Enforce Backup Policy Best Practices with Dig and Cohesity

Yotam Ben EzraYotam Ben Ezra
table of contents
Enforce Backup Policy Best Practices with Dig and Cohesity

A ransomware attack is about as bad as it gets for organizations, especially mission-critical ones. Your sensitive (and non-sensitive) data gets encrypted, and you have no choice but to shut down until all that information is retrieved or restored.

Failing to protect your data from ransomware, data destruction, and denial of service attacks is a matter of survival. And it’s why myriad organizations deploy managed backup.

Dig Security and Cohesity recognize the importance of integrating backup protection into your data security program. The two companies have teamed up to deliver an industry-first solution. One that brings together data classification and data backup so you can implement best practices for your backup policies.

Step 1 – Classifying your data

With so much data rapidly spreading across on-premises and multiple cloud environments, organizations are finding it increasingly difficult to keep track of the vital information that makes them tick. In addition, more and more compliance regulations are cropping up, with many of them (e.g. SOC2) requiring managed backup.

To ensure business continuity, you first need to classify and gain visibility of your data, which is where Dig comes into play. The company’s data security posture management (DSPM) solution automatically discovers and classifies your data across all public clouds, including PaaS, IaaS, DBaaS, and SaaS environments, as well as on-prem file shares..

The solution also enables you to identify and visualize the flow of data across all managed and unmanaged cloud sources to determine what needs to be retained for compliance and/or retention policies.

Step 2 – Tagging and reporting non-backed-up data

Once your data is classified, you need to ensure that sensitive data, such as secrets and IP, is backed up with the right policies. And that’s where Cohesity comes into play. Using an API provided by Dig, Cohesity’s secure backup and recovery solution uses the tags and reports of non-backed-up sensitive data to enable the creation of customized “no-backup” risk.

Step 3 – Executing data detection and response

Once you’ve classified and identified your non-backed-up sensitive assets, including those requiring compliance, you’re ready to take action. The Dig-Cohesity joint solution proactively defends against ransomware attacks by ensuring that data security posture management (DSPM) is applied to all your data. With Cohesity you can be sure that all critical data required to run your business is securely backed up.

Dig’s data detection and response (DDR), meanwhile,  alerts your organization of a potential ransomware or denial of service attack early in the kill chain. By nipping potentially devastating threats at the bud, you protect your sensitive data, maintain compliance, and ensure business continuity.

Dig’s DSPM solution and Cohesity’s rapid recovery technology is a unique one-two punch that enables you to implement best practices for your backup policies and secure your data to ensure business continuity over time.

To find out more about the Dig-Cohesity solution, contact a data security expert.

FAQs

No items found.
Pro-Tip

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed consectetur do eiusmod tempor incididunt eiusmod.