Protect VMs in Nutanix Acropolis and other Hypervisors Without a Need to “Rip and Replace”

Catalogic 01/06/2020 0 Comments

In a world that seems to be dominated by “next big thing” messaging, VMWare and Microsoft Hyper-V have found a way for the last decade or so to dominate the hypervisor market – maintaining over 80% of the market share throughout the last ten years.  However, based on the emergence of several other competitors, we may begin to see a shift in the landscape. Though the “Big Two” still maintain a strong majority of the market, now more than ever, organizations are questioning the value proposition of VMware and Hyper-V, and are looking at alternative hypervisors.

There are a few reasons for this shift. The first is obvious, organizations are simply unable to keep up with the increasing cost of VMware and/or Hyper-V, and because of this, are more open to investigating other options. The second reason for this shift is in a way, a result of the first reason: more and more end users are beginning to trust in these alternative hypervisors to host their critical data.

However, one thing that organizations that are making the switch to one of these “other” hypervisors are running into is a problem when it comes to protecting that data. Unlike VMWare and Hyper-V, that have many supported backup solutions, there are a very limited number of products (if any) that protect the VMs in these alternate hypervisors. This is perhaps one of the biggest reasons why more people are unable to transition away from VMWare or Hyper-V. Not only does moving off require implementing an entirely new virtualization platform, but oftentimes requires an entire “rip and replace” of the existing backup architecture.

We are seeing this issue especially concerning with DellEMC customers who have moved to alternate hypervisors like Nutanix AHV.  Without installing agents on each and every VM, DellEMC has no way to natively protect AHV VMs with NetWorker, Avamar, or Data Domain.  Then, what ends up happening is, the end user has to implement an entirely new backup solution that not only protects everything that the previous infrastructure backed up, but also the Nutanix VMs. A full “rip and replace” just to fill the gap in protecting the VMs in that alternate hypervisor.

Well, we at Catalogic Software say, “why buy an entirely new car just because of a flat tire.”  Instead of spending the time and money on an entirely new backup architecture, allow Catalogic Software’s vProtect to bridge that gap.

vProtect is a modern, enterprise-level backup solution designed specifically to protect these open-sourced VM environments, providing agentless protection. This includes support for Nutanix Acropolis, Red Hat Virtualization, oVirt, Kubernetes, and more. What is great for end users is that there is no need to make any changes to your existing backup architecture. vProtect directly integrates with Dell EMC NetWorker, Avamar, and DataDomain Boost File System as a backup destination for the “previously unsupported” hypervisor.  (Additional options for backup destination include IBM Spectrum Protect, Veritas NetBackup, cloud storage, and even local file systems or NFS)

Following a simple RPM deployment, and configuring at least one vProtect Node as a datamover, on-demand or protection policies perform backup jobs for individual or groups of VMs, storing the backup data in a predefined backup destination. This should be outstanding news for existing DellEMC accounts. Not only does this allow you a cost-effective way to protect the VMs that you were previously unable to protect, but it also prevents the need for a “rip and replace”, that would require major architectural changes, extensive reconfiguration, and additional cost. On top of that, your admins would be able to continue to use the existing NetWorker, Avamar, or Data Domain appliances that they are used to. They will also be able to continue to leverage the specific features of those appliances, including reporting, cataloging, deduplication etc. that they purchased DellEMC for in the first place, and now include the backup data from the previously unsupported hypervisor.

In conclusion, if your organization is investigating alternative hypervisors, or perhaps have already taken that step, don’t be forced to perform an entire re-architecture of your existing backup infrastructure. Simply use vProtect to fill the gap, protect your VMs and seamlessly integrate directly to your existing backup destination.

If you would like to learn more about vProtect, you can request a live demo or even get a 30-day trial copy to try it for yourself. We’ll be happy to help you set things up.

We also have a pre-recorded demo available on our website if you would like to see the product in action on your own time.

In my previous post, I discussed how snapshots are a feature, and not a solution. Snapshots, in conjunction with RestoreManager, can enable NetApp users to have a valid data protection solution. In this post, I’m going to discuss how snapshots are an important feature to recovering data effectively and efficiently in the event of a ransomware attack.

Sadly, we live in a day and age whereby ransomware is the “go-to method of attack” for Cybercriminals. According to Cyber Security Ventures, it’s estimated that every 14 seconds a business falls victim to a ransomware attack. We see details of the impact of attacks in the news on almost a daily basis, and it’s severely impacting the ability of all business types to generate revenue and function normally. The damage of these attacks is costing billions globally, with the estimated cost predicted to reach over $20 Billion by 2021.

Due to this, a question frequently asked at Catalogic is, “how can I ensure my content within my NetApp environment is fully protected from the threat of ransomware, and more importantly, enable the ability to only recover potentially infected files of ransomware hits?”

Our simple answer: CryptoSpike

CryptoSpike delivers real-time detection of ransomware on NetApp file systems. It enables protection through 3 key elements:

  1. The Blacklist – This stops ransomware at the front door. The Blacklist contains over 2960 file types and ransomware signatures, meaning we prevent these from being stored on the filer. This Blacklist is automatically updated via a global team that are collecting information regarding the latest known ransomware attacks signatures and file types from multiple sources.
  2. The Whitelist – This blocks all file types except the allowed file type list. This is very good from a security perspective, but limits types of files. This works very well when applied at a granular level i.e. an accounting folder allows only Excel files in a specific share.
  3. The AI Learner Module – The most intelligent part of the product, the AI Learner Module. Because we are monitoring SMB transactions on the filer, we can detect unusual behavior i.e. too many files read or altered in a period of time vs. that user’s typical behavior and cut off user access. This means if an unknown or cutting-edge attack starts or even a malicious user is wanting to start wreaking havoc, CryptoSpike prevents this from happening via blocking the user.

We can setup granularity, as well as, all SMB transactions to be monitored for clusters, SVMs, volumes, and shares.

The impact of the monitoring being made active is very minimal. Generally, you can expect up to 0.3ms increase in latency due to the TCP packets being sent between ONTAP and the F-Policy servers.

All this sounds great, but what about the ability to recover data in the event of a ransomware attack?

One of the key differentiators of CryptoSpike is we provide the ability to quickly restore individual files from snapshots – meaning in the event of a ransomware attack or data breach, you only recover the impacted data. Enabling NetApp users to use Snapshots as a valid ransomware protection solution.

Data recovery can be quickly and easily identified via file activity reporting. This is because CryptoSpike monitors and logs all user file access (reads, writes, opens, etc). This means you can identify who was infected, who accessed which files, who has made changes to files, and who has deleted files. You are then able to make quick business orientated decisions to ensure the businesses data is quickly recovered and available again to ensure continued normal business operations.

Additionally, CryptoSpike is incredibly simple to deploy with minimal resources required for 1x CryptoSpike Server and 2x F-Policy Servers.

The requirements for these are as follows:

  • CryptoSpike Server
    • 8vCPU
    • 4GB RAM
    • Minimum 100GB Disk Space
  • CryptoSpike FPolicy Server
    • 4vCPU
    • 4GB RAM
    • Minimum 20GB Disk Space
  • Connection between Data LIF SVM <-> FPolicy Server (high performance, low latency)
  • Connection between FPolicy Server <-> CryptoSpike Server (high throughput)
  • Connection between CryptoSpike Server <-> ONTAP Mgmt. (not performance critical)
  • Connection to https://cryptospike.prolion.at (for Black-List loading)
  • Connection to https://cryptospike.prolion.at/repository/ (for general updates)

All can be deployed via OVA files into VMware vSphere environments. An example of the architecture of a typical CryptoSpike setup is shown below:

Image: CryptoSpike Example Architecture

We understand that companies are hesitant to deploy CryptoSpike based on the potential impact it has in blocking user access to critical file data. To ease those doubts and ensure no actions are taken at the start of proof of concept, we recommend you put CryptoSpike into asynchronous mode. In asynchronous mode, Cryptospike will not block anything. The user will appear in “Blocked Users”, but an email notification will be sent to ensure the user has not been blocked. After a period of 7+ days, you can then switch from asynchronous mode to synchronous mode making CryptoSpike live, and your environment protected.

If you want to learn more, get a no obligation quote or run a proof of concept, feel free to get in contact with us to quickly provide you with what you are looking for.

Ransomware/Malware Protection:

Ransomware activity is at an all-time high in 2020. Researchers estimate that a business is attacked by a cybercriminal every 11 seconds and expect that damage costs from these attacks will hit around $20 billion by 2021. With so many employees working remotely, accessing networks and critical data from personal devices and potentially flawed VPNs, it is especially important to prevent Ransomware threats from accessing business-critical NAS data in CIFS and NFS shares.
That is where Catalogic Software’s CryptoSpike comes in.
CryptoSpike is ransomware protection, prevention, and recovery tool that is designed to protect NAS data stored on CIFS and NFS shares on NetApp storage. It leverages NetApp’s FPolicy to monitor user behavior and identify when suspicious activity is occurring, stopping those activities in their tracks. CryptoSpike also integrates directly with NetApp to utilize single-file restores from NetApp snapshots to help recover from any attack. This prevents the need to revert an entire snapshot, essentially losing all of the files across that volume.
CryptoSpike can protect your data from COVID-19-themed ransomware attacks, as well as other traditional and evolved forms of ransomware. Cryptospike actively monitors suspicious behavior, quarantining possible threats, and by giving you the ability to recover only files affected by the attack.

File Access Transparency and Data Governance

But data security is not always about protecting your data from outside threats. Consumers’ personal information needs to be secure within your organization, as well. Data governance is the process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. Effective data governance ensures that data is consistent and trustworthy and doesn’t get misused.

Catalogic Software’s portfolio contains multiple products that can help maintain data governance standards. CryptoSpike for example provides file access transparency for file activity auditing. Through its FPolicy collection mentioned above, CryptoSpike collects all file activity and stores that activity data in its database. It then leverages Grafana Dashboards to provide a visual representation of this audit data that can be filtered to show activity for certain users, time frames, shares/volumes, etc. If, for example, a disgruntled employee is somehow able to view/copy/delete files that they should not have, CryptoSpike can provide a detailed list of those actions, and also restore those files to an earlier snapshot if needed.

Another product called RestoreManager can also help maintain an effective data governance standard, by providing analytics and reporting on user’s file permissions and ownership. RestoreManager is a virtual appliance that can provide an online catalog of NetApp NAS data for an index, search and restore of individual files or folders. To provide this index of NetApp snapshots, RestoreManager performs a SnapDiff/CIFS crawl of file shares, storing that crawled metadata in an Elasticsearch database that is local to the appliance.

This allows for instant “google-like” search for files/folders. It also allows end-users to generate customizable reports for analyzing that data, using Kibana Dashboards. These reports can help better understand exactly what type of data is stored on the NetApp systems, how old that data is when it was last modified, etc. And, for the topic of data governance, can present information on specific permissions that users have on individual files and folders, and also a list of files that each particular user “owns.”

Data Masking of Oracle Data for Data-Reuse

Another area where data security is extremely important is when production data is moved to non-production or cloud environments for testing or development purposes. Oftentimes, since non-production environments are generally not as protected or monitored as production environments, they become an easy target for cybercriminals. This means that when Oracle databases, for example, are copied to a non-production server for test-dev purposes, the data stored in those Oracle databases are at risk. For many organizations, take a hospital for example, that data will include customers’ personal information, like credit card numbers, social security numbers, etc. Because of this, it is extremely important that when Oracle databases are mounted non-production environments, this personal information is masked in some way. Data Masking is the process of replacing sensitive values, like credit card numbers, with a fake yet realistic-looking number.

ECX, another product developed by Catalogic Software, provides the ability to seamlessly integrate with Data Masking software to automatically mask Oracle data as it is being mounted on a test server for development testing.

ECX provides automation and orchestration of application-consistent storage snapshots that can be used to backup and restore databases for applications like SQL, Oracle, and SAP HANA. This means that ECX can understand what storage volumes need to be snapshotted to protect specific applications. It then uses those snapshots to “restore” or spin up those databases on the same or alternate Oracle server for a variety of use cases. In this particular example, when ECX is tasked to copy an Oracle database from a production environment to a test server, the “restore” job can include integrated data masking workflows that will then mount a masked copy of that database to be used for development. This way, if there is a security breach in that non-production environment, cybercriminals will only have access to fake personal information.

Additional Data Security Features

In addition to masking Oracle data, ECX also can structure role-based access controls for the backup data, as well as the cloned volumes, VMs, and applications created by ECX. This means that ECX can limit the permissions of ECX users within the web-based GUI to view/perform certain tasks for specific use cases. SQL DBAs for example, may be granted the ability to run individual SQL-specific backup and restore jobs, but will not have the ability to run any Oracle-based jobs, or make changes to any backup SLA policies.

This feature is available in Catalogic Software’s DPX product as well. DPX is the first product that Catalogic launched in the late ’90s. It is an all-purpose backup and restore solution for virtual and physical machines, that can backup to multiple backup destinations like disk, tape, or cloud. This includes its own software-defined backup target that Catalogic developed called vStor.

Just like with ECX, DPX allows for structured role-based access controls to define specific backup users, etc. limiting them in areas that they should not have access to.

Another way that DPX promotes data security is its ability to perform encryption of backup data. This includes encryption for tape drives attached to a NetApp device. With hardware encryption, the tape device encrypts data as it is written to the tape. DPX can also perform disk-level encryption using its vStor appliance mentioned above.

As you can see, Catalogic Software understands that, especially in 2020, protecting you and your customers’ information is a top priority. That is why data security is a major aspect of Catalogic Software’s product portfolio.

CryptoSpike is specifically designed to protect you from and prevent the spread of Ransomware activity on your NetApp NAS data. It also helps maintain an effective data governance standard by providing file access transparency for auditing. If you would like to learn more about CryptoSpike, go to

RestoreManager also helps with data governance by providing granular reporting and analytics on file permissions and ownership. You can learn more about RestoreManager here.

Catalogic’s ECX allows for automated recovery/copy of masked oracle data using storage snapshots. ECX can integrate with any of the data masking solutions out there, removing the risk of consumers’ personal information from being vulnerable in non-production environments. ECX also features granular role-based access control to limit the permissions for application or backup-specific roles.

And finally, DPX is Catalogic’s all-purpose backup and restore appliance. DPX also features role-based access controls, as well as multiple encryption options for backup data.

Leave a Reply

Your email address will not be published.

Let us show you around


Data ProtectionData ManagementOpen VM BackupNetApp Ransomware ShieldNetApp File Catalog