


Dell EMC Power Protect Cyber Recovery
Protecting your business starts with protecting your data
Global business relies on the constant flow of data across interconnected networks, and digital transformation means an increase in sensitive data. This presents ample opportunity for cyber threats and exposure to leverage data for ransom, corporate espionage, or even cyber warfare.
To reduce business risk caused by cyber-attacks and to create a more cyber-resilient approach to data protection, you can modernize and automate your recovery and business continuity strategies and leverage the latest intelligent tools to detect and defend against cyber threats.
Dell EMC PowerProtect Cyber Recovery automates workflows end-to-end to protect critical data, identify suspicious activity, and perform data recovery when required. The Cyber Recovery vault is disconnected from the network via an automated air gap and stores all critical data off-network to isolate it from attack. This promotes business resiliency, provides assurance following extreme data loss or destruction, and includes both business and technology configuration data to enable rapid recovery of the environment and resumption of normal business operations.
Only PowerProtect Cyber Recovery combines multiple layers of protection and security into a turnkey solution to provide maximum protection for critical data.
The number one risk to your business is a ransomware attack. This is the number one way to protect your data.
Isolation
Physical and logical separation of data within an air-gapped vault.
Immutability
Preserve data integrity and confidentiality with layers of security and controls.
Intelligence
Machine learning and analytics help ensure recoverability.
Cyber Recovery Is Now More Important Than Disaster Recovery
The amount of data that businesses rely on, combined with the increase in remote working, presents an opportunity for criminals to launch cyber-attacks.
Unfortunately, in today’s data-driven environment, traditional Disaster Recovery (DR) and Business Continuity solutions are not enough to address modern cyber threats.
Although cyber-attacks take many forms and attackers have a variety of motivations the target of their efforts is consistent: destroy, steal, and ransom valuable digital data for financial gain, and social, or political purposes.
Cyber Recovery, sometimes called Isolated Recovery, is a new segment of data protection solutions designed to address the modern threat of ransomware and other cyber threats.
Abtech partners with Dell EMC to deliver market-leading Cyber Recovery solutions.
How PowerProtect Cyber Recover Works?
- Critical data is synced to a hardened vault and isolated with an automated operational air gap
- A copy of this data is made and the vault retention period is set as needed
- The data is retention locked to further protect it from accidental or intentional deletion
- CyberSense performs full content indexing of all vaulted data confirming integrity and alerting to any potential corruption
- Recovery of data from the vault is efficient and secure whether for testing or incident response

Cyber Recovery Vault
Learn more about the Cyber Recovery vault which keeps a safe, air-gapped copy of your business's data to protect it from any ransomware attack.
Accelerated Data Recovery​
Increase your business resiliency with automated recovery workflows, CyberSense forensic tools, and dedicated incident response.