#DellPowerProtectCyberRecovery
Explore tagged Tumblr posts
govindhtech · 3 months ago
Text
Dell APEX Protection Storage, Smarter Flash Cyber Recovery
Tumblr media
Dell APEX Protection Storage
Success in fast-paced IT is often ascribed to speed. Data recovery should be done quickly to retrieve valuable data. The 2024 Global Data Protect Index found that 75% of organizations concern that current data protection policies may not be enough to combat ransomware and malware. Dell’s latest product, APEX Protection Storage All-Flash for Cyber Recovery, is useful for smart fast recoveries that maintain data integrity.
The Power of Flash Storage
Because flash storage is faster and has more communication capabilities than regular HDDs (Hard Disk Drives), it has completely changed the IT sector. Speed is what makes flash storage popular among enterprises. The SSDs improve system performance by reducing latency and speeding up data access. They do this by having faster read and restore times than conventional HDDs. Additionally, consolidation of workloads, smaller hardware footprints, less power consumption, and cheaper maintenance and operating expenses can all be advantageous to businesses.
Addressing Ransomware
Critical data for many firms is growing in size as the ransomware assault threat landscape changes. Currently, enterprises must overcome the difficulty of continuing to uphold their service level agreements (SLAs) while recovering more vital data from isolated recovery environments. Now that Dell APEX Protection Storage All-Flash for Cyber Recovery is available, clients may take advantage of an easy-to-use, cost-effective, and energy-efficient solution with quick restoration capabilities for important data. This storage is based on PowerProtect Data Domain software-defined storage.
PowerEdge R760 server
Storage for APEX Protection On Dell’s 16G PowerEdge R760 server with 220 TB of capacity, All-Flash for Cyber Recovery is provided as a reference design running on VMware. With up to 56% less rack space and up to 2x faster restore speeds than the DD69002 when compared to the DD9910 at 1.5PB3, this product can help you optimize your recovery operations and save energy while enhancing your analytics with CyberSense.
CyberSense verifies the accuracy of the data stored in the Cyber Recovery vault, and All-Flash uses less hardware resources while still leaving a minimal carbon imprint. Through extensive testing against real-world situations with live ransomware, CyberSense, powered by AI-based machine learning and over 200 content-based analytics, delivers an astonishing 99.99% accuracy in detecting malware corruption.Image Credit to Dell
Principled Technologies compared the ability of a competing data protection system (identified as Vendor X) to identify ransomware corruption with Dell PowerProtect Cyber Recovery with CyberSense.
The competitive approach completely missed one attack, according to the results, and it required 15 backup cycles to identify the other two. On the other hand, in a single backup cycle, CyberSense identified ransomware corruption from the three distinct attack types. Comprehensive details regarding this testing are available in the Principled Technologies report: A report by Principled Technologies: Practical testing and real-world outcomes
Dell Technologies PowerProtect CyberSense Cyber Recovery
Data protection policies must safeguard and analyze all IT components, from the surface to the core, as cyber threats increase and attack tactics adapt. After a cyberattacks or other disruption, Dell PowerProtect Cyber Recovery safeguards critical data and assures proper recovery. Dell PowerProtect Cyber Recovery safeguards data and programs from ransomware, hacks, and unexpected events.
The multi-copy system copies backups to segregated storage for protection and analysis. PowerProtect Cyber Recovery includes one or more storage vaults, either on-premises in a PowerProtect DD (formerly Data Domain) appliance or in the  cloud via software-defined Dell APEX Protection Storage for Public Cloud. Both the on-premises and APEX vaults are operationally air-gapped, or isolated from the production environment. This makes it harder for unauthorized individuals to log in and compromise backups.
The completely automated and integrated intelligent security analytics engine CyberSense in PowerProtect Cyber Recovery checks vault data, files, databases, and photos for ransomware corruption.
CyberSense performs full content analysis, takes observations from files to feed its AI-based machine learning (ML) model, and detects malicious activity like mass deletions, encryption, and other suspicious changes in core infrastructure (including Active Directory and DNS), user files, and critical production databases that may indicate ransomware or a destructive attack.
CyberSense alerts the PowerProtect Cyber Recovery dashboard when it finds corruption patterns, providing more information on the attack’s scope. PowerProtect Cyber Recovery reduces downtime, mitigates cyberattacks, strengthens data resilience with multiple backups, and maintains business continuity. This paper shows dell competitive analysis of CyberSense and highlights major data protection capabilities and functionality using publicly available data.
In summary
While recovery speed is crucial, in order to minimize extra business risks, it must be combined with a clever strategy that verifies the integrity of your data prior to restoration. Dell APEX Protection Storage All-Flash for Cyber Recovery provides the speed needed for prompt data restoration without sacrificing data integrity, resulting in an intelligent recovery procedure. When trying to retrieve data compromised by cyberattacks, this is essential.
A dependable and effective cyber recovery solution is becoming more and more important for enterprises as ransomware assaults get more sophisticated and focused, utilizing new technologies and taking advantage of security holes. You can rely on Dell Technologies to deliver the data restoration solution that combines intelligence, speed, and resilience to let you resume your operation.
Read more on govindhtech.com
0 notes