Search
Close this search box.

Combat Ransomware with Advanced Anomaly Detection.

Overview

Detect malicious encryption between subsequent recovery snapshots.

Gain early warning of suspicious encryption.

Anticipate ransomware attacks with early detection of encrypted data.

Recover any available system image before encryption to a sandbox environment for analysis.

Determine the last known clean system image in isolation from your production network.

Detection can be enabled to run during every system capture process with no impact on backup performance.

Ransomware detection seamlessly integrated into system image updates.

Anomaly Detection

What is Advanced Anomaly Detection?

The Cristie Software team has integrated patented technologies to detect malicious encryption and file renaming during every BMR system capture process. With Advanced Anomaly Detection, the system performs integrity scans between image updates to detect encryption. Analysis can also be scheduled independently from regular image updates.

Combat Ransomware

How does Advanced Anomaly Detection help to combat Ransomware?

Rapid detection of anomalies in data structure and naming can provide the earliest warning of malicious encryption and an active cyberattack. Having the ability to detect and alert on activity which may be suspicious means that potential ransomware attacks can be identified in motion and immediate action taken.

How CBMR works

Learn more about CBMR.

CBMR is a simple, yet powerful, backup software solution that creates a backup of your entire system as well as the data files and databases that you specify. The backup can be held on a network share, a tape device, a library, a standalone NAS or using Spectrum Protect.

The software will also provide quick recovery of the operating system in the event of system failure or human error. The recovered machine can be on dissimilar hardware or on a virtual or cloud machine.

CBMR also provides the ability to clone to a new machine from an existing backup. The cloning option allows the hostname and/or the IP address to be changed during the recovery.

CBMR allows you to backup data on your system to any backup location attached to your computer or network, including FTP (Windows only), tape, VMware, Hyper-V, Spectrum Protect and AWS and OCI public clouds. You can then examine the content of the backup and restore any desired files or directories.

Encryption

What can be done if suspicious encryption is detected?

Given the rapid spread of ransomware encryption within a compromised network, it is highly probable that earlier system images will contain malware. In such cases, extensive cyber forensic investigation is typically required to identify the “last known clean” system image that can serve as a safe restore point. This process can be time-consuming, leading to prolonged downtime and revenue losses. However, Cristie Software’s anomaly detection capability can help expedite this process. By comparing images against multiple snapshots of previous backups, anomalies can be detected, reducing the time required for investigation. Additionally, system images from any specific point in time can be recovered to a sandbox environment for analysis, preventing further infection of the production environment.

How CBMR works

CBMR - Workflow Sequence

VM, Cloud or Physical Server

Prepare Server

Install CBMR Agent
Create/Copy Binary

Protect Server

Create Protection Policy & Group

Download the Recovery ISO

Download the recovery ISO from Cristie

Boot Recovery ISO

Connect to Platform

select desired snapshot

Complete Recovery

CBMR Recovery Environment

CBMR requires one license per system it protects and includes 12 month free support & maintenance. Find out more about our pricing here

The Cristie Software Blog

Top 5 causes of System Recovery failure

The Top 5 Causes of System Recovery Failure and How to Avoid Them

The Top 5 Causes of System Recovery Failure and How to Avoid Them In today’s always-on business environment, system recovery is more than just a technical safeguard, it’s a critical component of business continuity. When a system recovery plan fails, the consequences can include extended downtime, lost revenue, and damaged

Read More »

The extent of cybercrime in the US pharmaceutical industry

The extent of Cybercrime in the US Pharmaceutical Industry Cybercrime in the pharmaceutical industry is very prominent in the United States due to its high-value intellectual property (IP), sensitive patient data, and essential role in healthcare. The extent of cybercrime in this sector is significant, as evidenced by several key

Read More »

The New Threats to Connected Manufacturing

Manufacturing is facing a new era of cybercrime Ransomware in manufacturing is rising fast. Manufacturing companies face a growing array of challenges related to cybercrime, largely due to the evolving nature of their IT systems and their reliance on operational technology (OT). These challenges stem from the convergence of IT

Read More »

The painful cost of Cybercrime to the US Healthcare Sector

The painful cost of Cybercrime to the US Healthcare Sector In February 2024, UnitedHealth Group’s subsidiary, Change Healthcare, suffered a significant cybersecurity breach, which has had far-reaching consequences across the U.S. healthcare system. The attack, attributed to the ALPHV/BlackCat ransomware group, compromised both personally identifiable information (PII) and protected health

Read More »

Contact the Cristie Software team for more information

Whatever your replication and data recovery needs, we are here to help.

Contact Us

Thank you for contacting us. We have received your request.