New offering aims to synchronize disaster recovery and business continuity with cybersecurity. Credit: MJFelt / Getty Images A new system recovery offering from former IBM division and current managed infrastructure service provider Kyndryl incorporates air-gapped data vaulting technology from Dell for faster recovery from major cybersecurity incidents like ransomware attacks. The Cyber Incident Recovery service is a four-part system, says Kyndryl global security and resiliency practice leader Kris Lovejoy. Kyndryl provides an orchestration tool that offers users a way to respond programmatically and immediately to a cybersecurity event, an analytics tool that uses machine learning to do regular integrity checking on system configuration data (ensuring that it hasn’t been compromised by bad actors), and the company’s own in-house expertise in deployment and configuration of large-scale, enterprise systems. The fourth part is the newly added Dell cybervaulting capability, which provides an air-gapped repository of known-good configuration and backup data for speedy recovery in the event of a major system compromise. Lovejoy says that the idea behind the newly buttressed partnership is to address a logical gap between cybersecurity and disaster recovery/business continuity, particularly where ransomware is concerned. “This is a practical problem that the market faces, that we’ve been focused on for a long time,” she said. “Ransomware is creating a new recognition that there are gaps in our organizational structures.” That gap creates a serious issue in cases where a business has to recover from a ransomware attack — recovering newly wiped systems requires clean backups and configuration data, neither of which is a given in the wake of ransomware. “Imagine your entire infrastructure has been locked up — an incident response provider helps you contain the event and then the question is ‘how do you bring it back?'” Lovejoy says. “You have to assume you have [usable] storage, you have to assume you have a [usable] system configuration, and that’s frequently not accurate.” Moreover, the process of recreating clean configurations and recovering backup data from deep storage is often sufficiently time-consuming that it can be more cost-efficient to simply pay the ransom, instead. By integrating Dell’s cybervaulting capability, then, Kyndryl is hoping to eliminate a key variable that can cost valuable backup time and effort, and — ideally — make it much more attractive to recover organically, instead of paying off cybercriminals. “This kind of technology ensures that, if there’s been a ransomware event, that the company has a backup that can be activated in an automated fashion,” Lovejoy said. Related content analysis Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen Für CISOs und ihre Teams bedeutet die Einhaltung von Cybersicherheitsvorschriften eine enorme Herausforderung. Lesen Sie, was dabei helfen kann. By Andreas Müller 23 Aug 2024 6 mins Business Continuity Risk Management news Counting the cost of CrowdStrike: the bug that bit billions Cyber insurance coverage is set to cover only a fraction of the losses, leaving affected businesses to grapple with substantial uncovered expenses. By Shweta Sharma 26 Jul 2024 1 min Business Continuity Endpoint Protection feature CrowdStrike failure: What you need to know A flawed update to CrowdStrike Falcon sent Windows servers and PCs across the globe into an endless reboot cycle that IT organizations are still working to remediate. By CIO staff 23 Jul 2024 7 mins Technology Industry Incident Response Business Continuity feature 5 critical IT policies every organization should have in place From acceptable use policies to remote work guidelines, identifying the rules and procedures for all individuals accessing your organization’s IT resources is an IT security fundamental. By Bob Violino 22 Jul 2024 7 mins Internet Security Disaster Recovery IT Strategy PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe