Peer Software and Pulsar Security have announced a strategic alliance. Peer Software will use Pulsar Security’s team of cyber security experts to continuously monitor and analyze emerging and evolving ransomware and malware attack patterns on unstructured data as part of the alliance. These attack patterns will be leveraged to enable an additional layer of cyber security detection and response by PeerGFS.
PeerGFS is an enterprise-class software solution that streamlines the deployment of a contemporary distributed file system across multi-site, on-premises, and cloud storage. These capabilities will improve PeerGFS’s Malicious Event Detection (MED) feature.
Duane Laflotte, CTO at Pulsar Security stated, “Each ransomware and malware attack are encoded to infiltrate and propagate through a storage system in a unique manner that gives it a digital fingerprint. By understanding the unique behavior patterns of ransomware and malware attacks and matching these against the real-time file event streams that PeerGFS collects across the distributed file system, Peer can now empower its customers with an additional layer of fast and efficient cyber security monitoring. We are excited to be working with Peer Software on this unique capability.”
Through additional services like penetration testing, vulnerability assessments, dark web assessments, phishing simulations, red teaming, and wireless intrusion prevention, Pulsar Security and Peer Software will collaborate to educate and inform enterprise customers about new trends in cyber security and how to fortify their systems against attacks.
Jimmy Tam, CEO of Peer Software commented, “Ransomware attacks have become so common that almost every storage infrastructure architecture plan now also requires a cyber security discussion. “But whereas other storage-based ransomware protection strategies have focused mainly on the recovery from an attack, Peer Software’s goal in working with Pulsar Security is to prioritize the early detection of an attack and limit the spread to minimize damage, speed recovery, and keep data continuously available for the business.”