• 132c0c36 ba25 49d2 90eb 4edf1f4f06dd1
  • Dodge County Banner 1100x500px
  • CS Moreno Valley Schools
  • ESG report banner

CyberSense for Dell Technologies Cyber Recovery

Given that real time protection solutions are not 100% effective, data that is protected in the Cyber Recovery vault may have already been attacked. Adding CyberSense analytics to the Dell Technologies PowerProtect Cyber Recovery vault allows for the discovery of these corrupt files so they can be replaced with the last known good version.

CyberSense is fully integrated with the Dell’s Cyber Recovery solution for ransomware protection. Dell leverages the backup workflow to copy and secure critical business records in an isolated vault using backup software such as Networker and Avamar.

Once data is replicated to the vault CyberSense scans the backup image and generates analytics, without the need for the original backup software in the vault. Analytics look inside the files and databases to uncover unusual behavior that is indicative of a cyberattack. This includes file corruption, encryption of files or pages in a database, or deletions and creations.

Cybersense image

The statistics are then analyzed using machine learning algorithms that have been trained on the latest ransomware threats to make a deterministic decision on whether the data has been attacked. If an attack has occurred and data corrupted, CyberSense delivers forensic tools to find the corrupt files, report on the user account that caused the corruption, so this account can be locked, and also will report on the application that made the changes to the file. With these forensic tools you can recover and diagnose a ransomware attack and replace corrupted files with the last good copy.

Together these solutions provide a secure and powerful solution against ransomware attacks. If an attack does get past the real time defenses, and corrupts files or databases, CyberSense can detect it quickly and within a backup cycle the last good copy of the data can be retrieved.
This enables business operations to continue without any interruption and cyberattacks to be thwarted quickly and painlessly.

Key Features and Benefits

CyberSense delivers a unique approach by looking inside data to determine if it has been attacked. Key advantages include:

  • Fully integrated with Dell Cyber Recovery vault
  • More than 100 statistics generated that look inside the data for unusual behavior
  • Machine learning to generate a Yes/No indicator that an attack has occurred
  • Forensic tools to find corrupt files, and diagnose the attack vector
  • Ability to restore last good file to minimize business interruption

Talk to an Expert

Learn more about our software, solutions, services or competitive pricing models - call us or send an email.

Contact Us

contact us