A Window Into Your Data Landscape
As institutions become more attractive targets, network administrators require tools purpose-built for the cyberthreats they now face. An important first step in improving security posture is knowing what data is on the network. The sprawling and complex architecture of most university networks can make this a challenge.
Administrators often lack clear visibility into what data they have and whether it is protected. One way to achieve better visibility is with the NetApp Console, which provides a centralized management overview of an institution’s hybrid cloud assets. This console allows colleges to implement a variety of security-focused data services, including NetApp’s Ransomware Resilience.
“This service scans your environment and discovers all of your workloads,” explains Trudewind. “Once Ransomware Resilience discovers them, it can show you if they're protected by all of our ransomware protection capabilities, including AI ransomware detection and immutable, indelible backups.”
Immutable (unchangeable) and indelible (undeletable) backups — and especially write-once, read-many configurations — serve as a critical hedge against ransomware. With a few clicks, network administrators can quickly extend all of NetApp’s ransomware protections, including immutable and indelible backups, to any unprotected workloads on the network.
DIG DEEPER: See proactive ransomware recovery strategies and defense tactics.
Defensive Measures Following a Breach
Should an attacker breach the university’s network defenses, Ransomware Resilience includes data breach detection that will alert the administrator to data that’s been moved offsite by the attacker as well as data that’s been locked out through ransomware encryption. NetApp has added a feature to specifically address the growing data exfiltration threat of more recent ransomware attacks.
“Administrators can now detect when someone's trying to take data offsite, and they are able to block that user account,” says Trudewind. “So, if an attacker uses a stolen user account to send data offsite through a data breach or encrypt data, we can actually block the user account and stop that from occurring.”
