What is Cohesity Threat Defense?

What is Cohesity Threat Defense?

With the rise of ransomware extortion tactics, we find ourselves increasingly in a minefield when it comes to cyber security.

Every day we are subject to an attack and it is up to us basically to be prepared to deal with it. Having cyber insurance, a zero-trust strategy, and a good backup and recovery system is essential these days, but not always enough. That's why Cohesity developed the Threat Defense Architecture that follows and goes beyond zero confidence to help organizations achieve cyber resilience.

Cohesity Threat Defense

The Threat Defense architecture is designed to help you improve cyber resilience and stay one step ahead of cybercriminals. The main pillars of threat defense are:

Data resiliency

Your data drives your business and must be able to withstand any failures that may occur, including hardware issues, system or software corruption, human error, natural disasters, or ransomware.

Immutability

The foundation of Cohesity is SpanFS, a third-generation distributed file system, which stores all ingested data in internal Cohesity views that are never exposed to any external applications or users. Any attempt to modify an immutable backup snapshot will automatically create a clone (zero cost), which is also marked read-only. In addition, Cohesity was the first modern data management solution to introduce a time-limited read and write (WORM) feature we call DataLock, which provides an additional layer of protection against any insider threats.

Cryptography

Cohesity offers high-performance, FIPS-validated data encryption, utilizing the strong AES256 standard to ensure data is protected in transit and at rest. The Cohesity platform offers the flexibility to seamlessly integrate with the third-party key management systems of your choice.

Fault tolerance

Data integrity is critical to protecting your data, and that starts with completing successful backups, regardless of conditions. Cohesity's distributed hyperscale architecture, resilience to node(s) or cluster failure, auto-recovery, unique strict consistency, and much more ensure that your backup data is resilient to any hardware or software failure.

Access control

According to Verison's Data Breach Investigations Report, cybercriminals prefer to use lost or stolen credentials rather than malware to deploy ransomware attacks as they are much easier to obtain and can easily circumvent antivirus programs and other security software.

Colonial Pipeline was one of the biggest and most disruptive ransomware attacks of 2021. The attack was attributed to DarkSide, a group of hackers who took advantage of a compromised password to gain access. To mitigate the risk posed by weak user passwords and insider threats, Cohesity Threat Defense includes features to prevent unauthorized users from affecting your business.

Multi-factor authentication requires anyone accessing the Cohesity platform to authenticate using multiple authentication factors, such as something you own (i.e. your mobile device, one-time password token, smart card, etc.) and something you know ( i.e. your password, PIN).

Learn more about Cohesity Threat Defense in this blog post.

Are you happy to improve your data protection? Contact us today.

73% of healthcare organizations have already been ...
Smart Cities: What They Are and Why They Are Data-...

Related Posts