White Paper

Designing for Recovery from a Cyber Attack

Designing for Recovery from a Cyber Attack

Pages 13 Pages

This Veritas whitepaper presents a comprehensive recovery strategy for ransomware attacks using Flex Appliance and NetBackup. It emphasizes Zero Trust architecture, immutable storage, and air-gapped isolated recovery environments. Key practices include multi-factor authentication, malware scanning, anomaly detection, and catalog protection. It outlines recovery planning steps—identify critical functions, calculate maximum tolerable downtime, automate restoration, and rehearse regularly. Veritas also offers a dedicated ransomware support team and tools to ensure rapid, secure, and scalable recovery across cloud and on-prem environments.

Join for free to read