Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Improving ransomware resilience

September 08, 2021

Improving ransomware resilience
powered by Sounder

Ransomware is everywhere.
Every company is a potential target.
What plans do you have in place to make sure your company remains resilient against ransomware?
Shelby Skrhak speaks with Gus Iannello, technical account manager at Ingram Micro, and Jeremy Snow, systems engineer at Veritas, about:
  • What you need to know about ransomware
  • How Veritas helps protect vulnerable areas
  • How dark data is connected to data silos
  • Unprotected workloads and unprotected servers

What you need to know

The goal of ransomware is to take control of a company’s system and disrupt their business.
It targets companies of all sizes, from large-scale enterprises to small businesses.
“They’re even targeting vendors and technology providers like MSPs,” Gus says.
Plus, they are attacking every single infrastructure—even the cloud.

How Veritas helps

Protect, detect, recover—that’s the mode that Veritas operates in.
The company wants to protect your data and your workloads, detect any types of anomalies and recover, whether it be locally, at an alternate location or in the cloud.

Anomaly detection system

This is a new feature with the latest version of Veritas NetBackup.
“It’s an engine that is essentially programmed to detect any suspicious activity,” Gus says. “It looks at metadata and it finds out if there are any out-of-the-ordinary processes happening.”
If it detects anything, it deploys an alert within the UI so that administrators can address the issue.

Data visibility

Data insight gives you full access and visibility into your data. You can see whether any particular data sets have elevated levels of risk and who has access to it.
“If it’s personal information, you might have some type of remediation play where you can investigate or put something in place to remove access,” Jeremy says.
On the infrastructure side, Veritas offers APTARE Analytics. It allows you to monitor your environment on an infrastructure optimization basis and offers a long list of ransomware reports.
Plus, you don’t have to be a Veritas customer to use it as it integrates with numerous different technologies.

Dark data

Dark data is data that is not being used because it’s redundant, obsolete or trivial. It could also be orphan data—data that no longer has an owner.
Not only is this wasted data, it also has a cost associated with it since it sits in storage. But more importantly, it is a ransomware vulnerability.
APTARE will run reports to identify this type of data so that you can secure it by deleting it, archiving it or moving it to a different location.

Unprotected workloads/servers

APTARE can run reports on different types of backup solutions and can identify data that is not currently assigned a backup policy.
Not only that, it can identify when backup software incorrectly reports a successful backup.
For more information, contact Gus or visit Ransomware Protection.