IBM wants to ensure a cyberattack never knocks your business down for long
Helps safeguard data from all sorts of corruption
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Computing giantIBMhas announced a new filesystem-level solution to help businesses safeguard their data, particularly from cyberattacks such asransomware.
The solution, dubbed Safeguarded Copy, can automatically take immutable snapshots of the filesystem, which it then preserves in an isolated area within the system, protecting them against any corruption.
When the system is attacked or runs into any other situation that causes data loss, Safeguarded Copy can help recover data from the snapshots based on known points-in-time prior to the breach.
“Protecting against ransomware and other forms of malware requires a two-pronged approach to resiliency that involves automated protection and rapid recovery,” said Denis Kennelly, General Manager, IBM Storage.
Flexible backups
IBM believes what sets its Safeguarded Copy solution apart from other comparable snapshot products is its dexterity and control.
Users can define a Safeguarded Copy schedule to create multiplebackupson a regular basis, such as hourly or daily. When it comes to restoration, the solution enables users to extract and restore specific data from the backup snapshots, and even restore a backup to a different volume.
Best of all, with Safeguarded Copy, users can configure and schedule the backups themselves instead of relying on an off-site storage provider.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Developed as part of IBM DS8000 series of storage systems, SafeGuarded Copy has now been extended to the IBM FlashSystem family of all-flash storage arrays that use standard solid-state drives (SSD).
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.
This new malware utilizes a rare programming language to evade traditional detection methods
A new form of macOS malware is being used by devious North Korean hackers
I’ve been covering Apple Watch deals for years – This is the one model most people should buy on Black Friday