White Paper
Designing for Recovery from a Cyber Attack
This Veritas whitepaper presents a comprehensive recovery strategy for ransomware attacks using Flex Appliance and NetBackup. It emphasizes Zero Trust architecture, immutable storage, and air-gapped isolated recovery environments. Key practices include multi-factor authentication, malware scanning, anomaly detection, and catalog protection. It outlines recovery planning steps—identify critical functions, calculate maximum tolerable downtime, automate restoration, and rehearse regularly. Veritas also offers a dedicated ransomware support team and tools to ensure rapid, secure, and scalable recovery across cloud and on-prem environments.