Behind the Scenes with Veritas REDLab

BlogHeroImage

What is REDLab (and why we call it that)

Data security, protection and ransomware require more than marketing fluff. You want to know that your products are reliable and will hold up against cyber threats and disasters. And you want to implement from a trusted vendor. But how do you judge their performance without stress-testing them? It's difficult to trust solutions without evidence that they work. Would you decide what to do based on a brochure or website copy? No. Trust requires proof; accept nothing less. 

Veritas backs up its words with action. We take your data security seriously. Data security is engrained in our core values; therefore we leverage a secure, isolated REDLab to rigorously orchestrate PEN testing, identify new attack vectors, update defense mechanisms and validate our top-notch solutions. 

 Why Red?

The National Institute of Standards and Technology (NIST) defines a red team as “a group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.” A red team acts as a real-life hacker, testing the limits of your system and revealing any potential vulnerabilities. It extends beyond regular pen testing, unleashing an unrestricted simulation of possible threats. 

With these independent reviews, you can gain a comprehensive overview of your security setup, so you're ready to face whatever comes your way. Our red team researchers use malware and ransomware to simulate real world scenarios, so they need a place to work that is secure from all Veritas network infrastructure. We call that environment the Veritas REDLab.  

At Veritas REDLab, we strive to stay ahead of the curve when protecting our customers from dangerous ransomware and cyber threats. Our dedicated red team conducts rigorous testing in a secure environment and air gapped infrastructure. This is ensuring that our solutions stand up to even the toughest threats. The team regularly injects live malware and ransomware variants in the Lab. By simulating real-life scenarios and evaluating our products and solutions in the context of actual threats, we can gain a deeper understanding of how our security functions in the wild — thereby creating ever stronger defenses against these malicious intrusions.

Why do we test our solutions?

Imagine you are buying a car and you want to make sure it is safe in the event of a crash. You wouldn’t want to crash your new car to test its crash resistance. Because of government mandates in the auto industry, the manufacturer tests the car for you to ensure its safety. Similarly, you don’t want to wait until your data is compromised to test your data protection solutions. By simulating attacks, we do this testing for you.

By continuously anticipating and testing emerging threats, Veritas takes a proactive approach to security vulnerabilities. We identify and address issues by actively seeking out vulnerabilities and gaps in our systems and solutions. Our solutions are continuously tested to ensure that they are secure against ransomware, malware, and evolving threats. 

REDLab helps companies improve their incident response and be prepared on how to respond to real attacks. This is critical so we can prioritize what’s most relevant to a company’s security posture, backup, recovery, and disaster impact. The benefits of simulating attacks against data protection solutions:

  • Identifying and addressing vulnerabilities: By simulating attacks, we can identify any vulnerabilities in our solutions. This allows us to fix the vulnerabilities before they can be exploited by attackers.
  • Improve the effectiveness of our solutions: We can learn how our solutions perform under attack. This allows us to improve the effectiveness of our solutions. 
  • Provide peace of mind:  Our customers are confident that their data is protected.

 What are we seeing that’s new?

Our products have been rigorously tested and proven robust in extreme circumstances. Our results demonstrate their reliability, allowing us to continually improve our anomaly detection technology. We also collaborate with security vendors to ensure their solutions are up-to-date and can effectively defend against potential threats.

Our 16-page report showcases the efficacy of Veritas products and solutions like:

Why it Matters

At Veritas, we understand the importance of safeguarding our customers from ransomware and malware attacks. That's why we have established the REDLab — a secure facility that is purpose-built to study the intricate details of threats and assess our capabilities in combating them. By proactively deploying real-world ransomware and malware scenarios, we can continuously develop and sharpen our cyber defenses, improve our detection systems to protect all backups and infrastructure, and hone our recovery processes to ensure maximum reliability during a crisis. 

If you're thinking about a Veritas solution, it's essential to make sure that it can handle all the needs of your infrastructure and environments. Proof of concept is the best way to determine that—and with Veritas REDLab, you don't have to take our word for it. Our guide is at your disposal, so you can find out for yourself.

blogAuthorImage
Sonali Jeurkar
Director of SQA Engineering