Analysing global revenue opportunities for cyber security companies.


Blog Post

What is Ransomware Data Protection?

Kevin Bailey • 7 October 2024

How many vendors do you see and hear proclaiming to deliver ransomware protection, only to unveil that their solution comes with caveats.

Synergy Six believe that organisations need an explicit ransomware data protection solution to protect and recover active data, recovery data, and installed device OS and services during exceptional operations. These solutions should not replace existing security tools that are your primary detection and response to these types of cyber attacks.


Ransomware data protection solutions are not your current data backup and recovery tools, they can only protect a copy of your copied data not data that is active. 

 

Synergy Six Degrees defines ransomware data protection as vendor-developed solutions that prevent the compromising (encryption, deletion, modification, or exfiltration) of active data on devices. These solutions operate in real-time, delivering their value when enterprise security tools fail to detect and mitigate ransomware/malware attacks. Ransomware data protection can be offered as SaaS-based, on-premises, hybrid and can be a combination of software and hardware.


Synergy Six Research - Ransomware Impact Map

The vendors included in the lower left quadrant of this report do not deliver any active primary data protection. The primary role of these solutions is to take periodic copies of data for future recovery. Their only value in a ransomware attack is achieved if they maintain a copy of data on an immutable/air-gapped technology. This choice of media ensures the backup data cannot be compromised and can be used for data recovery when the primary and secondary backup copies have been compromised. The NeuShield solutions (upper right quadrant) have been identified currently as the only solutions purposely developed for ransomware protection, prohibiting direct data modification that may compromise (encrypt, delete, modify and/or exfiltrate) active data, delivering instant recovery.


Want to read the rest of the report then click on this link.

Share our content on your social media sites

Share by: