70% 72% - Unisys · 2019. 12. 3. · Infected backup data can reinfect your operation. Bad actors...

1
Cloak Your Recovery Data From Cyber Predators An estimated 33 billion records will be compromised by attacks from cyber criminals in 2023. 1 The Threat of Cyberattacks Internet of things (IoT) is creating new opportunities for cybercriminals. Ransomware is rarely discovered until activated. Infected backup data can reinfect your operation. Bad actors inside the firewall can wreak havoc to backup systems. The Cost of Vulnerability $2.2M to $6.9M: The potential cost of a data breach. 1 Estimated $6T in annual damages by 2021. 2 of organizations report at least one security incident that negatively impacted operations. 3 of enterprises are still immature in capabilities involving incident response and recovery. 5 92% of organizations can’t detect cyberattacks quickly. 7 67% of organizations had incidents with a negative impact in the past 12 months. 4 Cyberattacks by the Numbers 70% 72% of detected malware is ransomware. 6 39% What Cyberpredators Look For Backup and recovery systems not sheltered from cyberattacks. Data recovery systems exposed to the network. Franchise-critical and non-critical data are not segregated. Backup catalogs not protected from penetration. 1 2 3 4 It’s not just revenue at stake. Failure to fully secure data can lead to: • Loss of compliance or standard certifications • Loss of reputation and customer trust 1. Norton, “10 cyber security facts and statistics for 2018,” 2019. 2. Ponemon Institute, “2017 Cost of Data Breach: Global Overview,” June 2017. 3. Cybersecurity Ventures, “Cybercrime Damages $6 Trillion by 2021,” December 2018. 4. RSA, “RSA Cybersecurity Poverty Index,” June 2016. 5. SecureWorks, “2017 Ransomware Defense Survey: The Enterprise Strikes Back,” May 2016. 6. Verizon, “2018 Data Breach Investigations Report,” April 2018. 7. Gartner Research, “Shift Cybersecurity Investment to Detection and Response,” January 2016 © 2019 Unisys Corporation. All rights reserved. Unisys and other Unisys product and service names mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation. All other trademarks referenced herein are the property of their respective owners. 11/19 19-0628 Protect Your Critical Data with Unisys Stealth with Dell EMC Cyber Recovery Dell EMC Cyber Recovery with Unisys Stealth combines the best in data recovery and network security analytics with an extra layer of defense-grade protection. Unisys Stealth creates a Zero Trust network around backup data that delivers maximum protection against cyberattacks. Data is automatically synchronized between production systems and the undetectable Cyber Recovery vault, creating immutable data copies, free from ramsomware, and securely encased in a cryptographic wrapper that is inaccessible to unauthorized users and devices. Learn More About Unisys Stealth Dell EMC PowerProtect Cyber Recovery Dell EMC Cyber Recovery • Automates replication to an isolated, secure Cyber Recovery vault. • Assures Cyber Recovery data is uncorrupted. • Maintains gold copies of critical backup data. Unisys Stealth • Uses microsegmentation technology to isolate the Cyber Recovery vault. • Data is inaccessible to unauthorized users via cryptographic cloaking. • Authorized access only via Zero Trust segmentation. Build an Active Defense Against Ransomware What’s Your Plan If Your Backups Get Corrupted With Ransomware? Stealth aircraft use a variety of technologies that render it undetectable to enemies. Unisys Stealth® with Dell EMC PowerProtect Cyber Recovery makes your entire cyber recovery operation undetectable to ransomware and attackers.

Transcript of 70% 72% - Unisys · 2019. 12. 3. · Infected backup data can reinfect your operation. Bad actors...

Page 1: 70% 72% - Unisys · 2019. 12. 3. · Infected backup data can reinfect your operation. Bad actors inside the firewall can wreak havoc to backup systems. The Cost of Vulnerability

Cloak Your Recovery Data From Cyber Predators

An estimated

33 billion records will be compromised by attacks from cyber criminals in 2023.1

The Threat of Cyberattacks

Internet of things (IoT) is creating new opportunities for cybercriminals.

Ransomware is rarely discovered until activated.

Infected backup data can reinfect your operation.

Bad actors inside the firewall can wreak havoc to backup systems.

The Cost of Vulnerability

$2.2M to $6.9M:The potential cost of a data breach.1

Estimated $6T in annual damages by 2021.2

of organizations report at least one security

incident that negatively impacted operations.3

of enterprises are still immature in capabilities

involving incident response and recovery.5

92%of organizations can’t detect

cyberattacks quickly.7

67%of organizations had incidents

with a negative impact in the past 12 months.4

Cyberattacks by the Numbers

70% 72%of detected malware

is ransomware.6

39%

What Cyberpredators Look For

Backup and recovery systems not sheltered from cyberattacks.

Data recovery systems exposed to the network.

Franchise-critical and non-critical data are not segregated.

Backup catalogs not protected from penetration.

1

2

3

4

It’s not just revenue at stake.Failure to fully secure data can lead to:

• Loss of compliance or standard certifications

• Loss of reputation and customer trust

1. Norton, “10 cyber security facts and statistics for 2018,” 2019.

2. Ponemon Institute, “2017 Cost of Data Breach: Global Overview,” June 2017.

3. Cybersecurity Ventures, “Cybercrime Damages $6 Trillion by 2021,” December 2018.

4. RSA, “RSA Cybersecurity Poverty Index,” June 2016.

5. SecureWorks, “2017 Ransomware Defense Survey: The Enterprise Strikes Back,” May 2016.

6. Verizon, “2018 Data Breach Investigations Report,” April 2018.

7. Gartner Research, “Shift Cybersecurity Investment to Detection and Response,” January 2016

© 2019 Unisys Corporation. All rights reserved.

Unisys and other Unisys product and service names mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation. All other trademarks referenced herein are the property of their respective owners.

11/19 19-0628

Protect Your Critical Data with Unisys Stealth with Dell EMC Cyber RecoveryDell EMC Cyber Recovery with Unisys Stealth combines the best in data recovery and network security analytics with an extra layer of defense-grade protection. Unisys Stealth creates a Zero Trust network around backup data that delivers maximum protection against cyberattacks. Data is automatically synchronized between production systems and the undetectable Cyber Recovery vault, creating immutable data copies, free from ramsomware, and securely encased in a cryptographic wrapper that is inaccessible to unauthorized users and devices.

Learn More About

Unisys Stealth

Dell EMC PowerProtect Cyber Recovery

Dell EMC Cyber Recovery • Automates replication to an isolated,

secure Cyber Recovery vault.

• Assures Cyber Recovery data is uncorrupted.

• Maintains gold copies of critical backup data.

Unisys Stealth • Uses microsegmentation technology

to isolate the Cyber Recovery vault.

• Data is inaccessible to unauthorized users via cryptographic cloaking.

• Authorized access only via Zero Trust segmentation.

Build an Active Defense Against Ransomware

What’s Your Plan If Your Backups Get Corrupted With Ransomware?

Stealth aircraft use a variety of technologies that render it undetectable to enemies.

Unisys Stealth® with Dell EMC PowerProtect Cyber Recovery makes your entire cyber

recovery operation undetectable to ransomware and attackers.