Ransomware is everywhere.
Every company is a potential target.
What plans do you have in place to make sure your company remains resilient against ransomware?
speaks with Gus Iannello
, technical account manager at Ingram Micro
, and Jeremy Snow
, systems engineer at Veritas
- What you need to know about ransomware
- How Veritas helps protect vulnerable areas
- How dark data is connected to data silos
- Unprotected workloads and unprotected servers
What you need to know
The goal of ransomware is to take control of a company’s system and disrupt their business.
It targets companies of all sizes, from large-scale enterprises to small businesses.
“They’re even targeting vendors and technology providers like MSPs,” Gus says.
Plus, they are attacking every single infrastructure—even the cloud.
How Veritas helps
Protect, detect, recover—that’s the mode that Veritas operates in.
The company wants to protect your data and your workloads, detect any types of anomalies and recover, whether it be locally, at an alternate location or in the cloud.
Anomaly detection system
This is a new feature with the latest version of Veritas NetBackup.
“It’s an engine that is essentially programmed to detect any suspicious activity,” Gus says. “It looks at metadata and it finds out if there are any out-of-the-ordinary processes happening.”
If it detects anything, it deploys an alert within the UI so that administrators can address the issue.
Data insight gives you full access and visibility into your data. You can see whether any particular data sets have elevated levels of risk and who has access to it.
“If it’s personal information, you might have some type of remediation play where you can investigate or put something in place to remove access,” Jeremy says.
On the infrastructure side, Veritas offers APTARE Analytics. It allows you to monitor your environment on an infrastructure optimization basis and offers a long list of ransomware reports.
Plus, you don’t have to be a Veritas customer to use it as it integrates with numerous different technologies.
Dark data is data that is not being used because it’s redundant, obsolete or trivial. It could also be orphan data—data that no longer has an owner.
Not only is this wasted data, it also has a cost associated with it since it sits in storage. But more importantly, it is a ransomware vulnerability.
APTARE will run reports to identify this type of data so that you can secure it by deleting it, archiving it or moving it to a different location.
APTARE can run reports on different types of backup solutions and can identify data that is not currently assigned a backup policy.
Not only that, it can identify when backup software incorrectly reports a successful backup.
For more information, contact Gus
or visit Ransomware Protection