It’s a tough job out there for IT – the landscape is much more complex with workloads no longer just sitting secure in your battle stations (that’s no moon!); they’re roaming the galaxy and getting exposed to a lot more risk than ever before.
And there are Bounty Hunters…
These hunters are after a prize, and that prize/payout is your data – if they can get a hold of it.
There are a lot of tricks up a bounty hunter’s sleeve, and it will take more than carbonite to protect your precious data cargo. There are known vulnerabilities out there in the IT galaxy: older droids needing a patch, newer starships with a hidden exhaust port. These are part of a changing list of things in your environment that need to be maintained and proactively fixed. So how can you stay ahead of this wretched hive of scum and villainy?
Step 1: Keep your shields up (to date)!
Commvault’s Security Assessment report is one way to help keep these hunters at bay. This dashboard displays an up-to-date view of your data protection environment and a list of potential holes in that shield to patch up. Comparing your configurations to the most recent best practices, you can quickly validate that known exposures and weaknesses like needed zero-day patches or basic config settings for encryption or multi-factor authorization (MFA) are taken care of.
Report. Remediate. Repeat. Keeping yourself up to date with the latest fixes is a solid first step in your defense strategy!
Step 2: Activate scanners!
You can’t protect what you don’t know about, and you can’t recover it either. Data analytics and the insights they provide used to be a nice to have, but they have become must haves if you want to be serious with your security. Like a good protocol droid, the Commvault analytics services: File Storage Optimization (FSO) and Data Governance (DG) will help you scan, classify and enable you to take the appropriate actions needed to ensure your most critical data sets are secure. FSO and DG can use their machine learning intelligence to identify key data and assess the risks against it. Are the permissions and access controls too open? Is it residing in a cloud virtual machine or it shouldn’t be?
Be ready to know more about the data under your management and take action!
On top of this, Commvault provides built-in ransomware anomaly detection (no third parties, no add-ons!) and other security features like flexible air gap and data immutability options to monitor for threats and provide a gold copy to recover from.
Speaking of which …
In fact, here’s a handy checklist you can use when trading with Jawas for the latest in analytics droids 😉 A buyer’s checklist for data analytics and governance.
Step 3: Be ready with a plan
Having a recovery plan is critical. Whether it’s simply spinning up a fresh virtual machine in the cloud or failing over an entire application or environment, without a plan there’s a good margin for error. With the plan in place, the next important part is automation to ensure that plan executes smoothly.
Commvault Disaster Recovery helps automate your DR plan by providing policy driven recoverability. Not only that, but you can easily run restore validation tests, adjust recovery time objectives (RTOs) and recovery point objectives (RPOs) as your business needs change. Chuck in some one-click failovers, sub-minute RPOs for your most critical data and the ability to recover across platforms, clouds and hyper-visors and clouds – and you’ve got resiliency and protection matching the strongest Beskar in the Republic!
Of course, there are a lot more details behind all of these steps, and if you want to dive deeper into the galaxy of how Commvault supports your cybersecurity initiatives, I suggest a quick jump to hyperspace and check out “Greater ransomware prevention with data isolation and air gap technologies.” Or if you can stay awhile and listen, then I recommend you fire up this webinar on “Mastering modern disaster recovery: A guide to being recovery ready.”
Matt Tyrer is a Senior Solutions Marketing Manager at Commvault.