Four Technologies Combine To Protect You From Ransomware Attacks

&nbsp

Published February 2020

Forrester.Four_Technologies_Combine_To_Protect_You_From_Ransomware_Attacks

Ransomware continues to paralyze public and private enterprises globally.

As the ones responsible for recovering from outages, infrastructure and operations pros have successfully managed recoveries from all failures but one: ransomware. Ransomware attacks do not result in the familiar type of outage; they often put the backup infrastructure itself under siege. And it’s not about just recovering from a backup; I&O professionals need to work closely with their security and risk peers to ensure that they are recovering from an uninfected copy.

This paper explores the technologies and proactive strategies that Infrastructure & Operations professionals must employ to improve their confidence and recoverability in the face of a ransomware attack including: write once, read many (WORM) storage, data resiliency solutions, immutable file systems, and multi-factor authentication.

You will have to register, or log in, in order to download this content.

Biting the hand that feeds IT © 1998–2020