Security Market Segment LS
Thursday, 01 August 2019 23:01

Cohesity CyberScan checks backup for vulnerabilities

By

Data management specialist Cohesity's latest product is Cohesity CyberScan, which scans backup data to identify vulnerabilities in the organisation's IT environment.

As Cohesity CyberScan examines backup data, it does not affect the performance of production systems. Cohesity's architecture means the application runs directly on the Cohesity cluster where the data resides, avoiding the need to move the data to a separate application environment.

CyberScan uses Tenable.io to identify applications affected by entries in the public Common Vulnerabilities and Exposures (CVE) database.

"This is the first application we've seen that focuses on assessing systems for exposures, such as vulnerabilities, within backup data," said Tenable vice president of technical alliances Ray Komar.

Vulnerabilities often lead to cyberattacks – such as ransomware attacks or data breaches – and discovering these exposures is the first step in defending against online criminals, Cohesity officials said noting that a recent survey found that the majority of organisations suffering a data breach in the past two years attributed it to a known but unpatched vulnerability.

Furthermore, 37% of organisations said they do not scan for vulnerabilities.

CyberScan, available on the Cohesity MarketPlace, scans backup copies the Cohesity DataPlatform, identifies issues, and presents the results as a security dashboard with actionable recommendations for addressing these vulnerabilities.

"Visibility is the first step in addressing cyber exposures and vulnerabilities. With increasing cyber threats, enterprises need a solution that can help uncover blind spots while also ensuring no previously addressed vulnerabilities are re-injected into the IT production systems. Enterprises can now leverages their backup data and infrastructure to assess their IT product environment’s risk posture by discovering vulnerabilities and also perform a backup verification for a predictable recovery," Cohesity director of product marketing Raj Dutt told iTWire.

It also verifies that a given backup snapshot is recoverable, and eliminates the risk of re-injecting known or previously addressed vulnerabilities back into the production environment as a side-effect of recovering from a backup.

"Businesses today need an IT environment that runs 24-7 and want to avoid recovering VMs with known vulnerabilities," said Cohesity vice president of product management Raj Rajamani.

"While we are focused on empowering customers to make backup data more productive, we are also proud to introduce an industry-first solution that helps customers easily identify exposures, such as vulnerabilities and misconfigurations, without putting any additional burden on their mission-critical operations."

All Cohesity customers may use CyberScan as part of the Pegasus 6.4 software release.

BUSINESS WORKS BETTER WITH WINDOWS 1O. MAKE THE SHIFT

You cannot afford to miss this Dell Webinar.

With Windows 7 support ending 14th January 2020, its time to start looking at your options.

This can have significant impacts on your organisation but also presents organisations with an opportunity to fundamentally rethink the way users work.

The Details

When: Thursday, September 26, 2019
Presenter: Dell Technologies
Location: Your Computer

Timezones

QLD, VIC, NSW, ACT & TAS: 11:00 am
SA, NT: 10:30 am
WA: 9:00 am NZ: 1:00 pm

Register and find out all the details you need to know below.

REGISTER!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments