GET THE FREE REPORT ON THE TOP 5 2PB+ CYBER SECURE BACKUP TARGETS
DCIG is pleased to announce the immediate availability of the 2024-25 DCIG TOP 5 2PB+ Cyber Secure Backup Target Global Edition Report. This report provides guidance on the TOP 5 cyber secure backup targets that enterprises should consider in their fight against ransomware. These TOP 5 backups targets afford enterprises the best options for accelerating backups, repelling ransomware attacks, and facilitating restores and recoveries.
CYBER SECURITY BECOMES CORE BACKUP TARGET FEATURE
Enterprises have historically measured backup targets based on how well they minimally deliver on the following three features:
- Backup throughput speeds.
- Data reduction.
- Economical storage.
Ransomware threats and attacks have forced enterprises to add at least one more core feature to this list: cyber security.
Enterprises and managed service and technology providers now regularly report that many ransomware stains routinely target their backup infrastructures. Some ransomware strains even start their attacks by seeking to compromise or disable backup targets. This do so in one or more of the following ways:
- Compromise or obtain administrative logins to these systems.
- Delete backups residing on them.
- Encrypt backups residing on them.
- Exfiltrate, or copy, backups from the system to the hacker’s site.
THE STATE OF CYBER SECURE BACKUP TARGETS
Only recently have storage providers, as a group, begun positioning their network attached storage (NAS) solutions as backup targets. Prior to that, few storage providers formally marketed their NAS systems as backup targets. While NAS systems could serve in this role, providers downplayed this functionality.
Today, few providers exhibit any concerns about their NAS solutions being used as backup targets. More than 20 different storage providers promote more than 100 production storage systems on their respective websites as backup targets.
While many of these storage systems support multiple storage protocols, this report focuses on solutions with file protocol support. These support either the Network File System (NFS), the Common Internet File System (CIFS), or both. These NAS solutions provide the following benefits for backup that enterprises frequently want:
- Backup software can easily discover and utilize these solutions as backup targets.
- Client-side software available to accelerate backup throughput.
- Facilitate fast application, and data, restores.
- Fast, easy deployment, setup, and management in enterprise backup infrastructures.
- Readily recognized as a storage target by all commonly used operating systems.
- Utilize standard, cost-effective Ethernet for network connectivity.
TOP 5 2PB+ CYBER SECURE BACKUP TARGETS
Ransomware first attacking backup targets hinders an enterprise’s ability to recover from an attack. Having compromised the backup target in any of these ways, the ransomware then turns to attacking production IT data and systems. If it then succeeds in these attacks in production, enterprises may find themselves without any restoration or recovery options.
In preparing this report, DCIG formally evaluated over 100 different storage systems based on multiple different features and capabilities. 27 of these solutions met DCIG’s criteria for a 2PB+ Cyber Secure Backup Target in the Global Edition of this report.
The general categories under which the features of these backup targets fell included:
- API/network protocols supported.
- Data protection.
- Hardware configuration.
- Technical support.
Based on these criteria, DCIG awarded the following 2PB+ Cyber Secure Backup Targets a TOP 5 ranking:
- ExaGrid EX189
- Huawei OceanProtect X9000
- Infinidat Infinibox/InfiniGuard
- Nexsan Unity NV10000
- VAST Data Platform
COMMON FEATURES ACROSS 2PB+ CYBER SECURE BACKUP TARGETS
Each of these 27 cyber secure backup targets offers the core features that enterprises should prioritize when selecting a 2PB+ Cyber Secure Backup Target. Across these 27 backup targets, DCIG evaluated over 170 features on each one. Despite all these solutions scaling to 2PB or higher, enterprises may safely assume that each one minimally possesses the following features:
- Four (4) Ethernet ports. Since each backup target supports file networking protocols, enterprises would expect they support Ethernet connectivity. Further, enterprises might expect each solution to offer numerous Ethernet ports due to the number of petabytes supported. Yet enterprises may only safely assume the availability of four Ethernet ports on any of these systems. However, over 90 percent scaled to offer up to eight ports.
- Can fit 100 terabytes in every rack unit. Data center floor space remains some of the most expensive real estate in the world. This often makes optimizing every square inch of available space an imperative. Cyber secure backup targets do their part. Each one can hold no less than 100 terabytes per rack unit (TB/RU). Further, over 85 percent of these backup targets can achieve up to 250 TB/RU.
- Compression. Due to more storage systems repositioning themselves as backup targets, enterprises must verify their data reduction capabilities. With respect to this functionality, enterprises may now only assume that all these backup targets offer compression. If they need the solution to deliver deduplication, they should check further. Only slightly more than 75 percent now offer deduplication as a core or optional feature.
- NFSv3/SMBv2. As a report that focuses on backup targets that offer file protocol support, one may assume they support NFSv3/SMBv2. That assumption would be correct. However, enterprises should not assume these backup targets support all versions of these two file protocols. SMBv3 represents the next most widely supported protocol across these backups targets as nearly 90 percent support it. Enterprises should also verify if the backup target supports and enables SMBv1 by default, as about 50 percent do. If enabled and using SMBv1 on the backup target, this could present an internal cyber security risk.
- Active Directory (AD) and Lightweight Directory Access Protocol (LDAP). Storage systems of any type integrating with and supporting AD and LDAP were once more the exception than the rule. No more. The threat of ransomware has led to more storage providers implementing better forms of identity management on their storage systems. As it pertains to these 2PB+ cyber secure backup targets, all now support AD and LDAP.
- Email alerts, notifications, and technical support. 2PB+ cyber secure backup targets use at least eight and possibly more means to send out alerts and warnings. However, email represents the only alert and notification feature that enterprises may assume every backup target supports. This even extends to technical support. Enterprises cannot simply assume that because a backup target scales over 2PB that it offers other means of technical support. They can only assume that it offers email technical support.
The full 2024-25 DCIG TOP 5 2PB+ Cyber Secure Backup Target – Global Edition report is available for download immediately on DCIG’s site with registration by following this link. The full report contains additional details such as:
- A list of all 27 cyber secure backup targets evaluated.
- The incentives for hackers to first attack backup targets.
- Similarities and differences between the TOP 5 2PB+ cyber secure backup target.
- A profile of each TOP 5 cyber secure backup target that lists at least three (3) ways each one distinguishes itself from the other solutions.
CONFIDENTIALITY AND COPYRIGHT
Other than excerpts from this report published in this announcement, the contents of the 2024-25 DCIG TOP 5 2PB+ Cyber Secure Backup Targets – Global Edition report are copyrighted and may not be republished without the express written permission of DCIG.
KEEP UP TO DATE WITH DCIG
DCIG will release more DCIG TOP 5 reports in the weeks and months to come. Please sign up for the weekly DCIG Newsletter to receive notice of their availability.
To learn about DCIG’s forthcoming research and publications, see the DCIG Editorial Calendar.
Technology providers interested in licensing DCIG TOP 5 reports or having DCIG produce custom reports, please contact DCIG for more information.