facebookpixel

Comprehensive Data Protection to Strengthen Cybersecurity and Reduce Business Risk

ActiveScale

In today’s IT environments, ransomware is unfortunately a big business risk with global losses exceeding 10’s of billions of dollars annually. The impact on businesses is real, including the cost of paid ransoms, revenue loss, damage to the brand, and even job losses in the wake of an attack. Even with best efforts to prevent ransomware, it is an unfortunate truth that IT professionals must plan for the day when ransomware gets in. This is one reason why, here at Quantum, we are maniacal about data protection and recovery.

Screen Shot 2022 09 28 at 10.25.05 AM

A well-known best practice to protect your environment from ransomware is the 3-2-1-1 strategy; that is, three copies of your data on two independent storage mediums with one copy offsite and one copy offline. Here at Quantum, we strongly endorse this strategy in our work with our resellers, customers, and prospects on data protection and ransomware recovery projects. And we continue to innovate and expand our capabilities in this area.

Validated Solution Bundles for Atempo Tina

So, without further ado, we are excited to introduce Quantum validated solution bundles for Atempo Tina. These new offerings from Quantum are architected to simplify the design, purchasing, deployment and management of backup infrastructure in conformance with 3-2-1-1 best practices. The solution bundles combine Atempo Tina backup and recovery software (sourced from Quantum), a Quantum media server, and Quantum secondary storage products to meet a wide variety of data protection, ransomware recovery, and disaster recovery needs. Key features include the abilities to:

  • Centrally manage backup sources, targets, scheduling, and recovery
  • Simply protect VMs, databases, bare metal servers, NAS resources, and Microsoft 365
  • Create immutable, air-gapped, offsite copies to protect against ransomware and disasters
  • Easily recover data with fast, intuitive granular restores
  • Support Quantum DXi , ActiveScale , and Scalar backup targets and feature sets
    (plus 3rd party storage and public cloud targets)
  • Simplify procurement and support from a single vendor through Quantum

Quantum Validated Solution Bundles for Atempo Tina

Screen Shot 2022 09 28 at 10.26.44 AM
Screen Shot 2022 09 28 at 10.27.45 AM

Unique Software Licensing Simplifies Management and Reduces Cost

One valuable aspect of the solution bundles worth highlighting is our unique Atempo Tina software licensing model that results in lower management overhead and lower overall cost. In contrast to legacy backup software pricing, Quantum provides an all-inclusive Atempo Tina software license, based exclusively on the backup target capacity of the accompanying Quantum storage targets (DXi , ActiveScale , Scalar ).  Moreover, with DXi and Scalar targets, deduplication and compression come into play with the potential to reduce backup storage requirements significantly, resulting in even further savings. All in, our pricing model effectively results in a flat, predictable cost, scaled to your backup storage requirements, irrespective of the number of servers, VMs, application agents, end users, or CPU cores in your environment.

With our validated solution bundles, you have the resources you need to simply and confidently backup your entire virtualized infrastructure, databases, bare metal servers, NAS devices, and your entire Microsoft 365 environment (including Exchange, OneDrive, SharePoint, and Teams).

Screen Shot 2022 09 28 at 10.28.34 AM

Immutability and Air Gapping

As we started our discussion on the topic of ransomware, we should consider immutability and air gapping. Net-net, Quantum’s complete secondary storage portfolio (DXi, ActiveScale, and Scalar tape) supports immutable backup copies. In addition, to achieve fully offline data copies, it’s important to consider that tape media is the lowest cost, most durable medium for offline copies, and as such, has seen a bit of a renaissance as the data copy of last resort. Further, Scalar tape libraries are the industry’s most secure solution with their exclusive Ransom Block capability.

So, in closing, here are some of the key benefits of Quantum Validated Solution Bundles for Atempo Tina:

  • Fully validated, end-to-end solutions tailored to your IT environment
  • Reduced TCO with an all-inclusive, target capacity-based software licensing model
  • Advanced integration for greater security, cyber resilience, and storage efficiency
  • Simple procurement and support from a single vendor

Here at Quantum, we invest in our technology alliances because of the value that these partnerships bring to our customers. We not only work to validate complete solutions with our partners, but also work together to help our customers and resellers solve challenging problems with innovative solutions. With our expanded partnership with Atempo, we continue our long tradition of innovation.

To learn more about Quantum validated solution bundles for Atempo Tina, visit the web page for additional resources. https://www.quantum.com/atempo-tina

The post Comprehensive Data Protection to Strengthen Cybersecurity and Reduce Business Risk appeared first on Quantum Blog .

To view our Partner blog, click here

Powerful Data Protection with Half-Height LTO-9 Drives

Archive

Quantum is announcing the availability of LTO Ultrium format generation 9 half-height drives in its Scalar i3 tape libraries, Standalone Drives, and Superloader 3. This announcement is preceded by the recent ransom block feature announced last month that enhances security in the Scalar Tape Library.

Combining security with the high capacity of LTO-9 technology, customers can now have the latest in security innovation and advanced tape solutions to protect data and cope with the massive growth of unstructured data. Quantum Scalar Tape Libraries create a new and higher standard for addressing customers’ capacity and security needs allowing them to future-proof their archives.

The new LTO-9 delivers 18 TB of native capacity per cartridge and up to 45 TB with a typical compression of 2.5:1 – This is an increase of about 33% compared to LTO-8, and 7x more capacity over LTO-6 extending the value of tape with its low-cost, highly efficient storage. Half-height LTO-9 drives boast a transfer rate of up to 400 MB per second.

With cyberattacks on an upward trend, escalating and evolving with stealthy tactics, organizations need an effective method of defending data against ransomware . Tape is beneficial in many ways, but one of its primary benefits is its offline “air gap” inherent nature to isolate and protect data. This helps meet the security requirements of highly regulated industries where an offline copy is crucial to recover from should online copies be compromised. The costs that can be incurred if a ransomware attack is successful can be astronomical and compared to the cost of a half-height tape drive or tape library, it makes sense to add this form of insurance to your security arsenal to mitigate risk.

Quantum is taking orders for LTO-9 half-height drive technology available on Scalar i3, Standalone Drives, and Superloader 3. Please visit the Scalar i3 or LTO-9 webpage to learn more.

The post Powerful Data Protection with Half-Height LTO-9 Drives appeared first on Quantum Blog .

To view our Partner blog, click here

Ransomware Proof Your Data: New Ransom Block and Logical Tape Blocking Features

Archive

.vce-row-container .vcv-lozad {display: none}

 

In recent alarming news, we’ve learned that U.S. Federal agencies issued a joint cybersecurity advisory over the ‘BlackMatter’ ransomware group targeting critical infrastructure entities, including two U.S. food and agriculture sector organizations. What’s even more alarming is that many organizations are still not prepared to defend their most valuable asset – their data. For those who don’t know, ‘BlackMatter’ seems to have evolved from ‘DarkSide,’ a ransomware gang that shuttered operations after the Colonial Pipeline ransomware attack.  

A Multi-Layer Strategy 

The U.S. Government, in the wake of the Colonial and Solar Winds cyberattack, issued an executive order to bolster up U.S cybersecurity defenses to withstand such threats. There is a clear sense of urgency that a multi-layered strategy must be implemented and not just in the government, but this will go deep into the private sector as well. A multi-layered strategy in data protection is a topic I’ve been pushing for quite some time now – definite technologies (cloud, disk, tape) are needed to lay out multi-defenses to combat and defend data against ransomware.  

Introducing Scalar Ransom Block 

For the reasons mentioned above, Quantum has hardened its Scalar Tape Library  and introduced Scalar Ransom Block , an industry-first solution that creates a physical block between data tapes and the robotic tape system. It is a feature that employs a simple and unique concept to create a physical barrier between the data stored on tapes and the network robotic tape system. This feature ensures data stored on tape is completely offline and secure and provides an ultimate level of data security for cyber-resilient archives, after all the endgame is to be cyber resilient.  

image

Logical Tape Blocking 

In addition, we also introduced Logical Tape Blocking (middle image), a software-based solution that enables administrators to use software commands to prevent tapes from being loaded or unloaded. This allows the risk window to be reduced from when the magazine waits to be filled to when it can be ejected. Both features are part of Quantum’s comprehensive Scalar Security Framework making Scalar Tape systems one of the most secure tape storage systems available in the market. The combination of employing Scalar Ransom Block and Logical Tape blocking as a deterrence to ransomware along with front-end defenses in your network, where software meets hardware and big data meets intelligence, make for a good strategy in creating a cyber-resilient infrastructure. 

Solutions like these bring a high-value proposition and bonus: Data is kept offline and managed automatically, yet available with a ‘push and a click’ versus long-term data that is kept 100% on always connected spinning disks, costing hundreds of thousands more or the hassle of handling tapes introducing human negligence. Quantum has a secure and reliable solution to help you keep your data secure and available when you need it – Quantum Ransom Block is only available in Scalar Tape Libraries.  

Make sure you check out the press release  to learn more about our recent announcement and stop by our new Scalar Tape Libraries  page where you will find in-depth information related to Scalar Ransom Block, Logical Tape Blocking, and our Scalar Security Framework. 

The post Ransomware Proof Your Data: New Ransom Block and Logical Tape Blocking Features appeared first on Quantum Blog .

To view our Partner blog, click here

Take the Virtual DXi V5000 Software for a Test Drive

ActiveScale

The need for affordable high-capacity storage grows every year, which is why Quantum continues to produce DXi deduplication appliances and software with blazing fast ingest rates and huge capacities. But most large companies also have smaller sites that don’t need a monster storage solution of their own – and may even have excess virtual server and storage capacity sitting idle. For these sites – or any office with limited storage needs– Quantum offers virtual DXi deduplication appliances that you run on your own servers and scale to your own needs (for the soon-to-be-released V5000 that means from 20 TB to 5 PB of logical storage).

These virtual DXi appliances have all the main capabilities of their hardware relatives, including the ability to replicate data in either direction with other DXi appliances whether virtual or physical; or with AWS S3 Glacier Storage; or a Quantum ActiveScale server via S3 Cold Storage.

Try Out the Free V5000 Trial Version

Quantum just released the first test iteration of the V5000 – the V5000 Trial version — available for free here . This is a test system (the full GA version will be out this summer) that you can install and test out for up to 8 months and see how well this product can work for you. It’s not rated for production data and only scales to 1 TB of native storage, but you can use it to test out ways to install and utilize the V5000 full version coming in the summer. And the real shocker – when the full V5000 becomes available, the first 5 TB of storage you apply, which means up to 40 TB of logical data, is absolutely free without an expiration.

So, you can download the V5000 Trial version to test your hardware solution now and get a feel for the award-winning DXi technology in preparation for the true V5000 available this summer. The bottom line is that whatever your storage needs are, large or small, Quantum has a DXi answer.

About DXi Software

Quantum DXi software is fast and simple to download and deployable within minutes. For disaster recovery and ransomware protection, it includes the power and flexibility of target-based deduplication, instant encrypted replication that can send data to any other virtual or physical DXi appliances. The Secure Snapshot feature enables you to defend against cyberattacks, keeping data immutable. Quantum DXi integrates seamlessly into your environment and is compatible with leading backup software.

Try Out the V5000 Trial Version Now

Download the Trial Version Here

To view our Partner blog, click here

Why the Colonial Pipeline Ransomware Event Highlights the Need to Review Your Own Data Security

CMMA Blog

Ransomware is back in the headlines again with the Colonial Pipeline reporting that malware was discovered on its computer systems. The result of that discovery has caused a disruption in the gas supply system in the East Coast of the United States and will likely cause a spiraling effect on related businesses and the general public. This attack – and others like it – was perpetrated by hackers who infiltrate an organization’s IT infrastructure and hold its data hostage until a ransom is paid. The fallout of this sort of attack is incredible, and in this instance, the country’s critical gas supply has been compromised. As a result, the impact to our country’s critical resources will likely impact the cost of fuel for everyone. According to the BBC , Colonial has a pipeline that carries 2.5 million barrels a day, that is about 45% of the East Coast’s supply of diesel, petrol and jet fuel. Colonial was forced to shut down operations in order to protect itself from the spread of the malware, reportedly perpetrated by the DarkSide hacking group, which has been linked to similar attacks. 

This event should come as no surprise; many cyber experts have been watching DarkSide and their ‘modus operandi’.  Cybersecurity professionals have been sounding the alarm on nation-state and financially motivated attacks for well over a decade. The question is: as these attacks continue, is your business prepared? 

As I write this blog, there is no “tried and true” way to stop hackers from exfiltrating data once they’ve managed to gain access to a network. If the network has been infiltrated, your only defense is having several ‘security check points’ or ‘roadblocks’ to slow the attack and give you time to shut down systems, which is how Colonial Pipeline responded. However, stopping the spread ultimately did not mitigate damage. DarkSide locked Colonial out of their systems, made their data inaccessible, and demanded ransom, costing the company lost revenue, loss of public trust, and lost time. In the end, the ransomware gang responsible for the attack stole nearly 100 gigabytes of business-critical data and threatened to leak it onto the internet. The key is to truly secure your data and remove the risk of infiltration altogether. 

Though in the case of Colonial Pipeline, we don’t know exactly how the hackers were able to break into the network, there are some steps you can take to prevent a breach – or at least to reduce the probability of a major shut down and the exfiltration of data: 

  1. Ensure Access to Data Won’t Be Compromised if a Hack Occurs 
  • Look at your backup strategy holistically across your entire environment. 
  • Ensure you can recover; test, test, test your recovery method. 
  • As soon as data fulfills its value in fast disk, tier it off to a cold data solution. 
  • Think differently: Consider a multi-layer approach to protect and recover backups. 
  1. Prevent A Hack Before it Happens 
  • Understand your risk profile; Minimum damage if there are tight controls.
  • What are your entry and exit points? 
  • Reduce the attack footprint/surface. 
  • Harden your systems (shut down the ‘nice’ to haves). 
  • Disable services like RDP (gateways, ports). 
  1. Review Your Cyber-Hygiene 
  • Regular scan for vulnerabilities. 
  • Remediate findings. 
  • Understand the threat landscape and what you might be vulnerable to. 

As you can see, it is important to choose the right security solutions to help secure a modern network infrastructure. If you don’t master your tools, someone else will master theirs. A modern technology solution should provide data “immutability” to protect and recover your assets in the case of a breach and secure your data with a multi-layer technology approach.  

Check out an ebook  to see some of the resources Quantum has prepared to address the concerns around ransomware, including how to create a proactive ransomware strategy with steps on how to secure your data with a multi-layer technology approach.  

To view our Partner blog, click here

Multi-Tiered Data Recovery Prepares Healthcare Organizations Against Ransomware

ActiveScale

I can’t remember the last time I saw sporadic cyber-attacks on health organizations; seems like a very long time ago. Lately they’ve been relentless and merciless on the most vulnerable – health institutions. According to French government, since the beginning of the year, they’ve seen a health facility fall victim to a cyber-attack on a weekly basis. “The hospitals at Dax and Villefranche-sur-Saône were paralyzed by attacks in which hackers blocked the telephone systems, forcing the hospitals to shut off the internet service and other networks to keep the ransomware from spreading. This affected patient records, surgical devices, medication management, appointments, bed and doctor allocation,” reported Healthcare IT News, an authoritative source covering technology in healthcare. The French Government is finally cracking down on e-crime, responding with a one-billion-euro investment in a national cybersecurity strategy.

This story resonates all over the world, including the United States. As we see, the unwavering attacks continue to rise leaving many institutions crippled, unable to provide services that truly skirt a life-or-death scenario. With the appearance of the COVID-19 pandemic last year, this development presented new yet urgent challenges for the medical community.  

At Quantum, we are working hard to protect our cyber climate, and want to empower the healthcare industry with the knowledge and tools to protect and recover from ransomware and other malware. E-security methods will evolve, but today we need to employ technologies, such as machine learning (ML) and artificial intelligence (AI), to provide the advanced security analytics needed to stay ahead of the criminals, and of course, mitigating risk takes multiple technologies. Not one single solution can achieve the protection needed for the assault healthcare organizations are experiencing.

Protect Network and Backup Infrastructure

While networks and production data must be protected, so does your backup infrastructure. Recent analysis of criminal tactics indicate that attackers are targeting critical systems but with a focus on backup first. Why? If they can disable your ability to recover, they’ve won the battle. With the ability to recover gone, what can you do? Institutions end up paying ransom, but this doesn’t solve the problem.

Solutions to Recover Data Across Any Point in the Data Lifecycle

Tools like the ability to isolate your backups via immutable storage or leveraging a physical airgap to create a barrier that protects and enables fast recovery are indispensable. As the data protection experts, Quantum has created solutions that can protect and recover your data across any point in your data’s lifecycle. We did this to help you maintain a cost-effective, multi-tiering solution that also provides you the ability to use just about any application you prefer. Let’s take a closer look:

A blended mix of technology that secures and isolates backups in different tiers, all kept in either a non-network addressable location or in an immutable state that simply unreachable by an intruder. Your institutional needs vary and so does your data. So, depending on performance, retention, scale, and risk level needs, we have a solution that focuses on each tier.

  • In the first tier where performance matters, data is backed up to shares where the DXi Backup Appliance system (per your schedule) takes snapshots that cannot be deleted or encrypted making backups (snapshots) immutable, which means backups can be managed to meet SLAs required RTOs and RPOs. This solution supports NAS, OST, VTL protocols.
  • In the large unstructured nearline storage tier, where medical imaging can be stored, retained, and made readily available, we support keyless encryption of data at rest to prevent access via unauthorized applications. The Object Lock feature in ActiveScale makes objects immutable; once set, immutability can’t be modified even by an administrator, making data safe from ransomware attacks. The system may be partitioned into buckets and different protection policies may be applied to align with the security requirements. This a simple and easy to use and architecture that is designed to scale seamlessly at an exabyte level for on-prem hybrid cloud data storage.
  • In a long-term retention tier, there is the simple, yet very effective physical barrier created by Scalar Tape Libraries that secure your data in an “active” vault in the library so that data is isolated, secured and readily available when you need it. This long-term storage tier that is highly recommended by CISA, FBI, and NCSK UK is the most cost-effective method to protect and recover from ransomware.

To learn more about how Quantum solutions can help you achieve solid ransomware protection and recovery, please contact a Quantum authorized reseller or reach out to us at www.quantum.com to help you connect with someone who can help you.

Source: Emmanuel Macron pledges €1bn for cybersecuri t y after hospital ransomware attacks | Healthcare IT News

To view our Partner blog, click here