This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Search
  • C-MRP

    Helping Customers to Build a ‘Cloud + Storage’ Comprehensive Defense System Against Ransomware Attacks

  • Overview
  • Benefits
  • Architecture
  • Products
  • News and Events
  • Resource

C-MRP

In recent years, ransomware has shown characteristics such as multiple variants with rapid updates, a doubling of attack volume, and fast encryption speeds. The targets of attacks are diversified, with an organization falling victim to ransomware every 11 seconds on average, and each successful attack resulting in more than 5 days of business disruption. Traditional ransomware protection models based on behavior, characteristics, and network traffic detection, combined with network security and storage backup recovery, have been unable to adapt to the increasingly complex ransomware attacks.

In response to the entire ransomware attack process, Huawei has build a multi-layered anti-ransomware solution C-MRP, which collaborates with multiple cloud security services and storage to provide key anti-ransomware capabilities such as AI intelligent ransomware attack identification, lossless encrypted traffic detection, and proactive data protection. It constructs an end-to-end anti-ransomware system that "prevents intrusion, prevents proliferation, prevents leakage, and prevents tampering," helping customers effectively defend against ransomware attacks and ensuring that data is "unstealable and unalterable."

Benefits

Intrusion Prevention

Intrusion Prevention

Build a three-tier defense system at the network layer, application layer, and host layer, supporting the protection of various objects such as cloud hosts, containers, applications, databases, etc.
Spread Prevention

Spread Prevention

Support virus-encrypted traffic detection and automatic network isolation for risky hosts.
Leakage Prevention

Leakage Prevention

Based on AI identification of covert channels for outgoing data, support for post-incident audit and traceability.
Tampering Prevention

Tampering Prevention

Real-time data protection based on the collaboration of cloud brain and storage, with secure snapshots and backup data that cannot be tampered with, and AirGap isolation area data protection.
Architecture

Architecture

Architecture

Intrusion Prevention

• In-depth intrusion prevention system
• Full coverage of attack types
• Intelligent virus detection

Spread Prevention

• Automatic isolation of compromised hosts
• Low-loss encrypted traffic detection
• Dynamic honeypot deception

Leakage Prevention

• Prevention (pre-event)
• Interception (in-event)
• Tracing (post-event)

Tampering Prevention

• Proactive data protection based on cloud-storage collaboration
• Tamper-proof snapshot backups
• Air Gap for isolation zone protection

Huawei

TOP