Introducing the Zerto Cloud Vault
As the cyber threat landscape grows more complex, organizations are realizing that data protection and confidence in cyber recovery solutions are critical for surviving an attack. Most data protection solutions were not designed with cyber recovery as their primary focus. A recent IDC white paper, sponsored by Zerto, a Hewlett Packard Enterprise company— The State of Disaster Recovery and Cyber Recovery, 2024–2025: Factoring in AI¹—reveals that organizations often pay ransoms not because backups are unavailable or infected, but due to concerns over downtime, data loss, and difficulty identifying clean data for recovery.
These statistics show the importance of the new Zerto Cloud Vault solution delivered by managed service providers (MSPs) to help customers with their cyber recovery challenges. In partnership with trusted providers, Zerto combines its cyber resilience capabilities with secure hosted infrastructure and cyber recovery experts to ensure your data can be recovered from cyber threats. Let’s take a closer look at the Zerto Cloud Vault.
What Are the Key Features of the Zerto Cloud Vault?
• Real-time encryption detection—Respond to cyberattacks events more quickly
• Immutable data copies—Ensure data remains untouched
• Cleanroom recovery—Avoid attack loops with known clean infrastructure
• Isolated from production environments—Add more barriers to attackers
• Nondisruptive instant testing—Keep recovery plans current
• Agentless protection—Keep workloads free from unnecessary agents
• Software-only deployment—No hardware appliances required
• Hardware- and storage-agnostic—Works with existing infrastructure
What Are the Benefits of the Zerto Cloud Vault?
• Immediate threat alerts—Receive instant notifications of suspicious encryption activity, enabling faster response to potential cyber threats.
• Untouchable data copies—Keep secure, immutable copies of your data for up to 12 months to ensure it remains safe from bad actors.
• Secure, isolated recovery—Recover data in a clean environment where it can be thoroughly checked and cleansed of any threats before returning to normal operations.
• Enhanced security flexibility—Maintain separate security protocols and postures for production and recovery environments, minimizing risk.
• Confidence through regular testing—Regularly and comprehensively test your cyber recovery plans without disruption, ensuring you’re always prepared for potential cyber incidents.
• Simplified management—Protect virtual machines without the need for additional agents, reducing complexity and management overhead.
• Flexible and cost-effective deployment—Deploy easily with a software-only solution that eliminates the need for additional hardware.
• Broad compatibility—Run the Zerto Cloud Vault seamlessly across different hardware, storage, and cloud environments, ensuring flexibility in your infrastructure choices.
Which Partners Currently Offer the Zerto Cloud Vault?
At launch, the Zerto Cloud Vault is available from the following Zerto MSP partners:
• Assurestor
• Verinext
• Converge Technology Solutions
• LincolnIT
For more details, check out our Zerto Cloud Vault solution page and explore these resources:
White paper: Understanding Real-Time Encryption Detection with Zerto
Analyst Report: Zerto Named a Leader in Resiliency Platforms – ISG Provider Lens 2024 Report
Datasheet: What Is CDP?
Datasheet: Application-Centric Protection for Disaster Recovery
1 IDC white paper, sponsored by Zerto—The State of Disaster Recovery and Cyber Recovery, 2024–2025: Factoring in AI— #US52445524, August 2024