You don’t need us to tell you that ransomware is a major security concern. Millions of attacks take place every year causing billions of dollars in damage. Odds are very high that your organization has already been hit, though you might not know it yet. If you want lots of scary statistics, you can find plenty of them here.
Most ransomware attacks happen when files get compromised, so your NetApp file shares are among the most vulnerable parts of your organization. File shares are where end users meet the data center most directly, and most ransomware comes through the front door via interaction with end users. It’s as simple as someone in your organization getting an email, they click on it, and bang! Your file shares are infected.
CryptoSpike was designed to work with NetApp ONTAP file systems, monitoring every action your users take to protect you from vulnerability to ransomware. As part of the ransomware monitoring, CryptoSpike also provides a user and file audit trail.
To see CryptoSpike in action, watch our demo video.
CryptoSpike uses a multi-pronged approach to detect ransomware.
It begins with a Black List that includes thousands of ransomware file endings or names. Updates are made every day and downloaded to the CryptoSpike server.
The White List is a set of allowed file extensions, such as .doc or .pdf. If a new, unknown file ending is detected, it is blocked. The initial white list is generated via a scan of your current files.
The most important component is the Learner module. The Learner tracks user behavior and determines allowable file transactions (e.g. read, write, open, etc.). If any anomalous behavior is detected, the user is blocked. For example, if User A suddenly writes to dozens of files in a few seconds, this behavior is recognized as outside of normal patterns, and the user’s write access is blocked.
Different strategies can be applied at different levels in the file hierarchy. One policy can be applied across the NetApp cluster, or different policies can be applied at the level of Storage Virtual Machine or even file share. For instance, you may white list different file types for a developer share than for a marketing share. This multi-technology approach helps you tighten your NetApp security, decreasing vulnerability.
Another aspect of overall data security is data access transparency: understanding which users accessed what data, plus when and how often. Because CryptoSpike is monitoring all user file access, it is ideally suited to track and deliver this information.
With CryptoSpike, you can easily examine user behavior down to the level of files and folders. Reports will show you user activity in terms of file opens, closes, deletes, writes and so on. This will provide you with definitive information that a volume, folder, file, etc. was accessed by a given user.
CryptoSpike works together with the NetApp FPolicy server, which is required. The FPolicy server will enforce the blocking decisions made by CryptoSpike.
For example, if ransomware is detected by the Learner module, the relevant user will be changed to having read-only access, which stops them from further spreading the ransomware. CryptoSpike lets you know which files have been affected, allowing you to do targeted recoveries, rather than having to roll-back an entire folder or more.
IT security can then be alerted about the infected user and suitable steps taken to disinfect their system. Meanwhile, CryptoSpike provides a list of infected files, allowing you to perform targeted recovery from NetApp snapshots.
CryptoSpike is licensed per NetApp controller, with pricing tiered according to the NetApp model number. There are no capacity limitations in terms of total storage or number of files, making CryptoSpike licensing very easy to manage.
Please contact us for a price quote.