Better detect ransomware and recover data

B2B Cyber ​​Security ShortNews

Share post

Joint solution provides customers with detailed alerts to stay ahead of threats: better detect ransomware and recover data through integration of Cohesity Helios and Palo Alto Networks Cortex XSOAR.

Cohesity, a leading provider of data management solutions, is working with Palo Alto Networks to link its next-gen data management platform, Cohesity Helios, with Palo Alto Networks' Cortex™ XSOAR security orchestration, automation and response (SOAR) platform. The integration aims to improve ransomware detection and data recovery after a cyberattack.

Detect ransomware attacks

The key to defending against cyber attacks such as ransomware is how quickly IT teams can identify attacks and initiate countermeasures. The new integration raises an alarm as soon as the AI-based Helios platform detects anomalies in the backup data that indicate an attack. Cortex XSOAR then automatically initiates a series of actions from a playbook to contain the potential cyberattack and damage.

"Any delay in ransomware response and recovery can lead to increased downtime and increased data loss," said Brian Spanswick, CISO at Cohesity. “This integration can help link data management and data security processes more effectively. It's the key to staying ahead of persistent ransomware attacks and building an organization's cyber resiliency.”

Smart alerts improve decision-making and reduce stress

If security analysts are informed about potential threats in a timely and detailed manner, they can quickly determine how best to respond to the incident. That takes the pressure off these teams. According to a study by Forrester Consulting "The 2020 State of Security Operations", security analysts all too often have to extinguish a fire with a garden hose.

Only 47 percent of respondents said they were able to resolve most or all security alerts they receive within a single day. The other 53 percent admitted they struggle in several ways:

  • 20 percent of the alerts are manually reviewed by an analyst.
  • Almost a third of all alerts are false positives.
  • 28 percent of alerts are never acted upon by analysts because they simply have too many alerts to investigate.

Cohesity Helios and Palo Alto Networks' Cortex XSOAR

Cohesity offers comprehensive anti-ransomware capabilities to protect backup data from cybercriminals. Cohesity's architecture ensures that backup data is immutable and cannot be accidentally or maliciously overwritten. The software, powered by AI-powered insights, continuously monitors any anomalies in a company's data. At worst, Cohesity helps find and restore a clean copy of data to reduce downtime and loss, and ensure business continuity.

More at Sophos.com

 


About Cohesity

Cohesity greatly simplifies data management. The solution makes it easier to secure, manage and create value from data - across the data center, edge and cloud. We offer a full suite of services consolidated on a multi-cloud data platform: data backup and recovery, disaster recovery, file and object services, development / testing, and data compliance, security and analytics. This reduces the complexity and avoids the fragmentation of the mass data. Cohesity can be provided as a service, as a self-managed solution, and through Cohesity partners.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more