Report Features Cybersecurity Approaches from Asigra, Dell, and Rubrik for Detecting and Responding to Malware Attacks

TORONTO, ON – July 9, 2019 — /BackupReview.info/ — Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today announced that the Data Center Infrastructure Group (DCIG), has published a report titled “Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment.” The report provides a comparison of three different approaches to detecting and preventing malware attacks on backup data and provides analysis on what may be the most effective for enterprise backup environments.

Recovering lost data with confidence starts with a golden copy of the backup set. To manage the threat that malware presents to backup data today, organizations are deferring to backup providers to help them perform successful recoveries from a confirmed reproducible copy of the data. This “golden copy” must be free from malware and capable of being returned to its native usable state for use in the enterprise.

In the DCIG report[1], three methodologies for creating a golden copy are reviewed. The first is the inline scan where incoming and restored backup data are actively screened for malware. The second method is the use of a sandbox, where backups complete as normal but a separate IT sandbox is set up to recover data and tested for malware. Snapshot analysis is the third approach where snapshots of production data are taken and analytics are performed on each snapshot. The results of the analytics will inform which to check for the presence of malware.

The highlighted solution for inline scanning of malware is Asigra Cloud Backup V14, which scans all backup data for malware as part of the backup job and alerts the administrator to its presence in the event it has slipped past perimeter cybersecurity defenses. It then scans data during data backup and recovery, significantly improving the chance of detecting malware signatures that were latent or undetectable when the backup occurred.

“The products that Asigra, Dell EMC, and Rubrik offer, and the respective techniques they use to detect the presence of malware in backup repositories, represent the primary methodologies that backup software employs.,” said Jerome Wendt, Founder and President, DCIG. “Of these three, only Asigra and Rubrik provide a company with the means to automate and simplify the process to detect for malware in backups. Of those two, only Asigra currently makes cybersecurity software available as an optional feature that a company can turn on.”[2]

“Asigra Cloud Backup V14 converges enterprise data protection and cybersecurity, embedding malware engines in the backup and recovery streams to prevent ransomware from impacting the business,” said Eran Farajun, Executive Vice President, Asigra. “Asigra identifies any infecting malware strains, quarantines them, then notifies the customer. It is a very comprehensive data protection solution, built from the ground up for distributed IT environments.”

Tweet This: Inline Backup/Recovery Stream Scanning the Preferred Approach for Detecting/Preventing Malware in Enterprise Backup Environments According to New Report by DCIG – http://bit.ly/30mPeHO.

Access the Report

Download the free report by DCIG at: http://library.asigra.com/dcig-report

Additional Resources:

About Asigra

Trusted since 1986, Asigra provides organizations around the world the ability to quickly recover their data from anywhere through a global network of IT service providers who deliver Cloud Backup Evolved as either public, private and/or hybrid solutions. As the industry’s most comprehensive data protection platform for servers, virtual machines, endpoint devices, databases and applications, SaaS and IaaS based applications, Asigra lowers the total cost of ownership, reduces recovery time objectives, and eliminates silos of backup data by providing a single consolidated repository with 100% recovery assurance. The company has been recognized as a Gartner Cool Vendor and included in the Gartner Magic Quadrant for Enterprise Backup and Recovery Software since 2010. More information on Asigra can be found at www.asigra.com.

###

Asigra and the Asigra logo are trademarks of Asigra Inc.

[1] DCIG, Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment, April, 2019

[2] DDCIG, Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment, April, 2019

Contact Asigra

Call 877-736-9901 or email info@asigra.com

Source: Asigra, Inc.

 

 

 

Tags: ,