roseData
中文 Menu

Rose Anti-Ransomware Backup System

Ransomware Awareness and Backup Assurance

Introduction

The new generation of Rose Anti-Ransomware Backup System is an enterprise-level data backup solution that integrates ransomware detection, data backup, data recovery, business continuity, and disaster recovery drills into one system. It provides unified and comprehensive data protection for cloud hosts, virtual machines, and physical server environments. Innovatively incorporating an anti-ransomware module, the Rose Anti-Ransomware Backup  meets the dual demands of data backup and ransomware virus detection in production environments. In the event of a data disaster, it ensures complete, accurate, and rapid data recovery, thereby minimizing potential losses for enterprises.

Features

Ransomware Behavior Awareness

By analyzing the behavioral patterns of programs within the production environment been backed up, the system relies on an AI expert system to determine the true intent of the executor, thereby identifying and pinpointing ransomware. When users attempt to recover their data, they can effectively distinguish between flagged potentially infected data and healthy data, aiding them in easily locating usable recovery data and reducing operational complexity. The behavior-aware anti-ransomware module does not depend on virus signatures to detect a wide range of known and unknown ransomware threats.

Full-system Data Protection

The backup mechanism based on block replication, using volumes as the backup target, effortlessly achieves full-system backup of production systems, including the operating system, applications, and data.

Through DCT (Data Change Tracking) technology, backup efficiency is significantly enhanced. It supports data compression, data encryption, multi-link transmission, and bandwidth management.

It supports backup exclusion scheduling, where during specific dates/times when facing peak business pressure, only data changes are tracked without performing backups. Once the peak business period has passed, the system automatically resumes the backup process.

CDP (Continuous Data Protection)

It enables the recovery of data from any point in time to address incidents such as virus infections, human errors, and hardware or software failures, thereby minimizing data loss (RPO ≈ 0). By continuously tracking and recording data changes in real-time, it logs every IO event to achieve fine-grained data protection. The recovery unit of CDP is also at the IO level, allowing restoration to the last IO before the failure occurred, thereby retrieving the latest available data prior to the corruption point.

Data and business recovery

Intelligent Flashback: The flashback feature only restores the differences between the point of data corruption on the production host and the recovery data (snapshot). The flashback method automatically detects whether it is enabled, and typically completes the recovery within minutes.
Mount Recovery: Snapshot replicas are output as disk devices via iSCSI and can be directly mounted for use, enabling rapid business recovery and minimizing downtime. Mount recovery can also be output to a third-party host.
Bare Metal Recovery: This feature allows the entire host's snapshot replica to be directly restored to the original production host or a third-party host, without the need for pre-installing an operating system on the target host. It supports data recovery or full system migration across various environments, including Physical-to-Physical (P2P), Physical-to-Virtual (P2V), Virtual-to-Virtual (V2V), and Virtual-to-Physical (V2P).
Online Recovery: The recovery time for data and business operations is a critical metric for disaster recovery systems. It is not necessary to focus on the volume of data that needs to be recovered. By prioritizing the restoration of business operations and recovering data in the background, it is possible to achieve business recovery with an RTO (Recovery Time Objective) in minute level. In scenarios such as instant mount recovery, bare-metal recovery, and emergency takeover, combining these with online business recovery can prevent prolonged business downtime during the data recovery process.

CDM (Copy Data Management)

Emergency Takeover: When the production host fails and cannot resume business operations in a timely manner, the data replica within the anti-ransomware backup system can be utilized to quickly start an emergency virtual machine instance within the system. This virtual machine is a cloned host of the original production host and can serve as an emergency substitute for the original production host to resume business operations. The business recovery time, with the Recovery Time Objective (RTO), is in minute level.
Data Utilization: Select the desired data replica and launch a drill for virtual machine instance within the anti-ransomware backup system. This can be used for disaster recovery drills, data validation, development testing, data extraction, and other scenarios, enhancing the utilization value of backup data. During business simulation, there is no impact on the production host, and there is no need to shut down the production host.

Copyright © Rose Datasystems Inc.
  • to_top