Introducing the Asigra SaaSBACKUPSM Platform

Protect your business-critical SaaS data against data loss with secured backup and fast recovery in a single platform.

Learn More

Asigra Tigris Backup–the Next-Gen Approach to Data Security

Defensive tactics (3-2-1) are effective protection against natural disasters and older ransomware but fall woefully short when facing weaponized ransomware and other Advanced Persistent Threats (APTs).

Tigris Backup takes a completely different approach to protecting data. Tigris Backup is designed to proactively hunt and stop ransomware, not just hide from it. A multilayered proactive approach featuring anti-ransomware and Deep MFA is designed to catch and terminate attacks targeting your backup data.

Asigra Ransomware Protection

Watch the video to discover how to prevent malicious ransomware code from infecting and even deleting your backups.

Play arrow
Immutable backups for ransomware defense may not be enough. “Sleeper attacks” that can be difficult to detect can attack backup environments, where the malware infiltrates the environment and lays dormant until encrypting the data. Krista Macomber,
Senior Analyst, SearchDataBackup, TechTarget

Ransomware 3.0 Can Now Infiltrate Immutable and Air-Gapped Backups

Ransomware 3.0 marks the rise of a new era for a whole new breed of ransomware.

It’s enabled by the proliferation and increased convenience of ransomware tools, a level of sophistication in attack strategies rarely witnessed before, and a change in criminal enterprise strategy.

Hackers are no longer limiting themselves to encrypting targeted systems but also damaging the networks. They are also launching high-impact DDOS attacks to flood and crash company servers and websites and leveraging other tactics to create an outage. Since many companies rely on backups for data recovery, backups have become a primary target for hackers.

Tigris Backup provides a completely different approach to protecting data that is multilayered and features the industry’s #1 ranked anti-ransomware software.

Asigra Tigris Backup

Agentless Proactive Data Protection
Agentless Backup

No more endpoint agents to slow systems and frustrate end users. Asigra works at the network level to maximize speed and provide six layer proactive security.

Unique Security Architecture

Tigris isn’t restricted by endpoint agents‘ inherent limitations, allowing for next-gen security technologies to be integrated directly into the backup process.

Scalable Small Biz to Enterprise

VM backup, container backup, physical host backup, data center backup, remote worker back up — on-prem, In the cloud, hybrid Tigris does it all, with integrated security!

Saas App Data Security

Backup M365, Salesforce, and Google Workspace data while simultaneously protecting it from ransomware and other advanced threats.

Business Continuity (BCDR)

Reduce downtime from hours to minutes. Meet business continuity and disaster recovery objectives with a simple, efficient, low-impact, and secure solution.

Compliance Management

Securely and efficiently store, manage and wipe sensitive data to meet GDPR and other regulatory commitments.

Tigris Ultra Secure Backup

Tigris provides unparalleled protection for your data with a multi-layered, proactive, security system integrated into the backup and restore process.

Tigris Deep Six Security

Bi-directional Scan & Quarantine

Tigris utilizes cutting-edge AI-powered antimalware scanning to catch even zero-day threats. Asigra scans at the LAN level within the Asigra Security Module to complement existing endpoint antimalware. Tigris performs a second ransomware scan during the restore process to quarantine ransomware that had been dormant to prevent reinfection in the production environment.

Content Disarm & Reconstruction (CDR)

Bidirectional CDR scanning of files for potentially malicious content based on preset policies. The engine will remove subcomponents of a file deemed a threat even if the content is harmless.

Deep MFA

Backup admins are favorite targets for attackers. With stolen credentials they have the keys to the kingdom. Asigra’s Deep MFA creates multi-person MFA for critical tasks (deletion, copy, retention parameters etc.). Deep MFA is also critical for combatting insider threats.

Soft Delete

A hidden folder that holds deleted data for a designated period, fooling attackers into thinking permanent data deletion has occurred. Soft Delete creates a 2-step deletion process and protects against accidental/malicious data deletions. Deep MFA can also be applied to Soft Delete, requiring biometric authentication to delete data permanently.

FIPS-140 Encryption

As threats to sensitive information continue to grow, Tigris Backup encryption encompasses the entire system for all data in flight and at rest. Our cryptography provides hash algorithms, AES symmetric encryption algorithms and random number generation to ensure your backup data is useless to unauthorized individuals.

Variable Repository Naming

Avoid your backups being a sitting duck simply creating a moving target gives you the upper hand. If it can’t find them, it can’t delete them, nor does it know what storage volumes, file systems, or buckets to delete.

Learn more about proactive data security with integrated anti-malware and deep MFA.

Asigra Tigris Backup offers a next-gen approach to backup and data security for your physical, virtualized, and SaaS environments.

Request a Demo