New White Paper Highlights Crucial Role of Active Archiving in Defeating Ransomware Attacks
The Active Archive Alliance today announced a new white paper by the Data Center Intelligence Group (DCIG), “Mitigating Ransomware through Active Archive Solutions,” highlighting the importance of active archiving in defending against ransomware attacks. The white paper was commissioned by the Active Archive Alliance.
Cybersecurity software is the first line of defense against cyberattacks. But security software alone cannot guard against all types, especially ransomware. This form of malware often invades a network when a user innocently clicks on a malware-infested URL in an email. Because ransomware is c**** to develop and easy to spread, it has become today’s chief malware threat. Ransomware attacks can devastate an organization between lost revenue, lost time and lost reputation.
Enter active archiving: a scalable storage architecture that intelligently manages digital data assets and protects them against ransomware attacks, accidental data loss and corruption.
Top iTechnology Automation News: ZVRS, Purple Communications Announce Innovative Collaboration with Meta to Advance Access to Video Communications for the Deaf Community
“Hackers often attack industries with high-value data like healthcare, utility infrastructures, finance, and media and entertainment. These organizations often pay to recover their data,” said Rich Gadomski, Co-Chairperson of the Active Archive Alliance. “Active archive solutions provide a strong countermeasure to ransomware attacks while providing a strategic approach to the many data management challenges that organizations are faced with today.”
Key DCIG Highlights
DCIG notes that active archiving solutions offer permanent and long-term protection for archived data against malicious intrusion as well as accidental data loss or corruption. The report highlights numerous ways that active archive solutions can provide ransomware mitigation, including:
1. Protecting archive data from modification. WORM (write once, read many) and retention management features keep archived data safe from malicious encryption or overwrite.
2. Replicating archived data and securing offline storage. Active archive solutions may secure archived data through offline storage, providing an air gap defense that removes the data from the network where it cannot be attacked. Archived data may be replicated for additional protection.
3. Replicating data to a secure cloud. Data remains online in a secure cloud, protecting it with security features like Secure Socket Layers (SSL) encryption and multi-factor user authentication.
4. Supporting 3-2-1 data archiving. The 3-2-1 model maintains three replicated copies stored on two different storage types, such as a disk-based backup system, a secure cloud platform, and online or offline tape.
5. Enabling rapid recovery. The more data sets that reside in primary storage, the greater the opportunity for hackers. Active archiving minimizes attack opportunities in primary storage by identifying and moving inactive files to secure cloud and offline archives. This approach leaves fewer data sets to test and recover on primary storage and primary backup, speeding up recovery with minimal business impact.
Top iTechnology IoT News: Zimperium and Intertrust Partner to Provide End-to-end Security for IoT devices in Zero-trust Environments
[To share your insights with us, please write to sghosh@martechseries.com]