Book demo
15 October 2024

Predatar R17: Viper. Sometimes to go forward, you must look back.

Innovation isn’t about chasing the next trend, but building on what works – refining and enhancing it. At Predatar, we were the first to market with the Predatar CleanRoomTM over 3 years ago. In fact, we actually coined the phrase ‘CleanRoom’. Since then, we’ve been on a journey of improvement, evolving through two major iterations to bring you CleanRoom 3.0. The most advanced, flexible, and intelligent recovery environment available.

Predatar Managing Director, Rick Norgate recaps on the journey…

Looking back

CleanRoom 1.0 used VMware NSX and took over a week to deploy. While it was a breakthrough, we knew there was room for improvement. Listening to customer, we created CleanRoom 2.0. This simplified the setup, removed the reliance on NSX to reduce costs & complexity, expanded its support for more workloads including primary storage and backup platforms, and cut the deployment time down to just one day!

Moving forward

Now, with CleanRoom 3.0, we’ve gone back to the drawing board. We took all the learning and feedback from the last few years to create a truly transformative solution. Built from the ground up, CleanRoom 3.0 can be deployed in just hours, doesn’t require any third-party licensing, and supports multiple hypervisors, not just VMware. This means it’s faster, more cost-effective, and incredibly adaptable to your unique environment.

And to top it off, CleanRoom 3.0 features Predatar Aurora AI baked-in, making it the smartest CleanRoom available. Aurora AI ensures real-time anomaly detection, automation of key processes, and adaptive responses to threats, giving you unparalleled control over your backup & storage environments.

Join the revolution

CleanRoom 3.0 is not just an evolution, it’s a revolution. We’ve taken everything we’ve learned from the past two iterations and created a solution that is faster, more flexible, and smarter than ever before. If you’re looking to strengthen your cyber resilience, Predatar Recovery Assurance with CleanRoom 3.0 is your answer.

Read more about what Viper has to offer here. Interested in Early Access Preview? Register here.

Learn more about
Predatar recovery assurance

20 September 2024

Cyber Resilience. A team sport.

The world’s biggest problems require collective action. Pandemics and climate change immediately spring to mind.

According to Gartner there were 3,200 different cyber security vendors selling solutions in 2023. Yet, according to the UK Gov Cyber Security Breaches Survey, the number of attacks in 2024 was 30% higher than the previous year. Based on these statistics, it’s clear that despite the tech industry’s best efforts, cyber crime is a challenge that isn’t going away.

In our opinion, we can add cybercrime to the category of really big problems to solve.

Is prevention enough?

Quite reasonably, the primary focus of the world’s five million cyber security professionals has been on threat detection and breach prevention. Our advice to them is… consider your plan B. Is now the time to invest in Response and Recovery readiness?

At Predatar, our focus is on Recovery Assurance. We strive to help organisations be more confident that, no matter what happens, they can recover their data and systems, quickly, cleanly and completely.

For those of you thinking about cyber resilience, we’ve lined up industry leaders from the world’s of cyber security and storage. Leading lights from some of the world’s leading technology vendors will come together for an online summit on 9th October. Why?…

Collaboration over competition

If you think avoiding a cyber attack in 2024 is hard, try recovering from one! Cyber Resilience is firmly placed in the box marked, ‘really hard problems’. That’s why at Predatar, we have invited our technology partners to put rivalries aside and join the line-up at Control 24, our annual online summit for cyber security and infrastructure professionals.

Critical thinkers from Accenture, IBM, Dell, Rubrik and HPE will come together to discuss and debate how best to solve the cyber resiliency problem. And the truth is, they didn’t need any convincing. One thing all the experts agree on, is that winning the fight against cyber criminals is team sport.

Over the course of 3 hours, the Control24 ‘Team’ will deep-dive into the role of AI in Cyber Security, debunk the 10 myths of cyber resilience, dissect the evolution of attacks, and explain the difference between an air-gap and a cyber vault.

And while all this is happening, Predatar’s CTO Ian Richardson will be getting hands-on with a live CleanRoom deployment challenge!

Join Control24

Don’t miss this important event. Join Control24 online on 9th October.
See the full agenda and register here.

Learn more about
Predatar recovery assurance

18 September 2024

How To Make Your Backup Work

If a backup system consistently copies your data and retrieves it when called upon, is that sufficient evidence your backup “works”?

If you consider backup as an expensive insurance policy, then the answer should be a definite “yes”.

The dying role of ‘backup administrator’

In today’s hypercompetitive world every asset, be it capital or human, must be accountable and deliver a return on investment. An asset that delivers minimal value for 99% of the time is right not to be considered a jewel in the crown of a CIO’s IT infrastructure. Not surprising then that the role of “Backup Administrator” no longer graces the job boards on LinkedIn.

Whilst no CIO or CISO is rushing to remove their backup safety net, it rarely makes top billing at team meetings. The largest Security companies like Palo Alto, and until very recently, Crowdstrike, are worth $100 Billion. The largest pure play backup vendors are worth less than a tenth of that, and yet, companies are still getting attacked.

Security vendors are investing billions in artificial intelligence to eke out marginal gains in the efficacy of their products. Meanwhile, the largest data lake in most organisations – backup – sits idle. It’s time to put your backup to work. Here’s how…

The application of AI in backup

If there was ever a perfect use case for the application of artificial intelligence, surely backup would be right up there. Unlocking the hidden value in Backup is no longer constrained by the cost. Once trained, AI is ridiculously cheap. Is this why Gartner positioned AIOps for Backup as the fastest technology to reach maturity in its 2024 Hype Cycle for Storage? The properties which make it such a foundational technology are:

  1. Endurance – AI algorithms do not rest and do not lose focus. Spotting anomalies in backup systems is a repetitive and boring task best left to robots.
  2. Speed – AI has the ability to spot small, seemingly insignificant statistical aberrations at orders of magnitude faster than humans.
  3. Recitation – imagine a human being capable of memorising all the support manuals and knowledge base articles for a backup application? Now add in the ability to cross-reference with every known security vulnerability, error message and backup command.

Complementing the raw analytical power and speed of AI with the contextual understanding of humans we think will help unlock the intrinsic value of the data stored in enterprise backup systems. From spotting security threats, to helping administrators expedite incident resolution and meeting requests for ad-hoc reports from regulator, AI promises to be an IT administrator’s best friend.

Where does Predatar come in?

At Predatar, we are just getting started with the application of AI in Backup. Currently in Beta, we are using AI to uncover the hidden recovery risks for customers who have deployed IBM Storage Protect (TSM) backup software. We are now able to do this at a fraction of the cost of more traditional methods. For examples of this exciting application of AI, go to https://predatar.com/rrr and sign up to be an early adopter.

Learn more about
Predatar recovery assurance

15 July 2024

Will AI replace the backup administrator?

It’s a big question, with a simple answer… No, the role of the backup admin is here to stay. But just like most job functions, Artificial Intelligence will have a positive and significant impact. Let’s look at how…

Backup in the spotlight

As organisations seek to protect themselves from the dramatic increase in data loss events driven primarily by cybercrime – backup is in the spotlight. The backup function needs to evolve to meet the new challenges of the day, and backup admins need to do more than ever before, but all-to-often a lack of time and budget is standing in the way of progress. 

With its potential for big productivity gains, AI has a pivotal role to play. This article makes the case for the use of AIOps in elevating backup from legacy insurance plan to modern incident response platform. 

The case for AI intervention 

Backup systems have certain characteristics which make them a perfect candidate for AI intervention – notably; massive datasets, complex interrelationships, and repetitive tasks. 

A recent time and motion study found that up to 40% of backup administrators’ time is spent checking backup failures and a further 30% of time fixing them. That’s a lot of time to invest without either determining the root cause, or answering the critical question ‘Will my backups actually recover follow a cyber attack?’ 

AI’s ability to correlate events from complex datasets can fast-track problem determination. If the time sinks can be reduced, then more resources can be allocated to threat management and incident response, where backup has an increasingly important role to play. 

Backup as threat detection

Until very recently, few security professionals considered backup a key part of their threat detection solution (and many still don’t). But backup, with its extensive record-keeping and historical datasets is well-suited to the detection of unexpected activity and dormant malware. Daily antivirus scanning of backup copies alongside recovery testing is an excellent cost-effective supplement to more traditional security processes. 

Where AI truly excels is in detecting outliers in data which can’t be spotted by the human eye. Changes in backup behaviour can be an early indicator of active cyber-attacks, and can be picked up by an AIOps assistant around the clock, 365 days a year. 

Bridging the Gap 

As storage and security teams begin to join forces with the shared goal of operational resiliency, it is crucial that these two highly specialist teams can collaborate effectively, with complex information communicated in a way that everyone understands.

Generative AI with Natural Language Processing (NLP) can help. AIOps tools will produce unique reports that not only give each individual stakeholder (such as compliance officers, CIOs and CISOs) tailored metrics based on what’s most important to them, but will also use the language and terminology that each one understands.

What’s more, AI-powered chatbots will enable stakeholders to query their reports for extra clarity, and to get bespoke analysis of the metrics that are most valuable to them.

Job creation or job destruction? 

We believe the role of the backup administrator will be enhanced by AIOps software. By automating repetitive tasks such as recovery testing and scanning, incident management, and report writing, highly knowledgeable administrators will be able to focus on higher-value (and frankly, more interesting) tasks.

AI-powered insights will trigger more questions to the custodians of backup as stakeholders begin to truly understand just how resilient, or not, their data backup infrastructure is. 

As with all awakenings, as backup emerges from the dark recesses of the datacenter, there will be a clamour for greater understanding. Here, the highly knowledgeable backup administrators will come into their own. No longer drowning in repetitive, reactive tasks they will utilise their valuable time, energy and specialist knowledge to guide critical strategic decisions-making.

The future is already here

Predatar is leading the way with the World’s first AIOps for Recovery Assurance. Find out how Predatar puts powerful AI tools in the hands of backup and security teams to boost data resiliency and incident response. Discover the Predatar R16: Orca release here.

Learn more about
Predatar recovery assurance

11 March 2021

Podcast: Will the IBM elephant dance again?

Over the last 18 months, a lot has been going on at IBM.

It has purchased Red Hat, plans to spin out its managed services business and promoted new leadership. A generational shift is underway to position itself as the leader in open hybrid cloud.

Are these decisions too bold or are they too little too late? Sit back and listen, then let us know what YOU think.

Al and Rick begin by discussing IBM’s decision to essentially split the business in two, with its Global Technology Services arm due to be spun out in 2021, this is then followed by their thoughts on the acquisition of Red Hat as the engine to return the business to revenue growth. Finally, what does this mean for IBM’s overall culture and the technology platform it is building?

Learn more about
Predatar recovery assurance

03 December 2020

Five Cost-Effective Ways to Protect Your Business from a Ransomware Attack

We’ve already looked at recovering your data post-ransomware attack; plan, plan, plan and plan again. In this blog, we’ll explore five ways we can plan for and better protect against ransomware attacks. By planning and protecting, we can ensure that we lose the least amount of valuable data possible, without breaking the bank.

1. Understand the nature of ransomware

The chief problem with ransomware is that it is ever-evolving. This means that processes and systems need to be continuously reviewed and updated. However, as with most things like this, it can lead to perplexing problems that can make IT Teams feel they never get to place ransomware in the ‘Job Done Pile’. The temptation to stall can creep in, meaning there are holes in the system that can be exploited.

You can find out more about what ransomware is in this article from Expert Insights.

The nature of ransomware simply isn’t consistent, and so when businesses realise this, they can better understand the need for software and systems that can resist attacks and if attacked, better recover from them.

2. Invest in trustworthy and knowledgeable solutions early on

Because many businesses find these processes so difficult to navigate and their IT teams struggle to maintain effective management of these complex processes, it can be tempting for them to put the investment of software on the backburner. More so, the complex nature of ransomware means that when businesses do choose to invest in protection and reach out for help, they’re unsure if they are getting genuine, authentic advice or if they’re just being spun a clever sales play.

The best way around this is to seek out trusted advisors that are willing to not only help you with their service but will gladly share free knowledge with their customers in the form of excellent customer service. By sharing their first-hand experience, they can demystify the volume of information out there and tailor a solution to your unique business needs. Above all else, failing to invest in quality backup and recovery solutions early on, can – and probably will – end in botched disaster recoveries and a lot of wasted cash.

3. Utilise your resources

Irrespective of investing, there are also things you can do that cost nothing or very little that will help you in terms of shielding your backup systems. Without doing these things, your only option is to hope that your underfunded and under-loved backup setup will, by some miracle, come to life before you’re forced to pay the ransom. If, however, you hope that ransomware won’t target your backup setup; we’re here to break the bad news to you. It definitely will. So, here are a few things you can do to shield your backup set up as it stands*:

  • Use two different operating systems. Put the primary backup system on Windows and then copy the system on Linux (we’ll use Linux as an example here, but you can include AIX or any other). In simple terms: can the Ransomware attack navigate a Windows structure, it most certainly can. Can it navigate Linux as easily? Not necessarily.
  • If you have more than one domain, place the production backup system on a different domain to the Copy system. The strategy here is to put as many obstacles in the path of the attack.
  • Spread your data across different storage types. For example, Block is great for a primary source and S3 is good for a copy.

4. Making the most of IBM Storage Protect

By being an IBM Spectrum user, you’ve already invested in the right software, so make sure that you’re on the latest version. The latest versions of IBM Storage Protect work to make predictions on potential incoming attacks, making the update an invaluable asset to businesses. By pre-empting attacks, data loss is significantly reduced in the instance of an attack and can sometimes prevent a full-blown attack altogether. It’s always important to get the most out of the data protection software that you’re paying for. You can read more about making data backup and recovery technology sustainable for your business here.

On top of this feature, Storage Protect has within it a DRM File. In a nutshell, the system creates a backup file daily. You can then store this outside of your domain by email or any other method of your choice. Outside your domain is somewhere safe and secure! It’s a small task to undertake, but it holds the keys to unlock and recover your business quickly in the face of a disaster. Plus, there are no costs involved in emailing a copy of this to a safe location.

5. Stay alert and act quickly 

Our fifth and final piece of advice is to stay alert and act quickly. Don’t allow Ransomware to lie dormant so it can gain a stronghold on your data. By keeping a keen eye on things like the slowing of systems, inaccessible or corrupt files and CPU spikes, you may not be able to halt an infection entirely, but you will be able to align your damage control better by ensuring your backup is taken offline and stored safely before being infected. Always have a ‘Code Red’ plan in place. Who monitors these things? Who raises the alarm? Who acts on them quickly?

These five things will help you minimize and lessen the severity of ransomware attacks, but it pays to mind that they are limiting the cause, not preventing the effect. Always test your data recovery processes and ensure that you have invested in secure and, preferably, automated processes. The aim is to have maximum confidence that your data backup and recovery process will be quick, efficient and controllable.

*This is based on having a setup which has both a primary version and a copy version of the backup.  

 

Learn more about
Predatar recovery assurance

20 November 2020

Battening Down the Data Hatches for Black Friday

Ahh, Black Friday. It’s a plentiful day (now stretching to a full week), brimming with shiny bargains and special offers.

Every year, Black Friday comes and goes almost as suddenly as it appears. Like a thief in the night, it burns holes in our pockets and puts retailers and organisations back in the black. This year more than ever, Black Friday will play a fundamental role in aiding many businesses recovering from the adverse effects of COVID-19.

However, despite its merits, sorry looking bank accounts and bargains are not the only thing that Black Friday opens us up to. It also opens up organisations to data breaches. Take Amazon, for example. The Amazon sale for Black Friday 2018 saw a significant data breach. The details of thousands of customers were leaked just hours before the event took place. The leak was put down to an ‘inadvertent technical error’, suggesting it was Amazon’s IT team that took the hit for the breach.

Prophets or Profits?

So why do events like Black Friday leave our businesses more susceptible to cyber-attacks, hackers and data leaks like this one?

In the bustle of Black Friday, organisations big and small are often scrambling to ensure their servers can manage the onslaught of site traffic. They’re trying out new applications, forming new programmes, transferring ecommerce to the cloud; the list is endless. Actions like this, although well intended, can often leave minor – and sometimes major – gaps for data breaches.

For instance, a simple human error could be made in the rush to prepare things. It could cause the malfunctioning of a programme required to process customer data; ultimately leaving the data vulnerable, out-in-the-cold and easy for cyber criminals to gain access to.

On the other end of the spectrum, cyber criminals may directly attack less secure sites in the knowledge that Black Friday brings an abundance of opportunity to credential surf or RAM scrape.

Vigilance or Vigilante?

To combat potential breaches like these, organisations should take into account that Black Friday is simply not ‘business as usual’. Programmes and applications should be tried and tested with vigour. Data protection software should be up-to-date and functioning at full capacity with all-hands-on-deck. Extra layers of data protection may even be required. For optimal management, you may want to consider a SaaS data platform.

It also bodes well to remember, whilst customers do have a responsibility to protect their own data – organisations should be making this easier for them, not harder. Any external emails to customers should be well designed and clearly marketed, making it easier for customers to tell a real email from a fake phishing attempt. It should also be made clear what customer data may be shared and why.

So, don’t rush, be meticulous, test, test and test again. And, most importantly, happy bargain hunting!

 

Learn more about
Predatar recovery assurance

11 November 2020

Recovering from a Ransomware Attack: The road to recovering your data

In recent months, we have seen a rapid rise in ransomware attacks. Covid-19 has forced businesses to make fast changes, occasionally leaving holes in their IT systems for cybercriminals to creep through.

These attacks could be through the means of phishing, attachments, hidden links or in more direct formats like leaked passwords or guest passwords. Whatever the cause, these attacks have the potential to lay dormant for quite some time. Lying dormant allows the initial infection to take hold before spilling over and causing a noticeable event that alerts IT teams to its presence. Dormant and slow attacks allow a wider range of infection; singular computers may not only be at risk but put user ID’s – with access to multiple machines, operating systems and backup software – at risk.

Although dormant attacks are perhaps the more damaging, some attacks will be immediate and brutal, destroying as much data as possible in as little time as possible. The threat here is that IT teams don’t have enough time to scramble and halt the infection.

So, let’s say your organisation has been the victim of a ransomware attack. Now what? Where do you go from here? It might seem like there are endless possibilities and roads to go down, but one thing is clear:

You need a recovery plan

“But we already have one, why do we need another one?” The thing about ransomware attacks is that, like a real infection or virus, they change and adapt. Cybercriminals will often analyse the effectiveness of their attack methods and alter code. Organisations must understand this. They should be making a commitment to incrementally update and manage their backup and recovery processes to ensure the most effective protection of their data. Ransomware avoidance is simply is not enough; it will happen sooner rather than later. It must be followed by flexible backup and recovery plans that aim to prevent as much data loss as possible following a ransomware attack.

Let’s think back to 2017, when the infamous ransomware ‘WannaCry’, infected over 300,000 computers in 150 different countries, simply by spreading through a local network – no harmful links, no dodgy email attachments. It’s all very well the malware was eventually put a stop to but by then, data had already been compromised and cybercriminals were free to adapt the code and worsen the effects of the next planned attack.

Backup but not forgotten

It bodes well to remember that the aim of a sturdy backup and recovery plan is not to protect the perimeter. The aim of backup and recovery is to recover the overall environment, understand the level of infection and research the backup catalogues in order to find the earliest uninfected files. By promoting a culture where infection intelligence is ongoing, backup and recovery can be made into a flexible and compliant process.

The scanning processes of some backup vendors can detect locked files and directories alerting the user to the effects of ransom activities after the fact. Others can search backup images for infection signatures in an effort to avoid reseeding the environment by recovering infected backups. However, these measures really only signal how far the horse has bolted.

Take a step

Predatar uses a mixture of methods and approaches to help automate the backup and recovery process, taking the initial heat off of IT teams. Ultimately, rapidly recovering environments and ensuring that organisations have the best of their data back after disaster strikes.

For more on this topic why not watch this 20 minute presentation taken from our Control 2020 conference. It can be viewed from the Predatar You Tube channel here

 

Learn more about
Predatar recovery assurance

16 October 2020

How Compliant is your backup?

Over the last decade, organisations have really struggled to deal with the multitude of contradictory requirements for data compliance. How do you ensure that data is retained long enough but not too long when dealing with sector, geographic and internal requirements?

Deciding which regulation trumps another is a complex process. In fact, it’s best left to compliance and risk officers.

There are 2 key factors in compliance:

  1. The IT department should be the facilitator for compliance not the decision maker
    • Let Risk/Compliance decide what needs to be kept, in what condition and for how long
    • IT provision a solution to meet the requirements
  2. ALL compliance policies should be audited
    • Retention Policy should be documented
    • Changes to Policy should be reviewed and approved
    • Audit trail of changes should be taken as evidence of compliance

Backup is not Archive

When you’re dealing with long term retention, many organisations choose backup rather than content archival because of its lower cost. But, too often, we forget about the auditing of changes within the backup solution that could impact compliance.

Typically, backup administrators have the power to make changes to data retention and even delete existing backups. However, this process isn’t as smooth sailing as we’d like to think. A simple typo could delete the wrong data accidently.

Users of IBM Storage Protect have the ability to place a “legal hold” on retention sets so that data doesn’t suddenly expire when it may be needed for subpoena.

IBM Storage Protect not only has an audit trail of changes, it also has the concept of authorisation. When this is configured effectively, it requires any disruptive change to be authorised by a second admin.

Although this is a great place to start towards ensuring compliance, if 2 admins are in cahoots, it could still be difficult to prevent malicious intent.

So, what can you do about it?

Predatar’s platform gathers meta data from Storage Protect and stores it offsite for analysis. It can be configured to not only audit the activities, but also raise alerts based on customised thresholds.

The Predatar platform can be made visible to key stakeholders and risk officers. This means that alerts relating to data destruction can be reviewed by non-IT personnel and appropriate action taken in light of a breach of compliance. Predatar’s audit trail helps compliance and risk officers demonstrate sustained control over data. It shows effectiveness and efficiency.

3 Quick Steps to Success

We recommend that Storage Protect users with compliance requirements take the following steps:

  1. Upgrade to version 8.1.9 or higher
  2. Create at least 2 admins with “cmdapprover=yes” set
  3. Set commandapproval to on

Predatar gives you the tools and control you need to keep your backup compliant.

Learn more about
Predatar recovery assurance

16 October 2020

Podcast: The Canary in the Coal Mine

In this podcast, we speak to our new customer success officer, Andy Brown. We talk about why customer success for SaaS entities is so important and how it impacts their day-to-day deliverables.

We discuss the rapidly flowing river of data that is the IT industry and how IT customer service needs to be swiftly adaptable. Having the tools and skills to leap into action when things go wrong or change direction is crucial for Predatar as a SaaS platform.

We learn about how at Predatar, we take control of customer’s needs so that they can take control of their data.

 

Learn more about
Predatar recovery assurance