Dell EMC PowerStore is built for next generation datacenter capabilities with a focus on data-centric workloads, intelligent automation, deployment adaptability and enhanced security. PowerStore’s Data at Rest (D@RE) Encryption for all data offers snapshot protection.
Dell EMC PowerStore provides a simple but powerful approach to local data protection using snapshots. PowerStore uses the same snapshot technology across all the resources within the system, including volumes, volume groups, file systems, virtual machines, and thin clones. Snapshots use thin, redirect-on-write technology to ensure that system space is used optimally and reduces the burden by not requiring administrators to designate protection space. Snapshots can be created manually through PowerStore Manager, PowerStore CLI, REST API, or even automatically using protection policies.
Customers can take advantage of advanced snapshot technology and capabilities in an easy to use policy-based environment using PowerStore Manager – the HTML5 management GUI of PowerStore.
Now that we have an idea of the snapshot basics, the question of ransomware protection can be addressed. All PowerStore snapshots are immutable. An immutable snapshot cannot be manipulated or changed or mounted. However, you can create a Thin Clone of a snapshot. Thin Clones are zero space copies of snapshots that can be mounted and made writeable. This is where advanced copy data management comes into play with technology like AppSync.
Since a PowerStore snapshot is 100% read-only and cannot be modified or manipulated it is perfect for recovering instantly from ransomware scenarios.
Dell EMC CloudIQ is included with every PowerStore at no additional cost. It comes as part of your support contract and provides simplified machine learning/artificial intelligence based monitoring and reporting. With CloudIQ Cybersecurity a user can gain access to proactive security configuration information.
Security is on top of mind and with CloudIQ Cybersecurity. Another integral part of CloudIQ is what we call “Anomaly Detection”. Once again, using fully proactive ML/AI capabilities your PowerStore environment can leverage CloudIQ to alert you of anomalies taking place in your environment.
Customers under a ransomware attack begin to take quick notice that their host data is being encrypted. Once the data is encrypted an attacker will request the ransom in exchange for the decryption key. This problem is multifaceted.
- Even paying the ransom and getting the decryption key you are not guaranteed the ability to recover all of the data
- The decrypt process could take days, weeks, or months depending on the amount of data and the encryption algorithm. It is not an instantaneous recovery.
I would highly recommend taking a look at Dell EMC’s PowerProtect Cyber Recovery for the industry’s most robust ransomware detection and recovery but back to CloudIQ and PowerStore.
With CloudIQ Anomaly Detection your PowerStore environment is constantly being assessed for any type of performance or capacity based anomaly. What does this mean in reference to ransomware?
Performance Anomaly – If a sudden IO performance change happens you get notified
Capacity Anomaly – If a sudden capacity change happens you get notified.
Let’s Not Discount Data Reduction
Remember that PowerStore has advanced data reduction technologies that reduces data inline. Dell EMC’s CloudIQ is providing insight into your environment that can give you any early detection that something is happening. If it is determined that you are under a ransomware attack then you can instantly recovery from a PowerStore immutable snapshot.
Dell EMC PowerStore Family of advanced Storage solutions ensure security and provide customers with solid recoverability options. Maintain highly performing and secure environment so that you are fully prepared to prevent Ransomware attacks or have the ability to recover faster from such cyber security attacks.
Need Professional Assistance?
Take professional assistance from DELL EMC Platinum Partners in Chennai like Uniware Systems when it comes to implementation or consulting. You will be able to size precisely and accordingly enable right services.