Home Case Studies Micro Strategies Stopping ransomware in its tracks with CyberVault on IBM FlashSystem
Micro Strategies protects client data from corruption with various IBM technologies
Modern apartment building and green courtyard with pavement and trees in autumn

When America’s fastest growing mortgage lender needed a proactive data protection solution, Micro Strategies jumped into action. Using the IBM® Storage portfolio, Micro Strategies created CyberVault, a managed security service that helps clients quickly identify and recover from cyberattacks.

Ransomware puts an organization’s data, money and reputation at risk.

This extortion malware threatens to permanently withhold data or expose it unless the victim pays a ransom. Some attackers will unencrypt the files after payment—otherwise, there would be no incentive to pay—but that doesn’t guarantee a full recovery. Unfortunately, businesses lose money either way. Additionally, an attack can cripple systems critical to business continuity, leading to extended downtime and disruption. During these outages, customers may turn to competitors to meet their needs, and this lost business can cost an organization an average of USD 1.59 million. For the financial sector, the cost of a data breach is even higher: USD 5.72 million.

Businesses in the financial services industry are especially vulnerable to ransomware attacks because they store valuable customer data and frequently process large transactions. These organizations are under immense pressure to resolve security issues quickly while limiting damage and in recovery costs—a feat one prominent mortgage lender, which asked to remain anonymous, knew would be impossible without proactive data protection.

The lender scoured the marketplace for a security solution capable of protecting its data, regardless of its source, but found none that fit the bill. It realized it would need to install and deploy multiple reactive solutions to get the level of data protection it was looking for. Preferring to use one all-purpose solution, the lender turned to Micro Strategies, an IT solutions provider, to provide a solution uniquely architected to protect against ransomware.

Accurate data back-up

 

Accurately restores all customer data after an attack

Reduced risk

 

Reduces risk and time to remediation, saving millions in recovery fees

The biggest challenge for our customers is choosing from the overwhelming number of IT solutions out there. It’s very hard for them to select the right technology for their business and decide how to move forward with those solutions. Ron Mente Technical Solutions Specialist Micro Strategies Inc.
Protecting data at every source

The lender came to Micro Strategies with a heterogeneous IT environment that included an IBM Power® environment running the IBM AIX® operating system and a x86 environment running VMWare. Micro Strategies—an IBM Business Partner as well as an IBM IT solutions provider—chose to apply IBM technologies to build CyberVault and underpin its critical components. “We wanted to bring forward a proactive solution that would work for those various source systems,” says Ron Mente, a Technical Solutions Specialist at Micro Strategies.

CyberVault is a managed security service that isolates and scrubs data, then vaults it outside of the production environment. If a ransomware attack occurs, the data in the vault remains secure.

Designed for dependability, IBM FlashSystem® 7200 is the foundation for CyberVault. Its storage arrays can protect and manage large quantities of data across more than 500 heterogeneous systems. The IBM FlashSystem is built with IBM Spectrum® Virtualize software, which modernizes existing storage with intelligent system optimization and protects data using replication technology that safely migrates data between on-premises storage and IBM Cloud®.

IBM Storage Insights, an AI-driven storage management feature of IBM FlashSystem 7200, provides visibility and predictive analytics across the storage environment, helping the lender monitor its systems 24x7.

IBM Power, the lender’s current source system, performs data scanning and vaulting at maximum speed.

With these IBM solutions in place, Micro Strategies then used the Red Hat® Ansible® Automation Platform to automate each security feature and drive the data protection process forward.

As we configured the CyberVault solution for this client, we knew we needed a highly resilient, exceptionally secure, performant, API-driven platform to keep up with the demands of their business. IBM Spectrum Virtualize on IBM FlashSystem met and exceeded our requirements. Sotiris Sergiou VP of Sales Micro Strategies Inc.
Practicing defense in depth

Before installing CyberVault on IBM FlashSystem 7200, the lender risked losing USD 20 million a day in a ransomware attack. Now, its data is secure, and it doesn’t risk losing millions in an attack.

The lender’s reputation within the financial services industry has also improved. It is now able to distinguish itself from competitors with its new disaster prevention and recovery abilities. Having additional security in its IT stack has empowered the client to take on larger customers. It anticipates at least 20% growth by Q4 of 2021 and plans to bring on more than 1,200 new hires to meet the increased demand. The scalability and data security features of IBM Storage solutions will allow the client to operate without disruption as its business grows.

Most importantly, the client can focus on its core business objectives with peace of mind. “They’re significantly less concerned about getting hit with a ransomware attack today than they were this time last year,” says Sotiris Sergiou, VP of Sales at Micro Strategies.

Discover Flash Solutions

Micro Strategies logo
About Micro Strategies 

Micro StrategiesExternal Link (link resides outside of ibm.com) is an end-to-end IT solution provider that delivers award-winning business and infrastructure solutions in key practice areas including security, analytics, managed services and emerging technologies.

Take the next step

To learn more about the IBM solutions featured in this story, please contact your IBM representative or IBM Business Partner.

View more case stories Contact IBM Get the best of IBM in your inbox

Subscribe to curated newsletters for the latest in technology, business and thought leadership

Subscribe
OEDIV

Improving speed, flexibility, scalability and reliability with IBM and SAP

Read the case study
Hall AG and Citynet

Keeping water, electricity, connectivity and innovation flowing even as data volumes explode

Read the PDF
Legal

© Copyright IBM Corporation 2022. IBM Corporation, New Orchard Road, Armonk, NY 10504

Produced in the United States of America, March 2022.

IBM, the IBM logo, ibm.com, AIX, IBM Cloud, IBM FlashSystem, and IBM Spectrum are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copyright-trademark.

VMware, the VMware logo, VMware Cloud Foundation, VMware Cloud Foundation Service, VMware vCenter Server, and VMware vSphere are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.

Red Hat® and Ansible® are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.

This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates.

The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.

CyberVault is not an IBM product or offering. CyberVault is sold or licensed, as the case may be, to users under Micro Strategies Inc.’s terms and conditions, which are provided with the product or offering. Availability, and any and all warranties, services and support for CyberVault, is the direct responsibility of, and is provided directly to users by, Micro Strategies Inc.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.