Backups double the coordination in the event of a cyber-defense failure

Most organizations fail to protect themselves from cyber attacks and ransomware intrusions. That’s the view of James Blake, Cohesity’s EMEA CSO, who spoke to Computer Weekly Backup The company recently launched Datahawk services and its Data Security Alliance initiative.

“I’ve seen how people defend themselves and why they fail miserably,” he said blakeWho added that budgets and headcounts have often been thrown at security – but no real intelligence.

“There is no real linear relationship between spending and headcount and operational capacity,” he said. “The rules [of any defensive scanning capability] Can never be in front of the opponent. Attacker always has first mover advantage.

“And then you still have to assume that defenses are built with good processes and rules are upheld, and that’s not the case.”

So, Blake says, a huge part of dealing with any ransomware attack is successfully dealing with and recovering from the impact.

This means being able to restore the last clean copy of the data that was not corrupted.

To deal with this, solidarity — which at its core is a backup software and appliance provider — detects clean data using threat intelligence licensed from Qualis’ Blue Hexagon as part of its Data Security Alliance initiative.

“The idea is to stop the ransomware process from unfolding before it reaches the final stage – exfiltration and impact – Miter Attack 14-phase modelsaid Blake.

It does this by detecting signature patterns in backups to identify safe restore points without corrupt artifacts, he added.

Meanwhile, the Datahawk functionality actively searches for file system-related activity in enterprise systems, Blake said.

This includes modifying the file system, removing executable files associated with the ransomware process. “Anything that touches the file system,” he said. “Droppers, and temporary files that launch when someone clicks an email, for example.”

Other powers included Data monitoring And Classification To understand the potential impact of the attack.

“Compute and storage are becoming commoditized,” Blake said. “What’s important is the information. And understanding where those resources are is important. If there’s an impact on the system, you need to know what it does.”

“Using data on the Datahawk data management platform to classify critical data and PII [personally identifiable information] To allow customers to understand what data the business has released and what the impact may be.”

Cohesity has also been brought up in the meantime Fort Knox Cyber-vaulting In Datahawk. It’s about how to keep data out of the reach of attackers.

For companies, this means vaulting data in the sense of disappearing into the network. In other words, says Blake, “it cannot be discovered, it is not mounted, but can be restored to a chosen place”.

Cohesity’s approach contrasts with other providers, which use Immutable snapshot or immutable storage functionality in AWS S3 storage.

Coherence – like other suppliers – makes such data accessible only through multi-factor authentication, but uses a “clean room” concept where data can be mounted before being brought back into production.

The company announced its Data Security Alliance at its ReConnect Summit last month. It brings together 12 partner companies with cybersecurity and data protection management expertise, including Palo Alto Networks, Cisco, BigID and Splunk.

Meanwhile, DataHawk is a software-as-a-service (SaaS) offering from the company Fort Knox Data-vaulting services with threat scanning and detection and intelligent data classification in one offering. A customer must purchase DataProtect before adding services such as DataHawk.

Source link

Ruturaj Gaikwad knocks seven sixes in one over to win the Vijay Hazare Trophy. Singer Irene Cara, of “Fame” and “Flashdance,” passed away at age 63. Alia Bhatt, will act in Japanese films in the future?
%d bloggers like this: