Industry Leading Ransomware Protection

Proactive Data Security with Integrated Anti-malware and Deep MFA.

Request a Demo
Read Asigra Cloud Backup reviews on G2
Down arrow

Asigra Tigris Backup–the Next-Gen Approach to Data Security

Defensive tactics (3-2-1) are effective protection against natural disasters and older ransomware but fall woefully short when facing weaponized ransomware and other Advanced Persistent Threats (APTs).

Tigris Backup takes a completely different approach to protecting data. Tigris Backup is designed to proactively hunt and stop ransomware, not just hide from it. A multilayered proactive approach featuring anti-ransomware and Deep MFA is designed to catch and terminate attacks targeting your backup data.

Asigra Ransomware Protection

Watch the video to discover how to prevent malicious ransomware code from infecting and even deleting your backups.

Play arrow
Immutable backups for ransomware defense may not be enough. “Sleeper attacks” that can be difficult to detect can attack backup environments, where the malware infiltrates the environment and lays dormant until encrypting the data. Krista Macomber,
Senior Analyst, SearchDataBackup, TechTarget

3-2-1 Air-Gapped & Immutable Backups Are No Longer Enough

Attackers know that a clean backup foils ransomware paydays.

Advanced attacks now hunt credentials to delete backups or utilize trojan horse strategies with detonation delays of weeks or months, ensuring that the dormant malware is implanted in all backups (even air-gapped). Ransomware gets restored along with corporate data and the Attack-Loop has begun.

Unfortunately, Immutable Storage just ensures that both the backup data and the malware won’t be disturbed until it’s restored back to the network.

Tigris Backup provides next-gen proactive security, featuring 2-way scanning with the top-ranked anti-ransomware technology, Deep MFA and FIPs 140-2 encryption. An unmatched, proactive approach that actively hunts ransomware.

Asigra Tigris Backup

Agentless Proactive Data Protection
Agentless Backup

No more endpoint agents to slow systems and frustrate end users. Asigra works at the network level to maximize speed and provide six layer proactive security.

Unique Security Architecture

Tigris isn’t restricted by endpoint agents‘ inherent limitations, allowing for next-gen security technologies to be integrated directly into the backup process.

Small Biz to Enterprise

VM backup, container backup, physical host backup, data center backup, remote worker back up — on-prem, In the cloud, hybrid Tigris does it all, with integrated security!

Saas App Data Security

Backup M365, Salesforce, and Google Workspace data while simultaneously protecting it from ransomware and other advanced threats.

Business Continuity (BCDR)

Reduce downtime from hours to minutes. Meet business continuity and disaster recovery objectives with a simple, efficient, low-impact, and secure solution.

Compliance Management

Securely and efficiently store, manage and wipe sensitive data to meet GDPR and other regulatory commitments.

Tigris Ultra Secure Backup

Tigris provides unparalleled protection for your data with a multi-layered, proactive, security system integrated into the backup and restore process.

Tigris Deep Six Security

Bi-directional Scan & Quarantine

Tigris utilizes cutting-edge AI-powered antimalware scanning to catch even zero-day threats. Asigra scans at the LAN level within the Asigra Security Module to complement existing endpoint antimalware. Tigris performs a second ransomware scan during the restore process to quarantine ransomware that had been dormant to prevent reinfection in the production environment.

Content Disarm & Reconstruction (CDR)

Bidirectional CDR scanning of files for potentially malicious content based on preset policies. The engine will remove subcomponents of a file deemed a threat even if the content is harmless.

Deep MFA

Backup admins are favorite targets for attackers. With stolen credentials they have the keys to the kingdom. Asigra’s Deep MFA creates multi-person MFA for critical tasks (deletion, copy, retention parameters etc.). Deep MFA is also critical for combatting insider threats.

Soft Delete

A hidden folder that holds deleted data for a designated period, fooling attackers into thinking permanent data deletion has occurred. Soft Delete creates a 2-step deletion process and protects against accidental/malicious data deletions. Deep MFA can also be applied to Soft Delete, requiring biometric authentication to delete data permanently.

FIPS-140 Encryption

As threats to sensitive information continue to grow, Tigris Backup encryption encompasses the entire system for all data in flight and at rest. Our cryptography provides hash algorithms, AES symmetric encryption algorithms and random number generation to ensure your backup data is useless to unauthorized individuals.

Variable Repository Naming

Avoid your backups being a sitting duck simply creating a moving target gives you the upper hand. If it can’t find them, it can’t delete them, nor does it know what storage volumes, file systems, or buckets to delete.

Learn more about proactive data security with integrated anti-malware and deep MFA.

Asigra Tigris Backup offers a next-gen approach to backup and data security for your physical, virtualized, and SaaS environments.

Request a Demo