Actifio is now part of Google Cloud. Read the full announcement.

“We’re replacing the patchwork of manual systems and freestanding tools. Not only we are more resilient and able to recover data quickly, Actifio is providing us greater data security as well.”

James Buzek – VP of Information Assurance and Infrastructure Services

ACTIFIO FOR SECURITY OPERATIONS & RISK

Data Virtualization Enabling Security


OVERVIEW

Minimize threats to mission critical data with instant access to immutable pure data copies.

Mitigating risks and resolving data security problems demands a new, holistic approach to managing enterprise data.

Data virtualization enables data capture directly from production applications, manage a single “golden master” of that data in a secure environment, and use virtual copies to maintain both accessibility and control.

It limits the proliferation and availability of physical data copies, reducing the risk “surface area”, decreasing the number of targets available to those with malicious intent.

How to Stop Malware – Download the Tip Sheet

“We identified Actifio as our best data backup and recovery solution through a competitive process. Not only did Actifio closely match our primary criteria, but it also provides creative support for application development using application-aware data mounts. That is very powerful for us; a great benefit.”

Gabriel Kimanzi – IT RISK & SECURITY OFFICER

CHALLENGES

Keeping enterprise data safe and accessible is a complex balancing act made all the more difficult by the geometric growth rate of production data.

HOW Actifio HELPS

Actifio reduces complexity while increasing critical data security, resilience, and recovery capabilities through simplified security testing.

Array

Actifio data virtualization eliminates redundant infrastructure, process, and expense. Audit logs and access controls enable audit capabilities for all administrator and user actions to ensure accountability.

Management

IT administrators or application owners can set role-based data access controls (RBAC). Masking is available for Development and Test environments.

CloudSecurity

And two-factor control governs authorized user data access, including permissions for an individual or divided by a two-person-rule for any access to sensitive data.

Process

Data Loss Prevention (DLP) and penetration and vulnerability testing can be used to conduct compliance scanning without risk of disruption to production operations.

Immutability-Security

Immutable references create a permanent copy for compliance and investigatory purposes or to detect data tampering.

CyberSecurity, Ransomware & Malware: How Attacks are Sophisticating and Evolving.