HPE Announces the Inclusion of BrickStor SP to Combat Ransomware Attacks

  • Hewlett Packard Enterprise (HPE) has announced the inclusion of RackTop Systems' BrickStor SP in its Complete program.

  • BrickStor SP is a data security software platform that boldly claims to eliminate the threat of ransomware attacks and data breaches.

  • Together with HPE and their world class secure and versatile hardware, for the first time, customers can achieve end-to-end infrastructure security.


Hewlett Packard Enterprise (HPE) has announced the inclusion of RackTop Systems' BrickStor SP in its Complete program. BrickStor SP is a data security software platform that boldly claims to eliminate the threat of ransomware attacks and data breaches. The platform was built by Department of Defense intelligence community veterans charged with protecting the United States’ data while meeting the nation's data security compliance regulatory requirements. HPE plans to resell RackTop BrickStor SP software with its own ProLiant and Apollo Servers to meet the high-security file-storage needs of ]the federal government.


RackTop Systems CEO Eric Bednash said a prevailing failure to update their cybersecurity tools is making organizations in the United States vulnerable to cyber-attacks. “Enterprises and government entities are losing the cyber-war because they are using old tools and 90’s design standards which are largely focused on stopping network infiltration, rather than protecting data," said Bednash. "Based on our experience, most of the bad guys are already inside the network today." Explaining how RackTop's platform works to block ransomware attacks, Bednash said: “BrickStor attacks the problem properly by securing unstructured data at its source so that it can’t be seized, maliciously encrypted, or exploited.



Read more: NEW CYBER THREAT INDEX SHOWS INDUSTRIES ARE UNDER ATTACK IN UNCERTAIN TIMES

“Enterprises and government entities are losing the cyber-war because they are using old tools and 90’s design standards which are largely focused on stopping network infiltration, rather than protecting data,"

~ Eric Bednash CEO RackTop Systems


Together with HPE and their world class secure and versatile hardware, for the first time, customers can achieve end-to-end infrastructure security from a single vendor without gaps or loosely coupled bolt-ons.” Rapid and unstructured data growth can result in information's not being stored securely, making an organization vulnerable to cyber-attackers. Chris Powers, VP, Collaborative Platform Development, HPE Storage and Big Data, said RackTop tackles this issue by embedding its security and compliance software within a scalable data-storage system for unstructured files, protecting it at the source.

"Together with HPE and their world class secure and versatile hardware, for the first time, customers can achieve end-to-end infrastructure security from a single vendor without gaps or loosely coupled bolt-ons.”


BrickStor SP fills a high data security need in the storage market. We are entering a new era in IT infrastructure where security and compliance are a necessity,” said Powers.“RackTop’s storage software and security platform is a natural fit with our ProLiant and Apollo Servers which feature silicon-anchored, cradle-to-grave security. Together we bring our Federal Government customers a complete Zero Trust data security solution. This data availability best practice is designed to ensure that all businesses effectively prepare for and avoid potential data loss and downtime from ransomware attacks. By following industry best practices, IT managers can avoid paying ransom and create a rock-solid data availability solution for day-to-day operations by leveraging both HPE and Veeam software. Ransomware is a particularly malicious and scary form of malware. Just about anyone can understand it well enough to be terrified of it.


Without warning, you will have a choice: come up with a lot of cash quickly or see your business disappear. What is ransomware? After gaining access to your computers, the attacker runs software on it that encrypts all the data and deletes unencrypted copies. You get a ransom note that tells you to pay a certain amount in a cryptocurrency, after which you will receive a key and software to use to unencrypt the data. The criminal gangs behind many of these attacks have adopted advanced technology, including artificial intelligence. This improves the sophistication of their attacks, greatly increasing the chances of their success in getting a foothold in the victim’s network. From a purely technical standpoint, ransomware is just another kind of malware, a malicious program that has been allowed to run on your systems with privileges sufficient to cause damage.


Read more: MICROSOFT: MASSIVE COVID-19 THEMED PHISHING CAMPAIGN UNDERWAY TO GAIN REMOTE ACCESS

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More