Catalogic Software Strengthens Focus on Data Security from Multiple Angles
With the rapid transition to remote-working employees, malicious actors are looking to exploit weaknesses that have been exposed due to reduced IT staffing and the use of personal devices and insecure public and home networks. Businesses are also experiencing an increase in the number of phishing threats aimed at employees to open coronavirus-related messages infected with malware. At the same time, consumers are becoming more aware of these threats, and have higher expectations for the security of their personal information. This means that businesses are facing data privacy questions from these consumers, regarding the collection and disclosure of personal information.
Catalogic Software offers a variety of solutions, each designed to target that data security concern in a different way. These products improve data security by protecting against outside threats, like Ransomware, but also by providing additional data governance/access transparency, data masking for Oracle databases for data reuse, and granular role-based access control for backup and application data.
Ransomware activity is at an all-time high in 2020. Researchers estimate that a business is attacked by a cybercriminal every 11 seconds and expect that damage costs from these attacks will hit around $20 billion by 2021. With so many employees working remotely, accessing networks and critical data from personal devices and potentially flawed VPNs, it is especially important to prevent Ransomware threats from accessing business-critical NAS data in CIFS and NFS shares.
That is where Catalogic Software’s CryptoSpike comes in.
CryptoSpike is ransomware protection, prevention, and recovery tool that is designed to protect NAS data stored on CIFS and NFS shares on NetApp storage. It leverages NetApp’s FPolicy to monitor user behavior and identify when suspicious activity is occurring, stopping those activities in their tracks. CryptoSpike also integrates directly with NetApp to utilize single-file restores from NetApp snapshots to help recover from any attack. This prevents the need to revert an entire snapshot, essentially losing all of the files across that volume.
CryptoSpike can protect your data from COVID-19-themed ransomware attacks, as well as other traditional and evolved forms of ransomware. Cryptospike actively monitors suspicious behavior, quarantining possible threats, and by giving you the ability to recover only files affected by the attack.
File Access Transparency and Data Governance
But data security is not always about protecting your data from outside threats. Consumers’ personal information needs to be secure within your organization, as well. Data governance is the process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. Effective data governance ensures that data is consistent and trustworthy and doesn’t get misused.
Catalogic Software’s portfolio contains multiple products that can help maintain data governance standards. CryptoSpike for example provides file access transparency for file activity auditing. Through its FPolicy collection mentioned above, CryptoSpike collects all file activity and stores that activity data in its database. It then leverages Grafana Dashboards to provide a visual representation of this audit data that can be filtered to show activity for certain users, time frames, shares/volumes, etc. If, for example, a disgruntled employee is somehow able to view/copy/delete files that they should not have, CryptoSpike can provide a detailed list of those actions, and also restore those files to an earlier snapshot if needed.
Another product called RestoreManager can also help maintain an effective data governance standard, by providing analytics and reporting on user’s file permissions and ownership. RestoreManager is a virtual appliance that can provide an online catalog of NetApp NAS data for an index, search and restore of individual files or folders. To provide this index of NetApp snapshots, RestoreManager performs a SnapDiff/CIFS crawl of file shares, storing that crawled metadata in an Elasticsearch database that is local to the appliance.
This allows for instant “google-like” search for files/folders. It also allows end-users to generate customizable reports for analyzing that data, using Kibana Dashboards. These reports can help better understand exactly what type of data is stored on the NetApp systems, how old that data is when it was last modified, etc. And, for the topic of data governance, can present information on specific permissions that users have on individual files and folders, and also a list of files that each particular user “owns.”
Data Masking of Oracle Data for Data-Reuse
Another area where data security is extremely important is when production data is moved to non-production or cloud environments for testing or development purposes. Oftentimes, since non-production environments are generally not as protected or monitored as production environments, they become an easy target for cybercriminals. This means that when Oracle databases, for example, are copied to a non-production server for test-dev purposes, the data stored in those Oracle databases are at risk. For many organizations, take a hospital for example, that data will include customers’ personal information, like credit card numbers, social security numbers, etc. Because of this, it is extremely important that when Oracle databases are mounted non-production environments, this personal information is masked in some way. Data Masking is the process of replacing sensitive values, like credit card numbers, with a fake yet realistic-looking number.
ECX, another product developed by Catalogic Software, provides the ability to seamlessly integrate with Data Masking software to automatically mask Oracle data as it is being mounted on a test server for development testing.
ECX provides automation and orchestration of application-consistent storage snapshots that can be used to backup and restore databases for applications like SQL, Oracle, and SAP HANA. This means that ECX can understand what storage volumes need to be snapshotted to protect specific applications. It then uses those snapshots to “restore” or spin up those databases on the same or alternate Oracle server for a variety of use cases. In this particular example, when ECX is tasked to copy an Oracle database from a production environment to a test server, the “restore” job can include integrated data masking workflows that will then mount a masked copy of that database to be used for development. This way, if there is a security breach in that non-production environment, cybercriminals will only have access to fake personal information.
Additional Data Security Features
In addition to masking Oracle data, ECX also can structure role-based access controls for the backup data, as well as the cloned volumes, VMs, and applications created by ECX. This means that ECX can limit the permissions of ECX users within the web-based GUI to view/perform certain tasks for specific use cases. SQL DBAs for example, may be granted the ability to run individual SQL-specific backup and restore jobs, but will not have the ability to run any Oracle-based jobs, or make changes to any backup SLA policies.
This feature is available in Catalogic Software’s DPX product as well. DPX is the first product that Catalogic launched in the late ’90s. It is an all-purpose backup and restore solution for virtual and physical machines, that can backup to multiple backup destinations like disk, tape, or cloud. This includes its own software-defined backup target that Catalogic developed called vStor.
Just like with ECX, DPX allows for structured role-based access controls to define specific backup users, etc. limiting them in areas that they should not have access to.
Another way that DPX promotes data security is its ability to perform encryption of backup data. This includes encryption for tape drives attached to a NetApp device. With hardware encryption, the tape device encrypts data as it is written to the tape. DPX can also perform disk-level encryption using its vStor appliance mentioned above.
As you can see, Catalogic Software understands that, especially in 2020, protecting you and your customers’ information is a top priority. That is why data security is a major aspect of Catalogic Software’s product portfolio.
CryptoSpike is specifically designed to protect you from and prevent the spread of Ransomware activity on your NetApp NAS data. It also helps maintain an effective data governance standard by providing file access transparency for auditing. If you would like to learn more about CryptoSpike, go to
RestoreManager also helps with data governance by providing granular reporting and analytics on file permissions and ownership. You can learn more about RestoreManager here.
Catalogic’s ECX allows for automated recovery/copy of masked oracle data using storage snapshots. ECX can integrate with any of the data masking solutions out there, removing the risk of consumers’ personal information from being vulnerable in non-production environments. ECX also features granular role-based access control to limit the permissions for application or backup-specific roles.
And finally, DPX is Catalogic’s all-purpose backup and restore appliance. DPX also features role-based access controls, as well as multiple encryption options for backup data.