Home > Storage > ObjectScale and ECS > Product Documentation > ECS Cyber Protection Suite Reference Architecture > ECS Cyber Protection Suite
Dell ECS offers a Cyber Protection Suite of advanced software to protect data throughout its lifecycle, as shown in the following figure. Considering the ransomware lifecycle, ECS’s software suite ensures cyber protection at each phase, while also planning for a potential ransomware attack. Administrators can select the data that is paramount for business continuity in the event of a ransomware attack. The ECS Cyber Protection Suite aligns with the cybersecurity framework defined by the National Institute of Standards and Technology (nist.gov).
The three core pillars of the ECS Cyber Protection Suite are based on Protect, Detect, and Respond:
The ECS Cyber Protection Suite consists of modules that each perform a specific security function. When combined, the modules form a suite of advanced software to protect unstructured data from cyber threats.
ECS Cyber Protection Suite | |
Eyeglass | Management control plane for the Cyber Protection Suite |
Ransomware Defender | Real-time user behavior detection to detect and halt a ransomware attack through user lockouts and provide a recovery option at the object level (requires bucket versioning to be enabled) |
Zero Trust API | Enables Extended Detection and Response (XDR) and Security Information and Event Management (SIEM) telemetry sharing and collection across the data center. |
Enterprise Airgap Agent | Manages replication of an offline business continuity dataset in an automated cyber vault |