Vault Workspace Technology

Vault Moderator

The vault moderator profile will be used to move data from the user’s data to the vault data. Frozen (old) data in the vault can be accessed only by authorized users but cannot be deleted or modified. Data can be manually or automatically moved to the vault periodically or as required. This avoids the risk of deletion, infection, or modifications of frozen(old) data.

Will the users be able to work during the DCDC (Primary and Hidden Chamber) process?

No. The users cannot work during the DCDC process. Hence, it should be scheduled during non-working hours.

Can an inactive malware residing in the secondary chamber and scheduled to attack after a week affect the data?

The inactive malware will be treated as a data file in the hidden chamber and will not be executed inside the environment of the hidden chamber.

However, if any malware exists in the primary chamber, it will be executed in the user’s Windows environment and affect the primary chamber and the latest version of the backup in the hidden chamber. In such a situation, one can restore the second last version of the data from the hidden chamber.

What is the duration of the entire DCDC process?

The duration of the DCDC process will depend upon the data modified on that particular day.

Is the timing of the DCDC process customizable?

Yes. The time at which the DCDC process will be triggered daily can be configured.

How will the timing of the DCDC process be configured when the users are located across different time zones?

The DCDC process will be executed at a time convenient for all the users and cannot be user-specific.

How does BLACKbox prevent data loss by a ransomware attack?

BLACKbox does not prevent ransomware attacks. However, BLACKbox is deployed with primary-hidden chamber technology, which isolates the hidden chamber containing the versioned backup of the data.

Data inside the primary chamber is divided into two parts: frozen data, which is edit- locked, and warm data. So, in the event of a ransomware attack, only the warm data will be affected. Nevertheless, the last version of the warm data can be restored from the hidden chamber.

Which software and algorithm are used by BLACKbox to back up the data?

BLACKbox uses its own algorithm called the primary chamber-hidden chamber concept(vault workspace technology) for backup. The backup is taken in full/increments/versions during the DCDC process.