We tackle the two key challenges of recovering from a cyber attack:
Technical Recovery
Recovering the effected technical objects when you have lost access to foundational infrastructure.
Self inflating objects meaning no intermediary infrastructure such as backup infrastructure is required to recover a device.
​
Secure Windows and Linux, Physical or virtual, cloud infrastructure, network infrastructure, storage infrastructure, databases. Mid range coming on the product roadmap.
​
​Highly secure, isolated virtual vaults anywhere required.
Managing the Crisis
The scenario will be like nothing an organisation has encountered before. How do you manage the unmanagable?
Map the organisation's Minimum Viable Service, MVS. This is the minimum that an organisation would be in a position to provide a minimum level of service.
​
As everything is mapped, retrieval from the vaults is simple and an entire business service consisting of hundreds of objects can be retrieved with just 2 clicks.
​
​Pre-defined mobilisation tasks to ensure that every task is executed to mobilise the teams.
Vault Sentinel Features
Isolated Secure Vaults
INTELLIGENT CONSUMPTION
The vaults are in control of what they consume and provide and perform a series of checks before an object is consumed. We call this intelligent consumption.
SECURE ISOLATED VAULTS
Hundreds of secure isolated vaults, located globally, are managed seamlessly by the management layer.
ANOMALY DETECTION
Scan for behavioral anomalies and objects can be scanned for signs of compromise such as malware and ransomware, providing a belt-and-braces approach.
NON-PROPRIETARY COPIES
Vault Sentinel uses the concept of self-inflating objects utilizing native functionality, avoiding the need for proprietary formats.
Operational Management
MAPPING
The customer's Minimum Viable business is mapped in the solution, mapping technical objects and dependencies, providing a service view of the recovery.
AUTOMATIC RTO AND RTA CALCULATION
Automatically calculates the RTO for a business service during planning and the RTA during recovery.
UNDERSTAND THE IMPACT
Understand the impact of an attack as the MVB is mapped, the solution provides which services have been affected.
MANAGEMENT UPDATES
AI and user-generated updates to stakeholders and management.
RETRIEVE ENTIRE BUSINESS SERVICE
Allows retrieval of a business service with hundreds of technical objects in 2 clicks.
DATA RECONCILIATION INFORMATION
Provides data reconciliation information for services that have data stores.
REAL TIME UPDATES
Real-time updates to command and control during recovery as engineers and specialists progress through the runbooks.
REHEARSALS
Rehearse and fine-tune recoveries.
Everything Engineers And Management Need
ACTIVE RUNBOOKS
Detailed tasks with durations and dependencies, providing detailed and accurate plans for recovery with real-time updates during recovery.
ENGINEER IPHONE AND IPAD APP
Provides engineers with object information and allows them to provide updates to command and control.
MULTILINGUAL VIDEOS AND PDFS
Supports engineers with recovery instructions.
AI-GENERATED
AI and user-generated runbooks provide detailed tasks and durations for recovery.
SERVICE ACTIVE RUNBOOKS
Restoring technology is not restoring service. Active runbooks can be developed for business services, providing accurate plans and RTO for services.
MANAGEMENT IPHONE AND IPAD APP
Provides real-time updates on recovery progress for senior management.
Technology Agnostic
Tracks and manages objects across multiple technologies from the network layer upwards.
Industry Agnostic
Works with any industry.