Skip to content

Top ransomware attacks 2024: major incidents and impact

 

Summary: Discover 2024’s major ransomware attacks in healthcare, logistics, and manufacturing. Learn how advanced solutions like NordLayer help prevent and mitigate these threats

Ransomware attacks in 2024 have escalated to new heights, surpassing the scale and sophistication of threats seen in 2023. Attackers have become more aggressive than the previous year, using advanced tactics such as double and triple extortion. Organizations are not only facing encrypted files but also the threat of a data breach, with stolen data being leaked or even sold on the dark web. This increases the risks of reputational damage and regulatory penalties.

No organization is immune, and attackers now use more accessible tools like Ransomware as a Service (RaaS). Industries once considered less vulnerable, such as logistics and energy, have increasingly been in the crosshairs alongside traditionally targeted sectors like healthcare and education. This year alone, ransom payments have skyrocketed—rising from under $200,000 in early 2023 to $1.5 million in June 2024—with some organizations shelling out tens of millions of ransomware payments to regain access to their systems or prevent private data from being exposed.

In this blog post, we’ll examine the most significant ransomware incidents of 2024, their impacts, and practical measures your organization can take to strengthen cybersecurity.

Major ransomware attacks of 2024

Ransomware attacks in 2024 have become increasingly sophisticated and common, affecting industries worldwide and causing lasting financial and operational damage. Here are some of the most notable incidents of the year:

7. Healthcare: Change Healthcare

Date: February 2024
Impact: A phishing campaign exploited vulnerabilities in Change Healthcare’s email systems, deploying ransomware that encrypted critical operations. Services like claims processing and prescription drug management were disrupted across numerous U.S. hospitals, affecting thousands of providers and millions of patients.

The attackers demanded $22 million, which the company paid to restore essential services swiftly and limit disruptions to patient care. Strengthening cybersecurity has become key for healthcare providers, and tailored tools like NordLayer help safeguard personal data and ensure continuity.

6. Finance: Latitude Financial Services

Date: February 2024
Impact: Attackers stole 14 million customer records, including sensitive information like driver’s licenses, passports, and financial data. Latitude Financial decided not to pay the ransom, aligning with Australian government policies that discourage ransom payments. They stated that paying the ransom would not guarantee the secure return of data and could encourage further attacks. Instead, the company focused on restoring systems, contacting affected customers, and strengthening its cybersecurity measures.

Financial institutions can mitigate risks with NordLayer’s robust network security solutions, which safeguard critical systems and help meet regulatory compliance.

5. Non-profit: A global organization supporting orphans

Date: March 2024
Impact: A global non-profit supporting orphans (the organization’s name hasn’t been disclosed) was targeted by a ransomware group that encrypted sensitive files, including children’s photographs and medical records. The attackers initially demanded a ransom large enough to bankrupt the organization. After learning it was a non-profit, they lowered their demand.

However, this incident shows how non-profits, with limited defenses but valuable data, are becoming prime targets. Organizations can protect themselves with NordLayer’s security tools, which are tailored to address unique vulnerabilities in the sector.

4. Manufacturing: Allied Telesis

Date: May 2024
Impact: A LockBit ransomware attack encrypted corporate files and stole sensitive data dating back to 2005, disrupting operations for the telecommunications equipment manufacturer. The attackers threatened to release the stolen information if their ransom demands were unmet. The incident underlined the manufacturing sector’s vulnerability to such sophisticated threats.

This security breach is a stark reminder of the need forproactive cybersecurity measures. To mitigate risks like this, NordLayer offers tailored network security solutions for manufacturing industries to help protect critical systems and data.

3. Government: Indonesia’s National Data Center

Date: June 2024
Impact: The Brain Cipher ransomware group targeted Indonesia’s National Data Center, disrupting critical government services, including immigration processing at Jakarta’s airport. The attack encrypted sensitive data and temporarily paralyzed various government operations, highlighting the vulnerability of national infrastructure to sophisticated cyber threats.

Agencies can strengthen their defenses with NordLayer’s solutions for government institutions, designed to safeguard critical operations.

2. Software & IT: CDK Global

Date: June 2024
Impact: CDK Global, a key software provider for North American car dealerships, fell victim to a BlackSuit ransomware attack. Dealerships had to revert to manual processes for sales and paperwork, causing delays in registrations and transactions. The attack compromised sensitive customer data, such as social security numbers and bank account details, exposing millions to potential fraud.

CDK Global temporarily shut down its systems, creating substantial operational and financial challenges for dealerships dependent on its digital solutions. To speed up recovery, CDK Global reportedly paid a $25 million ransom in cryptocurrency. Despite the payment, the impact lasted about two weeks, with most systems restored by early July.

Software and IT companies can enhance security with NordLayer’s solutions, which help mitigate vulnerabilities and maintain operational efficiency.

1. Transportation: Port of Nagoya, Japan

Date: July 2024
Impact: The ransomware attack on Japan’s busiest port targeted the port’s computer systems, encrypting critical data and disrupting operations. As a result, cargo handling and customs clearance processes were severely impacted, causing shipment delays and creating a ripple effect throughout international trade networks.

The incident underscored the vulnerabilities in critical infrastructure and the need for robust cybersecurity measures in transportation. NordLayer offers tailored solutions for retail companies to protect dynamic networks and global supply chains, ensuring continuity even in the face of sophisticated threats.

These incidents highlight the urgent need for organizations to adopt comprehensive cybersecurity strategies. Ransomware attacks continue to grow in both sophistication and impact, making it crucial to counter these evolving threats.

Online threats keep evolving

Ransomware attacks are growing in sophistication, using tactics like double extortion, where stolen data is threatened with public release unless a ransom is paid. The increasing accessibility of Ransomware as a Service (RaaS) has lowered the entry barrier, enabling less-skilled cybercriminals to execute high-impact attacks with more frequently.

Key trends in 2024 include:

  • Higher ransom demands: The financial stakes are higher than ever. Ransom payments in 2024 are now exceeding $10 million in many cases, with some organizations facing demands well beyond that. Attackers are increasingly targeting organizations with high-value data or critical infrastructure, knowing the urgency to recover will push companies to pay.
  • Target expansion: While healthcare, finance, and education have long been prime targets for ransomware groups, other critical sectors like logistics and energy are now in the crosshairs. As supply chains and energy grids become more interconnected and reliant on digital systems, these industries face greater risks of disruptions with global consequences.
  • Advanced tactics: Ransomware groups are not only focusing on traditional on-premise networks but also exploiting vulnerabilities in cloud environments, which is becoming a bigger concern. This highlights the need for more advanced, tailored security solutions.

These trends show how ransomware incidents are becoming more sophisticated and multifaceted. This increases the potential for significant damage and calls for organizations to adopt more comprehensive, layered defense strategies.

Protecting against ransomware threats

Strategies to protect against ransomware attacks

A comprehensive strategy involves protecting not just your systems but also your data and network infrastructure. Each layer of defense plays a crucial role in minimizing the impact of a ransomware attack and preventing it from escalating. Below are essential strategies organizations should adopt:

1. Identify vulnerabilities and patch systems

Many ransomware attacks exploit vulnerabilities in outdated systems. To address known vulnerabilities and maintain a secure network, regularly update software. Ensure that all systems—operating systems, applications, and firmware—are consistently patched. This process should include automated updates where feasible, and IT teams should conduct routine vulnerability scans to identify and fix any weak points before they can be exploited.

2. Use endpoint detection

Use endpoint security solutions to identify and neutralize threats early. These tools not only detect ransomware but also offer insights into the nature of the attack, helping teams understand how it infiltrated the network. Ensure these solutions are configured to alert IT staff of suspicious activity and automatically block unauthorized file encryption attempts.

3. Implement multi-factor authentication (MFA)

MFA adds an extra layer of security, ensuring only authorized users can access sensitive systems, especially those handling sensitive or critical data. By requiring additional verification steps, such as a mobile authentication app, biometric verification, or a hardware token, MFA helps prevent unauthorized access even if login credentials are compromised.

4. Segment the network

Network segmentation isolates critical systems, much like fire doors prevent the spread of fire in a building. This limits the spread of ransomware within the network and minimizes potential damage. You can achieve it by segmenting critical applications, databases, and other high-value assets into subnets with strict access controls.

5. Backup data regularly

Frequent backups of important data should be a cornerstone of your ransomware defense strategy. Regularly schedule backups and ensure they are stored in secure, immutable formats that prevent tampering. The 3-2-1 rule—three copies of data, two different storage types, and one off-site—can provide extra security. Verify the integrity of backups periodically and run simulated recovery drills to confirm that data can be restored efficiently in case of an attack.

6. Train employees

Educate staff on recognizing phishing and other tactics used by ransomware groups. Awareness is a vital defense against social engineering attacks. Beyond that, offer comprehensive training on recognizing signs of suspicious activity, safe browsing practices, and the importance of reporting incidents promptly. Consider including scenario-based training that immerses employees in real-world attack simulations, reinforcing proper responses in a controlled environment.

7. Get cyber insurance

Cyber insurance can help organizations recover financial losses from a ransomware attack, including ransom payments, recovery costs, and legal fees. Cyber insurance can be an important financial safety net, but it’s not a substitute for solid security practices. Make sure the policy clearly defines what qualifies an insurable event and what documentation or proof is required for claims.

How NordLayer enhances security

NordLayer aligns closely with the recommended strategies to protect against ransomware:

1. Identity vulnerabilities and patch systems. With the Device Posture Security (DPS) feature, NordLayer identifies device types and their operating system versions accessing sensitive data. DPS provides timely notifications when a device with an outdated OS version connects to the network, enabling proactive measures such as restricting access to private gateways for devices that don’t meet security rules.

2. Endpoint protection. NordLayer offers Download Protection to block malicious files before they can infect devices and spread malware, which could lead to ransomware attacks.

3. Implement multi-factor authentication (MFA). NordLayer facilitates advanced authentication layers to bolster Zero Trust Network Access (ZTNA). Beyond basic MFA, NordLayer supports additional methods like Single Sign-On (SSO), IP allowlisting, and encrypted connections, ensuring that access to sensitive systems remains secure.

4. Segment the network. Customers can implement granular network segmentation Using Access Control Lists (ACL) within NordLayer’s Cloud Firewall tool. This isolates critical applications and high-value assets, minimizing lateral movement and potential damage in case of a breach.

5. Backup data. While NordLayer does not directly handle backups, its security measures protect access to systems where backups are stored.

6. Cyber insurance. Although NordLayer does not directly offer cyber insurance, pairing NordLayer with NordProtect provides a comprehensive solution for securing critical infrastructure.

By integrating these features, NordLayer supports organizations in addressing ransomware threats while reinforcing their overall security framework.

Lessons from 2024

The top ransomware attacks of 2024 are a stark reminder that no organization is immune to ransomware threats. Whether it’s healthcare organizations, financial firms, or critical infrastructure, the potential for a data breach remains high.

By adopting proactive measures and advanced cybersecurity solutions like NordLayer, businesses can strengthen their defenses and minimize the impact of ransomware attacks. As the threat landscape evolves, staying ahead of cybercriminals is not just a necessity—it’s a responsibility.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cracking the Shell of More_eggs: Cyber Risks for SMBs & How MSPs Can Respond

Key Takeaways:

  • Small Business Vulnerability: Limited cybersecurity awareness makes SMBs prime targets for sophisticated malware campaigns like More_eggs.
  • The Role of MSPs: Managed Service Providers (MSPs) must adopt proactive security measures to stay ahead of threats.
  • The Need for Modern Solutions: Tools like phishing simulations, endpoint protection, as well as a more unified platform approach can strengthen defenses at the foundation.”

The cybersecurity world is no stranger to evolving threats, but the resurgence of the More_eggs malware campaign has captured fresh attention. In December 2024, a report revealed new iterations of this malware, highlighting its enhanced evasion techniques and tailored attack chains. For SMBs and the MSPs safeguarding them, this is a clarion call to reevaluate their cybersecurity strategies.

 

What Is More_eggs?

More_eggs is a backdoor malware associated with the Golden Chickens malware-as-a-service (MaaS) framework. It is used by cybercriminals to infiltrate networks, enabling follow-up attacks like data theft, ransomware, and cryptojacking.

Chain of Attack

 

Campaign 1: VenomLNK → RevC2

  1. VenomLNK: An LNK file contains an obfuscated BAT script that downloads a decoy PNG file (API documentation) from a remote server.
  2. RevC2: An info-stealing backdoor communicates with a C&C server using WebSockets. It can steal passwords, execute commands, and capture screenshots.

 

Campaign 2: VenomLNK → Venom Loader → Retdoor

  1. VenomLNK: Writes VBS and BAT scripts to the Windows temporary directory. The VBS script triggers the BAT script to download a decoy cryptocurrency image and a malicious base.zip file from a remote server.
  2. Venom Loader: A custom-made loader decodes and delivers the Retdoor backdoor via PS1 scripts.
  3. Retdoor: Sends continuous HTTP POST requests to the C&C server with system details, executes encoded commands, and hides under system processes like “GoogleUpdate.”

 

Breaking Down the Terminology

Backdoor:
A backdoor is a type of malware that bypasses standard authentication methods to gain unauthorized access to a system. This allows attackers to remotely control resources like databases and file servers. With this access, they can execute system commands, steal sensitive data, or install additional malware undetected.

Loader:
A loader is a malicious tool designed to infiltrate devices and deliver harmful software (payloads). Once inside a system, loaders can gather system information, install other types of malware such as trojans or data stealers, and prepare the environment for further attacks.

These tools allow attackers to bypass conventional defenses, making them especially dangerous for SMBs with limited resources.

The Devastating Impact to Small Businesses”

  1. Low Security Awareness:
    SMBs often lack dedicated IT teams and cybersecurity expertise. Employees may unknowingly click malicious links or open infected attachments, triggering the malware long before anyone knows what is happening.
  2. Financial and Operational Fallout:
    • Data Exposure: Breaches can result in regulatory fines and loss of customer trust.
    • Operational Disruption: Ransomware and data theft can paralyze critical business functions.
    • Reputational Damage: A compromised reputation can lead to client attrition.
  3. Stealth and Persistence:
    More_eggs thrives on its ability to evade detection, establishing long-term persistence and enabling subsequent attacks.

 

MSP’s Role in Defending SMBs

MSPs are pivotal in addressing these challenges, serving as the first line of defense for SMBs. Here’s how they can combat threats like More_eggs:

 

1. Enhance Employee Awareness

  • Recurring Training: Use interactive videos and quizzes to teach employees how to spot phishing attempts and malicious files.
  • Phishing Simulations: Conduct periodic tests to evaluate and improve employee vigilance.

 

2. Deploy Advanced Endpoint Security

Endpoint protection solutions ensure continuous monitoring of all devices, especially crucial in hybrid or remote work environments. EDR tools with advanced NGAV capabilities are most effective at blocking this family of malware

 

3. Strengthen Email Security

Email remains a leading attack vector, with 90% of attacks originating from Phishing email. MSPs should deploy tools that scan attachments and URLs, proactively preventing threats like phishing and spoofing.

 

4. Implement Incident Response Plans

Regularly back up data and prepare a clear response plan to minimize downtime and financial loss in the event of an attack.

 

Proactive Measures for SMBs and MSPs

  • Unified Security Platforms: Tools that integrate Microsoft 365, Google Workspace, and endpoint protection enable MSPs to deliver holistic security.
  • Browser Protections: Real-time detection of malicious sites and phishing attempts can significantly reduce risk.
  • AI-Powered Solutions: Automation and predictive analytics allow MSPs to anticipate and mitigate evolving threats.

 

The Final Word 

The More_eggs campaign underscores the urgent need for proactive cybersecurity. SMBs are particularly vulnerable, but MSPs armed with the right tools and strategies can make a decisive difference.

Solutions like Guardz not only protect against advanced threats but also simplify the complex security landscape for SMBs. Want to learn more? Visit Guardz.com today.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

資料保護:PB 級別數據時代的來臨 善用數碼資產管理的藝術

IDC 分析師預測,到 2025 年,全球數據增長將達到 175 ZB(zettabyte)。其中大部分是非結構化數據,需要適當的保護措施。

來自海外的儲存系統供應商已經開始接收到有關儲存 EB(exabyte)級數據解決方案的查詢。重要的是,這些詢問並非僅來自超大規模數據中心(hyperscalers)。技術競賽的推進正加速電子郵件、文件、社交媒體等資料的創建,徹底改變了商業通信和營運流程,由此在企業和機構內部生成了大量非結構化信息。

PB 成為新常態
雖然中小型企業仍主要處理 TB(terabyte)級數據,但大型企業已越來越多地突破 PB(petabyte)門檻。超過一半的大型企業管理至少 5 PB 的數據,其中 80% 為非結構化數據。此外,89% 的數據儲存在雲端環境(包括混合雲端、公共雲端和多雲端)中。數據增長早已不是新話題,但令人驚訝的是其增長速度,最近更因物聯網(IoT)、高性能計算(HPC)、機器學習(ML)和人工智能(AI)等現象而加速。

保護 PB 級數據正成為一大挑戰。基於網絡數據管理協議(NDMP)的傳統備份系統面臨創建完整備份所需時間過長的問題。這一過程可能需要數天,甚至在極端情況下達到數週,原因是網絡負載過重。NDMP 的速度較慢,對於 PB 級別數據來說無法應對。此外,在備份前掃描數據以檢測變更也是一大困難。

備份規模的複雜性
增量備份雖是一種重要的改善策略,但在 PB 級別,確定哪些文件被修改可能耗時且資源密集。在備份完成後,多數企業還需進行測試以滿足合規要求,進一步延長過程時間。

儘管具有 PB 或 EB 儲存容量的儲存庫全面普及尚需時日,但對於中小型機構來說,即使是管理數十 TB 的數據也可能帶來實際挑戰。而更糟的是,問題往往接踵而至。硬碟和磁帶快速填滿並不是儲存系統供應商及其用戶面臨的唯一挑戰。隨著客戶需求和 IT 在幾乎每個行業中的關鍵角色,備份與災難恢復(DR)需求正在迅速演變。不再僅僅是創建和加密備份,組織還開始關注其他方面,例如連續數據保護(CDP)、安全性與合規性、裸機還原(包括操作系統、文件及配置的完整伺服器還原)、縮短備份窗口以及更快速的文件還原。

備份問題引起重視
直到最近,PB 級別的備份還很罕見。然而,隨著數據增長及新趨勢(如高級分析和 AI 建模)的出現,數據價值愈加凸顯,因此需要更多保護。值得注意的是,小型語言模型的興起正成為新趨勢。專家指出,企業 CEO 不需要了解 Pink Floyd 的唱片集或所有羅拔迪尼路的電影描述,而是需要有效管理業務的寶貴洞見。因此,圍繞開發訓練於較少數據上的小型語言模型的討論日益增多。這些模型比 ChatGPT 或 Claude 更廉價,可在本地設備上部署,但也需要更多數據來構建模型。

備份是抵禦攻擊、破壞或硬件故障的最後一道防線。對於 PB 級別數據集,即使是少量數據丟失也可能對企業造成災難性影響。然而,儲存管理員並非無計可施。數據正站在他們這邊。一些備份與 DR 工具能提供有關備份性能、容量使用率和錯誤趨勢的洞察。利用機器學習的預測分析可預測儲存需求和潛在故障,而報告儀表板則有助於可視化趨勢、評估合規性並簡化還原計劃。

數據管理的藝術
對於僅有數 TB 數據的公司,由於儲存成本低,往往不重視管理。然而,隨著數碼資產的增長,管理層開始意識到其相關成本。因此,非結構化數據的明顯增長需要採取適當措施,不僅是為了降低成本,還要提高信息安全性。事實上,一些廠商已認識到新的數據管理需求。近年來,數據安全態勢管理(DSPM)、AI 賦能以及管理、風險與合規(GRC)等新產品組別相繼出現。雖然這些目前屬於小眾產品,但其角色預計會隨著時間的推移而增強。

善用數碼資產管理的藝術
如今,許多公司難以回答看似簡單的問題:去年生成了多少個快照?其中有多少仍留在環境中?上次存取五年前創建的文件是什麼時候?當企業接近 PB 門檻時,這些問題的答案將變得至關重要。他們將更容易看到合理管理數據所帶來的節省效益。這種努力是值得的,數據越多,節省越大。不僅包括新儲存設備的支出,還包括因網絡攻擊或不符合法規而產生的罰款。

消除導致不必要數據積累的不良做法是清理存檔的第一步。第二步是將文件整理到適當的「貨架」上,或實施分層儲存解決方案。根據數據的重要性和存取頻率對其進行分類,可以提升儲存成本。例如,一些數據可移至較便宜的儲存中保存六個月。如果在此期間有人頻繁存取這些文件,可以將其返回到更高效的硬碟。而未使用超過 24 個月的數據(若不受特殊存檔法規限制)則可以永久刪除。

減少冗餘數據
另一種消除不必要數據的方法是使用刪除重複數據和壓縮技術。前者通過消除重複數據來減少儲存需求,大幅降低需要儲存和備份的數據量,從而降低儲存成本。刪除重複數據有兩種方法:內聯(數據在到達設備之前即被刪除)和傳統方式(數據儲存後進行刪除)。 

壓縮則可縮小文件大小,可以是無損的(適合關鍵業務信息),或有損的(通過丟棄部分數據來縮小文件大小)。

在有限的預算下管理包含大量數據集的備份對公司來說是一項重大挑戰。然而,通過實施分層儲存解決方案、刪除重複數據及壓縮技術,公司可以改善儲存和備份成本。

關於 Storware

Storware 是一家專注於備份軟件的企業,擁有超過十年的行業經驗。Storware 的備份與還原解決方案適用於各種數據環境,無論是虛擬機、容器、儲存提供商、Microsoft 365 還是運行在本地或雲端的應用程式,均能提供支援。其小巧的設計使其能夠無縫整合進現有的 IT 基礎設施或企業級備份方案中,提供極為便捷的備份保護。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Storware Backup and Recovery 7.1 新版本 將於 2025 年 1 月 1 日 正式推出

Storware Backup and Recovery 7.1 全新登場,帶來跨虛擬平台的強化還原功能、更豐富的儲存選項,及支援更多的操作系統。這一版本為公司企業提供更高的靈活性與效率,助力在多元化虛擬環境中實現數據還原與遷移。

Storware 7.1 重點新功能:

  • 跨虛擬化平台還原與遷移功能:Storware 7.1 引入了先進的跨虛擬化平台還原能力,允許在不同虛擬化平台之間進行虛擬機(VM)還原,例如 VMware vCenter / ESXi 與 OpenStack / Virtuozzo。此外,新增的 VM 對 VM(V2V)遷移功能,支援將 vSphere 虛擬機無縫遷移至 OpenStack 環境,為整合與改善多雲端基礎設施提供了便捷的解決方案。

  • 擴展的儲存支援:為滿足日益增長的數據保留與災難還原需求,Storware Backup and Recovery 7.1 現在支援 Ceph RBD 和 Nutanix Volume Groups 作為次級備份目標。此功能確保關鍵數據在多種儲存系統中安全可靠,並為儲存管理提供更高靈活性。

  • 操作系統支援更全面:Storware 7.1 將操作系統代理(OSA)功能擴展至 macOS,幫助企業在更廣泛的操作系統中實現數據保護策略的統一。此外,新版本完全支援 Canonical Ubuntu 24,進一步鞏固了其在多元化 IT 生態系統中的應用能力。

  • 更智能的備份策略配置:根據用戶意見反饋,7.1 版本新增常用路徑清單功能,幫助 IT 管理員更快速地設置備份策略。新功能還包括 Windows 和 Linux 系統的預設排除條目,大幅降低配置的複雜性。除此之外,此版本還支援 Proxmox VE 虛擬機磁碟級別設置,用戶可以更靈活地進行還原操作。

  • 支援新備份來源:Storware 7.1 現在支援 VergeOS 作為備份來源,為該 VMware 替代方案的超融合基礎設施提供全面保護。

  • 全新 Storware 備份設備:Storware 首次推出實體與虛擬兩種形式的備份設備(Backup Appliance)。這款設備集成了多功能特性,並採用基於 ZFS 的重複數據刪除技術,是全球最具靈活性的備份解決方案之一。

Storware Backup and Recovery 擁有強大的數據管理與保護能力,幫助公司企業在當前數據驅動的環境中保持穩定與安全,避免勒索軟件與其他威脅的侵襲,並促進業務的持續發展。立即免費試用,或享受 60 天免費試用期!

關於 Storware

Storware 是一家專注於備份軟件的企業,擁有超過十年的行業經驗。Storware 的備份與還原解決方案適用於各種數據環境,無論是虛擬機、容器、儲存提供商、Microsoft 365 還是運行在本地或雲端的應用程式,均能提供支援。其小巧的設計使其能夠無縫整合進現有的 IT 基礎設施或企業級備份方案中,提供極為便捷的備份保護。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×