Protect Dell File Storage

Stop ransomware attacks in real-time

Prevent compromised backups

Eliminate data exfiltration

Problems ProLion Solves for Dell Storage Systems

Rapid Response to Ransomware Attacks

Prolionโ€™s software is designed to block ransomware attacks in real time, isolating infected users
and devices from attacking other systems to protect production and backup data.

Minimizing Data Loss and Maintaining Business Continuity

Trigger protected snapshots based on suspicious activity and restore any effected files with one
click to avoid downtime and meet your SLAs.

Monitor Insider Threats and Prevent Data Exfiltration

Track and analyze all storage activities, uniquely identifying insider threats or early signs of a
breach with high accuracy. Alert security to automatically prevent data exfiltration before
it happens.

Accurately Recognizing Threats vs Normal Activities

ProLion has the highest efficacy threat detection engine for storage environments, making false
positives a thing of the past to let you focus on the alerts that matter.

Reduce Security Costs with Integrations into SIEMs

Send high efficacy alerts to your SIEM without needing to ingest all logs from your storage system
directly, savings costs and enabling real time response to contain threats.

“At Dell Tech World this year, one of the key points of emphasis we made was our partnership with ProLion and working with them on integrating their CryptoSpike technology, which can deliver to that massive install base. Customers can gain the confidence of knowing that not only can they detect ransomware but mitigate it in near real-time. I’ve said this before, and I’ll say it here: I’ve been doing this for a while, and Iโ€™ve not yet seen a technology that has the ability to detect and mitigate as fast as ProLion’s CryptoSpike. Hat tip to these guys because they’ve done a really good job.”

~ Jodey Hogeland, PowerStore Global Evangelist at Dell Technologies

Whitepaper

Strategies for Effective Storage Security for Dell

Best practices for storage security to help organizations safeguard their valuable data assets effectively.

  • A deep dive on storage security and why it matters
  • The key components of storage security
  • Best practices for storage security
  • Challenges in implementing storage security, and how to overcome them with ProLionโ€™s Cryptospike solution

Built for Dell Storage Systems

Detection

Volume & user based ransomware detection

Alerts

Alert triggering & seamless integration to your SIEM

Blocking

Blocks infected user immediately

Protocol

Full access transparency thanks to CEE Integration

Restore

Single file recovery via Snapshot integration

Seamless end-to-end detection and response

In case of an attack – you’ll come prepared. ProLion detects immediately, blocks the affected user, alerts, and supports you during the remediation process.

Let us show you what ProLion can do for you.

Region*(Required)
This field is for validation purposes and should be left unchanged.

CryptoSpike Demo for Dell

Do you have questions?

Frequently asked questions

CryptoSpike currently supports NetApp (FAS/AFF & virtual ONTAP), Lenovo DM-Series, Dell PowerScale, Dell Unity and Dell PowerStore* (starting CryptoSpike 3.3)

Installing CryptoSpike usually only takes a few hours, making it the fastest security project in the world!

CryptoSpike uses native APIs from the storage systems to collect and process the information.

No! User access is unaffected thanks to the use of native APIs.

CryptoSpike makes it possible to implement a so-called “four-eyes principle” which requires two people to access the data, protecting sensitive information.

CryptoSpike was developed with complex environments in mind and supports scaling via agents. We recommend the LandscapeManager add-on to manage distributed storage environments via a common user interface.

Yes, CryptoSpike adds another level of protection to your company’s security strategy and protects your storage system – where your most valuable, business-critical data is centrally stored.

An alert can be sent directly via email or integrated into existing monitoring solutions using an API.