• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

EMC’s Isolated Recovery Solution: 5 Things You Need to Know

Routine backups are an excellent way to minimize the impact of ransomware or malware infections – unless the backups themselves are comprised. As their techniques advance, cyber criminals s3x-0949-954are better able to probe more deeply into the networks they invade, putting backups at greater risk. Should they manage to cut that cybersecurity safety net, organizations who thought they were prepared could end up at the mercy of the enemy.

Even advanced examples of ransomware and malware can’t exploit something they can’t see. That’s the idea behind EMC’s Isolated Recovery Solution. Picture this technology like a bank vault for IT in that it secures copies of an organization’s most precious data under lock and key. However, unlike a bank vault, it’s not always connected to the rest of the bank. This way, if criminals stage a break-in, their access – and the damage they can do – will be limited.

5 must-know things about EMC’s Isolated Recovery Solution

We sat down with Arraya’s Data Management Practice to find out more about EMC’s Isolated Recovery Solution and its role in malware defense.

Q: How can I be sure my data is secure? 

A:  The Isolated Recovery Solution creates a hardened depository for data deemed critical to ensuring operational continuity. This cache contains no permanently active network links. Instead, it connects to the rest of the network only for brief periods to sync up with the latest versions of files. This “air gap” ensures a version of mission-critical files remains untouched during an attack. In the event of a recovery situation, the depository can be reconnected to the network in minutes, allowing normal business operations to quickly resume.

Q: What if the Isolated Recovery Solution syncs with a malware-infected file? 

A: This solution maintains multiple restore points and should include integrity checks on incoming copies of data. If the Isolated Recovery Solution detects any issues, an alert will be triggered to disregard the latest version and lock down the system. This ensures the data it manages stays uncorrupted.

Q: Will the Isolated Recovery Solution make it harder to manage my security environment?     

A: No, this solution won’t significantly add to the management complexity of a business’ IT security environment. Once deployed, EMC’s Isolated Recovery Solution can be set to automatically pull in the latest version of data at regular intervals and test the integrity of that version. While the solution handles backups and data protection, IT staff will be free to focus on other responsibilities.

Q: How will I know if the Isolated Recovery Solution is right for my business?

A: Businesses contemplating EMC’s Isolated Recovery Solution will first want to perform an internal assessment of their existing IT environment. The primary objective of this assessment should be to identify the applications, processes, etc. the business would be least able to go without. In addition, those leading the assessment should gauge whether their business has the infrastructure in place to support the solution, and if not, what changes they will need to make.

Q: Does the Isolated Recovery Solution work exclusively with EMC storage solutions? 

A: No, the Isolated Recovery Solution works across multiple storage platforms. Configuration of the solution is dependent upon the infrastructure that supports the data/processes/etc. the organization wants to protect. For systems or data residing on EMC and non-EMC storage, businesses can leverage technologies including Data Domain and/or RecoverPoint in order to enable the Isolated Recovery Solution.

A helping hand in the cybersecurity effort

Security concerns, malware and ransomware aren’t going anywhere. The latter especially is simply too good of a business model for cyber criminals to abandon. That fact, combined with recent predictions about the next generation of ransomware, seem to plainly indicate cybersecurity pros’ efforts in this sphere are only going to become more time-consuming in the coming years.

Want to learn more about EMC’s Isolated Recovery Solution or any of the backup and recovery solutions supported by Arraya’s team of data management experts? Visit us at www.arrayasolutions.com/contact-us/ to start a conversation today.

Arraya can also be reached via social media: Twitter, LinkedIn, and Facebook.

 

 

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}