Search
Close this search box.

APAC world-class racing club bolsters cyber resilience with Cristie BMR recovery.

Ready for true enterprise resilience? Start your free Cristie trial.

Recoveries can be made to isolated networks facilitating cyber forensics or integrity testing within a cleanroom environment.

Cristie automation features reduced administration overhead significantly compared to the incumbent recovery workflow.

The Cristie Virtual Appliance provided recovery of both Windows & Linux based systems from a single platform.

Cristie Recovery NBMR for Dell Networker enhanced the protection provided by the Dell Cyber Vault environment.

Cristie recovery improved RTOs and provides ongoing RTO verification through scheduled recovery simulations.

Tiered recovery of critical customer-facing applications is automated reducing downtime to a minimum in the event of an outage scenario.

Customer Profile:

A long-established non-profit organization within the APAC region providing horse racing, sporting, and betting entertainment. The charity provides dining, social, sport and recreation facilities to over 23,000 members. With multiple racing venues, over 100 regional outlets, and upwards of 24,000 staff, the charity IT infrastructure supports many functions and customer touchpoints.

Challenge

Having multiple customer interface points can broaden the attack surface for potential cybercrime. In this instance, a long established APAC charity organization providing many customer-facing services needed a faster system recovery process in the event of a cyberattack. The existing recovery process had scope for improvement, so a new automated solution was sought to meet internal Recovery Time Objectives (RTO). The new recovery solution would need to integrate seamlessly with existing data protection tools within a Dell Cyber Recovery Vault infrastructure. In addition, the ability to recover systems to a cleanroom environment for cyber forensics or integrity testing in isolation to the production environment was essential.

Solution

Using Cristie Recovery (NBMR) automation features in conjunction with the existing Dell Networker backup environment, the organization was able to eliminate 100s of hours in system recovery administration. Cristie recovery features provided customization to support multiple operating systems and network configurations including secure isolated air-gapped network infrastructures. 

Result

Recovery of systems supporting important customer-facing services such as payments, consisting of server estates numbering into the hundreds, was easily automated.  The seamless integration with Dell Networker Data Protection Software provided full recovery from a single backup and enhanced the benefits of the Dell Cyber Recovery Vault platform to ensure system recovery could be easily comply with internal cyber recovery RTO directives.

System Recovery & Replication Solutions

Protecting & Recovering your Infrastructure in every situation.

The Cristie Software Blog

Top 5 causes of System Recovery failure

The Top 5 Causes of System Recovery Failure and How to Avoid Them

The Top 5 Causes of System Recovery Failure and How to Avoid Them In today’s always-on business environment, system recovery is more than just a technical safeguard, it’s a critical component of business continuity. When a system recovery plan fails, the consequences can include extended downtime, lost revenue, and damaged

Read More »

The extent of cybercrime in the US pharmaceutical industry

The extent of Cybercrime in the US Pharmaceutical Industry Cybercrime in the pharmaceutical industry is very prominent in the United States due to its high-value intellectual property (IP), sensitive patient data, and essential role in healthcare. The extent of cybercrime in this sector is significant, as evidenced by several key

Read More »

The New Threats to Connected Manufacturing

Manufacturing is facing a new era of cybercrime Ransomware in manufacturing is rising fast. Manufacturing companies face a growing array of challenges related to cybercrime, largely due to the evolving nature of their IT systems and their reliance on operational technology (OT). These challenges stem from the convergence of IT

Read More »

Contact Us

Thank you for contacting us. We have received your request.