Loading

NetBackup Flex Appliances

Secure‑by‑default data protection for cyber‑resilient recovery

NetBackup Flex Appliances deliver cyber-resilient data protection as a purpose-built, turnkey platform. Rather than asking teams to build, harden, and maintain separate compute, storage, and security controls, Flex converges everything into a single appliance with zero-trust security engineered into every layer, not bolted on after deployment.

The result is a self-defending data protection platform where NetBackup runs hardened by default: access is controlled both at the instance & platform level, critical changes require multiple approvers, backups are verified clean before restoring, and recovery workflows remain intact even when credentials or administrators are compromised.

The challenge with traditional backup infrastructure 

Most enterprise backup environments were not designed for today’s threat realities. They rely on customer-built servers and storage, security controls configured after deployment, and manual enforcement of policies over time. This model increases operational overhead and creates inconsistency across environments. When administrative credentials are compromised or ransomware is active, recovery infrastructure itself can become a point of failure, precisely when it is needed most. Conventional approaches assume that:

  • Administrators remain trustworthy

  • Configurations remain intact over time 

  • Backups are clean and safe to restore

  • Manual controls hold under pressure

In real cyber incidents, these assumptions break down. The result: backups may exist, but recovery cannot be trusted. Organizations need a platform that assumes compromise and is built to withstand it.


Key Benefits

  • Reduced risk with zero-trust security built in by default 
  • Clean recovery confidence via integrated malware scanning 
  • Consolidation without compromise: fewer systems, same resilience 
  • Operational simplicity with low-downtime upgrades and automation 
  • Long-term retention secured with immutable WORM storage

A Layered Architecture for Cyber-Resilient NetBackup

Flex appliances deliver cyber‑resilient data protection through a tightly integrated, layered architecture.

1. Hardened appliance foundation 

Flex provides purpose‑built compute, storage, and networking integrated with a hardened operating environment. This foundation is designed for resilience, isolation, and predictable performance, removing variability introduced by general‑purpose infrastructure.

2. Embedded platform security services 

Security controls are enforced at the platform level and applied consistently across the environment, including: Strong identity and access controls, separation of duties and dual‑control for sensitive operations, Network segmentation and instance‑level isolation, and Secure defaults with documented, auditable exceptions.

These controls are designed to limit blast radius, prevent single‑admin failure modes, and preserve recovery integrity during an attack.

Designed to Defend Against the Four Stages of Attack

  • Unauthorized Network Access 
    Attackers first try to reach the backup environment. Flex enforces Network Access Control (NAC), host firewalls, and subnet allow‑lists to restrict which networks and systems can connect to management and data services, blocking unauthorized traffic at the perimeter.

  • Compromised Credentials at Login 
    Most breaches start with stolen usernames and passwords. Flex integrates MFA, SSO, and ECA‑based client certificates so a password alone is never enough. Authentication policies can be enforced across Flex, NetBackup Web UI, CLI, and WORM storage instances, aligning backup access with enterprise identity standards.

  • Privilege Escalation and Lateral Movement 
    Even if an attacker signs in, they should not be able to move freely or gain system‑level control. Flex uses granular RBAC, non‑root containers, Mandatory Access Controls (MAC), and Secure Computing (SECCOMP) profiles so every user and service operates with only the minimum permissions required. This sharply limits lateral movement paths for ransomware and rogue administrators.

  • Abuse of Legitimate Privileges and Destructive Operationst 
    Finally, Flex protects against misuse of valid admin rights. MPA enforces quorum approval for critical operations such as key management, instance deletion, and retention or immutability changes. NetBackup WORM storage combined with a tamper‑resistant compliance clock, immune to NTP or system time manipulation; ensures that backup data cannot be altered or deleted before its retention expires, even by privileged users.

These layers turn backup infrastructure into a self‑defending platform that assumes compromise and minimizes attackers’ room to maneuver. 

Figure 1

3. Isolated NetBackup application instances 

NetBackup runs as isolated application instances on Flex, benefiting from: 

  • Immutable storage and tamper‑resistant retention 
  • Pull-based IRE replication i.e. the isolated vault initiates data pulls (no inbound ports to IRE), enabling unidirectional access and stronger air-gap isolation 
  • Integrated malware scanning for clean recovery 
  • Automated orchestration of backup and recovery workflows 
  • No rehydration required for recovering data: retains dedupe efficiencies for replicated copies anywhere while supporting security capabilities for clean recovery 

Together, they help ensure that recovery workflows remain secure, available, and trustworthy, even during an active cyber event. 

 

Figure 2

Key customer outcomes 

Secure‑by‑default cyber resilience  

Flex appliances are delivered with security controls enabled by default. MFA enforcement, granular RBAC, Multi-Person Authorization (MPA), and instance-level network access control are built into the platform, not left to manual configuration. Sensitive actions like key management require quorum approval, reducing single-admin risk and strengthening governance. 

Clean recovery confidence  

Integrated malware scanning, immutable WORM storage, and instance isolation and encryption controls help prevent attackers from corrupting or hiding within backup data. Teams can more confidently identify clean recovery points and avoid reinfecting production systems. 

Consolidation without compromise  

Flex enables organizations to consolidate backup infrastructure onto fewer, high-density systems while maintaining performance and isolation. Application QoS, instance isolation, and embedded security controls preserve SLAs and limit blast radius, reducing footprint and operational overhead without weakening resilience. 

Long‑term retention with modern security  

Flex supports cost-optimized long-term retention while inheriting the same hardened posture. Immutable retention, encryption at rest (with SED options), and platform-enforced access controls provide a secure path forward from legacy retention architectures. 

Operational simplicity at scale  

With containerized NetBackup instances, low downtime upgrades, and built‑in governance, Flex reduces day‑to‑day operational complexity and helps teams spend less time firefighting and more time delivering value. 

Aligned to Cohesity's 5 Steps of Cyber Resilience

Flex Appliances map directly to each of the five steps organizations must take to achieve true cyber resilience:

Step Flex Appliances Capability
Step 1: Protect all data Hardened hardware, SED encryption, MFA, lockdown, RBAC, and NAC applied by default across all instances.
Step 2: Ensure data is always recoverable MPA-governed key management, immutable storage, malware-verified recovery points, and QoS-guaranteed restore performance.
Step 3: Detect and investigate threats Integrated malware scanning and anomaly detection with granular audit logs ready for SIEM/SOAR/XDR ingestion, provide deep visibility into suspicious behavior and help security teams investigateincident.
Step 4: Practice application resilience Containerized instance isolation, per-instance QoS, dynamic storage rescans, low-downtime upgrade workflows and Primary Server Availability (PSA) work together to keep protection services and recovery workflows available across maintenance events, node failures, and even site‑level disruptions.
Step 5: Optimize data risk posture Documented exception management, continuous platform hardening, and tiered software licensingaligned torisk and workload.

The Platform That Protects Recovery Itself 

NetBackup Flex Appliances are built for organizations that need more than backup, they need assurance. Assurance that backups are clean. That no single person can compromise recovery. Security controls hold through upgrades, personnel changes, and active incidents. 

By engineering zero-trust controls, dual-approval governance, and clean-recovery verification directly into the appliance platform, Flex removes the fragility of manually maintained security and replaces it with something that simply works, by default, at scale, and over time. 

  • No manual hardening required — security is the platform's default state 
  • No single point of administrative failure — critical changes require multiple approvers 
  • No uncertainty at recovery time — malware scanning confirms what's clean before restore 
  • No disruption during maintenance — low-downtime operations preserve backup coverage 

Protect your recovery infrastructure with NetBackup Flex Appliances. Learn more at www.cohesity.com/platform/netbackup/netbackup-flex/.

 

Loading