Why Your VTL Can Matter for a Ransomware Attack 

Leveraging Your VTL to Protect Your Data from Cyber Attacks 

Learn the ways your virtual tape library (VTL) can help with protecting your organization from a ransomware attack

It isn’t uncommon today to read headline news about cyber-attacks affecting some of the most influential brands. The sophistication of attacks has prompted new mechanisms to ensure the safety of an organization’s assets. Simple backups and the ability to restore to a point in time are no longer the only line of defense against the latest ransomware attacks. 

Attacks can happen anywhere. That is the challenge. With multiple points of entry for either a bad actor externally or internally, the relentlessness for infiltration is often insurmountable.  

It is no doubt data must be protected during backup transmission of data and for the data at rest. Some backup and recovery software solutions include a level of data encryption for data in transit and at rest rather than depending solely on the data in transit across the network to be protected through the dedicated and secure network ports. State of the art virtual tape libraries (VTL) ensure that data encryption continues throughout the process to the destination for recovery and long-term archive needs. VTLs providing encryption throughout the entire process can be a crucial step to saving against cyber-attacks. The AES-256 standard provides the most robust encryption for data at rest leveraging 256-bit managed keys as opposed to AES-128 encryption leveraging 128-bit managed keys. Securely managing the data at rest in today’s world is imperative.  

The best protection against ransomware attacks is when virtual tape libraries provide air-gapped and immutable backups by incorporating methods such as Write-Once-Read-Many (WORM) virtual tapes. But as the adoption of the cloud continues to rise, many organizations are backing their data to the cloud. With backups to the cloud, data should be replicated to secure cloud frameworks like IBM Immutable Cloud Object Storage for the highest level of protection. A VTL’s integration with IBM Immutable Cloud Object Storage ensures that even the most sophisticated bad actors and internal personnel will not be able to penetrate access to the data for a ransomware attack. 

It’s no surprise that Falconstor StorSafe VTL has implemented all of this as a leading VTL provider.  If cyber-attacks and ransomware protection are on your list of vulnerabilities, consider the solution that works with your existing backup and recovery infrastructure, FalconStor StorSafe VTL. 

Cathy Won
.
Cathy brings her passion for technology and products to FalconStor with a background of leading teams in product marketing, product management and engineering for both software and hardware companies in storage, networking, finance, and healthcare. As a strategic and innovative thinker, she brings a unique blend of understanding the balance of business demands and technology in products. She has led key marketing initiatives for companies like HPE, NetApp, Dell EMC, Veritas, Juniper Networks and more, as a consultant and employee. She holds an MBA and B.S. in Information Systems.