Supplier Risk Management is the process of evaluating and assessing your suppliers based on the impact they have on your business. If you are highly dependent on your supply chain to be able to deliver to your customers ...
Detect. Recover. Survive.
Cyber threats aren’t going anywhere. The ongoing prevalence of ransomware attacks means that organisations must introduce specific contingency plans with some urgency.
Outright prevention is practically impossible – attacks evolve too quickly, and software-based solutions are locked in an arms race to keep pace.
Databarracks’ new Cyber-DRaaS uses replication to bring a fresh, continuity-led approach to cyber security. Here’s the short pitch: Cyber-DRaaS identifies attacks early and enables users to roll back to the last clean replication point in Databarracks’ secure DR environment. It’s a simple and effective solution to a historically complex and costly problem.
What it does
Cyber-DRaaS offers a double-edged approach to cyber security, blending aggressive scanning and detection technologies with pro-active continuity planning. You can safely resolve cyber threats in a secure container, whilst continuing to support business as usual processes.
How it works
After initial scanning to establish a clean bill of health, we continuously replicate and scan your environment in isolation on our secure infrastructure platform. This delivers a regularly updated point in time from which to both scan against and recover to.
We begin by continuously replicating your production servers to our secure infrastructure platform in our ex-military data centers as normal. We use Zerto, which replicates at the hypervisor level.
2. Automated recovery
Next, we perform an automated recovery as we would with a typical DRaaS invocation. This is just like powering up your servers for a test or real invocation.
Step 3 is an automated malware scan on your newly recovered environment. We use Trend Micro's Deep Security to perform a more aggressive and far-reaching malware scan than would normally be feasible on a live production environment.
We then checkpoint your initial clean scan as safe for future recoveries.
Everything is captured and reported back to you in our Cyber-DRaaS portal – so there's no additional product to check. You can see which of your previous versions have been scanned, which are clean, and where the flags were raised.
5. Recursive scanning
If at any point one of the scans reveals an instance of ransomware or malware infection, we begin automatically scanning through an extended 72 hour replication journal in order to find the most recent clean instance to recover to.
“To recover from a ransomware attack without Cyber-DRaaS would take an uncomfortable length of time, so by using the service I know we’re protecting ourselves and our clients in the best possible way.”
Nick Doughty, Head of IT and Facilities at Magrath LLP