Security

10 top cyber recovery providers

Cyber recovery vendors

Cyber recovery doesn’t always come in a single product but tends to be part of a platform or offer as part of other products. IDC states that cyber recovery is not a capability unto itself, but rather a combination of capabilities. Below we list 10 vendors that cover cyber recovery.

Acronis Cyber Protect and Cyber Protect Cloud

Acronis is one of a few well-known names in the backup and recovery space bringing their expertise into modern cyber recovery tools. Fully recognizing that cyber recovery requires features well beyond backup and recovery, Acronis offers two comprehensive platforms: Cyber Protect and Cyber Protect Cloud. AI-backed antimalware, endpoint detection and response, and email security form the basis of proactively detecting attacks to quickly find and mitigate threats. Other notable features offered by Acronis in Cyber Protect include forensic backups, where not only the disk is backed up but a memory dump and key information about running processes, and the ability to perform notarization, which uses certificates to digitally sign files providing assurance to their validity.

Cohesity Data Protect, DataHawk, FortKnox, and SiteContinuity

Cohesity offers a range of products that fill different business needs relating to cyber recovery. Data Protect safeguards a variety of workloads using immutable snapshots with strict consistency, in conjunction with an optimized restore process that gives you the tools to quickly identify your restore point and efficiently restore system resources. Another option is Cohesity DataHawk, which focuses heavily on protecting against ransomware attacks using tools and techniques like security posture monitoring, threat and anomaly detection, and data classification using machine learning. DataHawk also includes Cohesity FortKnox, their SaaS cyber vaulting and recovery product that brings features like flexibly recovery targets, granularity in the data being recovered, and tools to confidently identify a trusted restore point. Finally, Cohesity SiteContinuity has built-in orchestration capabilities utilizing automation to facilitate hot standby or recovery of business applications.

Commvault

Commvault has a full catalog of products that lend themselves to cyber recovery. Commvault’s cyber protection capabilities start with threat detection and early warning, including Threatwise (cyber deception and decoy/bait systems) and Security IQ (risk monitoring, system and backup hardening, and multi-authorization workflows for critical management operations). Commvault’s cyber recovery systems leverage immutability, air gapped backups, and zero trust principles to protect critical systems against a variety of attack methods. All these components are backed by Commvault’s Metallic AI, which bolsters anomaly detection, facilitates placement of decoy and bait systems, and guides you through the restore process should the need arise.

Dell PowerProtect Cyber Recovery

Dell is first and foremost a hardware company, and their cyber recovery offerings bear this out, but Dell also brings a robust set of software tools that help form a complete cyber recovery solution. PowerProtect Cyber Recovery isolates critical data from potential attack, while also leveraging machine learning through Dell CyberSense to identify suspicious activity and to determine a safe restore point. Dell also offers PowerProtect appliances as either a backup target or as an integrated focal point of your cyber recovery platform. Dell’s professional services branch can be engaged to assist with building out your cyber recovery, performing testing, or can even be placed on retainer for incident response.

Druva

Druva may not have the name recognition as some of the vendors on this list, but their cyber recovery product does not suffer from a lack of features. Druva’s cloud-based control panel provides a single pane of glass into protecting workloads hosted in the cloud or on-prem. Dru, Druva’s AI copilot, acts as a guide to simplify management of backup jobs, delving into errors, or reviewing history of backup jobs. Druva combines orchestration with curated snapshots, offering insight into file change history — particularly malicious activity such as infection or encryption — and then provides flexible recovery options such as system rollback, quarantined snapshots, or recovery to a sandbox environment. Druva includes access to both Druva Learning Management and Druva Academy for licensed users, and offers professional services for training, fire drill testing, playbook development, and incident response.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button