Vault Workspace Technology
The vault moderator profile will be used to move data from the user’s data to the vault data. Frozen (old) data in the vault can be accessed only by authorized users but cannot be deleted or modified. Data can be manually or automatically moved to the vault periodically or as required. This avoids the risk of deletion, infection, or modifications of frozen(old) data.
No. The users cannot work during the DCDC process. Hence, it should be scheduled during non-working hours.
The inactive malware will be treated as a data file in the hidden chamber and will not be executed inside the environment of the hidden chamber.
However, if any malware exists in the primary chamber, it will be executed in the user’s Windows environment and affect the primary chamber and the latest version of the backup in the hidden chamber. In such a situation, one can restore the second last version of the data from the hidden chamber.
The duration of the DCDC process will depend upon the data modified on that particular day.
Yes. The time at which the DCDC process will be triggered daily can be configured.
The DCDC process will be executed at a time convenient for all the users and cannot be user-specific.
BLACKbox does not prevent ransomware attacks. However, BLACKbox is deployed with primary-hidden chamber technology, which isolates the hidden chamber containing the versioned backup of the data.
Data inside the primary chamber is divided into two parts: frozen data, which is edit- locked, and warm data. So, in the event of a ransomware attack, only the warm data will be affected. Nevertheless, the last version of the warm data can be restored from the hidden chamber.
BLACKbox uses its own algorithm called the primary chamber-hidden chamber concept(vault workspace technology) for backup. The backup is taken in full/increments/versions during the DCDC process.