www.techtarget.com Open in urlscan Pro
2606:4700::6812:5c  Public Scan

Submitted URL: https://go.techtarget.com/r/215080100/44157026
Effective URL: https://www.techtarget.com/searchdatabackup/tip/What-is-data-vaulting-and-how-does-it-shape-modern-backups?utm_campaign=202...
Submission: On April 07 via api from SE — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.techtarget.com/search/query

<form action="https://www.techtarget.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

Text Content

3
Trending Now

Building Resilience With The CloudDownload NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   Building Resilience With The CloudDownload Now
 * 
   Transform your network management with a multi-cloud WAN backboneDownload Now
 * 
   Choosing the right WAFDownload Now




SearchDataBackup
Search the TechTarget Network
Sign-up now. Start my free, unlimited access.
Login Register
 * Techtarget Network
 * News
 * Features
 * Tips
 * Webinars
 * More Content
    * Answers
    * Definitions
    * Essential Guides
    * Opinions
    * Photo Stories
    * Podcasts
    * Quizzes
    * Tutorials
    * Sponsored Communities

 * Storage Soup Blog

 * SearchDataBackup
 * Topic Security
    * Archiving and tape backup
    * Cloud backup
    * Data backup and recovery software
    * Data reduction
    * Disk backup
    * Remote backup
    * All Topics

 * Follow:
 * 
 * 
 * 


Tip
Article 1 of 5
Part of: Implement data vaulting for more secure backups


WHAT IS DATA VAULTING AND HOW DOES IT SHAPE MODERN BACKUPS?




DATA VAULTING METHODS, SUCH AS AIR GAPPING AND ACTIVE ARCHIVES, HELP ISOLATE AND
PROTECT DATA BACKUPS FROM MALICIOUS DELETION OR ACCIDENTAL DATA LOSS.

Share this item with your network:

 * 
 * 
 * 


By
 * Krista Macomber, Evaluator Group

Published: 31 Mar 2022

Data vaulting is a form of data isolation that creates a copy of data that is
disconnected from the production and core backup environments. Simply put, it is
the creation of a backup copy that is inaccessible from what has historically
been the core attack surface of enterprise IT environments. In a time when
ransomware attacks continue to grow more sophisticated, data vaulting is
essential.



For many customers, data vaulting is necessary to adhere to the 3-2-1 backup
rule. A loose definition of this rule states that, to protect data,
organizations must have multiple copies of backups stored in multiple places.

There are multiple approaches to data vaulting, and implementation will look
different for every organization. Regardless of how an organization incorporates
data vaulting, it is a key component to protecting backups today.


DATA VAULTING METHODS

From a technical standpoint, there are two core approaches that customers can
take to create a data vault. The first is to create an air-gapped copy that has
network isolation from the production and the core backup environments. This
should mitigate -- and, ideally, eliminate -- external connections and
management interfaces that could be compromised by outside attackers.

The 3-2-1 backup rule is a helpful template for a multidimensional backup
strategy.


Air gaps may be physical, where the data copy is located on a physically
disconnected storage system that exists within the customer's data center or is
hosted off-site or by a third party. Air gaps also may be logical, with the
air-gapped data copy located on public cloud storage that is managed either by
the customer via data protection software or by a service provider.

The second main approach is to create an active archive that stores data in a
read-only format and enables controlled access by applications and users.

An active archive is one method to implement data vaulting.


According to IT analyst firm Evaluator Group, there are a few table-stakes
capabilities that organizations must include in data vault implementation. These
include the ability to apply immutability and write once, read many designations
alongside automated control over data copy and movement procedures.

To avoid malicious penetration of the environment, the data vault should have
access control capabilities, including security credentialing, such as
multifactor authentication. Monitoring and reporting are critical to ensure the
health and availability of backups, as well as uncovering potential breaches.
Organizations may use machine learning and analytics to detect signs of
penetration or corruption and conduct security checks to validate data
integrity. Automated recovery from the vault helps to securely restore
operations as quickly as possible.


WHY DATA VAULTING?

These days, the major draw to implement a data vault is for resiliency against
ransomware. Increasingly often, ransomware attackers are targeting primary
backup environments. They understand that the customer is more likely to pay the
ransom if it does not have backups to recover from. Often these attacks are
sleepers, designed to lay dormant for a period of time to avoid detection and
exceed the ability to restore data to a near-term recovery point.

Another challenge is that attackers are going a step further with data
extortion, threatening to expose and sell data if the ransom is not paid. For
these reasons, it is critical to take all measures possible to inhibit attackers
from accessing backup copies in the first place. A data vault becomes an
important safeguard from this standpoint because, unlike the primary backup
environment, it is not inherently designed for accessibility in order to
facilitate recovery.



DIG DEEPER ON DATA BACKUP SECURITY

 * IBM UPGRADES FLASHSYSTEM TO TACKLE RANSOMWARE
   
   
   By: Adam Armstrong

 * PROTECT YOUR DATA CENTER FROM RANSOMWARE ATTACKS
   
   
   By: Alan Earls

 * RUBRIK'S RANSOMWARE TOOLS PUT DETECTION IN LINE WITH PROTECTION
   
   
   By: Adam Armstrong

 * DELL EXTENDS CYBER RECOVERY RANSOMWARE PROTECTION TO AWS
   
   
   By: Johnny Yu

Part of: Implement data vaulting for more secure backups

Article 1 of 5
Up Next
What is data vaulting and how does it shape modern backups?

Data vaulting methods, such as air gapping and active archives, help isolate and
protect data backups from malicious deletion or accidental data loss.

Air gap backups provide another layer of protection

Air gap backups can provide extra protection from data deletion or intruders,
but admins should exercise caution to ensure the data is encrypted and the
network is secure.

How to use air gaps for ransomware defense

Air gaps can be a valuable last line of defense against ransomware. However,
both logical and physical air gaps have vulnerabilities that can be exploited by
bad actors.

Immutable backups for ransomware defense may not be enough

Immutable backups ensure data cannot be overwritten or changed, making them a
great way to protect against ransomware, but they're not a perfect option.
Here's why.

Use immutable backups to prevent data loss, boost compliance

Immutable backups have gained traction with the rise in ransomware attacks.
However, there are different approaches to immutability and external factors
that come in to play.



Sponsored News
 * Modernizing Cyber Resilience Using a Services-Based Model –Dell Technologies
 * Cybersecurity Essentials for Critical Infrastructure –Dell Technologies
 * Building Confidence in Cyber Resilience –Dell Technologies
 * See More

Related Content
 * Dell EMC Cyber Recovery isolates and protects data – SearchDisasterRecovery
 * Rubrik's ransomware tools put detection in line with ... – SearchDataBackup
 * Dell extends Cyber Recovery ransomware protection to ... – SearchDataBackup



Latest TechTarget resources
 * Disaster Recovery
 * Storage
 * Converged Infrastructure
 * IT Channel

SearchDisasterRecovery
 * StorageCraft DRaaS outage highlights layered protection need
   
   As a result of the StorageCraft outage, some of the vendor's DRaaS users lost
   the ability to fail over. Having a local backup is ...

 * How AI adds value to crisis communications systems
   
   AI provides key enhancements to existing emergency notifications systems that
   can reduce the amount of time a business needs to ...

 * How to calculate maximum allowable downtime
   
   Determining maximum allowable downtime is more than a simple equation. Find
   out why it's important, how it varies and the ...

SearchStorage
 * MemVerge, Liqid create composable memory pools before CXL
   
   MemVerge and Liqid combined software with Intel Optane to make composable
   memory pools that can do today what the CXL standard ...

 * Kioxia releases PCIe Gen 5 SSD for data centers
   
   Kioxia's CD8, its second-generation PCIe Gen 5 SSDs, provides increased
   performance and a 2.5 inch form factor that make it much ...

 * A primer on the NVMe management ecosystem
   
   The NVMe management ecosystem has a lot of moving parts and confusing
   acronyms. This overview details the various specifications ...

SearchConvergedInfrastructure
 * FlexPod XCS brings cloud capabilities to data centers
   
   FlexPod XCS, the latest NetApp and Cisco converged infrastructure appliance,
   expands support for hybrid cloud environments with ...

 * Nutanix revenue increases, driven by hybrid cloud adoption
   
   Benefiting from the growing user adoption of hybrid clouds and a significant
   increase in digital transformation projects, Nutanix...

 * The top hyper-converged systems and composable infrastructure of 2021
   
   These Products of the Year winners offer the flexibility and scalability that
   make hyper-converged systems an excellent choice ...

SearchITChannel
 * SD-WAN project covers security, latency and cloud
   
   PM Pediatrics, an urgent care provider, hired service provider Vandis to
   improve branch security, but the project transformed ...

 * Digital transformation in oil and gas sector set for growth
   
   Kyndryl's large-scale, multi-cloud technology deal with refinery operator
   Motiva Enterprises underscores a broader industry trend...

 * Dig into the MSP M&A process from the acquirer's perspective
   
   MSP mergers and acquisitions may frequent the news, but how is the value of
   an MSP determined, how are deals structured and what ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Advertisers
 * Business Partners
 * Media Kit
 * Corporate Site

 * Contributors
 * Reprints
 * Answers
 * Definitions
 * E-Products
 * Events
 * Features

 * Guides
 * Opinions
 * Photo Stories
 * Quizzes
 * Tips
 * Tutorials
 * Videos

All Rights Reserved, Copyright 2008 - 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info


Close