📢 MSPs - THE ULTIMATE MSP GROWTH GUIDE - The PDF is available to download now!Download

Malware Detection

Deploy Malware Detection to remove threats from within backup data, helping to ensure malware-free recoveries. 

What is Malware Detection 

Deploy Malware Detection as a second layer of protection to remove threats from within backup data, helping to ensure malware-free recoveries. 

Redstor’s malware detection supports servers, laptops and any end-point machines and backups of Microsoft 365 and Google Workspace data. 

Graphics showing the files

The benefits of Malware Detection 

  • add an additional layer of protection 
  • preserves the integrity of your data, which is encrypted at source, in transit and at rest 
  • checks for malware outside your environment, so there is no impact on your resources 
  • avoids the need for a user to configure or install anything or carry out upgrades 

How it works 

After every backup, Malware Detection checks for signs of malware, pinpoint files that resemble malware in appearance or behaviour and then flags any suspicious files. 

If suspicious files are detected, Malware Detection quarantines them before they infect backups and enter systems, alerts you with notifications via the Redstor control centre and recommends actions to keep backups in a safe state. 

After checking quarantined files and folders, you have the option to:  

  • validate individual or multiple files by marking them as safe before releasing them into the backup set 
  • delete files entirely, so they are permanently removed from the backup set 
  • revert the quarantined files to a previous safe version 
  • Leave files in the quarantined list 
Graphics showing the files

Frequently asked questions

Why do I need malware detection in my backup? 

Cyber-criminals are becoming increasingly adept at hiding their activities, moving around inside business networks before targeting organisations’ backups.

Malware frequently lays undetected for longer than most retention policies, which are typically set for 90 or 180 days. A 2019 study by IBM Security and Ponemon institute showed the average time to detect a breach is 206 days. 

Anti-virus protects your data, not your backups. If your machine is infected with malware, your anti-virus will detect it. However, when you want to restore the data from that machine, you want to be sure that it is not also infected. Read more…

Ready to try the smartest backup and recovery platform?