Systems, data and backup sets are subject to cyber-attacks. Not only the primary systems and data are in the center of tan attack, but also the back-up catalog, which may be encrypted or corrupted.
Moreover, DR site is vulnerable to these attacks, since disaster recovery happens online and cannot be isolated to the degree of a cyber vault. What is the appropriate response? Join our session and learn how Dell EMC PowerProtect Cyber Recovery automates workflows end-to-end to protect critical data, identify suspicious activity, and perform data recovery when required.