NetApp Cyber Vaulting: Multilayered Data Protection
Isolate your most valuable data with secure hardening technology to minimize your attack surface and keep your most critical data confidential, intact, and readily available.
In today's digital landscape, safeguarding your organization's critical data assets is not just a best practice—it's a business imperative. Cyberthreats are evolving at an unprecedented pace, and traditional data protection measures are no longer sufficient to keep your sensitive information secure. That's where cyber vaulting comes in. NetApp's cutting-edge solution combines advanced logical air-gapping techniques with robust data protection measures to create an impenetrable barrier against cyberthreats. By isolating your most valuable data with secure hardening technology, cyber vaulting minimizes your attack surface so that your most critical data remains confidential, intact, and readily available when needed.
With NetApp® cyber vaulting, your data is protected by the highest standards of security. Our solution offers a range of benefits, including enhanced breach protection, rapid recovery capabilities with immutable and indelible copies, and seamless scalability to accommodate your growing data volumes. Whether you're safeguarding intellectual property, customer data, or mission-critical systems, cyber vaulting gives you the peace of mind that comes with knowing that your information is secure. With our flexible deployment and cost-effective storage options, cyber vaulting is an ideal solution for organizations of all sizes and industries.
Features and Benefits
The capabilities that set NetApp Cyber Vaulting apart.
NetApp Logical Air Gapping
Logical Air-Gapped Environments with ONTAP
- Create isolated storage systems that are logically separated from other networks and systems.
- Implement strict network segmentation and access controls to limit communication between storage and external networks.
- Use NetApp SnapLock® Compliance to create immutable and indelible, write-once-read-many (WORM) storage volumes that prevent data modification or deletion.
SnapLock Compliance Technology
Logically Air-Gapped Cyber Vaults
Further Hardening the Air Gap
Physical Air-Gapping Options
- Deploy dedicated, isolated storage systems for maximum protection against external threats.
- Implement secure data transfer processes, with strict security protocols for scanning and handling media.
- Use SnapMirror to replicate data efficiently from production systems to air-gapped storage, enabling secure data transfer and recovery.
- Leverage NetApp AFF and FAS on-premises systems with hardware-based encryption for secure, high-performance storage in air-gapped environments.
Robust Hardening with NetApp ONTAP
Multi-admin Verification
Multifactor Authentication
Between Primary and Secondary Storage
- Isolate management networks
- Separate administrators
- Different credentials
- Dedicated replication network
- Separate data centers (optional)
Solution Benefits
Comprehensive and Flexible Solution
Multilayered Cyber Resilience
Thrive with expert-led storage guidance
Get tailored advice on how NetApp Cyber Vaulting fits your environment — from sizing and deployment to long-term optimization.
Technical Specifications
Exhaustive hardware and software metrics extracted directly from official documentation.
-
Data Pull OperationA data pull operation copies from primary to cyber vault
-
SnapLock Compliance and Protocols DisabledAttackers cannot reach the cyber vault from the primary storage
-
Pierce-through PreventionNo pierce-through from the source possible
-
Vault Copy ProtectionCopies in vault cannot be read, modified, or deleted by anyone (including NetApp)
-
Step 1Identify the destination cluster
-
Step 2Create a destination volume with a SnapLock aggregate (volume create)
-
Step 3Create a policy (SnapMirror policy create)
-
Step 4Add rules to the policy (SnapMirror policy add-rule)
-
Step 5Create a cyber vault relationship between the volumes and assign the policy to the relationship (SnapMirror create)
-
Step 6Initialize the relationship to start a baseline transfer (SnapMirror initialize)
-
Cyber Vaulting How-To ResourceSee how to get started with this cyber vaulting how-to blog on the NetApp Community site.
-
AFF On-Premises StorageNetApp AFF A-Series
-
FAS On-Premises StorageFAS storage: Seamless, efficient, trusted
-
SnapLock Compliance SoftwareRetention and rapid retrieval
-
Security Hardening GuideSecurity hardening guide for NetApp ONTAP
-
Document TypeSolution Brief
-
Document IDSB-4289-0624
-
Copyright© 2024 NetApp, Inc. All Rights Reserved.
Compare NetApp Cyber Vaulting Series
Select the right scale for your workload demands.
Learn more
Explore resources
Datasheets, whitepapers, case studies, and technical documentation.
Explore resources