Asigra launched Tigris Data Protection software with CDR (Content Disarm & Reconstruction). Asigra Tigris Data Protection software now includes CDR for protection against deeply embedded malware to address the ransomware threat, which now significantly increases the risk to both primary and backup data. 

The most recent generation of ransomware hides harmful code within content files that are frequently nested and compressed. Cybercriminals know that antimalware cannot scan what it cannot see, so they can avoid detection by using deeply embedded code. The data protection platform Asigra Tigris unifies cybersecurity and backup, fostering new levels of collaboration between data protection and security experts. 

Val Silva, CTO of Asigra “Worrisome increases in cybersecurity attacks on critical business systems has followed the rise in remote work environments over the past couple years. These attacks are commonly finding their way within corporate networks, and in many cases, specifically targeting backup systems. 

With Asigra CDR, Tigris Data Protection has reset the bar with ultra-secure backup that ensures organizations meet their business continuity objectives for absolute confidence in the ability to recover mission-critical data when needed.” 

The brand-new security feature, CDR, breaks down supported files into their smallest parts to find any embedded malicious code, macros, links, or executables. CDR reconstructs the original file without the malware after filtering and containing the malware. The technology eliminates any potential payload threats that are deeply buried within each file, outperforming predictive detection-based techniques. By maintaining file functionality and authenticity without the use of malicious code, the new CDR functionality ensures the integrity of the files. 

Asigra’s security architecture now includes soft-delete support, FIPS 140-2 certified encryption, bidirectional CDR, zero-day exploit protection, variable repository naming to non-standard names to prevent recognition, deep MFA (multi-factor authentication), and variable repository sanitization with inline detection on both the backup and recovery streams.