Home News DCIG Publishes Report on Detecting Malware in Enterprise Backup Environments

DCIG Publishes Report on Detecting Malware in Enterprise Backup Environments

18
0

DCIG Publishes Report on Detecting/Preventing Malware in Enterprise Backup Environments

Report Features Cybersecurity Approaches from Asigra, Dell, and Rubrik for Detecting and Responding to Malware Attacks

Asigra Inc. announced that the Data Center Infrastructure Group (DCIG), has published a report titled “Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment.” The report provides a comparison of three different approaches for detecting and preventing malware attacks on backup data and which approach may be the most effective for enterprise backup environments.

Recovering lost data with confidence starts with a golden copy of the backup set. To manage the threat that malware presents to backup data today, organizations are deferring to backup providers to help them perform successful recoveries from a confirmed reproducible copy of the data. This “golden copy” must be free from malware and capable of being returned to its native usable state for use in the enterprise.

In the DCIG report, three methodologies for creating a golden copy are reviewed. The first is the inline scan where incoming and restored backup data are actively screened for malware. The second method is the use of a sandbox, where backups complete as normal but a separate IT sandbox is set up to recover data and tested for malware. Snapshot analysis is the third approach where snapshots of production data are taken and analytics are performed on each snapshot. The results of the analytics will inform which to check for the presence of malware.

Of the three approaches for stopping malware attacks on backup data, the preferred method is the inline scan of backup and recovery data because of the benefits provided over the competing approaches. According to DCIG, “Inline scans represent the easiest and fastest way for a company to scan its backup data for the presence of known strains of malware as well as position the company to scan recovered data for yet unknown malware signatures.”

The highlighted solution for inline scanning of malware is Asigra Cloud Backup V14, which scans all backup data for malware as part of the backup job and alerts the administrator to its presence in the event it has slipped past perimeter cybersecurity defenses. It then scans data during data backup and recovery, significantly improving the chance of detecting malware signatures that were latent or undetectable when the backup occurred.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

79 − = 70