Brand Arrow

Ransomware Protection

Recover Quickly and With Confidence

Ransomware is one of the greatest risks faced by today’s enterprises. The 'WannaCry' ransomware crisis of 2017 has further raised global awareness on the importance of having a rapid recovery strategy in place that ensures business continuity.

Next Steps for Ransomware Protection

Matthew Magbee shares how his company recovered after it was hit with a CryptoLocker virus.

Ransomware Webinar

Watch the on-demand webinar to learn how to protect your organization against ransomware.


Watch the on-demand webinar to learn how to prepare for the worst, such as a ransomware attack.

"Commvault is the only vendor offering a backup application with highly sophisticated security measures embedded within the platform, designed to specifically recover from ransomware attacks such as WannaCry."

- Andrew J. Nowinski, Sr. Research Analyst, Piper Jaffray

Minimize Risk Everywhere Your Data Lives

Data is at risk everywhere it may be stored. Whether it’s on-premises or in the cloud, data needs to be protected and managed with the same measured approach to assure that it won’t be compromised by a cybersecurity intrusion. At Commvault we deliver an integrated, automated data protection approach that provides a single, complete view of all stored data. This means you can rapidly recover data, whenever you need to, so that you can resume business as usual even in the face of a ransomware threat. And, Commvault doesn’t stop at file servers and storage arrays. Even business files stored in third-party file sharing applications can be protected in a secure, searchable and centralized virtual repository. And data created and stored on laptops and desktops can be secured and accessible from any web browser or mobile device.

What’s this mean in the event of a ransomware attack? Because your data has been securely backed up and protected, it can be easily recovered and restored to eliminate business interruption, without paying threatening ransom payments. Further, Commvault software monitors, alerts, and identifies the rate of file changes. Check files are placed in special locations to be monitored for changes. And, if files are altered, alerts and notifications are launched for further investigation, before they hop and infect other systems throughout the infrastructure.

Protect Data with Security Standards and Best Practices

Traditional backups aren’t enough. For assured protection from ransomware, it’s vital to have a dual backup configuration, where only one system is connected at a time. By having access to two recovery sites, systems can be easily restored with data from the offline system so recovery from a cyber-security event is seamless and fast.

  Ensure that key systems have at least one backup destination that is not continuously addressable through operating system calls. This will mitigate the risk of attacks like CryptoLocker which seek to encrypt or damage data on all addressable data shares, including backup destinations.  

-- Center for Internet Security (CIS) Critical Security Control (CSC)

  Ensure backups are not connected permanently to the computers and networks they are backing up. Examples are security backups in the cloud or physically storing backups offline… Backups are critical in ransomware recovery and response; if you are infected, a backup may be the best way to recovery your critical data.   

-- U.S. Government

The Commvault architecture meets the standards and recommendations of the Center for Internet Security and the U.S. Government. It alternates copies used to maintain persistent copies of the data in other locations – a powerful protection against ransomware. With ransomware, hackers can access file servers and encrypt the data. If they can find access paths to any online backup sets, they can potentially delete the attached backup pool as well. Commvault enables copy separation to minimize this risk while delivering comprehensive backup and recovery. Protecting data using a secure, searchable and centralized virtual repository, Commvault even protects data retained in cold storage with a protective “gap” that prevents stored data from being corrupted by ransomware while still enabling content to be easily searched and recovered. By restricting the attack to the client system, ransomware is contained and systems can be simply recovered from the secondary backup.

Prevent Endpoint Vulnerability

When it comes to cyber threats, endpoint systems – including laptops and desktops – are easy targets. By maintaining a secure, regularly scheduled backup of your organization’s laptops, you can simply recover from a ransomware attack. When all other endpoint security tools have failed, standards-based backups of your endpoints will serve as the insurance you need to avoid ransomware demands.

Commvault’s efficient, streamlined approach to endpoint protection reduces the IT burden, improves end user productivity and keeps corporate data protected, no matter where it lives. A self-service recovery portal enables users to securely access their data, via web browser or mobile device. And if a user’s system is compromised by ransomware, it can be easily wiped clean and rebuilt to minimize damage – all without paying the ransom’s price.

Services to Protect You Even More

To establish the comprehensive safeguards to protect from ransomware attacks with complete confidence, consider the support of Commvault services. We are experts in addressing the security layers you need to protect your environment from vulnerabilities. Working closely with your backup, recovery, archive and cloud teams, our technology consultants will help you develop a practical, modern design for your IT environment that is both efficient and secure.

Learn More

Here are selections from our resource library, which includes a wide range of videos, customer case studies, datasheets, whitepapers and more to further explain how Commvault can help you make your data work for you.

Defending Against the Siege of Ransomware

Get the whitepaper

5 Common Types of Ransomware and How to Defend Yourself

Get the whitepaper

What's Wrong With Disaster Recovery?

Get the whitepaper