T-Systems-Claim-Logo
Search
Circuit board with glowing lines.

Robust cyber resilience: Modern data backup

A next-generation cyber recovery solution, designed by Dell, managed by T-Systems

Adding a new line behind the “last line of defense”

Traditionally, data backups are the “last line of defense.” But what happens when your backup is compromised by a cyberattack and your final line of defense is crossed? Contemporary threats demand new cyber resilience strategies, including more effective disaster recovery and business continuity planning. Dell’s Cyber Recovery Vault data protection solution rapidly isolates business-critical data from attack surfaces and flags anomalies.

A new threat landscape needs a unique data backup solution

Programming code abstract technology background of software developer and Computer script

As cybercrime and cyber warfare outpace cybersecurity defenses, every organization must be prepared for the inevitability of a successful cyberattack. Dell’s Cyber Recovery Vault transforms how data is managed and protected and is vital for ensuring the recoverability and integrity of critical assets. Now, the threat landscape need not be an inhibitor to digital transformation. The Cyber Recovery Vault offers two distinct advantages:

  • An automated operational air gap that ensures data syncs for backup over the briefest possible time
  • Data is analyzed in the vault and anomalies flagged

Robust cyber resilience

Find out how off-site disconnected backups, air-gapped data backup architecture and state-of-the-art encryption can protect your data backups.

Modernize your data backups

Would you like to learn more about a unique data backup protection solution that not only isolates your critical data faster but analyzes it? Would you like to gain a competitive advantage with a more robust cyber resilience strategy? Get in touch!

How does the Cyber Recovery Vault work?

Logo Dell Technologies

The Dell Cyber Recovery Vault operates in four steps:

  1. Data from critical applications syncs through an air gap, which is unlocked by the management server into the vault and replicated. The air gap is immediately re-locked.
  2. A copy of the data is made. Vault retention times are configurable.
  3. The data is retention locked to further protect it from accidental or intentional deletion.
  4. Applying machine learning, the data is analyzed for any usual patterns or activity and automatically flagged.

Monitoring and reporting are also provided from the vault and can be shared in various secure methods.

What organizations should deploy the Cyber Recovery Vault?

Dell’s Cyber Recovery Vault is ideal for all sizes of organizations and industry types. It is suitable for any scenario as it receives backups from any source, from on-premises to data centers to multiple clouds. T-Systems manages the solution on behalf of our client organizations, founded on a solid twenty-year partnership with Dell. The Cyber Recovery Vault is available as a standalone service or included in T-Systems’ broader managed services portfolio.

Do you visit t-systems.com outside of United Kingdom? Visit the local website for more information and offers for your country.