SphereCyberX - the new dimension of cybersecurity

Meet SphereCyberX

The answer to the evolution of threats is the revolution of cybersecurity. That is where SphereCyberX enters to fill the gaps left by the traditional cybersecurity tools in battling the multidimensional threats.

The spherical architecture of SphereCyberX unifies multiple technologies and layers of cyber resilience. These range from prevention, protection, storage and replication to isolation, rapid response and instant recovery. Simply put -⁠ your cyber defences gain an extra boost.

The core of SphereCyberX revolves around data and 4 key areas -⁠ Data Restore, Storage and Access, Transmission as well as Isolation. These are the foundation for other layers of protective measures and the most important element of all cybersecurity strategies.

Data Recovery

Spherical protection for critical assets

Complete protection for data in storage and source-level optimization. On top of that, recovery and restore processes are ready for any scenario, along with On-Source Data Processing (xODP) technology. Your data is secured from the very beginning -⁠ before it even leaves the source. It is like installing an alarm before moving into your new home.

data
Storage and Access

A fortress for your data

Secure data storage in immutable environments that is based on Single Write Repository (SWR) technology along with complete access control. Imagine a fortress, where your data is protected and always accessible whenever you need it.

storage and access
Transmission

Guarantee of data availability

Smooth, dynamic and protected data transfer thanks to end-to-end encryption, one-way data flow approach, secure data ways for transferring data and georeplication. This is a form of insurance -⁠ data is copied and protected in different locations, therefore even during a failure you have a data availability guarantee.

transmission
Isolation

Failproof line of defense

AirGap and physical isolation, logical separation and protection against data manipulation… -⁠ isolation is your last line of defense even during an attack since it prevents the spread of a given threat.

Isolation

Technologies in SphereCyberX

Xopero Zero Trust Approach

Xopero Zero Trust Approach -⁠ restricted access, complete control

Xopero Zero Trust Approach (XZTA) is a fundamental aspect of SphereCyberX, eliminating the risk of unauthorized access and privilege escalation.

  • On-source Data Processing (xODP)

    Your data is important. Therefore, we secure it from the very beginning - before it even leaves the source.

  • Restricted access

    Full access control, integration with IAMs, access management as well as data protection at the level of encrypted agents.

  • Own Key Encryption

    Create your own encryption key, which will exclusively be used during the backup processes and prevent any third parties from decrypting it.

  • Role-based Access Control

    The ability to assign roles and set permissions give you full control and flexibility in terms of management.

  • Active Diagnostic Module (ADM)

    Detailed and immutable logs allow for complete tracking of all user activity across systems.

Triple-I

Triple-I: cyber resilience in 3 dimensions

The Triple-I technology is at the forefront of security, immutability and integrity of backup copies, multi-layer replication and isolation. By combining our flagship features and technologies, it ensures immediate data recovery in case of failures -⁠ anticipating every possible scenario.

  • Integrity and immutability of backups

    Flexible backup policies, many rotation schemes (GFS, Forever Incremental, FIFO). Additionally, protection against modifications, deletions and encryption using SWR technology.

  • Instant Disaster Recovery

    Quick recovery between different systems, instant access to files, granular restore and BMR. A guarantee of business continuity.

  • Isolation of backups

    Georeplication between any data storage, in geographically separated locations, including dedicated and physically isolated environments in the Xopero Isolated Zone, which minimizes the risk of network attacks.

FOXS

FOXS: the foundation of data immutability

Fortress ObjectX Storage (FOXS) is a proprietary technology which protects your backups from ransomware attacks, modification, deletion, and the spread of threats.

  • Single Write Repository

    A technology that allows for one-time data writing and then multiple read accesses without any possibility of modification or deletion after writing, guaranteeing immutability of backups.

  • Security by Default

    Built-in, default security mechanisms and advanced techniques, including network segmentation, sandboxing as well as multi-layered encryption.

  • Isolation and separation

    Segregation of the software layer used for backups and the storage layer according to the best practices of Xopero Zero Trust Approach (XZTA).

  • On-source Compression and Deduplication

    Advanced data optimization carried out directly at the source (deduplication and compression).

  • Unlimited Cloud i Any-Storage

    Secure data storage in Xopero Cloud Storage and the ability to attach any given data storage (cloud, on-premise, and hybrid), along with unlimited scalability.

xSAIR

Xopero Secure AirGap Immutable Repository (xSAIR)

A solution that protects your backups in a completely isolated zone, unavailable for ransomware or any other threats.

  • Isolated Replication Zone

    Dedicated, isolated environment for storing replicated data, which minimizes the impact of network attacks.

  • Time-Based Acccess

    The access to isolated data is only given for outlined time frames, further minimizing the risk of a data breach.

  • Point-to-Point Network Connection

    Direct, encrypted connection between isolated spheres, eliminating intermediaries and further minimizing the risk of data interception.

  • Xopero SphereReplication Engine (XSRE)

    Advanced methodology of transferring data, which guarantees secure transfers and isolation between spheres.

  • Compliance with regulations

    Data isolation based on compliance requirements with regulations like RODO, SOC2, HIPAA or ISO 27001.

CyberTierX -⁠ customizable spherical resilience

xSAIR

Freely configure how advanced your technology along with security management processes are. Adjust the level of spherical cyber resilience according to how critical the data is, what your primary business objectives are, and infrastructure along with security requirements. If needed -⁠ add more spheres, scale and expand.

CyberTierX1

Guaranteed
security

Includes fundamental security measures, such as access control, encryption, secure transmission, monitoring and fundamental technologies SphereCyberX. Available for both Xopero ONE Backup & Recovery and Xopero Unified Protection.

CyberTierX2

Advanced security measures

The foundation of CyberTierX2 is data replication, to another independent storage location. This can be local, cloud or hybrid, including Xopero Cloud. It is made for extensive infrastructures utilizing many storage instances.

CyberTierX3

Protection of critical infrastructure

The fundamental aspect of CyberTierX3 is the physical isolation of data and Air Gap backup to another Xopero Unified Protection storage. In this model, the storage is disconnected from the network and only turns on during replication. This makes it a secure while still effective and stable solution to archive backups and have a guarantee of instant Disaster Recovery capabilities -⁠ ready for any scenario.

Each CyberTierX level connects different key areas of security -⁠ data, storage, access, transmission, along with isolation -⁠ acting as shields of protective layers.

Łukasz Nowatkowski
Łukasz Nowatkowski Cybersecurity Advocate