top of page

Data Protection and Disaster Recovery @Scale for IT & OT

Think Like an Attacker, Act like a Data Protection Professional 

Ransomware, DestructiveWare and Post-Compromise Data Protection and Disaster Recovery

You're never getting your data back

As noted in Carbon Black's 2018 Year-End report, incident response  firms are encountering destructive attacks during 32% of investigations, meaning that almost 1/3 of these attacks ultimately destroyed a clients data.

Ransomware

There are legions of examples of unsecured AWS S3 buckets that easily identifiable and exploited for ransowmware, including Verizon, the NSA, and others according to Tech Republic.

UnSecured Storage Buckets

A DevOps resource in the UK was sentenced to 2 years in prison for destroying a firm's data hosted on AWS..after having acquired privileged account information that was not secured by MFA or rotating passwords

Malicious Insider

Black and Yellow Emergency Response Post

​

This is not our first rodeo.  We've engineered disaster recovery and data protection solutions for decades, from app-specific solutions in highly regulated industries where data loss just can't happen to global DR and data protection programs.  We understand and can manage the intersection of security and recovery.....

Bundled as part of our Security Operations Center or delivered as a turnkey function, we can assist from a single app to the enterprise and for OT Assets as well

Turnkey Security & Compliance

DevSecOp Factories

DevOps Factories

Full turnkey programs used to manage the recovery efforts using DevOps.  Standup Recovery environments via:

  • BuildFactory/Re-build using Infrastructure As a Code (IAAC)

​

Deploy immutable infrastructure to reduce attack surfaces and improve audit trails

Disaster Recovery and Data Protection Factories

DR Factory

Full turnkey Disaster Recovery programs used to manage the engineering, testing and failover/failback solutions: 

  • Bare Metal, VM, Containers

  • On-Prem to Cloud

  • Cloud to Cloud

  • On-Prem to On-Prem

​

Data Protection Factory

Unlike disaster recovery, data protection provide additional protection from compromised accounts in concert with our Zero Trust Bundle ensures that business units, app teams, and business processes have access to their data after a compromise occurs.

​

Often, Ransomware attacks will simply compromise the service account and use those credentials to go after data sets....Been there, done that.

ServiceMesh as Disaster Recovery Architecture

ServiceMeshFactories:

Full turnkey programs used to manage the engineering, deployment, compliance, and vulnerabilities for in-house and 3rd party cloud-enabled and service mesh:

  • BuildFactory

  • Compliance Factory

  • MigrationFactory

​

Leveraging servicemesh, app teams can, literally, abstract their app and their security from the physical infrastructure. 

​

Our approach can be used as part of our Zero-trust model as it manages end-points, accounts, and data while providing your testing and devops teams with tools to complete a/b and canary rollouts based on vulnerabilites found. 

Get Started Today

Get a demo of our capabilities or schedule a call so that we can discuss how we might help

Schedule a Demo
Schedule a Call

Data Protection and DR Programs

Governance

  • Validate Statutory, Regulatory, and Governance Requirements

​​

  • Define Data Classification Standards

​​

  • Define CIA standards

​​

  • Define data protection Standards by endpoints, platform and data type

​​

  •  Cloud-specific, DR Vendors, Platform Vendors

​​

  • Define SLA for recovery

​​

  • Documentation, Testing, Reporting standards

Inventory

  • Discover/Inventory data protection and disaster recovery assets including IT and OT

  • Integration with ITSM/ITIL

Engineering

  • ServiceMesh

  • Distributed

  • Active/Active

  • Active/Passive

  • Active/Restore

  • On-prem + Cloud

  • Continuous Replication

  • Snapshots

  • Endpoints

  • Bare Metal

  • VM

  • Containers

  • Serverless

  • Storage:on-prem, cloud, hybrid

Operating

  • Compliance

  • Change Management

  • Incident/Events

bottom of page