Cobalt Iron Advances Cyber Recovery With Isolated Vault Services

Cobalt Iron, a provider of SaaS-based enterprise data protection, has announced Isolated Vault Services, a new enhancement available in the Cobalt Iron Compass enterprise SaaS backup platform.

In a simple and unique way, Isolated Vault Services makes it possible to transition normal backup operations into isolated vault recovery services. It is intended for companies needing to recover data in an isolated vault or clean-room environment, typically as part of a declared disaster or cyber recovery operation. The simplicity of switching normal backup operations to isolated vault recovery services is something not experienced with other backup products.

With the ubiquity of cyber attacks, companies must continually improve their data resiliency and recovery posture. A critical part of that task is ensuring data is recoverable and then validating the integrity of recovered data after a disaster or cyber event. Data administrators need clean copies of data that they know have been and are isolated from access by bad actors. To that end, they often establish an isolated clean room for purposes of recovering systems, applications, and data.

Transitioning normal backup operations into isolated recovery services is challenging because backup infrastructures and operations are based on accessibility and connectivity that are not allowed in a vaulted recovery zone. In addition, typical backup environments have many vulnerabilities and are the target of cyber attacks themselves, so there must be some level of confidence that backup data and operations are sanitized before introducing them into a clean-room recovery environment.

As a result, organizations struggle with establishing safe, isolated recovery zones, where production operations can be restored from current backups that are accessible and validated.

Cobalt Iron Compass is unique in that all backup data ingested into the platform is vaulted and immutable by design, with no access available to the backup environment. Compass Isolated Vault Services extends these Zero Access architectural advantages by allowing administrators to toggle Compass Accelerators — the physical, on-premises devices that deliver the Compass SaaS platform — from normal backup operations into an isolated recovery services mode. At that point, customers can use the Compass Accelerators to restore business data and services inside of an isolated vault zone, completely disconnected from the internet. This vault service functionality is available through the local Compass Accelerator menu services or through the Compass REST API for orchestrated recovery.

Isolated Vault Services frees data administrators from cumbersome isolated recovery processes, such as establishing a recovery infrastructure in the isolated vault zone, manually reconfiguring backup and storage, manually recovering backup data and operations into an isolated vault environment, and validating backup data to ensure it was not infected prior to being made available in the isolated vault zone.

You might also like...

Broadcast Standards: The Principles, Terminology & Structure Of Cloud Compute Based Systems

Here we outline the principles, advantages, and various deployment models for cloud compute infrastructure, along with the taxonomy of cloud compute service providers and the relevant regulatory frameworks.

Live Sports Production: Broadcast Controllers & Orchestration In Live Sports Systems

As production infrastructure, processing resources and the underlying networks required become ever more complex, powerful tools are required to plan, deploy and monitor.

Monitoring & Compliance In Broadcast: Monitoring The Media Supply Chain

Why monitoring the multi-format delivery ecosystem starts with a holistic approach to the entire media supply chain.

IP Monitoring & Diagnostics With Command Line Tools: Part 3 - Monitoring Your Remote Systems

Monitoring what is happening in a remote system depends on being able to ask for something to be checked and having the results reported back to you. There are many ways to do this. This article looks at some simple…

Broadcast Standards – Cloud Compute Infrastructure – Part 1

Welcome to Part 1 of Broadcast Standards – Cloud Compute Infrastructure. This collection of articles is the first in a new series which expands on the enormously popular ‘Broadcast Standards - The Book’ by Cliff Wootton. Over the coming months a series of Th…