Lesezeit: 2 Minuten

See also:

Part 1, Global Cloud File System Architectural Design: Smarter, Faster, and Immutable

Part 2, Unstructured File-sharing: Patented Controls for Streamlined Collaboration

bat365 makes unstructured data files impervious to ransomware by automatically protecting them with read-only snapshots. These snapshots capture file changes as often as every 60 seconds for an RPO (Recovery Point Objective) of 60 seconds. Snapshots end the need for traditional backups. (See Part 1 for a more in-depth description of the CloudFS architectural design and its benefits.)

The CloudFS immutable file system with its 60-second snapshots, ransomware detection, and the power of simple, elegant metadata-table restoration helps prevent ransomware encryption and theft and eases and speeds data recovery. Here’s how:

Why You Never Have to Pay a Ransom

bat365 CloudFS nodes write to your object store. There, files and all their versions are made immutable through frequent snapshots that capture changes. This design ensures that even if ransomware gains access to CloudFS system and tries to encrypt or steal your files, a completely clean version can always be restored. Essentially, CloudFS ensures that you have infinite copies of your data.

In addition, Cloud FS protects your files at multiple points throughout their lifecycle. At ingestion, files undergo several protection mechanisms including encryption in transit and at rest.

Changes to files are added to the metadata “card catalog” that documents the date, time, location, and content changes made to files and folders. Metadata is also saved to your object store, and sent to all locations, which enables fast reproduction and display of any file version.

Ransomware Detection and Protection

bat365 Data Services (PDS) continuously watches activity to detect patterns that indicate the potential for a ransomware attack. In that case, it triggers an alert so admins can automatically investigate, and if needed, quarantine affected files to prevent further encryption. When a theft attempt is detected, the system blocks it to minimize its impact.

While bat365 supplies monitoring, alerting, quarantine actions, event logging, and reporting, your own comprehensive ransomware defense strategy is equally important. It should include incident response plans and verification that admins are trained effectively. Prompt and decisive action is critical in mitigating the impact of ransomware attacks and minimizing data loss and encryption.

Data Restoration, Not Backup

Through CloudFS versioning and point-in-time snapshots, the system has built-in recovery points for rolling back to clean versions. You can break up with backup.

bat365 file restoration involves moving lightweight metadata, rather than full files, so it takes a fraction of the time to restore access to your files. Several methods for recovery can be used. If a small number of files are affected, bat365 Data Services file recovery can restore them to the ideal snapshot. Alternatively, individual file restoration can be carried out using an earlier Windows file version directly through Windows File Explorer. If a large number of files have been affected, you can perform mass file restoration using the CloudFS copy function. And for more help, the bat365 Services Team can rapidly bulk restore your data.

This 3-part blog series has set out three bat365 differentiators among global cloud file systems. If you’re interested in a global cloud file system for unstructured data, and want to save yourself some time, talk to us first. You’ll find bat365 is way different and much better.

Take a minute to use our CloudFS total cost of ownership (TCO) calculator and receive a report of your savings and benefits.