Home > Storage > ObjectScale and ECS > Product Documentation > ECS Cyber Protection Suite Reference Architecture > Introduction
Cyber protection and cybersecurity spending continues to increase as it is prioritized by organizations. Ransomware attacks have been gaining national attention in recent years due to their ability to disrupt an organization’s ability to operate. An organization’s intellectual property, reputation, and revenues are all at stake in the current environment. The revenue impacts are far greater, given the data privacy laws enacted in recent years. The first recorded cyberattack occurred in 1989. Since then, attacks have become more sophisticated, using malware, ransomware, and phishing attacks.
ECS offers cyber protection to secure ECS clusters proactively and to store data in a separate air-gapped repository. This paper describes the cyber protection components available for an ECS cluster.