Gartner® Report

How to Protect Backup Systems From Ransomware Attacks

What was once an IT horror story is now an everyday reality — ransomware attacks are growing in frequency and sophistication. Are you prepared?

Download the report to learn:

  • Why immutable backups are more resilient to ransomware attacks
  • How to minimize backup system exposure
  • How to reduce the risk of losing backups during an attack
  • How to accelerate recovery from attacks

IT leaders must take urgent action to protect their backup systems from ransomware and facilitate recovery. Gartner’s latest research uncovers the best options for doing just that.

Ransomware’s target is data. Reliable, immutable backups minimize the risk.

The business of ransomware is booming, and the cost of recovery is enough to put ill-prepared companies out of business. Think your organization isn’t vulnerable? Think again. It’s only a matter of time before your organization is hit.

Here’s the unfortunate reality: When you factor in downtime, people hours, lost opportunities, reputational damage, and customer churn, a typical ransomware attack costs 10 to 15 times more than the ransom demand itself. The average cost of recovery from a ransomware attack in 2021 is estimated at $1.85 million USD. And, on average, company downtime post-attack is 21 days.

To make things worse, paying a ransom doesn’t even guarantee you’ll get your data back. Only 65% of data, on average, is restored after paying a ransom, and just 8% of organizations that pay up retrieve all their data.

With attacks — and their price tags — on the rise, organizations must be proactive about protection and well-prepared to recover. A strong data backup plan is more important than ever.

Why immutable object storage backups are crucial in the fight against ransomware

Innovations in data storage — and object storage specifically — can help with prevention, detection, and recovery from ransomware attacks. Object storage has built-in data recovery capabilities as well as sophisticated permissions and authentication to keep bad actors out. Also, access to data through APIs (the most popular being the Amazon S3 API) is typically more application-centric than user-centric, which limits hacker access. Learn more about why object storage should be part of your anti-ransomware arsenal.

The true hero and not-so-secret weapon against ransomware is data immutability. AWS-compatible S3 object storage solutions render backup data immutable, meaning impervious to deletion or modification — and, therefore, malicious encryption. Learn more about how AWS S3 Object Lock helps your data stay safe.

Scality and Veeam offer enhanced ransomware protection with support for Object Lock

Both of Scality’s storage solutions ARTESCA and RING offer enhanced ransomware protection with support for Amazon S3 Object Lock API. This capability also enabled Scality to pass Cohasset Associates SEC 17a-4 compliance validation for retention of sensitive financial data in banks, brokerage firms and insurance companies — a data security milestone achieved by only a handful of storage systems. Learn more about Scality’s SEC 17a-4 validation.

Qualified as Veeam Ready Object with Immutability, Scality RING and ARTESCA provide for air-gapped, tamper-proof backup data that stays immune to ransomware, offering a robust and swift recovery path in case of an attack. Learn more about Veeam and Scality’s joint solution.

Gartner, How to Protect Backup Systems From Ransomware Attacks, By Nik Simpson, Published 21 September 2021.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Published September 21, 2021. Gartner is a registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Privacy Policy Cookie Policy