You are on page 1of 9

4: Respond & Recover

RESPOND
& RECOVER
Equipping our clients with leading cyber solutions and
a proven methodology to build operational resilience
in the event of an attack.

Business Outcomes

OPERATIONAL RESILIENCE

Cybersecurity | 2019 | 46
4: Respond & Recover

Respond & Recover

Implementing precautionary measures to take


a proactive approach to security is the best way
to keep ahead of threats.
However, as the threat landscape is constantly changing and attacks
continue to grow more sophisticated, Dell Technologies recommends
our clients always have a response and recover strategy in place, so that
in the event an attack does occur, the business can function as normal.

Taking this approach will equip the business with worst case scenario
remediation plans to ensure the business can continue to operate as
normal. The following solutions outline Dell Technologies Response
& Recovery cybersecurity solutions.

Cybersecurity | 2019 | 47
4: Respond & Recover

Respond | OPERATIONAL RESILIENCE

Fraud Prevention Incident Response


PRODUCT SOLUTIONS MANAGED SERVICE SOLUTIONS

The RSA NetWitness Platform, RSA NetWitness® Platform Secureworks accredited


a leader in Gartner’s 2018 Magic enables the experts in our cyber incident response
Quadrant for Security Information team backed with proprietary
cyber defence centre to
and Event Management, applies Secureworks Threat Intelligence
the most advanced technology to understand the true nature, and purpose-built response
enable security teams to work more scope and impact of an technologies helps you resolve
efficiently and effectively. incident and empowers complex cyber incidents at scale.
It uses behavioral analysis, data science techniques them to take immediate, Our services help you reduce response time
and threat intelligence to help analysts detect and targeted action.” and incident impact by leveraging Secureworks
resolve both known and unknown attacks before seasoned incident responders.
they disrupt your business. K Lakshmi Narayanan
Using purpose-built response technologies enriched
The platform uses machine learning to automate
AVP and Head of Cybersecurity with years of cyberattack and threat group data to
and orchestrate the entire incident response Technology and Operations, help you respond to and mitigate cyber incidents
lifecycle. This allows security teams to collapse Infosys efficiently and effectively.
disparate security tools and the data they generate
into a single, powerful, and fast user interface. For more information: bit.ly/2BAMrjr

Cybersecurity | 2019 | 48
4: Respond & Recover

Recover – Dell EMC Cyber Recovery Solution | OPERATIONAL RESILIENCE

PRODUCT SOLUTIONS

Operational Resilience in the Event of an Attack

Datacentres are a fundamental part of BUSINESS CHALLENGE One of the most poignant
business infrastructure. An attack on this Whilst proactive solutions can help to protect businesses things I’ve heard a client say
from cyberattacks, insider threats still pose a huge risk to the
infrastructure can not only devastate a business and are much harder to detect and defend against. about this solution is that:
business commercially but can have a Whether it is a rogue employee or an intruder has taken over
much wider impact on society as a whole access of your systems, businesses must protect their ability “This solution is the
as it disrupts core services to customers.
to recover in order to minimise disruption to the running of the difference between business
business and impact on customers.
continuance and business
This threat to society has meant that there THE SOLUTION
existence. In the absence
is an increased focus on protecting backup Dell EMC’s Cyber Recovery solution protects your business’
of this capability we might
systems and enhancing disaster recovery most critical data by leveraging an air gapped cyber cease to exist after a
capabilities so that in the event of an recovery vault and limiting access to authorised personnel successful cyberattack.””
only. This sophisticated, secure backup solution ensures
attack, businesses can continue to critical data is physically and virtually separate from production Todd Lieb
function as normal. systems. The vault is only accessible to the network when it is Cyber Recovery Lead,
transferring data – it then disconnects leaving the vault Dell EMC
in true isolation.

Cybersecurity | 2019 | 49
4: Respond & Recover

Recover | OPERATIONAL RESILIENCE

Dell EMC Cyber Recovery Solution


PRODUCT SOLUTIONS
2. Isolation
Move critical data
1. Planning into isolated vault 3. Analysis
This solution works best in Identify critical data Continually analyse vault
addition to disaster recovery to host in vault for unusual behaviour

and backup systems.


C O RPO RAT E NET WO RK CYBE R R E COVE R Y VAULT
Dell EMC recommends to PRODUCTION
only backup 10-15% of your APPS
PROTECTION STORAGE
most critical data in the Backup
vault, updating once per day 10-15% of
AI R most critical
and storing data for up to GAP data for up
30 days. for up to
Network connected 30 days
In the event of an attack, once a day
COMPUTE FOR:
this solution enables you • Management orchestration
• Backup application
to recover data in its DISASTER
• Analytics tools
• Recovery
last known true state to RECOVERY
/ BACK UP

be moved back into the


corporate network to enable MANAGEMENT PATH NO MANAGEMENT PATH
Perimeter Defense - Authorised Users CSO Cleared Personnel Only
your business to operate 4. Recovery
In the event of an attack,
as normal. data is recovered from
its last known true state
from the vault to the
corporate network
Cybersecurity | 2019 | 50
4: Respond & Recover

Recover | OPERATIONAL RESILIENCE

Dell EMC Cyber Recovery Solution


PRODUCT SOLUTIONS

This robust business resilience solution is made up of four components:

1. Planning 2. Isolation 3. Analysis 4. Recovery

Assess business critical systems to The centrepiece of the solution is the Cyber Recovery’s automated workflow Automate recovery workflows to
protect and create dependency maps cyber recovery vault, an isolated and includes the ability to create sandbox perform recovery and remediation after
for associated applications and services, protected part of the datacentre. copies that organisations can use for an incident and bring business resiliency
as well as the infrastructure needed to The vault hosts critical data on Dell security analytics. Analytics can to a higher level.
recover them. EMC technology used for recovery automatically be performed on a
and security analytics. scheduled basis. Cyber Recovery allows customers to
The service generates recovery leverage dynamic restore / recovery
requirements and design alternatives, The goal of the vault is to move data away CyberSense applies over 40 heuristics to procedures using existing disaster
identifies the technologies to analyse, host from the attack surface, so that in the event determine indicators of compromise and recovery procedures that bring business
and protect data, along with providing a of a malicious cyberattack, organisations alert the user. critical systems back online.
business case and implementation timeline. can quickly resort to a good, clean copy of
data to recover critical business systems. Cyber Recovery stays ahead of the Dell EMC and its ecosystem partners
Using vault protections around the isolated bad actor by enabling tools such as provide a comprehensive methodology
data also protects it from insider attacks. CyberSense which incorporate Artificial for protecting data, as well as performing
Intelligence and Machine Learning damage assessments and forensics to
Dell EMC Cyber Recovery automates the analytics methods to the vault. either recover your systems or remediate
synchronisation of data between production and remove the offending malware.
systems and the vault, and creates
immutable data copies.
Cybersecurity | 2019 | 51
4: Respond & Recover

Our Clients say... Industry Analysts say...

Financial institutions are among the most The most effective plans for cyber threat
targeted organisations for cyberattacks resilience must include provisions to
and our responsibility is to ensure the highest protect and isolate the data protection
levels of security for our members and the infrastructure.
financial assets they entrust us with.
By design, data protection systems are
All it takes is for one successful intrusion or architected on the same networks as
ransomware attack to seriously disrupt any production systems and are therefore
business and if the bad guys are smart enough part of the potential attack surface.
to know where your backups are, you’re left
Dell EMC offers a smart solution that
with no protection.
employs an air-gapped Cyber Recovery
Dell EMC Cyber Recovery helps my team Vault, along with automated software
isolate all of our critical data off-network, that helps isolate, analyse and recover an
giving us confidence in our business organisation’s critical data so business can
resilience in the event of a worst-case resume in the event of a cyber intrusion or
cyberattack scenario.” ransomware attack.”
Bob Bender Christophe Bertrand
Chief Technology Officer, Senior Analyst,
Founders Federal Credit Union ESG
For more information: bit.ly/2eYyAcn For more information: bit.ly/2IZEtnn
Cybersecurity | 2019 | 52
67

Contact Details
www.DellTechnologies.com

@DellTech

Dayne Turbitt Margarete McGrath Chris Miller Simon Godfrey


Senior Vice President UKI Chief Digital Officer UKI RSA Regional Director, UKI Secureworks Regional Director, UKI

Dayne.Turbitt@Dell.com Margarete.Mcgrath@Dell.com Chris.Miller2@RSA.com SGodfrey@Secureworks.com

bit.ly/2xGgo0p bit.ly/2NGJdUq bit.ly/2V9Tl82 bit.ly/2V5J3pD

Cybersecurity | 2019 | 67

You might also like