Not logged in » Login
Feb 08 2022

Ways to ensure ransomware resiliency with Veritas solutions

Businesses today have to navigate economic crises, global pandemics, shifting regulations, malware, and ransomware. Ransomware is big business and attackers are relentless in their pursuit to develop new, creative ways to infiltrate corporate networks and IT environments to seize and hold data hostage. The key is to be resilient and be able to restore your on-prem or hybrid infrastructure quickly at scale.

Together with Fujitsu solutions, Veritas unified Enterprise Data Services Platform will help to secure your resiliency strategy and data protection infrastructure, and by reducing the risk, you can maintain control of your business – even when facing malicious malware.



Challenges for Ransomware Resiliency

Data all over the place (not just geographically, but also spread across multiple providers and in multiple form factors), exponential data growth, and the growing set of options from where threat actors are able to attack are just some examples of the tough challenges your company will face.

Even with the best security and backups, your company will be bypassed in some way. Are you truly optimized for recovery? Are you able to guarantee you can recovery from a clean backup?

While being mainly known for backup solutions, Veritas is also in the business of recovery. The path to recovery starts with having a solid, multilayered plan.


Veritas Strategy



STEP 1, Protect:

ImageWith an expansive and growing environment, it’s important to be able to protect it all with a single tool, which will help to optimize recovery in a worst-case scenario. With NetBackup, Veritas is able to extend ransomware protection to over 800 data sources – this protection is simple to implement, scales to any size, and can be dispersed to handle the load of data being protected.

The flexibility of NetBackup protection includes the ways in which we can provide immutable storage. “Immutability” means that once written, and for the selected duration, data cannot be changed by any method, including ransomware.

Veritas can connect with third-party hardware – like Fujitsu Technology that has immutability capabilities – while additionally proving immutable storage as part of the hardened purpose-built backup appliances, where this data is efficiently stored, leveraging deduplication technology. Veritas also extends immutable capabilities with support for AWS S3 Object Lock.


STEP 2, Detect:

ImageVeritas provides powerful detect capabilities to ensure there are zero gaps in your ransomware resilience – the reporting across production and backup environments ensure no production systems are left unprotected.

Beyond visualizing the entire environment, Veritas helps to detect the telltale markers of anomalous behavior which may indicate a ransomware attack is underway.

Since backups are often a target of threat actors, Veritas focuses the AI/ML anomaly detection engine towards the backup process. Not only can these reports pinpoint when an attack happened, helping to identify the last known good backup, as it improves with time, since the engine learns from feedback.

Detection on unusual file activity is also ensured, which can indicate an attack.


STEP 3, Recover:

ImageIf immutably stored data and keeping tabs on the environment wasn’t enough, we stand out for the importance of the 3-2-1 methodology – at least 3 copies of your data, 2 distinct medium types, and 1 offsite or segregated copy. Veritas NetBackup can easily and automatically ensure no single point of failure by configuring lifecycle policies that send data over to a secondary or even tertiary domain – Auto Image Replication (AIR). With AIR configured, your data can be sent unidirectionally to a secure second location with different credentials configured and limited network capabilities, ensuring proper segmentation of your data protection environment. Part of that same automatic lifecycle can also be sent as deduplicated immutably stored data to the cloud.


By following the 3-2-1 model, the recovery after a disaster is as easy as a simple click. Veritas Resiliency can configure a digital runbook that knows where the data is and is able to execute complex orchestrated recovery – from a single file all the way up to an entire data center.

Veritas provides options from quickly recovering single files, to bare metal restore of servers that need complete rebuilding. Not only can it restore data protected from on-prem to the cloud, but also from deduplicated immutable data you had already moved there.

Collectively the capabilities provided ensure that when ransomware strikes, your organization will be ready to resist and recover.



Veritas recommends the following best practices:

  • Avoid single point of failure with 3-2-1 backup rule;
  • Update and upgrade all software regularly;
  • Be prepared! 


The comprehensive study from Veritas explores the growing disparity between enterprise IT complexity and resiliency to ransomware threats. Every plan is only as strong as its weakest link. Ransomware loves to find the vulnerable areas of your environment. Make sure to test, validate, and disinfect regularly. Not only will this practice shorten threat-response times and minimize the impact of an attack, but the enhanced visibility will also help you identify problems areas to resolve and improve, as well as ensure you will be able to recover when disaster strikes.


In order to learn more about Veritas ransomware protection, please visit or read the whitepaper NetBackup data protection ensures ransomware resiliency.



ImageGuest Author:

Petter Sveum,

Technology Practice Lead, Veritas


Comments on this article

No comments yet.

Please Login to leave a comment.


Please login

Please log in with your Fujitsu Partner Account.


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now