Commvault Corroborates Logicalis South Africa for Strategic Partnership

Gerhard Fourie, Channel Lead at Commvault Africa

South Africa’s subsidiary of international digital transformation solutions provider, Logicalis has strengthened its strategic partnership with Commvault by becoming a Commvault Service Advantage Programme Foundation Partner.

This extends the existing relationship as Premier Partner, improving customer service and opening up a number of synergistic opportunities for both organisations.

“Over the past 18 months, Logicalis has worked consistently to upskill their technical team and understand the nuances and deeper inner workings of Commvault. They now have 12 engineers certified on Commvault and a dedicated Service Operations Centre (SOC) to support Commvault customers. They are also our first partner to take the Metallic offering to the Microsoft marketplace, allowing more customers to easily access our Software as a Service (SaaS) offering. There is great synergy between our organisations,” says Gerhard Fourie, Channel Lead at Commvault Africa.

Gerhard Fourie, Channel Lead at Commvault Africa
Gerhard Fourie, Channel Lead at Commvault Africa

Logicalis specialises in modern digital services supported by a digital platform that transforms the way customers interact. Being data-savvy is key to this approach, and as an integrator of solutions that transform business through data, data management and data protection are critical components.

Read alsos : Nigerian Fintech Startup TAP Raises $3M Seed Funding To Expand

As a mature solution that is integrated at an API level with Microsoft and other partners, the Commvault solutions offering fits perfectly into the Logicalis managed service offerings basket.

“We are already ISO 27001 and ISO 20000 certified, ITIL-aligned, and compliant with both the General Data Protection Regulation (GDPR) and Protection of Personal Information Act (PoPIA), so our commitment to data quality, data privacy and data protection are evident. Commvault solutions empower us to build modern data management solutions to take to market as digital integrator. We can now offer customers both locally and globally an enhanced customer experience and superior service delivery,” says Morné Laubscher, CTO at Logicalis. 

Becoming a Commvault service advantage programme partner showcases Logicalis’ commitment to customer service excellence, proving that they have the skills to not only design and deploy effective, holistic solutions, but manage these solutions on an ongoing basis.

As a Foundation Partner, Logicalis will continue to develop specialisations on Commvault, including the Microsoft training track that enables them to further focus on apps in Azure, as well as the SaaS space.

Read also : Byld Ventures Targets African Fintech Startups With New $15M Fund

There are also other strategic alliances that are strengthened by the enhanced partnership with Logicalis – for example, they are a top-tier Hitachi Elite partner, which from a global standpoint is Commvault’s largest OEM ISP. Collaboration between global vendors ensures that customers can access innovative, best-of-breed solutions from top providers.

“Logicalis has an impeccable service ethos and their consultative approach to delivering complete solutions, rather than simply products, aligns with Commvault’s approach to business. This alliance is customer-centricity at its finest – our joint customers can access the best service levels from a global provider, backed by the technical skills and competence they need. I look forward to growing this partnership and delivering superior customer service now and in the future,” Fourie concludes.

Kelechi Deca

Kelechi Deca has over two decades of media experience, he has traveled to over 77 countries reporting on multilateral development institutions, international business, trade, travels, culture, and diplomacy. He is also a petrol head with in-depth knowledge of automobiles and the auto industry

Why Immutable Architecture is Key to Protecting Backup Data

Kate Mollett, Regional Director at Commvault Africa

By Kate Mollett

Ransomware and other malware are a constant threat, and data backup is critical to safeguard a business’s most important asset. However, cybercriminals are increasingly targeting and encrypting backup data copies as well, a strategy that leaves organizations unable to recover unless they pay the ransom.

Keeping an immutable copy of backup data is a best practice for data protection and is the solution in the event of a successful two-pronged ransomware attack.

Kate Mollett, Regional Director at Commvault Africa
Kate Mollett, Regional Director at Commvault Africa

What is immutable architecture?

For data to be immutable means that it is unable to be changed over a period of time. With an immutable architecture, when retention policies are set for data backup and recovery, data will be secured, locked and unchangeable for that retention period. This in turn means that it cannot be encrypted by malware, keeping it safe from cybercriminals and ensuring that recovery is possible without the need to pay a ransom.

Read also:How WhatsApp Business API is Changing SMEs Journey in Kenya

An immutable architecture is critical in today’s landscape and should address three key elements: data locks; air gaps and isolation; and data validation.

Automatically secure against unauthorised changes 

Data locks automatically secure storage, applications, and the backup infrastructure from unauthorised changes, such as those that would be made by malicious applications like ransomware. Locking mechanisms should be able to be applied to any storage, including hyperscale, and should be applied at a deep layer under the operating system. This is to ensure that the locks do not rely on software so that if a malicious actor moves or alters the software, the storage is still protected.

The first layer is hardening the storage infrastructure itself. Leading-edge industry standards, as well as industry best practices, need to be used to harden storage appliances. This includes the underlying operating system and databases for metadata. This layer helps to improve the overall security posture.

Read also:Starting With Ethiopia And Tanzania, This Company Is Migrating African Countries To Blockchain Technology

Secondly, it is essential to harden the application, in other words, the backup and recovery management interface. The typical environment has many users at varying levels of permission who have access to the backup and recovery environment. They may be able to change, delete or maintain data, and this introduces the potential for both accidental and malicious removal of critical data. To protect against this, it is essential to lock the storage and the application layer using multi-factor authentication controls. This will help to protect and validate access to backup and management software. It is also advisable to implement command authorisation as an additional layer of locking, to add yet another safeguard.

By adding layers of protection at both the appliance and application levels, organisations are better protected against both accidental data loss and malicious intent.

Segment and block direct access to backup data

Air gaps and isolation enable organisations to segment data and block direct access to backup data copies. This is essential for protection against ransomware events. Threats typically infiltrate an environment through various exploits, which gain the malicious actor access to the network. From there, the attack infiltrates through the environment, locating data and ‘lying in wait’ to be triggered in a full-blown ransomware attack.

Air gapping mitigates this, providing a layer of protection against these laterally moving threats. Since storage is segmented, isolated and unreachable, it becomes difficult for a threat to gain access to storage targets.

Continuously ensure backup copy integrity

Organisations rely on backup data to be protected and secured. This in turn relies on the assumption that the data is not corrupted since this would make it unrecoverable. However, without data validation, it is impossible to verify the integrity of backup data. With an on-premise solution, this needs to be performed at a hardware level, whereas with cloud-based and hyperscale storage, data validation can be performed more efficiently, at a software level. Data can be validated at a block-level as it is being transmitted, and if it passes checks it will be written to disk. Should data be invalid, an alert will be sent so that the backup can be rerun.

Read also:Cybersecurity Experts Warn of New SMS Phishing Scheme Spreading Worldwide

This delivers a more proactive view of data, rather than a reactive strategy once corrupt data is already written to disk, ensuring that the backup copy is always valid and can be restored. Intelligent solutions can even use distributed file systems that have the inherent capability to mitigate data corruption and heal at the file system level. This offers extra resiliency to ensure data is valid from the start and always stays valid.

Unchanging, protected, safe from harm

Today, successful ransomware attacks rely not only on encrypting primary data but attacking the backup copy as well. Once this happens, organisations are defenceless and are left with little option other than to pay the ransom or lose their data. Implementing data management best practices, including keeping an immutable copy of data, is essential to an effective disaster recovery strategy. An immutable architecture that incorporates data locks, air gaps and data validation, will ensure organisations can recover from any data disaster.

Kate Mollett is Regional Director at Commvault Africa

Kelechi Deca

Kelechi Deca has over two decades of media experience, he has traveled to over 77 countries reporting on multilateral development institutions, international business, trade, travels, culture, and diplomacy. He is also a petrol head with in-depth knowledge of automobiles and the auto industry