Dell brings data recovery tools to Apex and the cloud

Dell shows off full stack of cyber recovery SaaS, partners with Snowflake for data analytics

LAS VEGAS – Dell is giving enterprises new ways to protect the data they store in public clouds.

At the Dell Technologies World event Monday, the company unveiled a full-stack cyber-recovery managed services offering in its Apex -as-a-service portfolio and data protection technologies that will be available in both the Amazon Web Services (AWS) and Microsoft Azure public clouds.

In addition, Dell is partnering with high-profile cloud-based data analytics vendor Snowflake to enable organizations to take the data they're keeping in their data centers in Dell object storage and run it in Snowflake's Data Cloud while keeping the data on premises or copying it to the public cloud, an important capability for companies with data sovereignty or privacy concerns who can't freely move it around.

In another move to bridge the gap between data stored in central data center and in public clouds, Dell at the show is demonstrating how its block and file storage platforms can run in public clouds and how companies can buy the software as a managed service via cloud credits.

"The world is becoming more and more of a multicloud world," Sam Grocott, senior vice president of product market at Dell, said during a briefing with journalists. "Our customers have their data and their applications spread across everywhere, whether it's within data centers, across colocation facilities, public cloud, and increasingly more so, we're seeing it at the edge."

Those customers are pushing Dell to give them the ease of use and agility of public clouds throughout their IT environments, Grocott said.

Dell in 2020 announced Apex as an effort to make its entire portfolio available as a service and give organizations a more cloud-like experience. That includes offering enterprises multiple consumption models, including paying for products via a subscription.

It illustrates the central importance of data in the modern enterprise and the rapidly disappearing lines between cloud players and longtime infrastructure OEMs. Other vendors also are increasingly offering their products as services, including Hewlett Packard Enterprise with GreenLake, Lenovo with TruScale and Cisco via Cisco+.

"Apex is really about delivering that cloud-like experience to our customers in on-premises or in co-location," Chad Dunn, vice president of Apex product management, said during the briefing. "We've done this for computing services. We've done this for data storage services, we've done it for data protection. Now we're doing it for a full stack solution."

The Apex Cyber Recovery Services are the first full-stuck offering in the as-a-service portfolio, Dunn said. The managed service designed to help organizations more easily recover from cyberattacks, including ransomware. Enterprises can store their data in isolated and immutable data vaults in the cloud. If data is encrypted or exfiltrated through an attack, the targeted company can use the data in the vault to return to the last clean image.

Dell also manages the vaults and uses a security analytics platform to detect anomalies in both the vault and underlying infrastructure.

Like other OEMs, Dell also is making more of its technologies available in multiple public clouds. The company late last year made its PowerProtect Cyber Recovery software available in AWS. The software is designed to isolate and protect data from ransomware and other threats, including using analytics and machine learning techniques to monitor the integrity of the data and detect attacks. There also are recovery options in case of attack, including within an enterprise's data center.

Now Dell will make the software available on Azure, so the recovery options also will include a new Azure private network or an unimpacted Azure environment.

"This is all about being able to create that air-gapped copy and – In this case, a physically isolated air-gapped copy as well – of that data in the public cloud," Caitlin Gordon, vice president of software and solutions product management at Dell, told journalists. "We really see an increased desire and flexibility of how customers and where customers want to create these cyber vaults and being able to do that in the public cloud not only gives them another opportunity in another location, but actually enables them to be able to test recovery very efficiently as well, because they can spin up and spin down those resources in the public cloud."

Dell is expanding its work with AWS by bringing CyberSense for PowerProtect Cyber Recovery to the cloud. CyberSense is software that enables organizations to more quickly detect and recovery from attacks and to monitor files and databases to determine if an attack has happened. They can respond to an attack by identifying the last known uncorrupted copy of data that can be used during the recovery.

The partnership with Snowflake gives organizations greater flexibility in where they store their data and how they analyze it, Gordon said.

"Customers want to keep some of that data in their data center, but they still want to use that with their Snowflake-based analytics by not changing where the analytics run by keeping the data in place," she said. "We've been able to collaborate to enable Snowflake's external table capability to read the data that exists on our on-prem object storage capabilities of either ECS or ObjectScale so that you can actually read that data and keep it in place but leverage that with the other cloud-based data that you have in the Snowflake platform."

Bob O'Donnell, principal analyst with TECHnalysis Research, told The Register that at a high level, Dell is enabling organizations to do the two key things they want with their data: protect it and get value from it. What the vendor – and others like HPE, Lenovo and Cisco – also is doing is ensuring that in a data- and cloud-centric world, they are still the top option for enterprises.

"They still have a lot of customers that still have a lot of data on-site," O'Donnell said, adding that those that have worked with Dell for years for their on-premises needs can now continue with the company as they shift to a more modern IT environment. ®

Other stories you might like

  • Google battles bots, puts Workspace admins on alert
    No security alert fatigue here

    Google has added API security tools and Workspace (formerly G-Suite) admin alerts about potentially risky configuration changes such as super admin passwords resets.

    The API capabilities – aptly named "Advanced API Security" – are built on top of Apigee, the API management platform that the web giant bought for $625 million six years ago.

    As API data makes up an increasing amount of internet traffic – Cloudflare says more than 50 percent of all of the traffic it processes is API based, and it's growing twice as fast as traditional web traffic – API security becomes more important to enterprises. Malicious actors can use API calls to bypass network security measures and connect directly to backend systems or launch DDoS attacks.

    Continue reading
  • Carnival Cruises torpedoed by US states, agrees to pay $6m after wave of cyberattacks
    Now those are some phishing boats

    Carnival Cruise Lines will cough up more than $6 million to end two separate lawsuits filed by 46 states in the US after sensitive, personal information on customers and employees was accessed in a string of cyberattacks.

    A couple of years ago, as the coronavirus pandemic was taking hold, the Miami-based biz revealed intruders had not only encrypted some of its data but also downloaded a collection of names and addresses; Social Security info, driver's license, and passport numbers; and health and payment information of thousands of people in almost every American state.

    It all started to go wrong more than a year prior, as the cruise line became aware of suspicious activity in May 2019. This apparently wasn't disclosed until 10 months later, in March 2020.

    Continue reading
  • If you didn't store valuable data, ransomware would become impotent
    Start by pondering if customers could store their own info and provide access

    Column Sixteen years ago, British mathematician Clive Humby came up with the aphorism "data is the new oil".

    Rather than something that needed to be managed, Humby argued data could be prospected, mined, refined, productized, and on-sold – essentially the core activities of 21st century IT. Yet while data has become a source of endless bounty, its intrinsic value remains difficult to define.

    That's a problem, because what cannot be valued cannot be insured. A decade ago, insurers started looking at offering policies to insure data against loss. But in the absence of any methodology for valuing that data, the idea quickly landed in the "too hard" basket.

    Continue reading
  • HelloXD ransomware bulked up with better encryption, nastier payload
    Russian-based group doubles the extortion by exfiltrating the corporate data before encrypting it.

    Windows and Linux systems are coming under attack by new variants of the HelloXD ransomware that includes stronger encryption, improved obfuscation and an additional payload that enables threat groups to modify compromised systems, exfiltrate files and execute commands.

    The new capabilities make the ransomware, first detected in November 2021 - and the developer behind it even more dangerous - according to researchers with Palo Alto Networks' Unit 42 threat intelligence group. Unit 42 said the HelloXD ransomware family is in its initial stages but it's working to track down the author.

    "While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k," the researchers wrote in a blog post.

    Continue reading

Biting the hand that feeds IT © 1998–2022