Catalogic DPX 4.6.0 is launched

Catalogic 12/19/2019 0 Comments

The success of any good Data Protection solution lies in its ability to recover swiftly and smoothly. DPX has been a pioneer in optimizing for quick and easy access to your backups, effectively an insurance against your bad days. DPX has been a leader in focusing on immediate access to your data sets through early patents on Instant Access and Instant Virtualization methods. For thousands of customers, DPX has been part of their core data protection strategy, enabling fast backup and instant recovery and is trusted due to its leading industry reliability and comprehensive coverage.

This week we launched DPX 4.6.0 and it’s great to announce so many major features in a single release. Let’s run through some of the key components of the new release that our team has been putting a ton of effort into.

New DPX Management Interface

DPX 4.6 brings an exciting introduction in that we are moving away from the Java standalone GUI and to a HTML5 based web UI – consistent with the modern look and feel that our customers are accustomed to. This enables us to deliver a new fresh and modernized data protection product that is focused on ease of access and simplicity for our users to monitor and manage their data protection environment. In the first release we have focused on the dashboard, job monitor and schedule overview with more of your day to day operations converted to this interface in upcoming patches and releases. Here are a few screenshots to whet your appetite.

Image: DPX Management Interface Screenshot 1

Image: DPX Management Interface Screenshot 2

It must be noted that the UI is being built on top of the new DPX RestAPIs. Once completed, this will also enhance ease of use by allowing customers to integrate with DPX via existing customer automation platforms and workflows utilizing these robust APIs. Engage our product teams, if there are any specific requirements for your automation needs.

Archive to Cloud for NDMP and Agentless backups on vStor

Cloud has become part of the core DR strategy in many organizations. There has been a growing set of requests allowing us to use S3 and Glacier storage as targets for longer term retention data.

  • NDMP remains one of DPX’ core strengths. DPX has been supporting NDMP workloads for over 15 years and are one of the first solutions to be certified by NetApp for Cluster Aware Backups. There has been a resurgence in adoption of NDMP backups since customers are looking for “Air Gaps” and Media Separation to protect themselves against cyber attackers.
  • This feature provides the ability for us to support cheap and deep storage for storing NDMP archives as well as our VMware Agentless backups to S3 targets directly.
  • NDMP backups can also be offloaded to Glacier Storage for infrequently accessed archives.

Additional Features in this Release

  • Hyper-V templates for DPX Master Server and vStor Appliances
    Enables simplistic deployment within Hyper-V environments via these templates.
  • S3 bucket support for vStor volumes
    Allows our vStor Appliance to serve up S3 buckets to which Applications can write directly to, as an object storage.
  • Performance tuning for vStor
    Enhances the performance and security of our snapshot and volume management.
  • Expanded Support
    Expands support to new versions of RedHat and CentOS.

More details regarding DPX 4.6.0 can be found here.

If you want to learn more about the updates, what the future holds for DPX or how DPX can become the core of your data protection strategy, feel free to contact us or send an email to info@catalogicsoftware.com.

In my previous post, I discussed how snapshots are a feature, and not a solution. Snapshots, in conjunction with RestoreManager, can enable NetApp users to have a valid data protection solution. In this post, I’m going to discuss how snapshots are an important feature to recovering data effectively and efficiently in the event of a ransomware attack.

Sadly, we live in a day and age whereby ransomware is the “go-to method of attack” for Cybercriminals. According to Cyber Security Ventures, it’s estimated that every 14 seconds a business falls victim to a ransomware attack. We see details of the impact of attacks in the news on almost a daily basis, and it’s severely impacting the ability of all business types to generate revenue and function normally. The damage of these attacks is costing billions globally, with the estimated cost predicted to reach over $20 Billion by 2021.

Due to this, a question frequently asked at Catalogic is, “how can I ensure my content within my NetApp environment is fully protected from the threat of ransomware, and more importantly, enable the ability to only recover potentially infected files of ransomware hits?”

Our simple answer: CryptoSpike

CryptoSpike delivers real-time detection of ransomware on NetApp file systems. It enables protection through 3 key elements:

  1. The Blacklist – This stops ransomware at the front door. The Blacklist contains over 2960 file types and ransomware signatures, meaning we prevent these from being stored on the filer. This Blacklist is automatically updated via a global team that are collecting information regarding the latest known ransomware attacks signatures and file types from multiple sources.
  2. The Whitelist – This blocks all file types except the allowed file type list. This is very good from a security perspective, but limits types of files. This works very well when applied at a granular level i.e. an accounting folder allows only Excel files in a specific share.
  3. The AI Learner Module – The most intelligent part of the product, the AI Learner Module. Because we are monitoring SMB transactions on the filer, we can detect unusual behavior i.e. too many files read or altered in a period of time vs. that user’s typical behavior and cut off user access. This means if an unknown or cutting-edge attack starts or even a malicious user is wanting to start wreaking havoc, CryptoSpike prevents this from happening via blocking the user.

We can setup granularity, as well as, all SMB transactions to be monitored for clusters, SVMs, volumes, and shares.

The impact of the monitoring being made active is very minimal. Generally, you can expect up to 0.3ms increase in latency due to the TCP packets being sent between ONTAP and the F-Policy servers.

All this sounds great, but what about the ability to recover data in the event of a ransomware attack?

One of the key differentiators of CryptoSpike is we provide the ability to quickly restore individual files from snapshots – meaning in the event of a ransomware attack or data breach, you only recover the impacted data. Enabling NetApp users to use Snapshots as a valid ransomware protection solution.

Data recovery can be quickly and easily identified via file activity reporting. This is because CryptoSpike monitors and logs all user file access (reads, writes, opens, etc). This means you can identify who was infected, who accessed which files, who has made changes to files, and who has deleted files. You are then able to make quick business orientated decisions to ensure the businesses data is quickly recovered and available again to ensure continued normal business operations.

Additionally, CryptoSpike is incredibly simple to deploy with minimal resources required for 1x CryptoSpike Server and 2x F-Policy Servers.

The requirements for these are as follows:

  • CryptoSpike Server
    • 8vCPU
    • 4GB RAM
    • Minimum 100GB Disk Space
  • CryptoSpike FPolicy Server
    • 4vCPU
    • 4GB RAM
    • Minimum 20GB Disk Space
  • Connection between Data LIF SVM <-> FPolicy Server (high performance, low latency)
  • Connection between FPolicy Server <-> CryptoSpike Server (high throughput)
  • Connection between CryptoSpike Server <-> ONTAP Mgmt. (not performance critical)
  • Connection to https://cryptospike.prolion.at (for Black-List loading)
  • Connection to https://cryptospike.prolion.at/repository/ (for general updates)

All can be deployed via OVA files into VMware vSphere environments. An example of the architecture of a typical CryptoSpike setup is shown below:

Image: CryptoSpike Example Architecture

We understand that companies are hesitant to deploy CryptoSpike based on the potential impact it has in blocking user access to critical file data. To ease those doubts and ensure no actions are taken at the start of proof of concept, we recommend you put CryptoSpike into asynchronous mode. In asynchronous mode, Cryptospike will not block anything. The user will appear in “Blocked Users”, but an email notification will be sent to ensure the user has not been blocked. After a period of 7+ days, you can then switch from asynchronous mode to synchronous mode making CryptoSpike live, and your environment protected.

If you want to learn more, get a no obligation quote or run a proof of concept, feel free to get in contact with us to quickly provide you with what you are looking for.

Ransomware/Malware Protection:

Ransomware activity is at an all-time high in 2020. Researchers estimate that a business is attacked by a cybercriminal every 11 seconds and expect that damage costs from these attacks will hit around $20 billion by 2021. With so many employees working remotely, accessing networks and critical data from personal devices and potentially flawed VPNs, it is especially important to prevent Ransomware threats from accessing business-critical NAS data in CIFS and NFS shares.
That is where Catalogic Software’s CryptoSpike comes in.
CryptoSpike is ransomware protection, prevention, and recovery tool that is designed to protect NAS data stored on CIFS and NFS shares on NetApp storage. It leverages NetApp’s FPolicy to monitor user behavior and identify when suspicious activity is occurring, stopping those activities in their tracks. CryptoSpike also integrates directly with NetApp to utilize single-file restores from NetApp snapshots to help recover from any attack. This prevents the need to revert an entire snapshot, essentially losing all of the files across that volume.
CryptoSpike can protect your data from COVID-19-themed ransomware attacks, as well as other traditional and evolved forms of ransomware. Cryptospike actively monitors suspicious behavior, quarantining possible threats, and by giving you the ability to recover only files affected by the attack.

File Access Transparency and Data Governance

But data security is not always about protecting your data from outside threats. Consumers’ personal information needs to be secure within your organization, as well. Data governance is the process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. Effective data governance ensures that data is consistent and trustworthy and doesn’t get misused.

Catalogic Software’s portfolio contains multiple products that can help maintain data governance standards. CryptoSpike for example provides file access transparency for file activity auditing. Through its FPolicy collection mentioned above, CryptoSpike collects all file activity and stores that activity data in its database. It then leverages Grafana Dashboards to provide a visual representation of this audit data that can be filtered to show activity for certain users, time frames, shares/volumes, etc. If, for example, a disgruntled employee is somehow able to view/copy/delete files that they should not have, CryptoSpike can provide a detailed list of those actions, and also restore those files to an earlier snapshot if needed.

Another product called RestoreManager can also help maintain an effective data governance standard, by providing analytics and reporting on user’s file permissions and ownership. RestoreManager is a virtual appliance that can provide an online catalog of NetApp NAS data for an index, search and restore of individual files or folders. To provide this index of NetApp snapshots, RestoreManager performs a SnapDiff/CIFS crawl of file shares, storing that crawled metadata in an Elasticsearch database that is local to the appliance.

This allows for instant “google-like” search for files/folders. It also allows end-users to generate customizable reports for analyzing that data, using Kibana Dashboards. These reports can help better understand exactly what type of data is stored on the NetApp systems, how old that data is when it was last modified, etc. And, for the topic of data governance, can present information on specific permissions that users have on individual files and folders, and also a list of files that each particular user “owns.”

Data Masking of Oracle Data for Data-Reuse

Another area where data security is extremely important is when production data is moved to non-production or cloud environments for testing or development purposes. Oftentimes, since non-production environments are generally not as protected or monitored as production environments, they become an easy target for cybercriminals. This means that when Oracle databases, for example, are copied to a non-production server for test-dev purposes, the data stored in those Oracle databases are at risk. For many organizations, take a hospital for example, that data will include customers’ personal information, like credit card numbers, social security numbers, etc. Because of this, it is extremely important that when Oracle databases are mounted non-production environments, this personal information is masked in some way. Data Masking is the process of replacing sensitive values, like credit card numbers, with a fake yet realistic-looking number.

ECX, another product developed by Catalogic Software, provides the ability to seamlessly integrate with Data Masking software to automatically mask Oracle data as it is being mounted on a test server for development testing.

ECX provides automation and orchestration of application-consistent storage snapshots that can be used to backup and restore databases for applications like SQL, Oracle, and SAP HANA. This means that ECX can understand what storage volumes need to be snapshotted to protect specific applications. It then uses those snapshots to “restore” or spin up those databases on the same or alternate Oracle server for a variety of use cases. In this particular example, when ECX is tasked to copy an Oracle database from a production environment to a test server, the “restore” job can include integrated data masking workflows that will then mount a masked copy of that database to be used for development. This way, if there is a security breach in that non-production environment, cybercriminals will only have access to fake personal information.

Additional Data Security Features

In addition to masking Oracle data, ECX also can structure role-based access controls for the backup data, as well as the cloned volumes, VMs, and applications created by ECX. This means that ECX can limit the permissions of ECX users within the web-based GUI to view/perform certain tasks for specific use cases. SQL DBAs for example, may be granted the ability to run individual SQL-specific backup and restore jobs, but will not have the ability to run any Oracle-based jobs, or make changes to any backup SLA policies.

This feature is available in Catalogic Software’s DPX product as well. DPX is the first product that Catalogic launched in the late ’90s. It is an all-purpose backup and restore solution for virtual and physical machines, that can backup to multiple backup destinations like disk, tape, or cloud. This includes its own software-defined backup target that Catalogic developed called vStor.

Just like with ECX, DPX allows for structured role-based access controls to define specific backup users, etc. limiting them in areas that they should not have access to.

Another way that DPX promotes data security is its ability to perform encryption of backup data. This includes encryption for tape drives attached to a NetApp device. With hardware encryption, the tape device encrypts data as it is written to the tape. DPX can also perform disk-level encryption using its vStor appliance mentioned above.

As you can see, Catalogic Software understands that, especially in 2020, protecting you and your customers’ information is a top priority. That is why data security is a major aspect of Catalogic Software’s product portfolio.

CryptoSpike is specifically designed to protect you from and prevent the spread of Ransomware activity on your NetApp NAS data. It also helps maintain an effective data governance standard by providing file access transparency for auditing. If you would like to learn more about CryptoSpike, go to

RestoreManager also helps with data governance by providing granular reporting and analytics on file permissions and ownership. You can learn more about RestoreManager here.

Catalogic’s ECX allows for automated recovery/copy of masked oracle data using storage snapshots. ECX can integrate with any of the data masking solutions out there, removing the risk of consumers’ personal information from being vulnerable in non-production environments. ECX also features granular role-based access control to limit the permissions for application or backup-specific roles.

And finally, DPX is Catalogic’s all-purpose backup and restore appliance. DPX also features role-based access controls, as well as multiple encryption options for backup data.

Leave a Reply

Your email address will not be published.

Let us show you around