
11
- Hall - / Booth Number -
- Hall 6 / Booth Number 6-236
Dell Cyber Recovery
Key Facts
- Cyber Recovery is included with the latest data domain systems
- Option of a cyber vault for additional protection
- Use of the BOOST protocol (non-attackable) & "Retention Lock" function: Data is written away in "WORM mode" (write once read many) and cannot be encrypted
Categories
Application security Hardware security Data center security Penetration tests Data recovery Data protection, data security Planning of data centers and IT infrastructures
Product information
A SECURE VAULT FOR YOUR COMPANY DATA
The pattern varies. Companies are often first encrypted in the backup and then the cyber criminal systematically moves on to the primary systems. Depending on when the attack is detected, the company can rescue its data: pull the plug, prepare an emergency manual, determine the damage, procure equipment, rebuild the system, etc. In many cases, the BSI (German Federal Office for Information Security) must be notified, which means that the affected systems must first be investigated to identify the perpetrators and may not be used until the investigation has been completed. This can sometimes take several days.
The experience ...Product Expert
