Detect. Recover. Survive.

Cyber threats aren’t going anywhere. The ongoing prevalence of ransomware attacks means that organisations must introduce specific contingency plans with some urgency.

Outright prevention is practically impossible – attacks evolve too quickly, and software-based solutions are locked in an arms race to keep pace.

Databarracks’ new Cyber-DRaaS uses replication to bring a fresh, continuity-led approach to cyber security. Here’s the short pitch: Cyber-DRaaS identifies attacks early and enables users to roll back to the last clean replication point in Databarracks’ secure DR environment. It’s a simple and effective solution to a historically complex and costly problem.

Case study 

Cyber DRaaS



What it does


Cyber-DRaaS offers a double-edged approach to cyber security, blending aggressive scanning and detection technologies with pro-active continuity planning. You can safely resolve cyber threats in a secure container, whilst continuing to support business as usual processes.

How it works


After initial scanning to establish a clean bill of health, we continuously replicate and scan your environment in isolation on our secure infrastructure platform. This delivers a regularly updated point in time from which to both scan against and recover to.

The benefits

By combining our award-winning DRaaS platform with Trend Micro's Deep Security, we've automated the process of finding the most recent clean replica of your production systems. The result is that you can recover from ransomware or malware infections within the same Recovery Time Objectives offered by our DRaaS platform, which can be as little as 15 minutes, whilst automatically recovering to the most recent Recovery Point.






1. Replication

We begin by continuously replicating your production servers to our secure infrastructure platform in our ex-military data centers as normal. We use Zerto, which replicates at the hypervisor level.


Automated recovery





2. Automated recovery

Next, we perform an automated recovery as we would with a typical DRaaS invocation. This is just like powering up your servers for a test or real invocation.







3. Detection

Step 3 is an automated malware scan on your newly recovered environment. We use Trend Micro's Deep Security to perform a more aggressive and far-reaching malware scan than would normally be feasible on a live production environment.
We then checkpoint your initial clean scan as safe for future recoveries.







4. Reporting

Everything is captured and reported back to you in our Cyber-DRaaS portal – so there's no additional product to check. You can see which of your previous versions have been scanned, which are clean, and where the flags were raised.



Recursive scanning

5. Recursive scanning

If at any point one of the scans reveals an instance of ransomware or malware infection, we begin automatically scanning through an extended 72 hour replication journal in order to find the most recent clean instance to recover to.

Recursive scanning




From The BCPcast - Episode 3: We're All Human,We're All Vulnerable

In The BCPcast, we meet the people who keep some of the largest organisations in the UK running throughout disruption. Listen to Stewart Duguid from BP on human error.

Visit the website

Subscribe on iTunes

“To recover from a ransomware attack without Cyber-DRaaS would take an uncomfortable length of time, so by using the service I know we’re protecting ourselves and our clients in the best possible way.”

Nick Doughty, Head of IT and Facilities at Magrath LLP

Get a Quick Quote

Latest News

Download free

Advice, guides, reports and the facts and figures you need.
Download now
See more resources

Get in touch

Call FREE within the UK:

0800 033 6633

If you are calling from outside the UK or from a mobile, please dial +44 (0)203 1771910