If you think ransomware attacks will slow, think again. Just a few years ago, Cybersecurity Ventures predicted a ransomware attack every 14 seconds. Last year it was every 11 seconds. A decade from now, the same group expects ransomware to attack an enterprise every two seconds. Think about that for a second—or two.

There’s little doubt building platforms and applications spanning multiple public and private clouds as well as on-premises data centers is accelerating digital transformation, agility, and responsiveness. But it’s also ensuring data is more distributed than ever—across many systems. The challenge today is that disparate, siloed, legacy products aren’t doing an effective job of protecting data everywhere. Moreover, enterprises are left to defend wider-than-necessary attack surfaces created by new cloud-age silos, guarded and managed by different point products depending on need (backup, disaster recovery, etc.).

In a nutshell, in the rush to exploit new hybrid and multicloud architectures, many enterprises have opened doors to bad actors, making their most valuable asset also their most vulnerable. Next-gen data management reverses this trend.

Keep Data Safe and Systems Resilient through Zero Trust

Half of enterprises  surveyed by the Everest Group say that meeting  data compliance standards is among the top three business challenges they face in a post-pandemic world. In its report Driving Enterprise Business Transformation with Next-Generation Data Management, analysts observe, “The higher the fragmentation of data, the larger the attack surface.”

The answer isn’t to retreat from hybrid architectures; it’s to adopt a next-gen data management platform that consolidates siloed data and protects it from ransomware attacks with unified, Zero Trust security principles. Because attacks will keep coming — some even getting through. That’s why keeping data safe is key and recovering from attacks quickly is crucial.

“When you have one platform, logically spanning your infrastructure, there is reduced surface area, as opposed to when you have multiple silos and attackers can get into the weakest link,” says Cohesity CEO and Founder Mohit Aron.

A next-gen data management platform keeps data safe and enterprises resilient by:

  • Reducing attack surfaces – It consolidates vulnerable infrastructure silos onto one secure, scalable platform.
  • Recovering rapidly from ransomware attacks – It creates immutable data snapshots—backups that can’t be encrypted, modified, or overwritten by ransomware—and monitors them using artificial intelligence and machine learning (AI/ML).
  • Integrating with a security ecosystem – It works seamlessly with pre-built apps from respected third-party security partners and allows teams to build their own protections, too, so the platform continuously benefits from the highest levels of protection.

If an enterprise falls victim to one of the growing waves of ransomware attacks, the next-gen data management platform quickly locates a clean, uninfected copy of data across the consolidated, global footprint, including public clouds. That way, the enterprise can instantly recover and reduce downtime.

Cyber Resiliency in the Real World

Sky Lakes Medical Center is a not-for-profit teaching hospital serving south-central Oregon and northern California. When it replaced its aging data center infrastructure with a Cohesity next-gen data management platform, it was prepared for what came next: a massive ransomware attack at the height of the pandemic. Sky Lakes was unexpectedly targeted and breached by ransomware, but the immutable backup snapshots, DataLock (WORM) capabilities and other Threat Defense protections from Cohesity helped it detect the threat as well as rapidly recover data at scale.

“Our organization suffered a critical ransomware attack, effectively crippling our entire infrastructure,” explained Sam Stewart, Sky Lakes Network Systems Analyst. “With Cohesity, we’ve been able to recover machines and file shares, verify they’re clean, and bring the applications back online. Cohesity literally saved us hundreds of hours of work and prevented us from having to actually pay the ransom note.”

Had Sky Lakes still been using its legacy systems, rather than a next-gen data management platform, and been forced to work from tape backups, it would have taken weeks, not minutes, to recover from the attack, members of the team stated. It also would have lost months of data. Instead, Sky Lakes retained its data and refused to pay the ransom.

Threat Defense Architecture for Defense-in-Depth Security

Security threats evolve and multiply, so a next-gen data management platform leveraging Zero Trust security principles is architected to address these evolutions. Cohesity Threat Defense is a multilayered data security architecture that protects data, maintains strict access controls, and offers SecOps teams deep visibility in near real-time so they can stay ahead of modern threats.

With a next-gen data management platform built on a Threat Defense Architecture, enterprises can defend themselves against the most sophisticated ransomware attacks. Such an architecture is:

  • Resilient at the core, so backup data can’t be taken hostage, thanks to an architecture that includes robust encryption algorithms, erasure coding, immutable backup snapshots, and WORM (write once read many) data storage that can’t be modified.
  • Protected against unauthorized access to mitigate the risk of weak or compromised user credentials. This means strict, granular, role-based access control, plus multifactor authentication.
  • Capable of near-real-time threat detection to minimize the risk of data exfiltration. By scanning backup copies of the source-side production data and using AI-powered advanced anomaly detection, enterprises can reduce the blast radius from ransomware attacks.

Over time, ransomware has grown gradually more destructive. Attacks have evolved from simply encrypting production data, to destroying backups, to wholesale data theft. At each stage in this ignoble evolution, the scope of damage from ransomware—the blast radius—has expanded. A Threat Defense Architecture keeps the possible damage to a minimum while ensuring enterprises remain up and running.

To learn how next-gen data management incorporates Zero Trust security principles into a defense in depth and Threat Defense Architecture, visit Cohesity.

Read more about 3rd Party Extensibility — Extend the value of the platform with marketplace apps and integrations.

Read more about Simplicity at Scale — Manage everything in one place, expand with ease.

Read more about Powered by AI — Improve decisions and act faster with built-in smart capabilities.

You May Also Like

Blog

What is Cohesity Threat Defense?

Learn more
Blog

Per-Tenant Data Security Service at Provider Scale

Learn more
Blog

Architecture Matters: Blueprints for Backup as a Service Offerings

Learn more
X
Icon ionic ios-globe

You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.

Don't show this warning again