ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Build business applications using new tools & platforms
The leading solution for COBOL application modernization
Modernize mainframe applications for the Cloud
Modernize host application access
Discover the future of CORBA
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Build secure software fast
Augment human intelligence
Discover, analyze, and protect sensitive data
Drive IT ecosystem with identity-centric expertise
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Get fast, accurate detection of threats
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Manage IT & non-IT services with automation and AI
Discover, monitor, and remediate with AIOps
Monitor and optimize complex networks
Discover, manage, and map configurations & assets
Accelerate provisioning with governance in place
Automate and orchestrate processes end to end
Manage IT & software assets for better compliance
Automate server provisioning, patching, and compliance
Automate screen-based human actions with robots
All Micro Focus learning in one place
Build the skills to succeed
Streamline software delivery for faster value
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Modernize Core Business Systems to Drive Business Transformation
Build business applications using new tools & platforms
The leading solution for COBOL application modernization
Modernize mainframe applications for the Cloud
Modernize host application access
Discover the future of CORBA
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
Security at the core to everything you do; Operations, Applications, Identity and Data
Build secure software fast
Augment human intelligence
Discover, analyze, and protect sensitive data
Drive IT ecosystem with identity-centric expertise
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Get fast, accurate detection of threats
Access all products in CyberRes
Trusted, proven legal, compliance and privacy solutions
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Simplify Your IT Transformation
Manage IT & non-IT services with automation and AI
Discover, monitor, and remediate with AIOps
Monitor and optimize complex networks
Discover, manage, and map configurations & assets
Accelerate provisioning with governance in place
Automate and orchestrate processes end to end
Manage IT & software assets for better compliance
Automate server provisioning, patching, and compliance
Automate screen-based human actions with robots
Access all products in IT Operations Management
Give your team the power to make your business perform to its fullest
To recover from a ransomware attack that had infected 90 percent of the company’s systems within 24 hours.
Running a global logistics and shipping network requires a very reliable IT infrastructure backed by a disaster recovery solution – and that’s what this organization has.
The company’s U.S. head office has a fully virtualized VMware environment running on a Hewlett Packard Enterprise 3PAR storage array. Its environment supports critical applications and data, including the user profiles and files of the company’s staff members, IBM Notes email servers, and virtualized Windows-based desktop systems running on Citrix.
However, even the most robust IT environments can be tested by ransomware, which is what recently happened to this organization. From a single infected file, a ransomware attack spread across 90 percent of the company’s servers within 24 hours.
“Users started calling in, saying they couldn’t access their apps or find their data,” said a systems analyst at the company. “So, when we looked into it, sure enough data was missing or not accessible. There were errors coming up left, right, and center.”
The team soon identified the issue – but not before the email servers had gone down, affecting staff productivity and, more crucially, communications between the company and its clients.
The ransomware was able to self-replicate rapidly by creating a new administrator-level user. “We later found that numerous other attacks occurred the same time as ours,” said the systems analyst.
The international shipping provider specializes in customs brokerage, international freight forwarding, and door-to-door cargo logistics. With offices around the U.S. and a network of agents throughout the world, the company provides comprehensive import and export shipping services, from a single-carton airfreight shipment to complete supply chain management.
The organization had the foresight to implement an enterprise-grade backup and disaster recovery solution in the form of Micro Focus Data Protector more than a decade ago.
The company’s backup strategy included a full backup of all data every weekend, followed by another full backup to tape, and then incremental daily backups on weekdays. The strategy leveraged Data Protector’s integration with VMware to perform agent-less backups to protect both the virtual machines and their data.
Thankfully, the ransomware only affected the virtual machines, not the VMware hosts. So, the systems analyst and his team were able to minimize the recovery time.
“Using the Data Protector interface, we were able to get started on the restoration process quickly and seamlessly,” he said. “Within three or four hours, we’d restored several servers.”
The team hit a snag when restoring larger files, with not enough disk space on the allocated destination servers. This caused some delay in the restore process, but once that was resolved, they used Data Protector’s advanced recovery features to restore the affected virtual machines very quickly
The ransomware attack was a significant disruption to the business, but that disruption was kept to a minimum due to the company’s backup strategy and Micro Focus’ disaster recovery solution.
The IT team was able to restore a recent backup that wasn’t compromised by the ransomware, ensuring the company’s data was recovered without having to pay the ransom.
SYSTEM ANALYST
The quick recovery time ensured the attack did not affect the company’s core delivery services – a crucial outcome considering the company specializes in time-sensitive deliveries.
Asked if the company had made any IT changes since the ransomware attack, the systems analyst commented: “We’ve tightened security, we’re scanning emails more thoroughly, and policies are set tighter, but we’ve made no changes to our backup strategy.”
That strategy, and Data Protector, had delivered when it mattered.