Customers are unique in terms of the data-sets that they want to protect in their air-gapped vault environment. However, they all need to protect business critical data and applications. What is each application or set of data worth? What is the cost of down-time or data-loss? How much is the organization willing to pay in ransom for their data?
The Cyber Recovery use case is centered around the types of bad actors and the broad spectrum of potential attacks, as well as their motivations, techniques, and goals: