Fail-safe Ransomware Recovery Protection!
WNY’s only true ‘Light’s Out’ Air Gapping & Recovery Service
So, you want to Air Gap, Move Data Off of Your Network or Archive Data, but you don’t have the hardware?
We have a Service:
"Air Gap as a Service" (AGaaS)
Here's How it Works:
On a scheduled basis, we’ll bring a clean, fully patched & updated NAS device to your facility with appropriatecabling/connection devices. Your IT will inspect it. Various copy methods will be discussed and some testing alternatives may be agreed upon, based on your infrastructure. Once validated, your IT will connect to your infrastructure/storage array. When ready, they’ll begin to copy data to it. Our storage engineer(s) will be present at the start to observe, and trouble-shoot any initial problems. They’ll observe data speeds, bottle-necks, and any issues. Any/All data should be encrypted prior to copying to the NAS.
Upon completion, we’ll return, remove the NAS, transport back to our unmarked, high security data storage facility, here in WNY. There, we’ll move the data onto a (currently using LTO-8) tape, remove tape from the drive and place in your tape storage containers (aka: Resident Box(es)), TOTALLY OFF-LINE. Then, we’ll sanitize our NAS, removing all of your (encrypted) data.
In the event of an ‘incident’ you’ll contact us (24x7). Depending on circumstance, we’ll either bring your tape(s) and our drive to your site, or we’ll move data back from tapes onto our NAS and bring the NAS to your facility. We’ll assist your engineers in reconnecting to your network, and begin the restoration process. We highly recommend restoring to an isolated/segregated server/storage array. Once initial data restoration has been completed, your IR Team will analyze it for IoC’s. Finding any, they’ll safely remove, before full restoration begins.
How much do the services cost?
Full Service - Active Data Archiving & Air-Gapping Service. Rates below do not include supply of Tapes or monthly storage (see below for required minimum storage cost). Client may purchase tapes from Lincoln Archives, Inc. / LACyber or source themselves. Our most popular plans:
1x Per Quarter Service - Weekdays - Mondays-Thursdays (1 Night Use) Deliver NAS to Client Site, Client Use Overnight (Weekday: Mon-Thurs), Return, Pickup, Deliver to Vault Facility, move data to Tape, Bar Code Tape(s), and file within Client Resident Box, Scan into Box & Location: $400.00 / Quarter
1x Per Month Service - Weekdays - Mondays-Thursdays (1 Night Use) Deliver NAS to Client Site, Client Use Overnight (Weekday: Mon-Thurs), Return, Pickup, Deliver to Vault Facility, move data to Tape, Bar Code Tape(s), and file within Client Resident Box, Scan into Box & Location: $250.00 / Month
1x Per Week Service (4x/month) - Weekdays - Mondays-Thursdays (1 Night Use) Deliver NAS to Client Site, Client Use Overnight (Weekday: Mon-Thurs), Return, Pickup, Deliver to Vault Facility, move data to Tape, Bar Code Tape(s), and file within Client Resident Box, Scan into Box & Location: $600.00 / Month
Storage of up to 500 (LTO-8 or other) Tapes in 6 Resident Boxes: $150.00 / Month
We have SEVERAL different plans! Different Needs/Plans
(contact us for pricing): info@LA-Cyber.com
For Backup Tape Vaulting & Rotation Services, please refer to:
Air Gap, Data Storage and Archiving:
How do I get this?
Fill Out the I WANT Order Form Below
98% of orgs with Office 365 harbor malicious emails inside their mailboxes. Threats like ransomware, spear phishing, and account takeover put your organization and employees at significant risk. Find out what’s hiding in your inbox.
Via security assessment, we can quickly identify security gaps, patches and software updates that are out of date, then advise steps to fix.
Via short questionnaire, we'll help you determine whether weakness exist in the way you protect your confidential data. In a few minutes, we'll produce a comprehensive profile of strengths and vulnerabilities of your IT security. Let us show you where protections should be placed before those vulnerabilities are exploited.
LA-Cyber can directly submit suspicious URLs and files through the ISAO’s Cyber Forum for rapid analysis to determine if they are known or zero-day cybersecurity threats.
Readiness Pro: Privacy/Security Assessment & Policy Development Tool
Network Perimeter Security - Firewalls
Security Awareness Training
Network Security, Monitoring & Patching
Cloud Based Backup & Recovery
Backup Tape Vaulting & Rotation Services
Air Gapping as a Service
Data Destruction Services
Security Operations Center (SOC)
Data Storage and Media Updating
Server & Data Center Relocation Services
Breach Investigation & Notification Services
Forensic & Legal Investigations