Sponsored Content

Sponsored content is a special advertising section provided by IT vendors. It features educational content and interactive media aligned to the topics of this web site.

Home > As-A-Service-Flexible IT

Modernizing Cyber Resilience Using a Services-Based Model

Cyberattacks are becoming more sophisticated and destructive and are being deployed at rapid speed. Damages from cybercrime are expected to reach $6 trillion in 2021, according to Cybersecurity Ventures, fueled by a sharp rise in ransomware attacks and malware that targets remote applications and work-from-home users.1

In this environment, organizations must consider new data protection and cyber security use cases to ensure they can survive a successful attack. Key steps toward cyber resilience include isolating critical data in a cyber recovery vault that is trusted to recover core business functions after a cyber attack.

This article looks at the business value of using a service-based model built on modern data protection technologies so you are well positioned to protect and recover your data and your business in the event of a successful cyber or ransomware attack.

The changing threat landscape
Cybercrime overall has spiked significantly since the beginning of the COVID-19 pandemic, and ransomware has been a particularly devastating means of attack. According to one study, ransomware attacks increased by 288% in the first half of 2021.2 U.S. Homeland Security Secretary Alejandro Mayorkas has estimated that $350 million was paid out in ransomware attacks in 2020.3

Data protection environments have been identified by many attackers as a primary target in the victim’s IT organization. As described by Enterprise Strategy Group:

“Ransomware and bad actors have learned that they have a better chance of achieving their goal—getting paid a ransom or destroying data—if no backup is available for recovery. This has placed backup systems and data under direct attack.  Unfortunately, there are a number of vulnerable points because backups were designed for accessibility, not necessarily for security.”

Dell EMC PowerProtect Cyber Recovery from Dell Technologies is one of the leading solutions in the industry, allowing customers to create a backup and rollback solution of mission critical data and applications so a company can minimize downtime and resume ‘business as usual’. This includes the creation of a cyber recovery vault that contains the core data and business functions the organization needs to operate, with features such as:

  • Data isolation and governance.
  • Data immutability to preserve the original integrity.
  • Automated data copy and air gap to ensure isolation between the production/backup environment and the vault.
  • Machine learning, full-content indexing and advanced analytics to identify suspicious activity and aid in determining recoverability of vaulted data.
  • Recovery and remediation tools to perform recovery after an incident.
  • Expert guidance to select critical data sets, applications and other vital assets to determine recovery time objectives (RTOs) and recovery point objectives (RPOs.) 

Cyber Recovery Services
Customers are also increasingly interested in how they can create a mature cyber recovery program around Dell EMC PowerProtect Cyber Recovery so they can have more confidence in the their ability to recover after a cyber event. 

To achieve this, Dell Technologies Services experts work with customers in parallel and iterative workstreams to tie agile and incremental activities to the bigger picture, through technologies, people and processes. The Services portfolio consists of Advisory, Implementation, and Managed Services tp drive these outcomes. These capabilities can enable organizations to:

  • Identify critical data for the vault aligned with recovering critical business processes
  • Deploy PowerProtect Cyber Recovery and extend the solution to meet specific business needs.
  • Leverage expert advice on recovery strategy and integration points, with organization-wide incident response plans.
  • Develop and test recovery plans and procedures.
  • Have Dell Technologies Managed Detection and Response Services experts manage day-to-day operations and support recovery efforts.

Each of these steps is critical to reducing risk and building a more cyber resilient organization. For more information on steps you can take, please visit the site: Maximizing Cyber Resiliency to Build Trust and Confidence.

Taking the next step
Organizations not only need to build in protections against successful attacks; they must also build trust and confidence in their cybersecurity and cyber resilience strategies.

As noted by Enterprise Strategy Group, customers deploying Dell EMC PowerProtect Cyber Recovery solution can tell key stakeholders that they have a high degree of confidence that systems can successfully be recovered after a cyberattack and the business will be operational and profitable again with the least amount of disruption.

To learn more about how your organization can leverage the benefits of PowerProtect Cyber Recovery as part of a comprehensive Cyber Recovery Services solution, please visit Dell Technologies.

1Cybercrime to Cost the World $10.5 Trillion Annually By 2025,” Cybercrime Magazine, Nov. 13, 2020
2Ransomware attacks increased by 288% in H1 2021,” Help Net Security, September 6, 2021
3DHS Secretary warns ransomware attacks on the rise, targets include small business,” ABC News, May 6, 2021

Close