Security advisor against ransomware

Security advisor against ransomware

Share post

An improved security status reduces cyber risks, also with ransomware. Cohesity launches Security Advisor that scans the customer's Cohesity environment, including numerous security configurations.

Cohesity, a leading provider of data management solutions, has launched Security Advisor. This extension of the threat defense architecture offers companies an easy way to improve their security posture in the face of sophisticated cyberattacks. You can use it to reduce human errors and increase the resilience of your surroundings, which are managed via the Cohesity Helios data platform.

Security Advisor scans security configurations

Security Advisor scans the customer's cohesity environment, including numerous security configurations. The solution takes into account many factors such as access control, audit logs and encryption, which are crucial for protecting the data cluster. Customers are given a rating of how they compare against Cohesity's best practice recommendations. In addition, you will learn how to approach potential risks and how to protect your platform and data from malicious actors - both internal and external.

"Organizations use many tools to create and manage data," said Brian Spanswick, Cohesity's chief information security officer. “The different security functions make it difficult to check all settings and to control access to all technologies. This lack of transparency and control makes IT environments vulnerable to cyberattacks. "

Security Advisor: Global visibility and deeper insights

If Security Advisor detects a problem, the following quick actions can be taken:

  • Detailed information and recommendations for resolving configuration problems help to improve the security situation.
  • The Helios dashboard offers a central overview of all security settings of the Cohesity cluster in all locations and regions.
  • An understandable scorecard facilitates internal security assessments.

Security Advisor complements the CyberScan solution. It enables customers to uncover cyber risks and blind spots in their production environment by automatically examining backup snapshots for known vulnerabilities. Both solutions are now ready to fend off rising cyber threats, security breaches and ransomware attacks. Ransomware attacks alone increased by 2021 percent in the first half of 93. Companies need a quick, easy and comprehensive way to assess their security situation and quickly resolve problems.

2022: Ransomware has the highest priority

"Our latest research shows that ransomware will be the top priority in IT spending in 2022 and that preparing for ransomware is now a key issue at management level and in the boardroom," said Christophe Bertrand, Practice Director, Data Protection at Enterprise Strategy Group. "Security Advisor gives Cohesity customers a better understanding of how to optimize their privacy capabilities to limit their risk and reduce their exposure to potential threats."

More at Cohesity.com

 


About Cohesity

Cohesity greatly simplifies data management. The solution makes it easier to secure, manage and create value from data - across the data center, edge and cloud. We offer a full suite of services consolidated on a multi-cloud data platform: data backup and recovery, disaster recovery, file and object services, development / testing, and data compliance, security and analytics. This reduces the complexity and avoids the fragmentation of the mass data. Cohesity can be provided as a service, as a self-managed solution, and through Cohesity partners.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more