Plug-in the Cybersecurity Framework

Addressing All Three Areas of the NIST Cybersecurity Framework

The solution we offer differs substantially from other solutions in terms of implementation of the NIST Cybersecurity Framework. From a cyber attack point of view, an organization is in one of three states: before an attack, under attack, or recovering from an attack. Our solution is the only solution that handles all three states.

Identify and Protect

Our offered solution detects problems with cyber hygiene (i.e., conflicting active directory permissions) and can be used to identify problems and reduce risk in the event of an attack or compromised credentials.

Detect and Respond

Triggered snapshots are old news. Our cyberstorage solution actively detects and stops an attack when it occurs. Users and devices are isolated from affected shares while other users and devices are allowed access, all in real time. Cyberstorage creates cyber resiliency by only blocking bad behavior and users.

Recover

Immediately identify affected files and recover from rolling immutable snapshots with an RPO of less than 1 minute. Restoration is managed through the bulk recovery option, which automatically identifies (with the option to manually customize or override) last known good versions of each affected file, allowing users to restore thousands of files in seconds.

Key Differentiators

Cyberstorage supports enterprise cyber response workflows and ecosystem integrations to further supplement its inherent capabilities through a customizable webhook engine. Modern collaboration platforms and applications can easily leverage a webhook framework to enable workflows and seamlessly integrate into any organization’s infrastructure. We can also stream log and audit events to a SIEM or SOAR for storage and long-term analysis.