase exponentially around the globe, with experts expecting to see a huge increase in the number of ransomware and mobile attacks in the coming months.

Research by Cybersecurity Ventures predicts that global cybercrime costs will reach $10,5 trillion annually by 2025, up from $3 trillion in 2015. Check Point Research (CPR), in its cybersecurity predictions for 2022, finds that ransom amounts demanded by attackers are predicted to increase in 2022. It further predicts that data breaches will be on a larger scale, with attackers targeting an organisation’s customers and/or business partners for ransoms too.

In light of this fast-growing cyberthreat landscape, industry experts are increasingly urging businesses to turn their focus to developing cyber resilience, which is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Least amount of disruption

The ultimate goal of cyber resiliency is to help an organisation thrive in the face of adverse conditions, including an ever-evolving and complex cyberthreat environment. The concept brings together the areas of information security, business continuity and organisational resilience. Essentially, cyber resilience enables an enterprise to continue to function with the least amount of disruption in the face of increasingly prevalent and sophisticated cyberattacks.

Thus, to safeguard against sophisticated and increasing cyberthreats, organisations need to implement comprehensive enterprise storage cyber resilience solutions with innovative capabilities and enhanced performance for modern data protection, backup, disaster recovery and business continuity.

A state-of-the-art, cyber-resilient enterprise storage solution would therefore ensure that an enterprise is protected against ransomware, malware, internal threats and other potential cyberattacks by accelerating replication to alternative sites, as well as transforming what is possible for modern data protection and backup. This sets a new standard for preparedness in the defence against increasingly dangerous cyberattacks by combining immutable snapshots, logical air-gapping, fenced forensic environments and virtually instantaneous data recovery into a single, high-performance platform.

Restoration in minutes

Logical local and remote air-gapping creates a gap between the management plane and the immutable snapshots of the backup dataset, while remote air-gapping sends data to a remote storage system. The fenced forensic environment provides a safe location to provide forensic analysis of backup datasets, to identify a copy of the data that is free from malware or ransomware and can be safely restored. When a backup dataset without malware or ransomware has been identified, the data can be recovered. Regardless of the size of the dataset, it can be made fully available to the backup software for restoration in minutes.

By using immutable snapshots, cyber-resilient storage platforms ensure that the copies of the data cannot be altered, deleted or edited in any way. This ensures the integrity of the data while reducing recovery time to minutes, rather than hours or days. Together, the immutable snapshots, air-gapping, fenced forensic environment and rapid recovery time are enabled by state-of-the-art technology that was developed to bring a new level of enterprise-grade cyber resilience to enterprises.

Reduced backup windows

With recent enhancements to cyber-resilient enterprise storage platforms, increased system performance means that backup windows can be reduced by as much as 50%. This reduces the impact of the backup process on applications, primary storage and primary servers, while the improved system performance can also reduce the time it takes to perform remote replication. Ultimately, with optimised performance and target-side storage processing, cyber-resilient storage platforms offer unmatched speed and reliability in data backup and maximise effective capacity for petabyte-scale environments.

Another significant benefit of leveraging a cyber-resilient enterprise storage platform is its ability to lower total cost of ownership (TCO). By supporting multiple protocols, these solutions simplify the process to consolidate data protection for multiple systems in a single high-capacity solution. In turn, consolidation reduces the data centre footprint and lowers power and cooling costs, which significantly reduces an enterprise’s data protection TCO without sacrificing performance.

The storage of an organisation’s data, considered to be among its most valuable assets, can no longer be seen as separate from a comprehensive cybersecurity strategy. If an enterprise or service provider does not deploy cyber-resilient storage, the damage that cyber criminals can do could be devastating.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.