Book demo
29 August 2024

Predatar’s big online cyber resiliency summit is back for 2024.

Our biggest and best event yet.

We’re excited to announce the return of our hugely successful annual summit, Control24. This year, some of the industry’s biggest storage and security vendors are putting rivalries aside, to come together and discuss one of the most pressing challenges in business today – cyber resilience.

As the role of Artificial Intelligence in business reaches a critical tipping point, Control24 will focus on how forward-thinking businesses are using it to make resilience a reality.

Control is back… and bigger than ever before.

Typically attracting an audience of over 400 attendees, Control has become one of the biggest online events for cyber resiliency. And with an average audience rating of 4.5 stars (out of 5), Control24 is an event not to be missed.

What’s different this year? 

We’ve been working relentlessly to grow our technology ecosystem. The market-leading Predatar Recovery Assurance platform now supports many of the leading storage and security technologies and
this year’s speaker lineup reflects this. We’ve got experts from Zerto/HPE, IBM Security, Dell Technologies, and Rubrik on the bill.

Long-term fans of the Control summit needn’t worry. You can expect the same pace and energy as usual. We’re sticking with the short energetic sessions, the same mix of thought-leadership and practical advice, and there’ll be plenty ways to get involved with live QA and competitions.

Don’t know what to expect? Take a look at our highlights reel.

What’s on the agenda? 

We’ve got an action packed agenda in store with customer stories, a real-time CleanRoom deployment challenge and guest speakers including:

  • Shariq Aqil and Sasha Acosta from Zerto/HPE 
  • Harpinder Powar and Richard Cassidy from Rubrik
  • Martin Borrett from IBM Security
  • Liz Campbell and Steve Kenniston from Dell
  • Christian Farrel from Accenture  


Register now!

Control24 takes place online, on 9th October at 2pm (GMT).
Don’t miss out. Register now!

Learn more about
Predatar recovery assurance

23 August 2024

10 Ways to make your backup more secure… And why you need to.

Data backup is not cyber security… or is it?

Although few security officers would consider backup as security, there is a strong argument that backup should be the most secure application in any organisation.

Why? Because sh*t happens – every day. Most of the time, your business is expecting it, and taking steps to prevent it. For example, there are not many big businesses today that don’t have multiple EDR and XDR tools in place, and fewer still that aren’t taking steps to educate their employees on phishing attacks.

But sometimes, when sh*t happens, the cause is totally unexpected.

The irony of a leading cyber security company causing a massive global IT outage last month was not lost on anyone (you know the one we’re talking about).

The fact that such catastrophic disruption could be caused by accident, only serves to remind us of the need to shift towards a resilience strategy over a security one.

It’s natural for technology leaders to want to prevent harmful and disruptive incidents, but the prioritisation of cyber security over data resiliency appears to be misplaced.

Cyber security only shortens the odds of an incident. No matter how small the odds, while there’s a risk, business leaders need to make sure there is a robust recovery plan in place? 

Closing the Recovery Gap – 10 ways to harden your backup system

In this guide, we focus on practical steps you can take to make your backup more secure and resilient. While we’ll dive deeper into the role of backup in threat detection in future articles, for now, let’s focus on securing your backup as your safety net.

1. Deploy Multi-Factor Authentication – The last thing you want is to grant attackers administration rights to wipe your backup data.

2. Implement 4-Eyes or Command Approval – Backup administrators have privileged access to data. Trust is essential, but having two people approve critical actions, as demonstrated by the CrowdStrike incident, helps prevent mistakes.

3. Turn on Backup Encryption – While it won’t stop ransomware, encrypting your backups ensures that attackers can’t read your sensitive data, reducing the fear of extortion.

4. Use Complex Passwords for Backup System Access – This basic step is still crucial. Simple passwords make you vulnerable.

5. Decouple Your Backup System from Active Directory – Avoid having a single point of failure by ensuring your backup system operates independently from your primary network.

6. Ensure You Have at Least 3 Backup Copies – These should be real backup copies, not production storage snapshots. Snapshots are useful for operational recovery, but don’t compromise your last line of defence.

7. Keep at Least One Backup Copy Off-Site – This is more about risk management than security, but it’s a practice that predates modern threats like ransomware for good reason.

8. Maintain an Air Gap – If you’ve eliminated tape drives, consider using dissimilar backup server OSs and storage media to maintain an effective air gap.

9. Use Immutable Storage Media for One Backup Copy – This won’t prevent malware from being backed up, but at least the data can’t be changed or encrypted.

10. Build an Isolated Recovery Environment (IRE) – Often called a cleanroom, this is the best way to ensure your backup copies can be safely recovered without further risk.

Find a data resiliency expert

At Predatar we’ve built a global network of elite data resiliency partners. Our APEX partners can help you build the foundations for data resilience, and take you on a journey to total recovery confidence with AI-powered Recover Assurance from Predatar.

Find an APEX partner near you now!

Learn more about
Predatar recovery assurance

15 July 2024

Will AI replace the backup administrator?

It’s a big question, with a simple answer… No, the role of the backup admin is here to stay. But just like most job functions, Artificial Intelligence will have a positive and significant impact. Let’s look at how…

Backup in the spotlight

As organisations seek to protect themselves from the dramatic increase in data loss events driven primarily by cybercrime – backup is in the spotlight. The backup function needs to evolve to meet the new challenges of the day, and backup admins need to do more than ever before, but all-to-often a lack of time and budget is standing in the way of progress. 

With its potential for big productivity gains, AI has a pivotal role to play. This article makes the case for the use of AIOps in elevating backup from legacy insurance plan to modern incident response platform. 

The case for AI intervention 

Backup systems have certain characteristics which make them a perfect candidate for AI intervention – notably; massive datasets, complex interrelationships, and repetitive tasks. 

A recent time and motion study found that up to 40% of backup administrators’ time is spent checking backup failures and a further 30% of time fixing them. That’s a lot of time to invest without either determining the root cause, or answering the critical question ‘Will my backups actually recover follow a cyber attack?’ 

AI’s ability to correlate events from complex datasets can fast-track problem determination. If the time sinks can be reduced, then more resources can be allocated to threat management and incident response, where backup has an increasingly important role to play. 

Backup as threat detection

Until very recently, few security professionals considered backup a key part of their threat detection solution (and many still don’t). But backup, with its extensive record-keeping and historical datasets is well-suited to the detection of unexpected activity and dormant malware. Daily antivirus scanning of backup copies alongside recovery testing is an excellent cost-effective supplement to more traditional security processes. 

Where AI truly excels is in detecting outliers in data which can’t be spotted by the human eye. Changes in backup behaviour can be an early indicator of active cyber-attacks, and can be picked up by an AIOps assistant around the clock, 365 days a year. 

Bridging the Gap 

As storage and security teams begin to join forces with the shared goal of operational resiliency, it is crucial that these two highly specialist teams can collaborate effectively, with complex information communicated in a way that everyone understands.

Generative AI with Natural Language Processing (NLP) can help. AIOps tools will produce unique reports that not only give each individual stakeholder (such as compliance officers, CIOs and CISOs) tailored metrics based on what’s most important to them, but will also use the language and terminology that each one understands.

What’s more, AI-powered chatbots will enable stakeholders to query their reports for extra clarity, and to get bespoke analysis of the metrics that are most valuable to them.

Job creation or job destruction? 

We believe the role of the backup administrator will be enhanced by AIOps software. By automating repetitive tasks such as recovery testing and scanning, incident management, and report writing, highly knowledgeable administrators will be able to focus on higher-value (and frankly, more interesting) tasks.

AI-powered insights will trigger more questions to the custodians of backup as stakeholders begin to truly understand just how resilient, or not, their data backup infrastructure is. 

As with all awakenings, as backup emerges from the dark recesses of the datacenter, there will be a clamour for greater understanding. Here, the highly knowledgeable backup administrators will come into their own. No longer drowning in repetitive, reactive tasks they will utilise their valuable time, energy and specialist knowledge to guide critical strategic decisions-making.

The future is already here

Predatar is leading the way with the World’s first AIOps for Recovery Assurance. Find out how Predatar puts powerful AI tools in the hands of backup and security teams to boost data resiliency and incident response. Discover the Predatar R16: Orca release here.

Learn more about
Predatar recovery assurance

04 July 2024

Why AI is non-negotiable for cyber resiliency.

Let’s kick off this article about Artificial Intelligence with a few very real facts…  

1. Storage environments are getting bigger and more complex.
2. Cyber-attacks are getting more prevalent and more sophisticated.
3. IT and Security teams are under increasing pressure to do more with less.

It’s a harsh reality that most businesses are treading a fine line in the battle to stay ahead of cybercrime. IT and cyber security budgets aren’t growing in line with the size of the challenge, and a serious shortage of technical skills in the employee marketplace adds another obstacle.   

A breach is coming. So, what can businesses do to prepare?

They can cross their fingers and hope their data recovery plans will work (the evidence suggests they won’t), or they can deploy Artificial Intelligence to deliver new levels of data resilience that would otherwise require a small army of security and storage technicians to achieve.

This article highlights three ways AI can boost your resiliency. Over the next 3 weeks we’ll dig into each of these in more detail.



1. Faster, more accurate threat-hunting

Malware is designed to evade detection. The reality is that your storage environment has probably already been compromised – you just don’t know it yet. Malware in your storage has the potential to render your backups and snapshots useless in a cyberattack and seriously derail your incident response.

Predatar found malware in more than 70% of its users’ storage within the first 90 days of deployment. That’s malware that had evaded perimeter cyber security tools such as EDR and XDR, and had not been detected by the anomaly detection that is built into most of the leading storage platforms.

Artificial Intelligence has a lot to do with Predatar’s dramatically enhanced threat-hunting capability.

Whether it’s spyware quietly collecting information, ransomware discreetly encrypting your files, or wipers deleting your data – malicious activity gives off ‘signals’. The challenge is finding these signals amongst the noise of busy, complex storage systems.   

Traditional anomaly detection techniques fall-short when faced with sophisticated malware designed mimic the signals of legitimate data activity. As a result, malware either goes unnoticed, or often storage and security teams become overwhelmed with false-alerts, and waste valuable time and resources investigating threats that aren’t real.

AI has the ability to understand nuances in data behaviour that would simply be impossible otherwise. What’s more, it gets smarter over time – learning from false positives, to make AI-powered threat detection exponentially more effective that traditional anomaly detection.       

2. See recovery risks hidden in complex storage

Most large businesses have multiple storage platforms in play. In our experience, typically it’s 2 or 3 platforms – but it can be as many as 5 or more. And the trend is an upwards one. As business bring new storage technologies on board, they need to maintain the old ones to manage their legacy data. Failed backup runs, unsupported software, unpatched vulnerabilities, and many other issues associated with storage administration have the potential to cause a major issue when it comes to recovering your data.

Traditionally, highly-skilled storage administrators would stay on top of these tasks, but today these skills are in high-demand, back-up administrators are stretched thin, and the need to manage not one, but many discreet environments is time-consuming and inefficient – especially given the lack of visibility and holistic reporting across platforms. In these scenarios, the chance of human error is increased.

AI can’t replace storage administrators, but it can act as a powerful assistant, or a ‘storage sidekick’. AI can monitor all of your storage platforms, all of the time – highlighting potential issues that can otherwise slip through the net, and spotting trends and insights that would take a whole team of data analysts to uncover.

The result… powerful real time intelligence to help you make decisions, prioritise remedial action and mitigate risks.


3. Extensive knowledge at your fingertips

One of the biggest advantages of AI is that it makes information and knowledge more accessible than ever before. AI can tap into a whole universe of data, and thanks to Generative Pre-trained Transformers (GPT) and Natural Language Processing (NPL), it can instantly give you the information you need to answer even the most specific query – and deliver it in a way that’s tailored to you.

We’ve built NPL and a GPT into Predatar’s Recovery Assurance platform. Trained on technical documentation for market-leading leading storage technologies, our extensive ‘knowledge base’ of expert articles from Predatar engineers and consultants built-up over more than 10 years, and best-practice articles from industry leaders – our AI is empowering security and storage professionals with extensive cyber resiliency knowledge at their finger tips.

Wrapping-up

Artificial Intelligence is quickly becoming critical for ensuring businesses are ready to launch a fast and effective response in the event of a cyber incident. Predatar is leading the way with AI for data resiliency.

Predatar’s R16: Orca release will ship with Aurora AI built-in, the world’s first AIOps assistant for Recovery Assurance. Find out more here, and stay-tuned as we dive deeper into this topic in the next few weeks.

Learn more about
Predatar recovery assurance