A cyber vault provides the ability to improve cyber resiliency by creating an isolated copy of production data. With a clean, separate, and protected copy of data always on standby, organizations can rapidly recover data back to its original source, or alternate backup locations, in case of a ransomware attack or other incident that compromises production or primary backup systems. A modern cyber vault strategy uses “virtual air gap” technology that protects backups but allows for temporary network connections to enable necessary remote access—albeit with very strong controls—while further isolating data with the cloud as needed. A well-designed cyber vault can be an effective part of a robust data isolation and disaster recovery strategy.
Leading cyber vault solutions offer five key capabilities: they isolate data; they tightly control access to it; they make sure the data cannot be tampered with; they allow for quick identification and recovery of the latest “clean” data to minimize data loss and downtime of business-critical systems; and they are easy to use and manage.
Here’s a deeper dive into each of these capabilities:
Protecting against cyberattacks, particularly those launched with ransomware, is an ongoing battle. Virtually all organizations have invested significant time and money in backup and recovery solutions, and use multiple overlapping technologies to protect their data, including shipping magnetic tapes off-site or deploying and maintaining remote clusters at parallel infrastructure environments. But these methods are complex, time-consuming, costly, and error-prone. For example, restoring data from tape is rarely able to meet RTOs, RPOs, or other service-level agreements (SLAs).
Cyber vaults simplify the process of restoring data to business-critical systems and getting organizations back online quickly to meet even the strictest SLAs. They also do this for low total cost of ownership (TCO) and high ROI.
The definition of cyber resilience, according to the U.S. National Institute of Standards and Technology (NIST), is “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.”
Here are the ways cyber vaulting meets each of these requirements to improve cyber resilience:
Data today is central to every organization. Given their dependence on it—no matter if it is stored on premises or in the cloud—cybercriminals see data as a tempting target. It is thus more vulnerable than ever to cybersecurity threats, especially ransomware.
The traditional 3-2-1 strategy of backing up data—three copies of data, on two different media, with one of them in an off-site environment—no longer cuts it for protecting valuable and sensitive data. Although a physical air gap model where data is stored on tapes and moved off-site to isolate it ensures data security, recovery is slow. It is virtually impossible to meet enterprise-grade SLAs with such a strategy.
Cohesity recommends a modern strategy, with a “virtual air gap” that also involves physical separation, and network and operational isolation, but which keeps data secure and highly available.
Cohesity FortKnox is a software-as-a-service (SaaS) cyber vault, data isolation, and recovery solution that improves cyber resiliency by storing an immutable copy of data in a Cohesity-managed cloud. By significantly simplifying backup operations while lowering costs, FortKnox enables organizations to both prevent and recover swiftly from any attacks.
The FortKnox cyber vault does this in three ways:
Cohesity is also a founding member of the Data Security Alliance, an organization of more than a dozen security industry heavyweights, giving businesses and governments more ways to win against cyberattacks.