Science and Tech

Resilience and data security, the key that shapes the world of tomorrow

Resilience and data security, the key that shapes the world of tomorrow

The key is resilience

Gartner describes data recovery as the ability to quickly restore a system after a failure. While many businesses already use backups, modern systems require even more efficient solutions to minimize downtime and interruptions—whether it’s checkpoint loading speeds or multi-site protection.

Adding a half-hearted level of data reliability and resiliency can cause irreversible damage. Given that much of society depends on networks and that no data is completely out of reach, it is increasingly crucial that companies have cybersecurity programs that ensure a rapid response to incidents, something that goes beyond the simple protection of main assets in an isolated area.

An underrated aspect of AI-enabled infrastructure is its cyber resilience. Modern solutions must offer features such as: high availability and reliability, as well as intrinsic security (protection against cyber threats); which uncover hidden threats and influence better decision making. In today’s era, when data can be hacked, leaked and manipulated, data storage operates as the last line of defense, an essential measure to prevent and respond to threats.

Prevention, detection and analysis

Network and storage collaboration technologies, based on Huawei’s multi-layered ransomware protection (MRP) solution, analyze historical and current data to deliver a 99.9% detection rate of known ransomware variants. This solution detects changes in input, output, and file entropy to provide protection before, during, and after the event.

Huawei’s MRP solution offers full-process encryption through storage, transmission and replication to prevent interception or breaches caused by ransomware. These features provide continuous data protection through secure read-only snapshots that restore data at specific times and cannot be deleted, and an air gap that keeps these copies secure in an isolated, offline environment unless to be transmitted, minimizing attack surfaces.

Additionally, primary and backup storage uses write once, read many (WORM) functionality, which prevents data from being modified once it has been written. Combined, these measures reduce the possibility of your data being encrypted and ensure that most threats are identified and isolated before they impact services.



Source link