Schließen Sie dieses Suchfeld.

Combat Ransomware with Advanced Anomaly Detection.


Detect malicious encryption between subsequent recovery snapshots.

Gain early warning of suspicious encryption.

Anticipate ransomware attacks with early detection of encrypted data.

Recover any available system image before encryption to a sandbox environment for analysis.

Determine the last known clean system image in isolation from your production network.

Detection can be enabled to run during every system capture process with no impact on backup performance.

Ransomware detection seamlessly integrated into system image updates.

Anomaly Detection

What is Advanced Anomaly Detection?

The Cristie Software team has integrated patented technologies to detect malicious encryption and file renaming during every BMR system capture process. With Advanced Anomaly Detection, the system performs integrity scans between image updates to detect encryption. Analysis can also be scheduled independently from regular image updates.

Combat Ransomware

How does Advanced Anomaly Detection help to combat Ransomware?

Rapid detection of anomalies in data structure and naming can provide the earliest warning of malicious encryption and an active cyberattack. Having the ability to detect and alert on activity which may be suspicious means that potential ransomware attacks can be identified in motion and immediate action taken.

How CBMR works

Learn more about CBMR.

CBMR is a simple, yet powerful, backup software solution that creates a backup of your entire system as well as the data files and databases that you specify. The backup can be held on a network share, a tape device, a library, a standalone NAS or using Spectrum Protect.

The software will also provide quick recovery of the operating system in the event of system failure or human error. The recovered machine can be on dissimilar hardware or on a virtual or cloud machine.

CBMR also provides the ability to clone to a new machine from an existing backup. The cloning option allows the hostname and/or the IP address to be changed during the recovery.

CBMR allows you to backup data on your system to any backup location attached to your computer or network, including FTP (Windows only), tape, VMware, Hyper-V, Spectrum Protect and AWS and OCI public clouds. You can then examine the content of the backup and restore any desired files or directories.


What can be done if suspicious encryption is detected?

Given the rapid spread of ransomware encryption within a compromised network, it is highly probable that earlier system images will contain malware. In such cases, extensive cyber forensic investigation is typically required to identify the “last known clean” system image that can serve as a safe restore point. This process can be time-consuming, leading to prolonged downtime and revenue losses. However, Cristie Software’s anomaly detection capability can help expedite this process. By comparing images against multiple snapshots of previous backups, anomalies can be detected, reducing the time required for investigation. Additionally, system images from any specific point in time can be recovered to a sandbox environment for analysis, preventing further infection of the production environment.

How CBMR works

CBMR - Workflow Sequence

VM, Cloud or Physical Server

Prepare Server

Install CBMR Agent
Create/Copy Binary

Protect Server

Create Protection Policy & Group

Download the Recovery ISO

Download the recovery ISO from Cristie

Boot Recovery ISO

Connect to Platform

select desired snapshot

Complete Recovery

CBMR Recovery Environment

CBMR requires one license per system it protects and includes 12 month free support & maintenance. Find out more about our pricing here

Der Cristie Software Blog

Orchestrating Your Comeback: How Automation Streamlines System Recovery

Orchestrating Your Comeback: How Automation Streamlines System Recovery In today’s digital landscape, downtime can be devastating. Every minute a system is offline translates to lost productivity, revenue, and potentially, customer trust. Organizations are constantly searching for ways to minimize downtime and ensure a swift recovery in the event of a

Mehr lesen "

How to close the Top 5 Disaster Recovery Plan Gaps

How to close the Top 5 Disaster Recovery Plan Gaps. A disaster recovery (DR) plan is an essential part of any organization’s risk management strategy. It outlines the steps that need to be taken in order to recover from natural disasters, cyber-attacks, or any other unexpected event that could disrupt

Mehr lesen "

Kontaktieren Sie das Team von Cristie Software für weitere Informationen

Was auch immer Sie für Ihre Replikations- und Datenwiederherstellungsanforderungen benötigen, wir sind für Sie da.


Vielen Dank, dass Sie uns kontaktiert haben. Wir haben Ihre Anfrage erhalten.