Addressing All Three Areas of the NIST Cybersecurity Framework
The solution we offer differs substantially from other solutions in terms of implementation of the NIST Cybersecurity Framework. From a cyber attack point of view, an organization is in one of three states: before an attack, under attack, or recovering from an attack. Our solution is the only solution that handles all three states.
Identify and Protect
Our offered solution detects problems with cyber hygiene (i.e., conflicting active directory permissions) and can be used to identify problems and reduce risk in the event of an attack or compromised credentials.
Detect and Respond
Triggered snapshots are old news. Our cyberstorage solution actively detects and stops an attack when it occurs. Users and devices are isolated from affected shares while other users and devices are allowed access, all in real time. Cyberstorage creates cyber resiliency by only blocking bad behavior and users.
Recover
Immediately identify affected files and recover from rolling immutable snapshots with an RPO of less than 1 minute. Restoration is managed through the bulk recovery option, which automatically identifies (with the option to manually customize or override) last known good versions of each affected file, allowing users to restore thousands of files in seconds.
Key Differentiators
Cyberstorage supports enterprise cyber response workflows and ecosystem integrations to further supplement its inherent capabilities through a customizable webhook engine. Modern collaboration platforms and applications can easily leverage a webhook framework to enable workflows and seamlessly integrate into any organization’s infrastructure. We can also stream log and audit events to a SIEM or SOAR for storage and long-term analysis.
