www.techtarget.com
Open in
urlscan Pro
2606:4700::6812:5c
Public Scan
Submitted URL: https://go.techtarget.com/r/215080100/44157026
Effective URL: https://www.techtarget.com/searchdatabackup/tip/What-is-data-vaulting-and-how-does-it-shape-modern-backups?utm_campaign=202...
Submission: On April 07 via api from SE — Scanned from DE
Effective URL: https://www.techtarget.com/searchdatabackup/tip/What-is-data-vaulting-and-how-does-it-shape-modern-backups?utm_campaign=202...
Submission: On April 07 via api from SE — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.techtarget.com/search/query
<form action="https://www.techtarget.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>
Text Content
3 Trending Now Building Resilience With The CloudDownload NowView All3 X 3Hello, these 3 documents have been trending and as a member they are free to you. * Building Resilience With The CloudDownload Now * Transform your network management with a multi-cloud WAN backboneDownload Now * Choosing the right WAFDownload Now SearchDataBackup Search the TechTarget Network Sign-up now. Start my free, unlimited access. Login Register * Techtarget Network * News * Features * Tips * Webinars * More Content * Answers * Definitions * Essential Guides * Opinions * Photo Stories * Podcasts * Quizzes * Tutorials * Sponsored Communities * Storage Soup Blog * SearchDataBackup * Topic Security * Archiving and tape backup * Cloud backup * Data backup and recovery software * Data reduction * Disk backup * Remote backup * All Topics * Follow: * * * Tip Article 1 of 5 Part of: Implement data vaulting for more secure backups WHAT IS DATA VAULTING AND HOW DOES IT SHAPE MODERN BACKUPS? DATA VAULTING METHODS, SUCH AS AIR GAPPING AND ACTIVE ARCHIVES, HELP ISOLATE AND PROTECT DATA BACKUPS FROM MALICIOUS DELETION OR ACCIDENTAL DATA LOSS. Share this item with your network: * * * By * Krista Macomber, Evaluator Group Published: 31 Mar 2022 Data vaulting is a form of data isolation that creates a copy of data that is disconnected from the production and core backup environments. Simply put, it is the creation of a backup copy that is inaccessible from what has historically been the core attack surface of enterprise IT environments. In a time when ransomware attacks continue to grow more sophisticated, data vaulting is essential. For many customers, data vaulting is necessary to adhere to the 3-2-1 backup rule. A loose definition of this rule states that, to protect data, organizations must have multiple copies of backups stored in multiple places. There are multiple approaches to data vaulting, and implementation will look different for every organization. Regardless of how an organization incorporates data vaulting, it is a key component to protecting backups today. DATA VAULTING METHODS From a technical standpoint, there are two core approaches that customers can take to create a data vault. The first is to create an air-gapped copy that has network isolation from the production and the core backup environments. This should mitigate -- and, ideally, eliminate -- external connections and management interfaces that could be compromised by outside attackers. The 3-2-1 backup rule is a helpful template for a multidimensional backup strategy. Air gaps may be physical, where the data copy is located on a physically disconnected storage system that exists within the customer's data center or is hosted off-site or by a third party. Air gaps also may be logical, with the air-gapped data copy located on public cloud storage that is managed either by the customer via data protection software or by a service provider. The second main approach is to create an active archive that stores data in a read-only format and enables controlled access by applications and users. An active archive is one method to implement data vaulting. According to IT analyst firm Evaluator Group, there are a few table-stakes capabilities that organizations must include in data vault implementation. These include the ability to apply immutability and write once, read many designations alongside automated control over data copy and movement procedures. To avoid malicious penetration of the environment, the data vault should have access control capabilities, including security credentialing, such as multifactor authentication. Monitoring and reporting are critical to ensure the health and availability of backups, as well as uncovering potential breaches. Organizations may use machine learning and analytics to detect signs of penetration or corruption and conduct security checks to validate data integrity. Automated recovery from the vault helps to securely restore operations as quickly as possible. WHY DATA VAULTING? These days, the major draw to implement a data vault is for resiliency against ransomware. Increasingly often, ransomware attackers are targeting primary backup environments. They understand that the customer is more likely to pay the ransom if it does not have backups to recover from. Often these attacks are sleepers, designed to lay dormant for a period of time to avoid detection and exceed the ability to restore data to a near-term recovery point. Another challenge is that attackers are going a step further with data extortion, threatening to expose and sell data if the ransom is not paid. For these reasons, it is critical to take all measures possible to inhibit attackers from accessing backup copies in the first place. A data vault becomes an important safeguard from this standpoint because, unlike the primary backup environment, it is not inherently designed for accessibility in order to facilitate recovery. DIG DEEPER ON DATA BACKUP SECURITY * IBM UPGRADES FLASHSYSTEM TO TACKLE RANSOMWARE By: Adam Armstrong * PROTECT YOUR DATA CENTER FROM RANSOMWARE ATTACKS By: Alan Earls * RUBRIK'S RANSOMWARE TOOLS PUT DETECTION IN LINE WITH PROTECTION By: Adam Armstrong * DELL EXTENDS CYBER RECOVERY RANSOMWARE PROTECTION TO AWS By: Johnny Yu Part of: Implement data vaulting for more secure backups Article 1 of 5 Up Next What is data vaulting and how does it shape modern backups? Data vaulting methods, such as air gapping and active archives, help isolate and protect data backups from malicious deletion or accidental data loss. Air gap backups provide another layer of protection Air gap backups can provide extra protection from data deletion or intruders, but admins should exercise caution to ensure the data is encrypted and the network is secure. How to use air gaps for ransomware defense Air gaps can be a valuable last line of defense against ransomware. However, both logical and physical air gaps have vulnerabilities that can be exploited by bad actors. Immutable backups for ransomware defense may not be enough Immutable backups ensure data cannot be overwritten or changed, making them a great way to protect against ransomware, but they're not a perfect option. Here's why. Use immutable backups to prevent data loss, boost compliance Immutable backups have gained traction with the rise in ransomware attacks. However, there are different approaches to immutability and external factors that come in to play. Sponsored News * Modernizing Cyber Resilience Using a Services-Based Model –Dell Technologies * Cybersecurity Essentials for Critical Infrastructure –Dell Technologies * Building Confidence in Cyber Resilience –Dell Technologies * See More Related Content * Dell EMC Cyber Recovery isolates and protects data – SearchDisasterRecovery * Rubrik's ransomware tools put detection in line with ... – SearchDataBackup * Dell extends Cyber Recovery ransomware protection to ... – SearchDataBackup Latest TechTarget resources * Disaster Recovery * Storage * Converged Infrastructure * IT Channel SearchDisasterRecovery * StorageCraft DRaaS outage highlights layered protection need As a result of the StorageCraft outage, some of the vendor's DRaaS users lost the ability to fail over. Having a local backup is ... * How AI adds value to crisis communications systems AI provides key enhancements to existing emergency notifications systems that can reduce the amount of time a business needs to ... * How to calculate maximum allowable downtime Determining maximum allowable downtime is more than a simple equation. Find out why it's important, how it varies and the ... SearchStorage * MemVerge, Liqid create composable memory pools before CXL MemVerge and Liqid combined software with Intel Optane to make composable memory pools that can do today what the CXL standard ... * Kioxia releases PCIe Gen 5 SSD for data centers Kioxia's CD8, its second-generation PCIe Gen 5 SSDs, provides increased performance and a 2.5 inch form factor that make it much ... * A primer on the NVMe management ecosystem The NVMe management ecosystem has a lot of moving parts and confusing acronyms. This overview details the various specifications ... SearchConvergedInfrastructure * FlexPod XCS brings cloud capabilities to data centers FlexPod XCS, the latest NetApp and Cisco converged infrastructure appliance, expands support for hybrid cloud environments with ... * Nutanix revenue increases, driven by hybrid cloud adoption Benefiting from the growing user adoption of hybrid clouds and a significant increase in digital transformation projects, Nutanix... * The top hyper-converged systems and composable infrastructure of 2021 These Products of the Year winners offer the flexibility and scalability that make hyper-converged systems an excellent choice ... SearchITChannel * SD-WAN project covers security, latency and cloud PM Pediatrics, an urgent care provider, hired service provider Vandis to improve branch security, but the project transformed ... * Digital transformation in oil and gas sector set for growth Kyndryl's large-scale, multi-cloud technology deal with refinery operator Motiva Enterprises underscores a broader industry trend... * Dig into the MSP M&A process from the acquirer's perspective MSP mergers and acquisitions may frequent the news, but how is the value of an MSP determined, how are deals structured and what ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * Definitions * E-Products * Events * Features * Guides * Opinions * Photo Stories * Quizzes * Tips * Tutorials * Videos All Rights Reserved, Copyright 2008 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info Close