- 1 Minute to read
- Print
- PDF
Set Up Ransomware Protection
- 1 Minute to read
- Print
- PDF
Ransomware is a type of cyber attack where malware designed to encrypt files on a device is used, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
Automatic Ransomware Protection and Recovering Compromised Content
CTERA Edge Filers from version 7.6 include CTERA Ransom Protect to stop any ransomware attack as soon as it is identified. Taking proactive measures against ransomware attacks helps safeguard your data and ensures the continuity of your operations. CTERA Ransom Protect is able to detect and block ransomware attacks within seconds.
Once a ransomware attack has been identified, every affected file is listed. You can then go through the list and rollback the affected files to the state immediately prior to the attack using snapshots.
The CTERA Portal retains previous file versions, by using snapshots. Snapshots are read-only copies of files as they were at a particular point-in-time. A new snapshot is created every few minutes. The snapshots are saved for a specified period, as defined in the retention policy by the global administrator or team administrator. You can restore a version of any file prior to the date that the content was compromised.
For more details, see:
- Version 7.6: Ransomware Protection
- Version 7.8: Ransomware Protection
Storage node vendors also provide ways to protect the data from disasters and ransomware attacks. For example, with an Amazon S3 storage node, you can use AWS versioning, as described, for version 8.1.x, in Using Amazon S3 Versioning to Protect Against Ransomware Attacks.