Asigra. Evolved Backup and Recovery for the Enterprise

The world of traditional backup means far more today than file backup; it means virtual machine backup, container backup, physical host backup, incremental forever or changed block tracking. It has evolved to a world of protecting/securing backups encompassing the gamut of the data protection market including cyber security, compliance management, cloud SaaS protection, and simplified data management and accessibility.

Provided by: Asigra Inc.

Download

Asigra. Why 3-2-1 Backup has Become an Ineffective Ransomware Defense

The traditional 3-2-1 backup process has been ballyhooed as an effective defense against ransomware, but that is no longer the case.

Backup software vendors, tape library vendors, cloud vendors, and BRaaS/DRaaS managed service providers say it is so. And as recently as 2017, the 3-2-1 defense may have been an effective ransomware defense, but no longer. Ransomware is a big multi-billion-dollar business. It’s organized and, sometimes, state sponsored. Reliable backup processes have become a threat to that revenue stream. The people making huge money on ransomware recognize that threat. This has resulted in them pouring those $ billions back into research and development (R&D) to neuter the backup defense. It is a classic struggle of offense (ransomware) versus defense (backups).

Provided by: Asigra Inc.

Download

Asigra. Comprehensive Malware Protection for Your Backups

Ransomware is not a new phenomenon. However, technological advancements by savvy cybercriminals have totally changed the game. Attacks used to be random…criminals would send millions of malware infections (either via phishing emails/malicious links) to see which end user would open the file to encrypt an organization’s data. Trends show that while these types of attacks are still occurring, targeted attacks are becoming much more dominant because organizations are more likely to pay the bitcoin figure to have their business critical data released.

Introducing Asigra’s Attack-LoopTM Prevention Solution.

Provided by: Asigra Inc.

Download

Data Sovereignty: The New Priority

To combat international crime, governments have passed, and are in the process of passing, new reciprocal legislation and agreements such as the CLOUD act and the E-Evidence Directive that extend their jurisdictional reach to access files stored in cloud servers outside their geographic boundaries.That means that organizations can no longer protect the privacy or exfiltration of confidential information (like healthcare information) stored in the cloud through data residency. Data sovereignty is what matters now.

By keeping files in their original location—behind the corporate firewall, on corporate storage assets, in specific geographic regions and access controlled, FileFlex Enterprise protects your data sovereignty and prevents possible data exfiltration inherent to cloud solutions to ensure compliance to local privacy regulations. There is no chance any third-party can gain access to files without the organization’s knowledge.

Provided by: Qnext Corp.

Download

CyberSecurity Product Analysis Whitepaper

FileFlex Enterprise has been evaluated by an independent, third party CISO level information security firm who has reviewed the information security supporting capabilities introduced through the use of FileFlex Enterprise, as well as the performance of a Threat Risk Assessment (TRA) on the product to meet HIPAA requirements in regards to data privacy and security. The FileFlex application and the underlying infrastructure has been subject to and passed a red-team, penetration testing assessment that used a black-box methodology. The security testing brief can be downloaded here and full test results and testing certificate can be obtained by contacting a Qnext representative.

Provided by: Qnext Corp.

Download