Abstract:
A cyber threat detection and deception system interoperates synergistically with a data storage management system. As a proxy for identifying crown jewels among many and diverse data assets in a network, the illustrative cyber threat detection and deception system uses service level information obtained from the data storage management system, e.g., RPO, RTO, append-only secondary storage, synthetic-full frequency, etc. The cyber threat detection and deception system emulates proprietary protocols used by storage management technologies such as the data storage management system, etc. By creating emulation traps and an emulation lexicon of these storage-related protocols, the illustrative cyber threat detection and deception system can create and execute cyber deception plans for the proprietary storage management assets. Synergistically, the illustrative data storage management system is configured to respond to alerts and react to other information received from the cyber threat detection and deception system by taking certain corrective and/or protective actions.
Abstract:
A data retrieval system comprising a first computing device communicatively coupled to a second computing device; the first computing device having a processor that supports operation of at least one software application that is used for retrieving data; the second computing device communicatively coupled to one or more storage media; the software application having a retrieval module for retrieving data from the one or more storage media; a storage and backup map that maps to the second computing device; and a data index stored on the second computing device that indicates to the retrieval module a particular location of the data that is to be retrieved by the retrieval module.
Abstract:
The disclosed cyber threat detection and deception system leverages metadata information collected by the data storage management system. Using the metadata collected by the data storage management system, the cyber threat detection and deception system analyzes that metadata to detect any anomalies. Once suspicious or abnormal behavior is detected in an asset, the cyber threat detection and deception system creates and deploys a cyber deception plan for that asset. The cyber deception plan is implemented by way of deploying sensors or emulation traps in any number of cyber-threat appliances within the data network. Lures or tokens are configured and deployed on the suspected assets themselves to redirect attackers to the emulation traps.
Abstract:
Data recovery from a cyber-attack is expedited based on data storage management integration with cyber threat deception. A cyber threat detection and deception system analyzes a “deposit” placed by an attacker at a deception trap, identifies distinguishing attributes of the deposit, and determines which subset of real data assets may be at risk, preferably based on subnet/VLAN proximity to the attacker's deposit. By focusing immediate attention on the subset of at-risk assets, a data storage management system shortens the amount of time needed to identify safe copies and components and to prepare them for recovery. Storage operations involving the at-risk assets are suspended and users are not shown at-risk assets and cannot invoke recovery or copy operations for them. Without the focus on at-risk assets provided by the cyber threat detection and deception system, the data storage management system would take much longer to navigate its backup data stores.