In a recent interview with VMblog, Aron Brand, CTO of CTERA, discussed the company's ambitious plans to become a leader in "cyberstorage" – an approach that deeply integrates cybersecurity into storage solutions. Brand explained how CTERA's Ransom Protect suite uses deception technology, honeypots, and AI-powered detection to combat double extortion ransomware tactics, which not only encrypt data but also steal and threaten to release sensitive information. He highlighted Ransom Protect's multiple layers of security, including immutable backups, to ensure data remains safe and accessible even if ransomware manages to encrypt files.
VMblog:
CTERA recently announced ambitious plans to become the leader in what Gartner
defines as "cyberstorage." Can you explain this term, and how does it
relate to your approach to cybersecurity?
Aron
Brand: CTERA is first and foremost a storage vendor, but
cybersecurity is at the core of everything we do. We don't just bolt on
security as an afterthought - it's deeply woven into the very fabric of our
solutions. When Gartner talks about "cyberstorage," they refer to
making data protection an inherent part of how storage is designed and
delivered.
Gartner
predicts that by 2028, 100% of storage products will include cyberstorage
capabilities focused on active defense beyond recovery. (Gartner, 2024
Strategic Roadmap for Storage.)
Let me
give you an analogy that resonates with me. Think about how a submarine is
constructed. You can't just build it with incredibly thick, heavy armor plating
everywhere. If you did that, it would be virtually impenetrable, sure, but it would
also sink straight to the bottom of the ocean!
Instead,
submarines are built with compartments. That way, if one section is breached,
you can contain the damage and seal off that area, while preserving the rest of
the vessel and keeping the crew safe.
That's
our philosophy at CTERA. We layer security intelligently, with multiple
compartments and failsafes. So if an attack manages to penetrate one layer, we
can quickly isolate and neutralize the threat before it spreads through the
entire system.
This
compartmentalized approach allows us to provide incredibly robust security
without compromising performance or usability for our customers. And that's
really what cyberstorage is all about - making bulletproof data protection an
integral part of the storage experience, not an inconvenient afterthought.
VMblog: You've recently announced that your product
provides protection against "double extortion" ransomware tactics.
Can you explain what this tactic means, and how does your product address this
problem?
Brand: Double extortion ransomware is a severe threat where
attackers not only encrypt victims' data but also steal it and threaten to
release or sell the sensitive information if the ransom isn't paid. This data
exfiltration tactic adds immense pressure, as the potential public exposure and
legal consequences of a data breach can lead to reputational damage, loss of
trust from customers and partners, regulatory fines, and more.
To
combat this, CTERA's Ransom Protect suite integrates deception technology
within the file system itself in the form of honeypots--decoy files that mimic
real assets to attract and monitor attackers. These are strategically deployed
across the network infrastructure, including CTERA's Edge Filers. Any
interaction with the honeypots, which have no legitimate reason to be accessed,
is a clear indicator of malicious intent.
When
attackers take the bait, their activities trigger alerts, and the system
automatically isolates the threat with the aid of real-time AI detection that
analyzes behavior patterns. This innovative approach ensures high security
while gathering invaluable attack insights to refine threat detection and
continually update defensive strategies against evolving ransomware tactics
like double extortion.
I'm
really proud that we're the first vendor in the file storage market to
integrate a honeypot directly into the file system, which makes it incredibly
easy to enable.
VMblog:
Does Ransom Protect only protect against the data theft aspect of double
extortion ransomware, or does it also prevent the encryption of company data?
Brand: Ransom Protect does a lot more than just protect against
data theft. It has multiple layers of security to ensure your company's data
stays safe and accessible, even if ransomware tries to lock it up.
First,
it uses advanced AI to constantly monitor for any unusual activities that could
be a ransomware attack happening. If it detects something suspicious, it
immediately alerts the IT team and blocks the offending user.
Second,
Ransom Protect doesn't rely just on looking for known ransomware signatures. It
can detect brand-new, never-before-seen ransomware strains too, which is really
important because ransomware keeps evolving to get past old defenses.
Perhaps
most importantly, the product gives the IT admins a mission control-type
dashboard where they can see everything happening in real-time, so they can
quickly understand the situation and fight back against the attack.
VMblog: No AI solution is foolproof, so what if the ransomware
still manages to impersonate a "good" user and damage files?
Brand: Even if ransomware does succeed in encrypting some files,
CTERA's file system continuously keeps immutable backup copies stored away-in
an air-gapped location that the ransomware can't reach. The data is stored in
object storage, at a remote location, protected with different administrative
permissions. So in one click, the IT team can recover those encrypted files
from the snapshots, and you're back up and running, no ransom payment needed.
We have some clever tricks up our sleeve that enable rolling back the data in
time to a point before the attack - even across slow WAN links - with the users
virtually not feeling a thing.
The best part is that setting up this powerful protection is
really easy - the IT team just turns it on for the Edge Filers. So you get
top-notch ransomware defense without the complicated work.
VMblog:
How is AI-powered cyber defense changing the industry?
Brand: In the
coming years, we will witness a paradigm shift as AI-powered technologies take
center stage, enhancing threat detection, predictive capabilities, and overall
security postures.
Organizations
will harness the power of AI algorithms to analyze vast troves of behavioral
audit data, enabling real-time identification of anomalies and potential cyber
threats. This will pave the way for automated, instantaneous responses,
significantly reducing the risk of successful attacks.
Moreover,
AI will play a role in predicting security incidents before they occur. By
learning from historical data and identifying patterns, these systems will
implement proactive measures, fortifying defenses and staying one step ahead of
malicious actors.
Perhaps
most significantly, adaptive security will become the norm, with AI dynamically
adjusting "alertness" levels and access controls based on the sensitivity of
the data and ongoing threat analysis. This intelligent approach will strike a better
balance between accessibility and robust protection.
VMblog:
You have seen record-breaking results in 2023 - what do you think has
contributed to that and what does that mean for 2024?
Brand: Our success in 2023 can be attributed to several factors,
from our products to strategic alliances. One of our focuses for last year was
continuously enhancing our product line to include cutting-edge technologies,
such as advanced AI-driven security features, seamless integration of edge and
cloud storage solutions, and robust data protection mechanisms like Ransom
Protect.
Forming
strategic partnerships with leading technology providers has also given us the
space to integrate with other enterprise IT environments seamlessly, while our
strong customer-centric approach and commitment to our users' success have
helped us build and maintain a new customer base with a direct impact on
results.
For
2024, we want to continue this focus on products, partnerships, and customers
and have plans to keep refining our current offering while releasing new features
tailored to specific industry needs and compliance requirements. We're also
investing in even more security innovations, constantly working to improve our
customers' experience and empower our partners - both new and existing - to
engage with CTERA in ways that help them meet their business objectives.
VMblog:
Where can readers learn more about Ransom Protect?
Brand: You can visit our website here or you
can go directly here to watch a demo of
Ransom Protect, with the new honeypot functionality.
##