facebookpixel

Powerful Data Protection with Half-Height LTO-9 Drives

Archive

Quantum is announcing the availability of LTO Ultrium format generation 9 half-height drives in its Scalar i3 tape libraries, Standalone Drives, and Superloader 3. This announcement is preceded by the recent ransom block feature announced last month that enhances security in the Scalar Tape Library.

Combining security with the high capacity of LTO-9 technology, customers can now have the latest in security innovation and advanced tape solutions to protect data and cope with the massive growth of unstructured data. Quantum Scalar Tape Libraries create a new and higher standard for addressing customers’ capacity and security needs allowing them to future-proof their archives.

The new LTO-9 delivers 18 TB of native capacity per cartridge and up to 45 TB with a typical compression of 2.5:1 – This is an increase of about 33% compared to LTO-8, and 7x more capacity over LTO-6 extending the value of tape with its low-cost, highly efficient storage. Half-height LTO-9 drives boast a transfer rate of up to 400 MB per second.

With cyberattacks on an upward trend, escalating and evolving with stealthy tactics, organizations need an effective method of defending data against ransomware . Tape is beneficial in many ways, but one of its primary benefits is its offline “air gap” inherent nature to isolate and protect data. This helps meet the security requirements of highly regulated industries where an offline copy is crucial to recover from should online copies be compromised. The costs that can be incurred if a ransomware attack is successful can be astronomical and compared to the cost of a half-height tape drive or tape library, it makes sense to add this form of insurance to your security arsenal to mitigate risk.

Quantum is taking orders for LTO-9 half-height drive technology available on Scalar i3, Standalone Drives, and Superloader 3. Please visit the Scalar i3 or LTO-9 webpage to learn more.

The post Powerful Data Protection with Half-Height LTO-9 Drives appeared first on Quantum Blog .

To view our Partner blog, click here

Ransomware Proof Your Data: New Ransom Block and Logical Tape Blocking Features

Archive

.vce-row-container .vcv-lozad {display: none}

 

In recent alarming news, we’ve learned that U.S. Federal agencies issued a joint cybersecurity advisory over the ‘BlackMatter’ ransomware group targeting critical infrastructure entities, including two U.S. food and agriculture sector organizations. What’s even more alarming is that many organizations are still not prepared to defend their most valuable asset – their data. For those who don’t know, ‘BlackMatter’ seems to have evolved from ‘DarkSide,’ a ransomware gang that shuttered operations after the Colonial Pipeline ransomware attack.  

A Multi-Layer Strategy 

The U.S. Government, in the wake of the Colonial and Solar Winds cyberattack, issued an executive order to bolster up U.S cybersecurity defenses to withstand such threats. There is a clear sense of urgency that a multi-layered strategy must be implemented and not just in the government, but this will go deep into the private sector as well. A multi-layered strategy in data protection is a topic I’ve been pushing for quite some time now – definite technologies (cloud, disk, tape) are needed to lay out multi-defenses to combat and defend data against ransomware.  

Introducing Scalar Ransom Block 

For the reasons mentioned above, Quantum has hardened its Scalar Tape Library  and introduced Scalar Ransom Block , an industry-first solution that creates a physical block between data tapes and the robotic tape system. It is a feature that employs a simple and unique concept to create a physical barrier between the data stored on tapes and the network robotic tape system. This feature ensures data stored on tape is completely offline and secure and provides an ultimate level of data security for cyber-resilient archives, after all the endgame is to be cyber resilient.  

image

Logical Tape Blocking 

In addition, we also introduced Logical Tape Blocking (middle image), a software-based solution that enables administrators to use software commands to prevent tapes from being loaded or unloaded. This allows the risk window to be reduced from when the magazine waits to be filled to when it can be ejected. Both features are part of Quantum’s comprehensive Scalar Security Framework making Scalar Tape systems one of the most secure tape storage systems available in the market. The combination of employing Scalar Ransom Block and Logical Tape blocking as a deterrence to ransomware along with front-end defenses in your network, where software meets hardware and big data meets intelligence, make for a good strategy in creating a cyber-resilient infrastructure. 

Solutions like these bring a high-value proposition and bonus: Data is kept offline and managed automatically, yet available with a ‘push and a click’ versus long-term data that is kept 100% on always connected spinning disks, costing hundreds of thousands more or the hassle of handling tapes introducing human negligence. Quantum has a secure and reliable solution to help you keep your data secure and available when you need it – Quantum Ransom Block is only available in Scalar Tape Libraries.  

Make sure you check out the press release  to learn more about our recent announcement and stop by our new Scalar Tape Libraries  page where you will find in-depth information related to Scalar Ransom Block, Logical Tape Blocking, and our Scalar Security Framework. 

The post Ransomware Proof Your Data: New Ransom Block and Logical Tape Blocking Features appeared first on Quantum Blog .

To view our Partner blog, click here

Why the Colonial Pipeline Ransomware Event Highlights the Need to Review Your Own Data Security

CMMA Blog

Ransomware is back in the headlines again with the Colonial Pipeline reporting that malware was discovered on its computer systems. The result of that discovery has caused a disruption in the gas supply system in the East Coast of the United States and will likely cause a spiraling effect on related businesses and the general public. This attack – and others like it – was perpetrated by hackers who infiltrate an organization’s IT infrastructure and hold its data hostage until a ransom is paid. The fallout of this sort of attack is incredible, and in this instance, the country’s critical gas supply has been compromised. As a result, the impact to our country’s critical resources will likely impact the cost of fuel for everyone. According to the BBC , Colonial has a pipeline that carries 2.5 million barrels a day, that is about 45% of the East Coast’s supply of diesel, petrol and jet fuel. Colonial was forced to shut down operations in order to protect itself from the spread of the malware, reportedly perpetrated by the DarkSide hacking group, which has been linked to similar attacks. 

This event should come as no surprise; many cyber experts have been watching DarkSide and their ‘modus operandi’.  Cybersecurity professionals have been sounding the alarm on nation-state and financially motivated attacks for well over a decade. The question is: as these attacks continue, is your business prepared? 

As I write this blog, there is no “tried and true” way to stop hackers from exfiltrating data once they’ve managed to gain access to a network. If the network has been infiltrated, your only defense is having several ‘security check points’ or ‘roadblocks’ to slow the attack and give you time to shut down systems, which is how Colonial Pipeline responded. However, stopping the spread ultimately did not mitigate damage. DarkSide locked Colonial out of their systems, made their data inaccessible, and demanded ransom, costing the company lost revenue, loss of public trust, and lost time. In the end, the ransomware gang responsible for the attack stole nearly 100 gigabytes of business-critical data and threatened to leak it onto the internet. The key is to truly secure your data and remove the risk of infiltration altogether. 

Though in the case of Colonial Pipeline, we don’t know exactly how the hackers were able to break into the network, there are some steps you can take to prevent a breach – or at least to reduce the probability of a major shut down and the exfiltration of data: 

  1. Ensure Access to Data Won’t Be Compromised if a Hack Occurs 
  • Look at your backup strategy holistically across your entire environment. 
  • Ensure you can recover; test, test, test your recovery method. 
  • As soon as data fulfills its value in fast disk, tier it off to a cold data solution. 
  • Think differently: Consider a multi-layer approach to protect and recover backups. 
  1. Prevent A Hack Before it Happens 
  • Understand your risk profile; Minimum damage if there are tight controls.
  • What are your entry and exit points? 
  • Reduce the attack footprint/surface. 
  • Harden your systems (shut down the ‘nice’ to haves). 
  • Disable services like RDP (gateways, ports). 
  1. Review Your Cyber-Hygiene 
  • Regular scan for vulnerabilities. 
  • Remediate findings. 
  • Understand the threat landscape and what you might be vulnerable to. 

As you can see, it is important to choose the right security solutions to help secure a modern network infrastructure. If you don’t master your tools, someone else will master theirs. A modern technology solution should provide data “immutability” to protect and recover your assets in the case of a breach and secure your data with a multi-layer technology approach.  

Check out an ebook  to see some of the resources Quantum has prepared to address the concerns around ransomware, including how to create a proactive ransomware strategy with steps on how to secure your data with a multi-layer technology approach.  

To view our Partner blog, click here

Multi-Tiered Data Recovery Prepares Healthcare Organizations Against Ransomware

ActiveScale

I can’t remember the last time I saw sporadic cyber-attacks on health organizations; seems like a very long time ago. Lately they’ve been relentless and merciless on the most vulnerable – health institutions. According to French government, since the beginning of the year, they’ve seen a health facility fall victim to a cyber-attack on a weekly basis. “The hospitals at Dax and Villefranche-sur-Saône were paralyzed by attacks in which hackers blocked the telephone systems, forcing the hospitals to shut off the internet service and other networks to keep the ransomware from spreading. This affected patient records, surgical devices, medication management, appointments, bed and doctor allocation,” reported Healthcare IT News, an authoritative source covering technology in healthcare. The French Government is finally cracking down on e-crime, responding with a one-billion-euro investment in a national cybersecurity strategy.

This story resonates all over the world, including the United States. As we see, the unwavering attacks continue to rise leaving many institutions crippled, unable to provide services that truly skirt a life-or-death scenario. With the appearance of the COVID-19 pandemic last year, this development presented new yet urgent challenges for the medical community.  

At Quantum, we are working hard to protect our cyber climate, and want to empower the healthcare industry with the knowledge and tools to protect and recover from ransomware and other malware. E-security methods will evolve, but today we need to employ technologies, such as machine learning (ML) and artificial intelligence (AI), to provide the advanced security analytics needed to stay ahead of the criminals, and of course, mitigating risk takes multiple technologies. Not one single solution can achieve the protection needed for the assault healthcare organizations are experiencing.

Protect Network and Backup Infrastructure

While networks and production data must be protected, so does your backup infrastructure. Recent analysis of criminal tactics indicate that attackers are targeting critical systems but with a focus on backup first. Why? If they can disable your ability to recover, they’ve won the battle. With the ability to recover gone, what can you do? Institutions end up paying ransom, but this doesn’t solve the problem.

Solutions to Recover Data Across Any Point in the Data Lifecycle

Tools like the ability to isolate your backups via immutable storage or leveraging a physical airgap to create a barrier that protects and enables fast recovery are indispensable. As the data protection experts, Quantum has created solutions that can protect and recover your data across any point in your data’s lifecycle. We did this to help you maintain a cost-effective, multi-tiering solution that also provides you the ability to use just about any application you prefer. Let’s take a closer look:

A blended mix of technology that secures and isolates backups in different tiers, all kept in either a non-network addressable location or in an immutable state that simply unreachable by an intruder. Your institutional needs vary and so does your data. So, depending on performance, retention, scale, and risk level needs, we have a solution that focuses on each tier.

  • In the first tier where performance matters, data is backed up to shares where the DXi Backup Appliance system (per your schedule) takes snapshots that cannot be deleted or encrypted making backups (snapshots) immutable, which means backups can be managed to meet SLAs required RTOs and RPOs. This solution supports NAS, OST, VTL protocols.
  • In the large unstructured nearline storage tier, where medical imaging can be stored, retained, and made readily available, we support keyless encryption of data at rest to prevent access via unauthorized applications. The Object Lock feature in ActiveScale makes objects immutable; once set, immutability can’t be modified even by an administrator, making data safe from ransomware attacks. The system may be partitioned into buckets and different protection policies may be applied to align with the security requirements. This a simple and easy to use and architecture that is designed to scale seamlessly at an exabyte level for on-prem hybrid cloud data storage.
  • In a long-term retention tier, there is the simple, yet very effective physical barrier created by Scalar Tape Libraries that secure your data in an “active” vault in the library so that data is isolated, secured and readily available when you need it. This long-term storage tier that is highly recommended by CISA, FBI, and NCSK UK is the most cost-effective method to protect and recover from ransomware.

To learn more about how Quantum solutions can help you achieve solid ransomware protection and recovery, please contact a Quantum authorized reseller or reach out to us at www.quantum.com to help you connect with someone who can help you.

Source: Emmanuel Macron pledges €1bn for cybersecuri t y after hospital ransomware attacks | Healthcare IT News

To view our Partner blog, click here

This Week at the Q

ActiveScale

Welcome to another entry of ‘This Week at the Q’ and our top 5 highlights.

  1. With our recently announced ActiveScaleTM Object Lock feature for data immutability, your data can be protected from malicious acts such as data deletion, relocation, and ransomware. We now have a new video explaining how this works – watch here !
active scale video grab

2. And for more advice to proactively combat the onslaught of ransomware attacks and the elements needed for a solid data protection plan, read more in this Security Magazine blog, “End the vicious ransomware cycle.”

3. Quantum will be at Tech Field Day on December 9th, from 8-10am PT! This event brings together a group of technical influencers and experts to explore the technical underpinnings and architectures of invited vendors. If you want to learn more about our ActiveScale object storage for private cloud, the event is live streamed and you can follow along live via Twitter @TechFieldDay or online during the time slots below:

tech field day logo 1
Time (PT) Section Speaker
8:00AM Quantum Company Overview Ed Fiore, General Manager
8:20AM ActiveScale Object Storage Intro Thomas Demoor, Lead Architect
9:00AM ActiveScale Layered Architecture  Thomas Demoor, Lead Architect
9:20 AM ActiveScale Product Summary Thomas Demoor, Lead Architect
9:30AM ActiveScale Product Demo Sherman Schorzman, Technical Marketing Engineer

4. We also recently launched our all-new All-Terrain File System, ATFS. Hear from early customer, The Hormel Institute, University of MN, about how they accelerated cancer research and improved ROI using ATFS’s zero-touch data classification and automated policies for data mobility. Read their case study here.

quote

5. And one more ATFS case study! The production experts at 5 guys named Moe had challenges ingesting multiple tapes (assume tape equals a movie or season episode) in parallel, tracking the progress of data through the workflow stages, and managing resources for productivity. Read their case study here to see how Quantum ATFS data insights and automation meet storage needs for productivity and profitability improvements.

quote2

Leave a comment if there are topics you’d like to see added to our weekly top 5 happenings!

Natasha

To view our Partner blog, click here

Cyber Insurance Market is Evolving Due to Ransomware Demands

CMMA Blog

The cyber security insurance market is evolving amidst an increase in ransomware demands and payments. Insurance companies have been taking on unmitigated risk, but as we begin to better understand the threats, insurers are moving the risk over to the subscribers, requiring stricter controls.  

Cyber Security Insurance Companies Requiring Stricter Controls

Cyber security insurance companies are changing their approach in dealing with ransomware. ZDNet claims that ransomware accounted for 41% of all cyber insurance claims in the first half of 2020 with claims ranging in size from $1,000 to over $2 million per ransomware incident. Out of all the cyberattacks in 2019, the attacks from the malicious malware known as ransomware have increased to 62% up from 56% the previous year. Latest studies indicate there is one attack every 39 seconds with demands for payments increasing year-over-year and at a high volume especially since RaaS (ransomware-as-a-service) adopted big-game hunting tactics (BGH = targeting enterprises). Whether a small business or a large enterprise, attackers have had an 80% rate of success. These statistics are alarming to the insurance industry and they should be.

Today, cyber insurers have not had strict requirements to underwrite a policy. This is very different from, let’s say, insuring an office building or your home from fire. It is best practice to have fire insurance, but to get coverage, the building owner/managers need to mitigate fire risk and install a sprinkler system. If they don’t, the insurer will demand the system be installed to accept the risk and provide the coverage needed. Similarly, cyber insurance brokers are further examining the risks they take and are beginning to push additional control measures to help mitigate ransomware risk. Underwriters are catching up with the myriad of changes happening in the data center and just like the security professional, they too are at a critical moment as this landscape evolves. “The cyber insurance market has rallied around the need for more sophisticated ways to mitigate ransomware,” said Mr. Maher, North America Cyber, AXIS Insurance (Insurancebusinessmag.com/us/ib-talk ).

What does all this mean for the IT professional?

Cyber insurers see the value of claims rise because of malicious attacks, especially because of RaaS, and are seeking to impose changes, such as a set of minimum standards, to underwrite cyber insurance. If you don’t have the minimum to meet their required control, they won’t grant the policy until you have. Accordingly, to mitigate effectively, the following standards are being proposed as a good start:

blog table

This list is not exhaustive; cyber security best practices recommend implementing anti-virus protection and encryption as techniques to enable controls. Check out the cybersecurity & infrastructure security agency for ransomware guidelines CISA.GOV for a complete list.

Savvy Security Professionals Keep Copies of Data Offline and Offsite

Some of these standards are in addition to what is a customary approach to data protection and network security. Based on forensic data available, we know that more network and backup controls are necessary, because criminals are penetrating networks going undetected for many days, even months using sophisticated methods that could be resolved using known security techniques. It’s not a straightforward formula for insurers either. They also have OFAC requirements and advisory that must be met and depending on who the threat actor is or what country they’re operating from, they may exclude coverage. This is bad news for the insured and is more reason to understand why savvy security professionals keep copies of data off-line and off-site and understand that mitigating ransomware risk requires more than buying a cyber insurance policy. How can brokers and cyber insurance underwriters help stop this vicious cycle? Demanding stricter guidelines for coverage.

Quantum Solutions Help Organizations Mitigate Ransomware Risk

Quantum offers solutions to help you mitigate the risk of ransomware. You can rely on our ActiveScale object storage platform to secure data in flight and at rest with encryption and to further protect data against ransomware with Object Lock capability. Object Lock policy for retention and immutability, once set, can’t be modified, even with administrative permissions. 

Our Scalar tape libraries with Active Vault technology protects data against ransomware true air-gap protection and multi-factor authentication. The tape library with Active Vault creates an offline partition with an automated robot moving tape cartridges from a network connected partition to a vault partition. Quantum’s solutions have been designed to help organizations mitigate ransomware risk and comply with new cyber insurers’ demands. With that in mind, Quantum created simple and complete Ransomware Protection Packages that include all the security features needed to air-gap and securely vault your data, making your backups and long-term storage immutable. Check out our Ransomware Protection Packages here .  

To view our Partner blog, click here