Professional Documents
Culture Documents
RESPOND
& RECOVER
Equipping our clients with leading cyber solutions and
a proven methodology to build operational resilience
in the event of an attack.
Business Outcomes
OPERATIONAL RESILIENCE
Cybersecurity | 2019 | 46
4: Respond & Recover
Taking this approach will equip the business with worst case scenario
remediation plans to ensure the business can continue to operate as
normal. The following solutions outline Dell Technologies Response
& Recovery cybersecurity solutions.
Cybersecurity | 2019 | 47
4: Respond & Recover
Cybersecurity | 2019 | 48
4: Respond & Recover
PRODUCT SOLUTIONS
Datacentres are a fundamental part of BUSINESS CHALLENGE One of the most poignant
business infrastructure. An attack on this Whilst proactive solutions can help to protect businesses things I’ve heard a client say
from cyberattacks, insider threats still pose a huge risk to the
infrastructure can not only devastate a business and are much harder to detect and defend against. about this solution is that:
business commercially but can have a Whether it is a rogue employee or an intruder has taken over
much wider impact on society as a whole access of your systems, businesses must protect their ability “This solution is the
as it disrupts core services to customers.
to recover in order to minimise disruption to the running of the difference between business
business and impact on customers.
continuance and business
This threat to society has meant that there THE SOLUTION
existence. In the absence
is an increased focus on protecting backup Dell EMC’s Cyber Recovery solution protects your business’
of this capability we might
systems and enhancing disaster recovery most critical data by leveraging an air gapped cyber cease to exist after a
capabilities so that in the event of an recovery vault and limiting access to authorised personnel successful cyberattack.””
only. This sophisticated, secure backup solution ensures
attack, businesses can continue to critical data is physically and virtually separate from production Todd Lieb
function as normal. systems. The vault is only accessible to the network when it is Cyber Recovery Lead,
transferring data – it then disconnects leaving the vault Dell EMC
in true isolation.
Cybersecurity | 2019 | 49
4: Respond & Recover
Assess business critical systems to The centrepiece of the solution is the Cyber Recovery’s automated workflow Automate recovery workflows to
protect and create dependency maps cyber recovery vault, an isolated and includes the ability to create sandbox perform recovery and remediation after
for associated applications and services, protected part of the datacentre. copies that organisations can use for an incident and bring business resiliency
as well as the infrastructure needed to The vault hosts critical data on Dell security analytics. Analytics can to a higher level.
recover them. EMC technology used for recovery automatically be performed on a
and security analytics. scheduled basis. Cyber Recovery allows customers to
The service generates recovery leverage dynamic restore / recovery
requirements and design alternatives, The goal of the vault is to move data away CyberSense applies over 40 heuristics to procedures using existing disaster
identifies the technologies to analyse, host from the attack surface, so that in the event determine indicators of compromise and recovery procedures that bring business
and protect data, along with providing a of a malicious cyberattack, organisations alert the user. critical systems back online.
business case and implementation timeline. can quickly resort to a good, clean copy of
data to recover critical business systems. Cyber Recovery stays ahead of the Dell EMC and its ecosystem partners
Using vault protections around the isolated bad actor by enabling tools such as provide a comprehensive methodology
data also protects it from insider attacks. CyberSense which incorporate Artificial for protecting data, as well as performing
Intelligence and Machine Learning damage assessments and forensics to
Dell EMC Cyber Recovery automates the analytics methods to the vault. either recover your systems or remediate
synchronisation of data between production and remove the offending malware.
systems and the vault, and creates
immutable data copies.
Cybersecurity | 2019 | 51
4: Respond & Recover
Financial institutions are among the most The most effective plans for cyber threat
targeted organisations for cyberattacks resilience must include provisions to
and our responsibility is to ensure the highest protect and isolate the data protection
levels of security for our members and the infrastructure.
financial assets they entrust us with.
By design, data protection systems are
All it takes is for one successful intrusion or architected on the same networks as
ransomware attack to seriously disrupt any production systems and are therefore
business and if the bad guys are smart enough part of the potential attack surface.
to know where your backups are, you’re left
Dell EMC offers a smart solution that
with no protection.
employs an air-gapped Cyber Recovery
Dell EMC Cyber Recovery helps my team Vault, along with automated software
isolate all of our critical data off-network, that helps isolate, analyse and recover an
giving us confidence in our business organisation’s critical data so business can
resilience in the event of a worst-case resume in the event of a cyber intrusion or
cyberattack scenario.” ransomware attack.”
Bob Bender Christophe Bertrand
Chief Technology Officer, Senior Analyst,
Founders Federal Credit Union ESG
For more information: bit.ly/2eYyAcn For more information: bit.ly/2IZEtnn
Cybersecurity | 2019 | 52
67
Contact Details
www.DellTechnologies.com
@DellTech
Cybersecurity | 2019 | 67