Ransomware can stay dormant in your file shares for weeks or months. NetApp and Lenovo customers are finding dormant malware in their environment, waiting to strike. We can provide a zero-cost threat assessment to see if you are at risk. We will help you isolate and remove any lingering threats before downtime occurs.
Did you know?
In the past 12 months alone, more than one-third of all organisations globally have faced some variety of ransomware incidents, according to a survey by analyst firm IDC. (In Australia, Ransomware breaches rose by 24% from January to June 2021).
More and more companies are finding dormant ransomware hiding in their storage infrastructure. Ransomware on average stays dormant for 40 days before activating and can reappear after an attack if the virus is hiding in your storage arrays or snapshots.
The average Ransomware attack causes 3 weeks of downtime and massive restore cycles for storage managers. Many attacks are now disabling backup before activating.
Zero-Cost Threat Assessment
For a limited time, Diversus Group are offering a zero-cost threat assessment for NetApp and Lenovo customers to determine the presence of Ransomware in your storage environment. Don’t delay – book an appointment with an expert today.
Protect Your Most Valuable Business Asset – Data
We don’t sleep, so you can.
Our ongoing proactive SaaS based Ransomware monitoring & detection service for NetApp ONTAP data storage environments provides early detection and blocks attacks attempting to access your data, and helps you isolate affected users in real time to avoid widespread damage.
The service is not a replacement for your existing cyber security practices such as endpoint or perimeter protection but is a data focused protection service. For an additional level of security – in particular insider threats, we monitor and log all user file access (reads, writes, opens, etc).
If your organisation is hit by some form of malware, we block just the affected user(s), identify & restore only the infected files. There is no need to rollback and restore an entire volume or folder overwriting clean files and potentially losing days or weeks of data. The service should be viewed as an additional data centric layer of defence by organsiations adopting a ‘defence in depth’ strategy.