Sapta Tunas Teknologi
  • Promo
    • Products
  • Solutions
    • Big Data & Data Analytics Solution
    • High Performance Computing
    • Internet of Things
    • Business Continuity & Disaster Recovery Planning
    • Software Define Data Center
    • Cloud Infrastructure
    • Security Solution
    • Business Application Infrastructure
    • PC as a Service
  • Services
    • IT Infrastructure Consulting
    • IT Deployment Services
    • IT Operation Services
  • About Us
    • Newsroom
  • Articles
  • Career
  • Contact Us
    • Helpdesk
March 31, 2021 by admin

How Cyber Recovery Works

How Cyber Recovery Works
March 31, 2021 by admin

The Cyber Recovery solution maintains mission-critical business data and technology configurations in a secure, air-gapped ‘vault’ environment that can be used for recovery or analysis. The Cyber Recovery Vault (CR Vault) is physically isolated from an unsecure system or network. The Cyber Recovery solution enables access to the CR Vault only long enough to replicate data from the production system. At all other times, the CR Vault is secured and off the network. A deduplication process is performed in the production environment to expedite the replication process so that connection time to the CR Vault is as short as possible.

Within the CR Vault, the Cyber Recovery software creates point-in-time (PIT) retention-locked copies that can be validated and then used for recovery of the production system.

Figure 1 High-level solution architecture

Pict 1. High Level Solution Architecture

Cyber Recovery architecture

As shown in the following diagram, the Cyber Recovery solution uses Data Domain systems to replicate data from the production system to the CR Vault through a dedicated replication data link.

Figure 2 Cyber Recovery architecture

Pict 2. Cyber Recovery Archiceture

How the Dell EMC Cyber Recovery Vault Works To Help You Recover From Attacks?

Dell EMC Cyber Recovery is a complete, isolated recovery solution that can help you minimize downtime, expense, and lost revenue by providing a resilient backup to critical data and a path to recovery from a cyber attack. To start, Dell EMC offers professional services that help you assess, plan, implement, and validate your cyber recovery solution.

Production environments are vulnerable to attack. Dell EMC Cyber Recovery keeps your data in a vault, where it is physically and logically isolated from other systems and locations. Physically, the Cyber Recovery Vault resides in a restricted room or area in your facility accessible only by authorized physical access, which limits the ability of in-house saboteurs that wish to hold your data for ransom to complete their objectives.

Pict 3. Dell EMC Cyber Recovery

CyberSense security analytics looks for indicators of compromised data and can help you discover the who, how, and the why, so you can recover quickly from attack.

Source:

https://www.delltechnologies.com/en-id/data-protection/cyber-recovery-solution.htm

https://www.channelsparkit.com/Share/6xyvoJVm1/

Share This Article

Recent Posts

4 CARA MENGURANGI ANCAMAN SERANGAN SIBER YANG SEMAKIN BERKEMBANGMay 30, 2023
MENGATASI GANGGUAN BISNIS : MANFAAT PERLINDUNGAN KEAMANAN INTRINSIKMay 22, 2023
5 HAL YANG HARUS ANDA PERSIAPKAN UNTUK KOMPUTASI KUANTUMMay 11, 2023
Copyright Sapta Tunas 2020
Privacy Policy

WhatsApp us