Backup-Everything-UK-Cloud-Backup-Online-Backup-Remote-Backup

.

Report Features Cybersecurity Approaches from Asigra, Dell, and Rubrik for Detecting and Responding to Malware Attacks

TORONTO, ON – July 9, 2019 — /BackupReview.info/ – Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today announced that the Data Center Infrastructure Group (DCIG), has published a report titled “Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment.” The report provides a comparison of three different approaches to detecting and preventing malware attacks on backup data and provides analysis on what may be the most effective for enterprise backup environments.

Recovering lost data with confidence starts with a golden copy of the backup set. To manage the threat that malware presents to backup data today, organizations are deferring to backup providers to help them perform successful recoveries from a confirmed reproducible copy of the data. This “golden copy” must be free from malware and capable of being returned to its native usable state for use in the enterprise.

In the DCIG report[1], three methodologies for creating a golden copy are reviewed. The first is the inline scan where incoming and restored backup data are actively screened for malware. The second method is the use of a sandbox, where backups complete as normal but a separate IT sandbox is set up to recover data and tested for malware. Snapshot analysis is the third approach where snapshots of production data are taken and analytics are performed on each snapshot. The results of the analytics will inform which to check for the presence of malware.

The highlighted solution for inline scanning of malware is Asigra Cloud Backup V14, which scans all backup data for malware as part of the backup job and alerts the administrator to its presence in the event it has slipped past perimeter cybersecurity defenses. It then scans data during data backup and recovery, significantly improving the chance of detecting malware signatures that were latent or undetectable when the backup occurred.

“The products that Asigra, Dell EMC, and Rubrik offer, and the respective techniques they use to detect the presence of malware in backup repositories, represent the primary methodologies that backup software employs.,” said Jerome Wendt, Founder and President, DCIG. “Of these three, only Asigra and Rubrik provide a company with the means to automate and simplify the process to detect for malware in backups. Of those two, only Asigra currently makes cybersecurity software available as an optional feature that a company can turn on.”[2]

“Asigra Cloud Backup V14 converges enterprise data protection and cybersecurity, embedding malware engines in the backup and recovery streams to prevent ransomware from impacting the business,” said Eran Farajun, Executive Vice President, Asigra. “Asigra identifies any infecting malware strains, quarantines them, then notifies the customer. It is a very comprehensive data protection solution, built from the ground up for distributed IT environments.”

Tweet This: Inline Backup/Recovery Stream Scanning the Preferred Approach for Detecting/Preventing Malware in Enterprise Backup Environments According to New Report by DCIG – http://bit.ly/30mPeHO.

Access the Report

Download the free report by DCIG at: http://library.asigra.com/dcig-report

Additional Resources:

About Asigra

Trusted since 1986, Asigra provides organizations around the world the ability to quickly recover their data from anywhere through a global network of IT service providers who deliver Cloud Backup Evolved as either public, private and/or hybrid solutions. As the industry’s most comprehensive data protection platform for servers, virtual machines, endpoint devices, databases and applications, SaaS and IaaS based applications, Asigra lowers the total cost of ownership, reduces recovery time objectives, and eliminates silos of backup data by providing a single consolidated repository with 100% recovery assurance. The company has been recognized as a Gartner Cool Vendor and included in the Gartner Magic Quadrant for Enterprise Backup and Recovery Software since 2010. More information on Asigra can be found at www.asigra.com.

###

Asigra and the Asigra logo are trademarks of Asigra Inc.

[1] DCIG, Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment, April, 2019

[2] DDCIG, Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment, April, 2019

Contact Asigra

Call 877-736-9901 or email info@asigra.com

Source: Asigra, Inc.

 

 

 

General Tags: CEO interviews, cloud computing, online file backup, backing up online, online backup companies, software as a service, online backup services, online data backup, data security, data storage, online backup, SaaS, online backup providers directory, compare online backups, top rated online backups, online file storage, online backup news, online backup reviews

Like us on Facebook




===========================
Do you like this post? Subscribe to our RSS feed ===========================



Share/Save/Bookmark

Related posts:

  1. New F-Secure Report Warns of Growth in Extortion Malware
  2. ExaGrid Systems Named ‘Recommended’ Solution for Disk Backup by DCIG for Midrange Organizations
  3. Netskope Report Reveals 43.7% of Cloud-Based Malware Delivers Ransomware
  4. ExaGrid Named ‘Recommended’ Solution for Disk Backup by DCIG
  5. DCIG, LLC Announces 2014-15 Virtual Server Backup Software Buyer’s Guide
  6. ExaGrid Systems Named ‘Best-in-Class’ Solution for Disk Backup by DCIG for Midrange Organizations
  7. ExaGrid Named ‘Recommended’ Solution for Deduplication Backup Target Appliances by DCIG
  8. Unitrends Scores Top Honors in DCIG 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide
  9. Kaspersky Lab Number of the Year 2016: 323,000 Pieces of Malware Detected Daily
  10. Acunetix Launches New Online Service that Scans Website for Malware, Vulnerabilities and Provides Automated Backup & Restore

Tags: ,