Cyber ​​resilience through AI-assisted recovery

Cyber ​​resilience through AI-assisted recovery
Advertising

Share post

A provider of secure multi-cloud data management solutions presents new AI-powered tools. The innovative AI-powered automations and user interface improvements support data protection specialists and IT all-rounders in cyber recovery.

"Data security is becoming increasingly complex and IT teams are under increasing pressure to ensure data is always available despite having limited resources. That's why we're focused on making recovery simpler, smarter and faster. With advanced AI support and intuitive management, we're removing the uncertainty and trial and error from the recovery process. Organizations can now recover quickly and safely from ransomware attacks and minimize business disruption," said Deepak Mohan, Executive Vice President of Engineering at Veritas.

Advertising

Faster threat detection and automated recovery

The new user interface and AI-driven features make cyber recovery easier and faster with the following improvements:

  • navigation and simplified operation – The Veritas Alta View management platform offers an improved, intuitive user interface that simplifies navigation and operation for IT specialists and generalists alike. The dashboard integrates AI-powered insights and a cyber risk assessment for real-time analysis. Improved visualization tools enable users to monitor their entire data landscape, proactively manage risks and accelerate cyber recovery.
  • Automating asset audits and policy creation – Veritas Alta Copilot automatically scans unprotected assets, recommends and applies tailored protection measures, and instantly integrates with existing protection policies to ensure all critical data is covered.
  • Accelerating threat detection and response – Improved security and accelerated threat detection and response to ransomware now through hash-based malware tracking in backup data and blast radius analysis. New features reduce the time to detect and assess spread by up to 93 percent.
  • Mitigate risks and cyber threats with automated recovery plans – Proactive disaster management and cyber recovery are enabled through a new interactive guide that makes it easier for IT teams to create, automate, test and edit workflow plans. Plans can be customized granularly to cover complex, hybrid platform-as-a-service and container environments and ensure effective risk mitigation.
  • Automating recovery point recommendations – Optimized recovery is enabled by proactive, detailed analysis that provides recommended recovery points. This reduces recovery time and potential data loss by eliminating the need to manually identify the “last good copy.” Instead, risk engine analysis is used to minimize expensive malware scans.

The new Veritas Copilot features announced today will be available in October 2024. All other features will be delivered through updates to Veritas NetBackup, Veritas Alta Data Protection and Veritas Alta View available in September 2024.

Advertising
More at Veritas.com

 


About Veritas

Veritas Technologies is a leading provider of secure multi-cloud data management. More than 80.000 customers – including 91 percent of Fortune 100 companies – rely on Veritas to protect, restore and ensure compliance with their data.


Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more

OT environments: Detect and assess threats

Enterprises with limited resources can identify, assess, and make informed decisions about threats in OT environments with a comprehensive endpoint protection solution. ➡ Read more