The Federal Criminal Police Office documented 108,000 cases last year - and the trend is rising. The latest hacker attack by the Eastern European hacker group "Darkside" on the Colonial pipeline impressively shows that it is no longer sufficient to rely on your firewall and the use of a virus scanner. The decisive factor is whether or not I as a company am able to recover involuntarily encrypted data on my own.
Secure aata with IBM Spectrum Protect
Get in touch with usOften a holistic concept is missing that also takes effect when the worst case scenario has already occurred. Then the exciting questions are:
- How long will it take until I can work again?
- Can I do it at all under my own steam?
This is where the concept with IBM Spectum Protect comes in.
textandvideo.cookieNotEnabled.text
textandvideo.cookieNotEnabled.button.textWhat is IBM Spectrum Protect?
Spectrum Protect is the leading data protection solution from the American industry leader IBM.
A central intelligence (server) monitors and controls a multitude of end devices and servers (clients) to be secured. After a one-time data backup, this intelligence knows which data is where and can detect changes. For example, it notices that a certain file has become larger or smaller, has been saved again or a new document has been added. This makes it possible to save only the changes. This in turn keeps the amount of data to be transferred small, leads to very fast backup results and enables efficient scaling even in very large IT environments.
The backup of the data is therefore incremental. All meta-information (information we have about our data) is managed by the central intelligence in its own database in such a way that, if necessary, the restoration (so-called restore) of the data always takes place in a single run. This also ensures a time-saving and efficient restoration. The transfer as well as the backup of the data is done in coded form. In addition, Spectrum Protect also supports conceptual security mechanisms that can prevent involuntary encryption of the backup by ransomware.
Key features of IBM Spectum Protect
With our concept based on IBM Spectrum Protect, you receive numerous advantages when securing your data.
Proven concept
Powerful
Flexible
We are your partner:
As TIMETOACT, we take a holistic view of cyber security and focus on building resilient IT and OT. Beyond the mere use of intrusion prevention and intrusion detection systems, we address the fundamental questions with you:
- Who is allowed to access which data and information, when and from where?
- Who has accessed which data, when and from where?
- How should I adapt my organisation, processes, architecture and software to ensure this?
- How do I react effectively in the event of an incident?
- Which concepts, processes and technology fit my company?
Check
Status Quo
Implementation
Accompaniment
Procedure for implementation:
We support you with everything from operations to managed services.
Review of processes and concepts
Resilient data protection starts with a coherent concept. Backup is not an end in itself, but only makes sense if backed-up data can be accessed again in the required time. Together with you, we examine the existing processes and take stock of the current situation in order to provide food for thought in a later phase, point out measures and work out implementation options.
Health check of the current landscape
Once the concept and processes have been analysed, this phase moves on to the "software level". The backup runs without problems, but when was the last time a successful restore test was carried out? Am I getting the most out of my installation? Does my software still support all legacy systems or are there gaps? Are my data and applications integrated in the cloud?
Identifying weaknesses and gaps
If weak points have been found, we point them out to you and evaluate the risks in a traffic light chart.
Advice and support during implementation
From a good doctor we not only expect a diagnosis, but also promise a cure. Based on the results, we do not only give you recommendations for action, but also help you with the implementation. In doing so, we deal with conceptual, organisational and technical possibilities, but also support you in licensing aspects and cost optimisation.