Cybersecurity
Presenting Atos “Cyber Recovery” end-to-end solution powered by Dell Technologies that enables enterprises to quickly recover from ransomware and other kinds of destructive cyber-attacks.
Working from home creates more endpoints for cyberattacks.
Attack rates and the Cost-per-attack is at a rise!
It’s not a matter of if… but when!
400%
increase in cyber attacks during Covid 19 pandemic. And what with the war in Ukraine?
82%
of organizations suffered from a disruptive event (e.g., downtime, data loss) in the last 12 months.
69%
of IT decision makers lack confidence they could reliably recover all business-critical data in the event of a cyber attack.
34%
of breaches are inside driven.
21
days average downtime experienced after a ransomware attack.
$19.6m
yearly cost of downtime to the average business.
$4.9T
of global value at risk over next 5 years.
Ransomware as a Service
Ransomware is becoming an industry, with well-organized groups (Circus Spider, DarkSide, Revil, …), and even “Ransomware as a Service” offers
Various internet sources, 2021
Global Organizations
Approximately 37% of global organizations were the victim of some form of ransomware attack in 2021, o/w 54% add data encrypted.
Source IDC
Damages caused
31% closed their business
53% stated their brands were damaged
29% were forced to remove jobs
32% lost top leadership
Cybereason, 2021
What is Atos Cyber Recovery?
NIST Security Framework
Atos end-to-end security coverage
Atos Cyber Recovery is a set of solutions that helps enterprises identify their most critical data assets and automate the protection of recovery copies within a cyber vault. Intelligent software analyzes all incoming datasets and detects any signal of potential threats from the production and backup environments, so you can get back to business quicker.
< Before
Identify
Asset management
Business environment
Governance
Risk assessment
Risk management strategy
Supply chain risk management
< Before
Protect
Access control
Awareness and training
Data security (integrity checking)
Information protection processes and procedures
Maintenance
Protective technology
During
Detect
Anomalies and events
Security continuous monitoring
Dection processes
During
Respond
Response planning
Communications
Analysis
Mitigation
Improvements
> After
Recover
Recovery planning
Improvements
Communications
Validation
Atos’ end-to-end offering is based on three key elements:
- Initial assessment– Atos Cybersecurity Experts identify what matters most to keep businesses up and running in accordance with their data governance program and regulatory landscape.
- Proven products– Atos customers benefit from Dell EMC PowerProtect DD series appliances and PowerProtect Cyber Recovery Solution with CyberSense, the core components of a “cyber recovery vault” PowerProtect
- Overall infrastructure orchestration– Atos teams manage the deployment and implementation within the physical infrastructure to make sure that it becomes effective asap.
- BCM & Cyber Recovery Alignment in the context of NIST Framework – Consulting of Ransomware Readiness Assessment integrated with BCM enables real Cyber Recovery
Atos-Dell Cyber Recovery:
MAINTAIN YOUR BUSINESS OPERATION
EVEN DURING A RANSOMWARE ATTACK
Don’t let a disruption in business cost you more than the ransom. Data is important but without your business that data is useless.
Fill out the form to download examples of how we’ve helped in a few industries.
Costs of downtime and recovery
Our main competitor got severely hacked. They faced 3 weeks total information system downtime and finally had to pay €20M for getting their data back! My team worked all week-end to restore everything, but we missed our SLA and the company lost a lot of revenue!
Data protection gaps
We need to protect data wherever they are located, from the edge, to the core, to the cloud. We’re trying to manage all the multi-environment locations and ensuring our backups are working properly. And that is really a challenge! Now that we build applications with containers, we urgently need to protect these modern workloads in the cloud!
Costs of managing the growth of data
Storing, managing and backing up this ever-increasing data is costly, and it can be time-consuming. It’s one of our biggest challenge!
Lack of time to focus on business
We need to spend less time on IT operations and more time on focusing on our business!
Compliance issues
Since we expanded to the cloud, I’m unsure if we’re still meeting all the compliance regulations for data retention and protection!
Our customers’ pain point
5 main challenges
Cybersecurity is a top-of-mind concern for all organizations.
It’s the top spending priority for businesses of all sizes.
Data is the lifeblood of business. Protecting data is essential.
Increased working from home creates more endpoints for cyberattacks.
Attacks are non-stop! Cost-per-attack is increasing across all sizes and types of businesses and industries.
It’s a matter of “when” an attack or disaster will occur, not “if” it will occur.