Dell extends Cyber Recovery ransomware protection to AWS – TechTarget

Dell EMC is providing customers with a means to lock down their data in AWS S3.
This week, Dell EMC introduced PowerProtect Cyber Recovery for AWS, a cloud-based variant of its data isolation and immutability software. The product enables customers to create an air-gapped data recovery vault in AWS S3, separate from their production and backup environments. Customers can secure the data within the vault by implementing access restrictions to PowerProtect Cyber Recovery for AWS.
The new software provides an extra layer of ransomware protection on top of a customer’s primary backup. Data in the Cyber Recovery vault is harder to access by bad actors because it is stored in an isolated storage environment on a product that is separated from the rest of an organization’s backup administration. Even if backup administrators’ credentials are compromised, Cyber Recovery requires its own set of security credentials and multifactor authentication to access.
Dell EMC PowerProtect Cyber Recovery was previously only deployable on premises, either directly into appliances in customers’ data centers or delivered as a service through Faction, a cloud service provider Dell EMC partners with.
Previously, customers who wanted to protect cloud-native data would have to move it back on premises first, leading to extra complexity and cost, said Rob Emsley, director of product marketing for data protection at Dell Technologies. This week’s launch addresses those customers’ needs by enabling them to use AWS S3 as the storage back end for the Cyber Recovery vault.
“When customers move to AWS, they have to protect their workloads the same way as they did on prem,” Emsley said.
Dell EMC PowerProtect Cyber Recovery for AWS costs less than $1,000 per TB for one year to approximately $2,000 per TB for a three-year commitment, according to the vendor. It is sold and deployed as a virtual appliance, so customers will need to provide their own storage for it in AWS S3.
Enterprise workloads are about evenly split between on premises and the cloud, so nearly every organization is adopting a hybrid infrastructure strategy, said Phil Goodwin, research vice president at IDC. Customers are faced with the challenge of bringing the same level of protection for on-premises environments to their cloud environments. IDC’s research predicts that by 2025, more than half of organizations will take a “cloud-centric perspective” to data protection instead of the traditional, on-premises approach.
“We’re in a transition of focusing on the availability of data and applications instead of underlying storage,” Goodwin said. “SaaS applications, hybrid cloud — we no longer have access to the storage underneath, so it forced us to think differently.”
For Dell appliances customers, PowerProtect provides a natural way to extend their infrastructure into AWS, and for cloud-heavy organizations, the software protects on-premises workloads moving into AWS’ public cloud, Goodwin said.
The Cyber Recovery vault will also enable customers to deploy a public cloud vault quickly instead of manually creating an S3 bucket, applying access and immutability policies to it and maintaining it themselves, Goodwin added.
“There are a lot of customers where [an isolated vault] doesn’t represent a large IT burden, but it’s good if you just want a turnkey approach,” Goodwin said.
Dell EMC PowerProtect Cyber Recovery for AWS provides other advantages over the DIY approach, said Krista Macomber, a senior analyst at Evaluator Group. Its two biggest benefits are that it removes the need for customers to create custom scripts for managing the air gap and, through its integration with Index Engines, PowerProtect Cyber Recovery for AWS can determine when a ransomware attack occurred and identify a safe backup copy to recover from.
“Identifying the last known good copy is something that we are seeing customers struggle with in particular,” Macomber said.
Two vendors are working with isolated recovery vault services: Veritas introduced NetBackup Recovery Vault in October and Cohesity is building Project Fort Knox. There’s a market for this technology, Macomber said, especially for smaller companies that don’t have the budget or staff for an air-gapped storage repository but still need to meet compliance or security demands.
Johnny Yu covers enterprise data protection news for TechTarget’s Storage sites SearchDataBackup and SearchDisasterRecovery. Before joining TechTarget in June 2018, he wrote for USA Today’s consumer product review site Reviewed.com.
A lengthy outage for AWS in December brought many enterprise apps and services to a halt, but it also provided a moment of …
New disaster recovery products attracted the site’s most page views in 2021, indicating disaster recovery planning is top of mind…
Resilience is a key issue for disaster recovery pros. This year, readers sought to build up their skills and learn more about the…
The 20th anniversary of the ‘Storage’ magazine and SearchStorage Products of the Year contest showcases 39 finalists in backup, …
The top 10 storage stories of 2021 highlight both large vendors and startups and demonstrate reader interest in performance, …
Delete unneeded data to ensure no data storage is wasted and to save both time and money. Use retention policies, data …
At a time when threats to network and data security are on the rise, MSSPs can help overwhelmed enterprises confront cloud …
As businesses in the throes of digital transformation and cloud migration struggle to find and hire technically skilled IT …
Nemertes Research CTO John Burke warns that a server’s lifecycle may be shorter than you think and offers a four-stage approach …
Ensono, SADA and NWN Carousel target mainframe modernization, Google Cloud adoption and cloud-based unified communications, …
Cybersecurity regulations and trends in the managed services market push for more formal MSP accountabilities to deliver and …
Cloud computing skills shortages are changing the way businesses think about in-house IT and making them more likely to tap …
All Rights Reserved, Copyright 2008 – 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info

source

Share this post:

Leave a Reply