Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection
When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for
What this is about? This time-based attack happens when an attacker manipulates insufficiently-secure time sync configuration to trick the backup systems into thinking that “X” number
On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s
In the world of cybersecurity, staying ahead of threats and vulnerabilities requires a multifaceted approach. Two prominent solutions in this field are StorageGuard and Rapid7 InsightVM. While both tools have distinct focuses, they also complement each other in ways that can significantly enhance an organization’s security posture. In this blog post, we will delve into the key features, benefits, and how these two solutions work together seamlessly.
StorageGuard’s security validation checks cover a wide range of system components, access controls, authentication mechanisms, encryption settings, monitoring configurations, and more. These checks are specifically tailored to ensure that Cohesity DataPlatform adheres to industry best practices and security standards.
To ensure compliance with DORA and to get ahead of the regulators, CISOs should take the following 6 steps to ensure that their storage and backup systems are secure and resilient
StorageGuard plays a critical role in your cyber resiliency strategy, by helping you increase usage & adoption of your existing data protection tools – and subsequently get more out of your current investment.
In the past two years, cybercriminals have become increasingly skillful at destroying the organizational backup first, only then locking the data – leaving victims no choice but to pay the ransom. Given how long this trend has been around, and the devastating impact of a successful attack, one would expect organizations would get things under control by now. If anything, the situation is worsening.
The ETC Program underscores Dell’s commitment to offer customers flexibility and choice with complimentary solutions such as StorageGuard for protecting their critical systems from cyberattacks and insider threats.
Cyber insurance provides a cushion to fall back on in a successful cyber-attack, providing coverage for damages caused by data loss.
It’s time to automate the secure configuration of your storage & backup systems.