Cloud Backup

We`re just sending through your details

Please give us a few moments whilst we get your account ready.


Detect and remove malware from backup data

Deploy AI to remove threats from within backup data, helping to ensure malware-free recoveries.

Need more information, a demo, pricing or simply like a chat, fill in the form below:

  • This field is for validation purposes and should be left unchanged.

Detect and remove malware from backup data

Deploy AI to remove threats from within backup data, helping to ensure malware-free recoveries.

Companies typically take 200 days to detect a data breach

Cyber-criminals are becoming increasingly adept at hiding their activities, moving around inside business networks before targeting organisations’ backups.

Malware frequently lays undetected for longer than most retention policies, which are typically set for 90 or 180 days. A 2019 study by IBM Security and Ponemon institute showed the average time to detect a breach is 206 days.

Keeping backups safe in the event of a cyber-attack

If malware has remained dormant for longer than an organisation’s retention policy, it is likely all backups will be infected too.

Without the ability to remove malware from backups, a clean recovery would be impossible.

In the event of an attack, organisations need to restore from backups that they know to be safe.

An additional layer of protection

The National Cyber Security Centre advises deploying different anti-virus and code-checking solutions to scan inbound AND outbound objects at a network’s perimeter as this increases overall detection capability.

Redstor uses machine learning to detect, isolate and remove malware within your backup data. This drastically reduces your chances of inadvertently restoring a malicious file, delivering peace of mind.

Quick and unobtrusive

Purchased as an add-on, Redstor’s malware detection supports servers, laptops and any end-point machines as well as backups of Microsoft 365 and Google Workspace data.

Our machine-learning model:

  • searches for key indicators exhibited by malware
  • preserves the integrity of your data, which is encrypted at source, in transit and at rest
  • checks for malware outside your environment, so there is no impact on your resources
  • avoids the need for a user to configure or install anything or carry out upgrades

How it works

  • After every backup Redstor’s technology:

    • checks for signs of malware

    • pinpoints files that resemble malware in appearance or behaviour

    • flags up any suspicious files

  • When suspicious files are detected, Redstor will:

    • quarantine them before they infect backups or enter systems

    • alert you with notifications via the Redstor control centre and mobile app

    • recommend actions to keep backups in a safe state

  • After checking quarantined files and folders, you have the option to:

    • validate individual or multiple files by marking them as safe before releasing them into the new backup set

    • delete files completely so they are removed from the backup set

    • revert the quarantined files to a previous ‘safe’ version

    • leave files in the quarantined list

Protecting those most at risk and likely to be targeted

Data belonging to government authorities, education establishments and financial institutions is highly prized by hackers, while organisations using legacy versions of Windows operating systems are prime targets for cyber-criminals due to the comparatively low levels of security on older OS (Windows 7 and below).

The recent increase in cyber attacks following the move to remote working has only exacerbated the risks of falling victim to ransomware.

Retain control of your data and ensure business continuity with Redstor’s malware detection for backup sets.


Talk to us

6 reasons to demand Redstor’s malware detection for backups

How the growth in scope and sophistication of malware has led to a need for an additional layer of protection.


Discover more about how you can remove threats to backups

Identify and remove threats, using machine learning so that you can rely on malware-free recoveries.