fbpx

StorageGuard™

Storage is the most important asset when it comes to protection from ransomware.
However, storage is also the only layer of IT not covered by traditional vulnerability management tools.
Until now…

StorageGuard secures your storage systems,
to help you protect your data.

StorageGuard scans data storage, storage management, and backup systems for vulnerabilities and misconfigurations. For the first time, enterprises will have complete visibility of their storage blind spots, with the most urgent risks automatically prioritized.

Visibility

Continuous scanning and analysis of data storage systems

Prioritization

Automatic detection
of security risks

Protection

Knowledge base of security configuration best practices

Compliance

Overall health and
compliance reports

Select your role

Head of Information Security

  • How do I assess the security of data storage?
  • How do I discover and minimize the storage attack surface?
  • How do I manage and prioritize storage security risks?
  • How do I assess data recoverability in the event of a cyberattack?
Find out more

Head of Infrastructure & Storage

  • How do I identify and resolve storage security issues?
  • How do I prove adherence to our security configuration standards / baseline?
  • How do I keep track of storage configuration changes?
  • How do I automate validation & enforcement of storage security best practices?
Find out more

The Storage Security Handbook

This handbook showcases the need for securing storage systems, providing practical tips, and helping you present the business case to your CIO or CFO

Product Comparison

Qualys

Choose

Rapid7

(InsightVM)
Choose

Tenable

(Nessus)
Choose

StorageGuard vs. Qualys

Qualys does a good job of scanning vulnerabilities across your host OS, network, and web, but offers no support for storage arrays, storage network, data protection/backup systems and storage management. And this is where all your data is kept.

Features

Solution use cases

  • Vulnerability Assessment
  • Security Posture Management

Focus Area 

  • Data Storage
  • Host and Desktops 

Supported Platform Types

  • Storage OS
  • Storage Software
  • Network (Storage) 
  • Host / Mobile OS, DBMS
  • Host Software
  • Network (Ethernet) 

Main Features

  • Security configuration assessment
  • Vulnerability scanning
  • Policy and Compliance (Audit) 
  • Threat detection
  • Storage & Backup Asset Inventory and Discovery
  • Storage & Backup Attack Surface Mapping and Visualization
  • One-click remediation

Scalability

  • Enterprise-scale (distributed collection)

SCAP support

Configuration Change Tracking

API 

  • REST
  • SQL

Policy & Compliance

Integration 

Solution use cases

Vulnerability Assessment

Security Posture Management

Focus Area 

Data Storage

Host and Desktops 

Supported Platform Types

Storage OS

Storage Software

Network (Storage) 

Host / Mobile OS, DBMS

Host Software

Network (Ethernet) 

Main Features

Security configuration assessment

Vulnerability scanning

Policy and Compliance (Audit) 

Threat detection

Storage & Backup Asset Inventory and Discovery

Storage & Backup Attack Surface Mapping and Visualization

One-click remediation

Scalability

Enterprise-scale (distributed collection)

SCAP support

Configuration Change Tracking

API 

REST

SQL

Policy & Compliance

Integration 

Download Datasheet

StorageGuard vs. Rapid7

Rapid7 does a good job of scanning vulnerabilities across your host OS, network, and web, but offers no support for storage arrays, storage network, data protection/backup systems and storage management. And this is where all your data is kept.

Features

Solution use cases

  • Vulnerability Assessment
  • Security Posture Management 

Focus Area 

  • Data Storage
  • Host and Desktops

Supported Platform Types 

  • Storage OS 
  • Storage Software
  • Network (Storage) 
  • Host / Mobile OS, DBMS
  • Host Software 
  • Network (Ethernet)

Main Features

  • Security configuration assessment
  • Vulnerability scanning
  • Policy and Compliance (Audit) 
  • Threat detection 
  • Storage & Backup Asset Inventory and Discovery
  • Storage & Backup Attack Surface Mapping and Visualization
  • One-click remediation

Scalability

  • Enterprise-scale (distributed collection)

SCAP support 

Configuration Change Tracking

API 

  • REST
  • SQL

Policy & Compliance  

Integration  

Solution use cases

Vulnerability Assessment

Security Posture Management 

Focus Area 

Data Storage

Host and Desktops

Supported Platform Types 

Storage OS 

Storage Software

Network (Storage) 

Host / Mobile OS, DBMS

Host Software 

Network (Ethernet)

Main Features

Security configuration assessment

Vulnerability scanning

Policy and Compliance (Audit) 

Threat detection 

Storage & Backup Asset Inventory and Discovery

Storage & Backup Attack Surface Mapping and Visualization

One-click remediation

Scalability

Enterprise-scale (distributed collection)

SCAP support 

Configuration Change Tracking

API 

REST

SQL

Policy & Compliance  

Integration  

Download Datasheet

StorageGuard vs. Tenable

Tenable does a good job of scanning vulnerabilities across your host OS, network, and web, but offers no support for storage arrays, storage network, data protection/backup systems and storage management. And this is where all your data is kept.

Features

Solution use cases

  • Vulnerability Assessment
  • Security Posture Management 

Focus Area

  • Data Storage
  • Host and Desktops 

Supported Platform Types 

  • Storage OS 
  • Storage Software 
  • FC Network 
  • Host / Mobile OS, DBMS
  • Host Software
  • IP Network

Main Features

  • Security configuration assessment
  • Vulnerability scanning 
  • Policy and Compliance (Audit) 
  • Threat detection
  • Storage & Backup Asset Inventory and Discovery
  • Storage & Backup Attack Surface Mapping and Visualization
  • One-click remediation

Scalability 

  • Enterprise-scale (distributed collection)

SCAP support 

Configuration Change Tracking 

API 

  • REST
  • SQL

Policy & Compliance  

Integration  

Solution use cases

Vulnerability Assessment

Security Posture Management 

Focus Area

Data Storage

Host and Desktops 

Supported Platform Types 

Storage OS 

Storage Software 

FC Network 

Host / Mobile OS, DBMS

Host Software

IP Network

Main Features

Security configuration assessment

Vulnerability scanning 

Policy and Compliance (Audit) 

Threat detection

Storage & Backup Asset Inventory and Discovery

Storage & Backup Attack Surface Mapping and Visualization

One-click remediation

Scalability 

Enterprise-scale (distributed collection)

SCAP support 

Configuration Change Tracking 

API 

REST

SQL

Policy & Compliance  

Integration  

Download Datasheet

FAQs

Don’t quite understand why securing storage is so important?
Want to understand how StorageGuard works? You’ve come to the right place!
 

We have our network and OS covered. Why do we need storage security?

Perimeter-based defense is not enough to protect against threats. The storage system is where all data is kept. Your existing vulnerability scanning solutions cover everything today, except for your storage, backup and storage management systems.

When a hacker gets control of a desktop, the damage is minimal. But when a hacker gets control of the storage systems, they have access to ALL THE DATA! This includes backup, copies, recovery copies, and production Data. They can delete it, corrupt it, or sell it.

What are the possible impacts of an unsecured storage system?

Attackers with access to a storage system could delete data volumes, encrypt data volumes, make data volumes inaccessible, corrupt / delete data recovery volumes and snapshots. A single storage array serves hundreds of database and application servers, thus a compromised storage system would cripple at least dozens business services and applications. 

Why is Storage Security essential for Ransomware protection? (~Why now)

There has been a major shift in the threat landscape, with the emergence of ransomware-as-a-service. The first step taken by threat actors is to knock out an enterprise’s ability to recover from an infection, by exploiting vulnerabilities in storage and storage management configurations.

A hacked storage system is the equivalent of hacking two hundred servers!

This greatly improves the incentive for enterprises to pay the ransom, after the critical data is exfiltrated and then encrypted. And it has significant implications for CISOs and Heads of Storage and requires a drastically different approach to cybersecurity.

Storage also plays a critical role in the ability to recover from a cyberattack, since storage is where replicas, snapshots and backups are kept.

What kind of checks does StorageGuard perform?

Automatically identifying storage security misconfigurations and vulnerabilities. Our checks repository is constantly updated with security recommendations based on the following publications –

  • Vendor Security guides and articles: Dell EMC, IBM, Hitachi, NetApp, INFINIBOX, Brocade, HPE, Pure and others
  • Information Security standards: NIST, ISO/IEC, PCI DSS, CIS Control, FFIEC and more
  • Security advisories, bulletins and CVEs (MITRE / vendors)
  • Community feedback – security configuration baseline suggestions by users

The checks cover a wide range of areas: authentication, authorization, administrative access, malware protection, services and protocols, interfaces and ports, anti-ransomware, SAN access control, encryption, audit logging, NAS access control, object access control and more.

Which storage systems and devices does StorageGuard support?

StorageGuard supports storage arrays, storage networking, data protection appliances, storage virtualization, storage management, storage software and plugins. 

How is securing storage different than securing servers?

  • Different network model (SAN vs TCP)
  • Different access control features (zoning, masking)
  • Scanning agents cannot be installed on the majority of storage systems (closed systems / appliances)
  • Some of the systems run non-standard operating systems
  • Some of the systems are only accessible through vendor-specific commands / programs (CLI/API)
  • Difficulty to identify the attack surface; including all hosts installed with storage CLI/API kit
  • Lack of storage security expertise within IS/IT
  • Poor support by existing Security Vulnerability Scanning solutions – in terms of coverage and depth

Our Awards 2021

Top 10 Enterprise Security Startups 2021

Data Security Solution of the Year

See StorageGuard in action

See how easy it is to assess the security of your storage & backup systems, and prioritize storage security risks

Book your Demo
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree