Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Security Vault

Cyber Recovery

Ransomware facts

Approximately 37% of global organizations were the victim of some form of ransomware attack in 2021, o/w 54% add data encrypted.

Source IDC

  • 31% closed their business
  • 53% stated their brands were damaged
  • 29% were forced to remove jobs
  • 32% lost top leadership

Cybereason, 2021

Ransomware is becoming an industry, with well organized groups (Circus Spider, DarkSide, Revil, …), and even “Ransomware as a Service” offers

Various internet sources, 2021

Your business challenge and our solution

The topics for the boardroom never really change spectacularly, but cybersecurity is a subject that should not be underestimated, even in the boardroom, kind of depending on how crucial digitality is in your operations.

Every sector and organization will be affected sooner or later and will have to deal with it. Depending on the vulnerability, a cyber-attack, which is becoming more professionally organized, will have an impact, significant or not, on business operations and sometimes viability.

Atos is number 1 in EMEA and number 3 globally in cybersecurity consulting.

Atos Cyber Recovery solution accelerates and secures post-attack recovery:

  1. Maintaining safe data to recover.
  2. Accelerating the recovery process through appropriate methodologies

BCM & Cyber Recovery Alignment in the context of NIST Framework

Consulting of Ransomware Readiness Assessment integrated with BCM enables real Cyber Recovery

< Before

Consulting Review

Identify

BCM: BIA, List of critical assets supporting key business services, processes and functionalities

Data Governance

Data Classification

Risk Assessment

Business & technical teams are aligned and up-to-date as for criticality, RTO, RPO scope of business data, applications, and its translation into all technical layers of systems and prioritization of back-up, restore and recovery

< Before

Maintenance – Vault Managed Services

Protect

Automate data protection for your key assets as well as your backup environment

Data Protection/
Back-up for Critical Data, Access Controls, Maintenance Data/InfoSec, IAM

Vulnerability Controls, Awareness

Ensure you always have safe, unencrypted backup data, prepared Vault/Cleanroom you can use for recovery with best-in-class platform security, immutable air-gapped backups, and zero trust architecture.

During

Maintenance – Vault Managed Services

Detect

Early threat detection is critical to mitigating ransomware threats

Align SOC/SIEM, IPS, AV to identify ransomware and its attack symptoms

Anomalies detection

Integrity checking

Awareness

Correlate unauthorized activity with insights into access attempts.

Alerting for data anomalies or quarantined data for forensics.

During

Maintenance – Vault Managed Services

Respond

Proactively respond to prevent threats from spreading

Incident response including both types: classic BCM/DR disruptive events and ransomware attacks

Alignment of BCM Incident/Emergency Response, Crisis management with Cybersecurity Incidents,
Mitigation

Stop the spread of ransomware immediately with SIEM and SOAR integrations that automate response activities like quarantining infected resources and snapshots.

> After

Maintenance – Vault Managed Services

Recover

Flexibility recovery options from clean backups reduces impacts to your business

Cyber Recovery from Air-gapped Vault/Clean Room with specific Runbook procedure to prevent re-infection.

CR part of DR architecture, plans, procedures, tests, reviews.

Avoid reinfection by scanning individual snapshots in Vault before recovery to ensure data is clean. Use automated recovery tools to find the most recent clean version of every file within a specified date range.

Cyber Vault – Protecting the critical data assets

An overview of the technology

1

Sync
  • Data isolation using an air-gapped recover vault
  • Only attached to the network when transferring data, then disconnected – virtually invisible to attackers
  • All controlled by the Backup app

2

Copy
  • Create immutable copies of both data and infrastructure

3

Lock
  • The data cannot be deleted until the lock expires

4

Analyze
  • Run CyberSense analytics to identify any corrupt data
  • Data marked as “good” can be immediately recovered, any corruption will register an alert

5

Recover
  • 1 day average
  • Accelerated data recovery helps quickly resume business activity

Atos Added Values Cyber Recovery

Atos has over 6000 cybersecurity consultants across 72 countries and provides international security services to global customers.

Atos is number 1 in EMEA and number 3 globally in cybersecurity consulting.
Cybersecurity is one of the top 4 investment priorities for Atos.

Cyber recovery key part of the customer’s cybersecurity strategy. Atos is a trusted advisor in all cybersecurity areas and can offer holistic advice and solutions to customers.

Atos has a proven track records of successes in deploying and operating IT infrastructures worldwide, ensuring high availability, disaster recovery, backup and restore for the most demanding customer environments.

The value of Dell Technologies

  • Validates backup set integrity to aid and accelerates recovery
  • Protects from attacks originating inside the organization
  • Offers full content indexing on-prem with AI/ML analytics
  • Supports multiple backup vendors
  • Offers automated operational air gap controlled from the cyber vault
  • The solution is endorsed by Sheltered Harbor
  • Multi-layer security ahead of competition
  • Secure remote management Zero trust Network design for remote access

#1

Data Protection
Appliances & Software*

Sheltered harbor emblems

1200+

Cyber Recovery Customers
250 wins/Q in H2-2021

  • The data cannot be deleted until the lock expires

*Based on combined revenue from the IDC 3Q19 Purpose-Built Backup Appliance (PBBA) Tracker, with select Storage Software segments from the 3Q19 Storage Software and Cloud Services Overview

Meet our experts

Lourens Penning

Lourens Penning

Sales Manager

Danny Van de Vyver

Danny Van de Vyver

Head of Partner Development TS Benelux & Nordics

Benoit Rousseaux

Head of Digital Security Belux and Atos Belgium