Ransomware protection

You’ve seen the headlines – organizations with their data held hostage and payouts to perpetrators to restore it. With new strains of ransomware and other malware threats on the rise, your enterprise and customer data is continually at risk despite steps you’ve taken.

A ransomware attack hit the City of Sparks, Nev., but with Commvault data protection the IT team had rapid data recovery.

Ransomware basics

Data protection in the new normal: A conversation with Commvault CIO Reza Morakabati

How to protect against ransomware attacks

A complete ransomware strategy includes both reducing the risk of a successful ransomware attack and lessening the impact of an attack that does succeed. There are five things you need to do: plan, prevent, monitor, restore quickly, and test.

How to protect against ransomware
  1. Create a plan: an effective strategy is a foundation for a full and speedy resumption of normal operations.
  2. Prevent attacks: proactive steps, including foundation hardening, application hardening, and ransomware protection.
  3. Monitor your environment: always be on the lookout for any anomaly, detecting the attack as quickly as possible to reduce its impact.
  4. Restore your data: perform fast restores with an intact and secure data copy to quickly resume normal business operations and reduce the ransomware impact. 
  5. Test your plan: perform frequent tests to verify you can meet your defined SLAs for high-priority data and applications.

With ransomware, there is both opportunity and risk – that’s the reality for businesses today and the people responsible for protecting the data. So how do you prepare? With Commvault solutions, you can ensure you do the one thing that matters most if you fall victim: Recover Fast.

Are you in control?

You are assured with Commvault’s capabilities, your data is safe, secure and recovery ready – against ransomware attacks and data breaches.

Check out one of our topical webinars

Ransomware strikes: Behind the scenes of a ransomware recovery

Managed cloud storage for your ransomware recovery strategy

Ransomware technology requirements

Does your current data protection and management solution offer…

Robust security framework based on AAA best practices: Authentication, Authorization, and Audit (AAA) framework is a set of security controls protecting who has access, and what they have access to, while monitoring events and activities for proper security posture.

Protect backups with air gapped copies: a technique that complements data isolation. Air-gapped networks have no connectivity to public networks. Tape is a traditional medium for air-gapped backups because tape can be removed from the library and stored offsite. To air gap secondary backup targets on disk or cloud, some access is needed, but communication is severed when it is not needed. Read more

Avoid ransomware file reinfections: ensure a clean and secure recovery by browsing and erasing suspicious or unnecessary files from the backup data, or create an isolated recovery.

Lock down cloud backup copies per your schedule: enable WORM/Object lock in cloud so that data cannot be deleted or changed for the duration of the lock period. Data is protected from changes within Commvault as well as changes direct change attempts.

Data isolation: having secondary and tertiary copies of backup storage targets segmented and unreachable directly from the public portions of the environment using virtual LAN (VLAN) switching, next-generation firewalls, or zero trust technologies.

Protect your backup copies from ANY changes with immutability: “unchangeable or changeless.” When applying this to backup data, whatever data you backup according to your set policies will be available to restore, unchanged and unmodified. Immutability protects against changes from within the backup solution, as well as outside of the backup solution. Read more

Monitor and detect suspicious activities: through active, backup, and event monitoring receive alerts to any anomalous events or changes within your environment. Detect ransomware activity, such as unauthorized system changes, with honeypots.

Continuously authenticate access with zero trust principles: Commvault’s security frameworks are based on Zero Trust principles. The underlying philosophy for zero trust is, “Never assume trust, but continuously validate trust.” Zero Trust ensures access is continuously validated using various multi-authentication, and segmentation techniques.

What you can do with Commvault’s single, integrated Data Recovery solution

Don’t let ransomware make your organization a victim. With Commvault, you’ll have an end-to-end solution that improves threat and risk mitigation across all endpoints and applications. You will always have recovery readiness and greater confidence in your data backup, recovery and compliance.

Learn more about Commvault ransomware protection and recovery

Secure your data, your recovery and your mission

Commvault Customer Champion Live: State of Colorado

Protecting your environment from ransomware with Commvault