You are on page 1of 6

Ransomware Protection Solution - Co

Sl. #.

10

11

12

13

14

15

16

17

18
19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36
Ransomware Protection Solution - Complia
Compliance Description

General Requirements:
The bidder to be included at least twice in the last 5 years in the Gartner Magic Quadrant™ for Enterprise Backup and Reco
Software Solutions.

Solution should accommodate current 200 TB of front end capacity.

Solution should provide support for VMware vSphere, Microsoft Hyper-V, Unix, Oracle & SQL DB environments.

Scalability of the solution is not affected by licensing, no upfront licensing decisions that could place limits on growth possib

Support fast restore. From all backup types, SQL, Oracle, file system etc.

Should have Data at Rest Encryption feature.

Support MFA to access to the backup console.

Support earlier data anomaly detection for Ransomware.

Supports Dedup Technology. No additional cost on Dedup licensing.

Perform analytics on the backup data to know exactly which protected backup is clean copy.

Please provide Enterprise Customer Reference in Qatar.

Analytics Servers Functionalities:

The bidder to provide Analytics Servers that will integrate with the current Backup solution or with the proposed backup solu

The bidder to provide Analytics Servers that will provide the capability to detect signs of corruption within files, databases an
Infrastructure

The bidder to provide Analytics Servers that will detect unusual patterns indicative of ransomware attacks.

The bidder to provide Analytics Servers that will use Machine Learning, Artificial Intelligence scanning tools or other tool to
abnormal behaviors.

The bidder to provide Analytics Servers that will scan Backup to identify the “last-known-good” image to be used for restore

The bidder to provide Analytics Servers that will use Indication Of Compromise (File Hash, Network communication with sus
and domains, and other) to identify the “last-known-good” image to be used for restore activity.
Isolated Recovery Environment:
The bidder to propose the High-Level Design of an Isolated Recovery environment that will integrate with the current Backu
the proposed solution.
The proposed Isolated Recovery Environment should be aligned with International best practices and should address the m
risks associated with ransomware and lateral movement attacks.

Sidra can take in charge the professional Services and the Security Controls to implement the Layer2/Layer3 Switching and
to implement any Firewalling requirements.

The bidder to quote as option any requirement (other than Firewalling and basic layer 2 and layer 3 switching/Routing Requ
implement the Sidra Isolated Recovery Environment.
Vault Environment Requirements:

The Recovery vault environment should contain a Storage hardware that stores the protected backup data.

The Recovery software available at the Vault Environement.

Data from the production environment should enter the Recovery vault environment through automated operational air gap
network isolation and eliminates management interface.
Recovery Requirements:
Automated Recovery - Solution should allow to recover directly from the backup solution rather than moving everything to
server in the production environment.

Instant Access - Solution should support Instant Access as the sole recovery process, VMs instantly needs to be brought u
business.

Bare Metal Recovery - Solution should support bare metal recovery of the critical systems in-order to recover physical clien
to reinstall operative system or configure hardware manually.

Database Recovery - The proposed solution should support for faster database restores. It should support Native databas
production environment to trigger restores for database clients.
Recovery Software Requirements:
The Recovery software should orchestrate synchronization, manage, and lock the multiple data copies that are stored on th
Storage in the Recovery vault, and perform quick recovery.

Should Secure data in an isolated network with an automated operational air gap.

Should support Policy-based secure copy creation, easy management, and scheduling.

The software should perform analytics on data that is stored on the Protection Storage Hardware in the Cyber Recovery va

Retention/Data Lock Requirements:

Protection Storage should have Retention/Data Lock feature that provides data immutability for a given time.

Protection Storage Monitoring Requirements:

The Protection Storage should notify the user in case of Backup or Synchronization Operation failures.

Notifies users for capacity alerts in case of any space issues in Protection Storage.

Should support proactive Dial-home feature to sends information on alerts or events from the CRS device to vendor Suppor
nce Matrix - Schedule - 1
Comply
Vendor Comments
(Y/N)

You might also like