Ransomware Data Recovery Features
Ensure successful recovery by testing if your replicas, backups and backup copies are bootable. The instant verification feature automatically verifies the functionality of your VMs by running the VM directly from the newly-created backup in a test mode environment (with the networking turned off).
Save up to 4,000 recovery points per backup and rotate them daily, weekly, monthly and yearly. The retention policy follows the grandfather-father-son (GFS) scheme, providing you with a large ransomware data recovery window. Having thousands of recovery points covering different points in time allows a fast data recovery before the ransomware infection.
Immutable backups cannot be modified, encrypted, overwritten or deleted by a user or ransomware. With your backups locked, you add another layer of ransomware protection and, thus, increase the chances of successful data recovery after a ransomware attack.
• Local Linux-based storage. Configure the repository or deploy as a part of the solution’s hardened VA or AMI.
• Amazon S3 Object Lock. Use the native Amazon feature to enable immutability for backups sent to S3.
Store backup copies in multiple locations, following the 3-2-1 backup strategy. If your primary backup gets encrypted, you can still recover from ransomware and resume operations with minimum downtime and data loss.
• Onsite. Keep backup copies onsite for faster and simpler recovery.
• Offsite. Send backup copies to a remote site or the cloud (Amazon S3, Wasabi) to eliminate a single point of failure.
• Tape. Meet compliance requirements and archival needs with native tape support.
Recovery Orchestration and Automation
Use Site Recovery and automation features to ensure 24/7 availability of your data and systems with the minimum downtime:
• Replicate critical VMs and EC2 instances and store replicas on a remote site.
• Configure automated backup and replication for the machines that match your criteria.
• Create multiple site recovery workflows of any complexity, which can also be tailored for recovery from ransomware.
• Test workflows to ensure that you meet RTO objectives.
• Perform a one-click switch to a secondary location (failover) to rapidly resume your business operations without paying the ransom.
Instant Ransomware Recovery
Choose among a variety of instant recovery options to recover critical data to the original location or any custom location in mere minutes:
• Instant VM boot from backups.
• Instant physical-to-virtual recovery of physical machines (as VMware VMs) from backups.
• Granular recovery of corrupted files, folders and application objects with all permissions preserved.
Use Cross-Platform Recovery for more effective recovery in mixed physical and virtual environments:
• Convert physical machines to VMware vSphere or Microsoft Hyper-V VMs.
• Recover VMware vSphere VMs as Microsoft Hyper-V VMs or vice versa.
NAKIVO Backup & Replication Pricing
Starting at USD 29 per workload per year
billed upfront. 24/7 Support included.
Unlock numerous ransomware recovery features with a perpetual or subscription license:
• Full recovery in every edition.
• Flash VM Boot, instant granular recoveries, cross-platform recoveries and automated failover in the Pro editions.
• Complex Site Recovery functionality in the Enterprise editions.
Perpetual licenses are charged per CPU socket, physical machine or Oracle database for indefinite use. Get 1 year of free standard technical support via phone, chat and email during business hours.
Subscription licenses are charged per workload, which can be a single VM, instance, physical server (or 3 workstations). Get 1 year of free 24/7 technical support.
For more details, see Pricing and Editions.
No credit card required.
- Deploy anywhere. Easily install on Windows and Linux physical machines, NAS devices or deploy the solution as hardened VA or AMI.
- Perfect for mixed environments. Protect VMware, Hyper-V, Amazon EC2, Nutanix AHV VMs; Windows/Linux physical servers and workstations; Microsoft 365 apps; and Oracle databases via RMAN.
- Ransomware-resilient backups in immutable local and cloud repositories or on tape.
- Replication of VMs and EC2 instances.
- Multiple instant recovery options that include VM boot, granular and physical-to-virtual recovery.
- Cross-platform recovery for mixed and hybrid environments.
- Simple administration with no errors due to convenient scheduling and automation features.
Infographic: How to Recover from Ransomware
Discover the latest ransomware stats, types and learn how to recover from ransomware if your data have been infected.Download
Infographic: Ransomware 2021: What You Should Know to Be Prepared
Get ready for a ransomware attack. Discover attack vectors, impact on businesses, and learn if your cloud data is safe.Download
White Paper: Best Practices for Ransomware Protection and Recovery
Learn the best data protection and recovery practices to resume your IT operations with minimum downtime.Download
Frequently Asked Questions
How do I plan ransomware recovery?
By backing up your data regularly, you can ensure a smooth ransomware recovery process and avoid paying ransoms. You can use backups to restore your machines to a specific point in time before the incident or use instant granular recovery to restore files and application objects.
How long does it take to recover from ransomware?
It varies from one business to another and depends on several factors, including the company’s size, ransomware type, amount of data to be restored, etc. According to a survey conducted by Vanson Bourne, it might take up to 33 hours to recover from ransomware as long as there is a valid backup available.
How does immutability protect data from ransomware?
Backup data stored in local Linux storage and Amazon S3 buckets can be made immutable for a defined retention period. Locked data can’t be deleted, encrypted and overwritten until the retention period expires. Immutability helps ensure that backup data isn’t corrupted and thus can be used for recovery from a ransomware attack.
What types of ransomware recovery can I perform?
NAKIVO Backup & Replication can help you restore your ransomware-infected files and application objects from deduplicated and compressed backups with Instant File Recovery and Instant Object Recovery. You can also instantly boot VMs from backups or perform P2V recoveries of your physical machines as VMware VMs.
How quickly is ransomware deployed?
Ransomware is usually spread using stolen credentials or phishing emails that include malicious attachments or links. The harmful malware holds the ability to be deployed in a matter of seconds once the attachment is opened or the link is clicked. Conduct anti-malware training for your staff to help them detect and avoid malicious links and phishing emails.
Why is it recommended not to ever pay ransoms to hackers?
Paying the ransom doesn’t guarantee that you will regain access to your encrypted data. Moreover, your readiness to pay may encourage ransomware hackers to carry out more attacks in the future. You should also check the laws in your jurisdiction, as paying out ransoms can incur sanctions in some countries (note the U.S. Department of Treasury advisories, for example).
Need Help?NAKIVO’s Support Team is always here to help if you encounter any issues. If you need assistance:
- Give us a call
Americas: +1 702 605 4495
Europe: +44 207 193 1230
Asia: +886 2 2656 5927
- Contact us by email: firstname.lastname@example.org
- Contact us via the chat in the product interface
- Browse the online knowledge base, anytime and anywhere
NAKIVO ForumNAKIVO Community Forum is a valuable information resource where you can:
- Share your ideas with tech experts and fellow users
- Discuss the latest news and upcoming product releases
- Ask and answer questions about NAKIVO Backup & Replication
- Learn more about the software capabilities