Reduce Time to Recovery

But, I Already Have a Backup Solution

Cyberstorage defends and restores the data where it resides. It protects unstructured data for SMB and NFS file shares only and is not a replacement for backup solutions (e.g. Commvault, Rubrik, Netbackup, etc). that are used for full-site recovery. The benefit of cyberstorage is that an attack is immediately detected and halted with easy recovery following an attack. This is in contrast to your backup solution, which has no ability to detect an attack. Cyberstorage is a bulwark for your perimeter security and a significant aid in demonstrating to IT leadership and General Counsel that they can have confidence in your organization’s security stance.

Data Restoration in a Nutshell

Cyberstorage provides immutable snapshots of your data and enables you to restore a single file or an entire dataset instantaneously, back to a previous version or restore individual files from a previous snapshot.

A Larger Nutshell…

Competing products use passive and slow reacting techniques such as blocking access through permission changes (which can take significant time and fail with large data sets, and may not be honored immediately due to caching) or rely on asynchronous periodic snapshots (which are often targeted for destruction along with the attack) to create potential recovery points. Our cyberstorage solution is a modern file solution designed specifically to natively solve data oriented cyber attacks on unstructured data without the need for relying on third party tools, integrations, or add-ons (which lead to false positives and slow (or no) response). And when it comes to the immutable snapshot technology, not even root users can destroy snapshots which are part of the active defense workflow. 

Ease of Data Restoration

The snapshot interface in the cyberstorage GUI allows admins to restore files for users without seeing the contents of the file. Metadata within snapshots is indexed to enable admins to quickly locate and restore files for users. Snapshots can be replicated to other cyberstorage nodes for disaster recovery and continuity of operations (COOP) in other locations.

Policy Driven

Data protection policies are defined by the organization and automatically associated with each storage profile. These policies go into effect automatically when a dataset is provisioned to prevent unprotected data. Data protection policies set how frequently snapshots are taken, how long they are retained in the local instance and on replicated instances.