93%
of ransomware attacks now specifically target backup repositories before deploying the main encryptor payload, according to Veeam Ransomware Trends Report 2024, compared to 68% in 2022
21 days
average recovery time for organizations without immutable backups following a major ransomware incident, versus 5 days for organizations with immutable backups and isolated vaults per Cohesity data protection survey
$1.85M
average ransomware payment made by organizations whose backups were also encrypted or destroyed, compared to $475K average for organizations that successfully recovered from backups, per Sophos State of Ransomware report 2024

Backup infrastructure is no longer a passive recovery tool. Ransomware operators have turned backup systems into a primary attack target, recognizing that destroying recovery options before deploying encryptors eliminates the organization's ability to recover without paying ransom. Documented ransomware tactics now routinely include deleting Windows Volume Shadow Copies, identifying and targeting backup software agents to corrupt backup jobs in progress, and encrypting or destroying backup repositories before the primary encryption payload is delivered.

This shift in attacker behavior has changed the criteria for evaluating backup platforms. Recovery speed and storage efficiency remain important, but they are no longer sufficient. The questions that security architects now ask about backup platforms are: Can backup data be modified or deleted by an attacker who has compromised administrative credentials? Is backup data reachable through network paths from the production environment? Does the platform detect when ransomware was present in backup data and when it was introduced? How quickly can the platform support recovery of hundreds of systems simultaneously rather than a single system at a time?

Rubrik, Veeam, and Cohesity are the three platforms most frequently evaluated in enterprise data protection programs that address ransomware recovery as a primary design requirement. Each takes a different architectural approach to backup security, and the differences between them determine which is the strongest fit for specific organizational contexts.

Why Backup Architecture Is Now a Security Control

The evolution of ransomware attack methodology has made backup architecture decisions as consequential as firewall configuration and endpoint security tool selection. Understanding the specific tactics that ransomware operators use against backup infrastructure is the foundation for evaluating which backup platform capabilities provide genuine protection.

Deleting Volume Shadow Copy Service (VSS) snapshots was among the first documented ransomware anti-recovery techniques, and remains standard practice in most ransomware playbooks. VSS snapshots are the default Windows backup mechanism for application-consistent backups, and ransomware that successfully deletes VSS snapshots before encrypting production data eliminates the most accessible recovery option for many organizations that rely on VSS as their primary backup. Dedicated backup platforms with their own backup repositories outside the VSS infrastructure are not affected by VSS deletion.

Targeting backup agents is a more sophisticated technique that has become common in enterprise ransomware attacks. Ransomware operators who have established initial access conduct reconnaissance to identify which backup software is running (Veeam, Rubrik, Cohesity agents, or others) before deploying the main encryptor. They then corrupt backup jobs in progress, modify backup schedules to prevent new backups from completing, or target the management server that controls the backup infrastructure. Backup platforms that separate the management plane credentials from the backup storage credentials, and that protect backup repositories with immutability independent of the management plane, are more resilient against this technique.

Encrypting backup repositories is the most direct attack on recovery capability. If an attacker achieves access to the backup storage infrastructure with write access, they can encrypt backup data before or alongside the primary encryption of production data. Immutability controls that enforce a no-modification guarantee at the storage layer prevent this outcome even when the attacker has management-level credentials to the backup platform.

The three properties that define a backup architecture resilient to ransomware are immutability (backup data cannot be modified or deleted even by an attacker with full administrative credentials), isolation (backup data is not reachable from the production network through normal network connectivity), and rapid recovery (the platform can restore large numbers of systems quickly enough to bound the business impact of the incident to an acceptable duration). All three properties must be present for the backup architecture to provide ransomware recovery assurance; any single property in isolation is insufficient.

Rubrik: Zero Trust Data Security Architecture

Rubrik positions its Security Cloud platform around a Zero Trust Data Security architecture that applies zero trust principles not only to access to the backup management plane but to the backup data itself. The central claim of Rubrik's security architecture is that its RIFT (Rubrik Instantly Recoverable File System) provides immutability that cannot be overridden even by administrators with full Rubrik credentials or by Rubrik support engineers accessing a customer environment, because immutability is enforced at the file system level rather than through access control policies.

Rubrik's RIFT is a purpose-built file system in which every backup snapshot is written in an immutable format that the file system architecture prevents from being modified after writing. Unlike Linux chattr-based immutability that sets a flag on individual files that could theoretically be removed by a privileged operation, RIFT's immutability is enforced by the file system's own data structure, which does not include modification operations for committed data. This makes Rubrik's immutability claim more architecturally robust than implementations that layer immutability on top of file systems that natively support modification.

Rubrik's anomaly detection monitors backup data change patterns across snapshots and uses machine learning models to identify unusual change rates consistent with ransomware encryption activity. When anomaly detection identifies a suspicious pattern, Rubrik flags the affected snapshots and identifies the approximate time window when unusual activity began. This detection within backup data supports faster identification of the last clean recovery point without requiring manual investigation of each snapshot.

Rubrik's threat hunting capability extends this to retrospective investigation: security teams can search across the entire backup history for specific indicators of compromise (file hashes, file names, registry keys) to identify not just when encryption began but when the initial malware was introduced. This retrospective visibility is valuable for understanding attacker dwell time and ensuring that the selected recovery point predates the initial compromise rather than just the visible encryption activity.

Rubrik Cyber Recovery provides orchestrated recovery workflows that automate the multi-step process of recovering from ransomware: selecting the clean recovery point, validating recovery completeness, sequencing the restoration of dependent systems in the correct order (domain controllers before dependent servers, database servers before application servers), and confirming recovery success before restoring network connectivity. These orchestrated runbooks reduce the manual coordination required during an incident and reduce the risk of recovery errors when teams are operating under incident response pressure.

Rubrik's primary limitations are its pricing and its integration ecosystem relative to Veeam. Rubrik is subscription-priced per TB of managed data and is typically the most expensive of the three platforms at comparable scale. Its platform and workload coverage is strong for VMware, cloud, and NAS environments but less broad than Veeam's support for physical servers, Hyper-V, Kubernetes, and the full range of enterprise application platforms.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Veeam: Market-Leading Coverage and Ecosystem Breadth

Veeam Data Platform is the most widely deployed enterprise backup solution by installed base, with a market presence built on the broadest platform and workload support in the enterprise backup market. Where Rubrik built its position on security-first design and Cohesity built its position on data intelligence and multi-cloud management, Veeam built its position on covering everything: VMware, Hyper-V, AWS, Azure, GCP, physical Windows and Linux servers, NAS and file shares, Microsoft 365, Oracle, SAP, Kubernetes through Kasten by Veeam, and a partner ecosystem of thousands of technology integrations.

Veeam's ransomware resilience capabilities center on the Veeam Hardened Repository, a Linux-based backup repository configured with specific security hardening including non-root Veeam service accounts, immutability flags on backup files using Linux file system immutability, and single-use credentials for repository access that prevent a single compromised credential from providing persistent access. The hardened repository requires careful configuration to deploy correctly, and Veeam publishes detailed hardening guides that outline the specific configuration requirements for achieving meaningful immutability guarantees.

Veeam also supports object storage targets (Amazon S3, Azure Blob Storage, Google Cloud Storage) with immutability locks enabled through the cloud provider's native WORM controls (S3 Object Lock, Azure Blob immutability policies). This cloud-native immutability is enforced by the cloud provider's storage infrastructure rather than by Veeam's software, which provides a strong and independently auditable immutability guarantee for organizations using cloud object storage as a backup tier.

Veeam SureBackup is a mature automated backup verification capability that actually boots backup VMs in an isolated sandbox environment, runs application-level health checks and security scans against the running VM, and confirms that the backup is not only technically intact but functionally recoverable. SureBackup verification results provide evidence of backup recoverability that satisfies cyber insurance requirements and audit requests for backup testing documentation.

Veeam ONE provides monitoring and reporting across Veeam deployments, including alerting on backup job failures, capacity planning, and compliance reporting for backup policy adherence. Veeam's Cyber Secure program provides ransomware recovery guarantees for customers that meet specific implementation requirements, including immutable backup configuration and annual backup restore testing through Veeam's professional services.

Veeam Instant Recovery allows failed VMs to be brought online from backup storage in minutes, serving production workloads directly from the backup repository while permanent storage recovery occurs in the background. For organizations with well-configured Veeam deployments and hardened repositories, this capability provides recovery speed competitive with Rubrik's Live Mount capability.

Veeam's primary limitation relative to Rubrik's security-first positioning is that its security features, while strong, were primarily added to a platform originally designed for operational backup rather than built from the ground up with security as the primary design requirement. Organizations evaluating platforms where ransomware recovery is the primary driver will find that Rubrik's architecture documentation and security-specific capabilities are more directly responsive to their security requirements.

Cohesity: Data Intelligence and Multi-Cloud Recovery

Cohesity positions its data protection and security strategy around two integrated platforms: Cohesity DataProtect for backup and recovery, and Cohesity DataHawk for data security, threat detection, and compliance. The combination is managed through the Helios cloud management platform, which provides a single management interface for multi-cluster Cohesity deployments across on-premises data centers and multiple cloud environments.

Cohesity's DataLock WORM (Write Once Read Many) immutability provides storage-level protection against backup data modification or deletion. DataLock policies can be set at the protection group level to automatically apply immutability to all backups within a defined retention window. Cohesity supports configurable DataLock periods aligned to compliance retention requirements (WORM policies that enforce retention for regulatory compliance alongside ransomware recovery).

Cohesity FortKnox is the platform's most distinctive ransomware recovery capability: a vendor-managed isolated vault service that stores a copy of backup data in a Cohesity-managed cloud environment with network and credential isolation from the customer's production infrastructure. FortKnox recovery requires retrieval of vault data to the customer's environment before restoration can occur, which adds network transfer time to the recovery timeline, but the isolation guarantee eliminates the possibility of an attacker with compromised production credentials reaching the vault copy.

Cohesity DataHawk provides security capabilities including threat detection integrated with CrowdStrike Falcon intelligence (scanning backup data for files matching known malware signatures using CrowdStrike threat intelligence), integration with Tenable for vulnerability assessment of data within backups, ransomware detection through anomaly monitoring of backup data change patterns, and sensitive data governance through automated data classification that identifies which backup snapshots contain regulated data categories.

Cohesity Helios enables centralized management across multiple Cohesity clusters and cloud environments, which is a significant operational advantage for large enterprises with distributed data center and multi-cloud backup infrastructure. Helios provides a unified policy management interface, global search across backup data, and centralized reporting across all managed clusters, reducing the administrative complexity of multi-cluster Cohesity deployments.

Cohesity's integration ecosystem, while smaller than Veeam's, includes native integrations with major enterprise storage platforms (NetApp, Dell EMC, HPE) and SIEM platforms (Splunk, Microsoft Sentinel) for security event forwarding. Cohesity's partner ecosystem for managed backup services is growing but less mature than Veeam's established partner channel.

Head-to-Head Comparison

The following comparison covers the dimensions most directly relevant to organizations evaluating these platforms for ransomware recovery capability.

Immutable backup architecture

Rubrik uses RIFT, a purpose-built file system with immutability enforced at the file system architecture level, preventing modification even by administrators or support engineers. Veeam uses Linux file system immutability flags on the hardened repository and supports cloud-native WORM through S3 Object Lock and Azure Blob immutability. Cohesity uses DataLock, a configurable WORM policy applied at the protection group level. All three implement genuine immutability controls; Rubrik's architectural approach provides the strongest theoretical guarantee against administrative-bypass scenarios.

Isolated vault and air-gap option

Cohesity FortKnox is the most turnkey isolated vault: a vendor-managed, network-isolated, credential-isolated copy of backup data managed entirely outside the customer's infrastructure. Rubrik Cloud Vault provides a comparable isolated vault service managed in Rubrik's cloud infrastructure. Veeam does not offer a vendor-managed isolated vault service; organizations using Veeam must configure isolated repositories independently using cloud object storage with Object Lock or physically isolated tape infrastructure, which provides equivalent protection but requires more customer-side configuration and management.

Ransomware detection within backup data

Rubrik has the most mature integrated ransomware detection: anomaly detection identifies unusual change rates consistent with encryption activity, and threat hunting searches backup history for specific IOCs to identify dwell time before encryption. Cohesity DataHawk integrates with CrowdStrike and Tenable for malware signature scanning within backup data. Veeam SureBackup provides verified recovery through isolated boot testing and third-party antivirus scanning within the verification environment, but relies on integrated third-party tools for malware detection within backup repositories rather than native detection capabilities.

Recovery speed and orchestration

Veeam Instant Recovery mounts backup VMs directly from repository storage in minutes for production serving with background data migration, and is among the most mature instant recovery implementations available. Rubrik Live Mount provides equivalent instant recovery capability with Cyber Recovery adding orchestrated multi-system recovery runbooks. Cohesity instant mass restore can recover multiple systems simultaneously, which is relevant for large-scale ransomware incidents affecting many systems concurrently.

Platform and workload coverage

Veeam leads with the broadest workload support: VMware, Hyper-V, AWS, Azure, GCP, physical Windows and Linux, NAS, Microsoft 365, Oracle, SAP HANA, and Kubernetes (through Kasten). Rubrik and Cohesity focus on VMware, cloud workloads, NAS, and enterprise application databases with less breadth for physical server and Hyper-V environments.

Pricing model and total cost

Rubrik is subscription-priced per TB of managed data and is typically the most expensive at comparable scale, reflecting its security-first positioning and the premium associated with purpose-built ransomware recovery features. Veeam offers both perpetual licensing and subscription pricing, with per-socket and per-workload models that can be cost-advantageous for specific deployment profiles. Cohesity is subscription-priced per TB with pricing typically between Rubrik and Veeam. All three require professional services investment for optimal ransomware recovery configuration; this cost should be included in total cost of ownership estimates.

Decision Framework: Matching Platform to Organizational Profile

The selection decision between Rubrik, Veeam, and Cohesity depends primarily on which organizational driver is most important and which existing infrastructure and vendor relationships shape the evaluation.

Security-led organizations with ransomware recovery as the primary driver

Rubrik's security-first architecture, integrated anomaly detection and threat hunting, purpose-built RIFT immutability, and Cyber Recovery orchestration make it the strongest choice for organizations where the CISO or security leadership is driving the data protection platform evaluation based on ransomware resilience requirements. The premium over Veeam and Cohesity is justified by architecture that was designed for this threat scenario from inception rather than adapted after the fact. Organizations in sectors with high ransomware targeting (healthcare, critical infrastructure, financial services) and those that have previously experienced a ransomware incident that exposed backup infrastructure vulnerabilities are the clearest fit.

IT operations-led organizations with broad platform support and existing Veeam investment

Veeam Data Platform with hardened repository configuration and Kasten for Kubernetes backup is the strongest choice for organizations whose primary requirements are broad workload coverage, operational familiarity, and a large partner ecosystem for managed services. Organizations with existing Veeam deployments should evaluate whether adding hardened repository, immutable object storage tiers, and SureBackup verification to their current Veeam implementation provides sufficient ransomware recovery improvement before considering a platform migration to Rubrik or Cohesity. Veeam platform migrations are operationally significant undertakings; the bar for replacement should be unmet requirements, not theoretical architectural improvements.

Large enterprises with complex multi-cloud environments and desire for vendor-managed isolation

Cohesity with DataProtect, DataHawk, and FortKnox is the strongest choice for enterprises with distributed backup infrastructure across multiple data centers and multiple cloud providers who want a unified management plane (Helios) and a vendor-managed isolated vault (FortKnox) without building and maintaining isolated cloud accounts independently. The Cohesity platform's multi-cluster management capability and its turnkey FortKnox isolation service address operational complexity challenges that are most acute in large, geographically distributed enterprises.

Implementation Considerations for Ransomware Recovery

Selecting the right backup platform is necessary but not sufficient for ransomware recovery capability. The implementation decisions that determine whether the platform delivers its theoretical ransomware recovery assurance in practice are as important as the platform selection itself.

Immutability must be configured, not just licensed. All three platforms require specific configuration decisions to enable immutability on backup repositories. Default installation configurations do not always enable immutability. Organizations should verify, through backup administrator review and vendor professional services engagement, that immutability is actively enforced on all production backup repositories and not just available as a feature.

Recovery runbooks must be documented and tested before an incident. The value of orchestrated recovery workflows (Rubrik Cyber Recovery, Veeam SureBackup, Cohesity multi-system restore) is realized only if they have been configured, tested, and validated before the incident occurs. Organizations that configure recovery runbooks after discovering a ransomware incident are doing incident response work under pressure with untested procedures, which increases the recovery timeline and the risk of recovery errors.

Isolated vault replication must be verified. FortKnox replication, Rubrik Cloud Vault replication, and independently configured isolated object storage tiers must be verified to contain current backup data before an incident. Replication failures that go undetected for weeks can result in a vault recovery that restores data from months before the incident rather than the recent clean state the organization expects.

Backup credential hygiene must be maintained separately from production credentials. The operational value of immutable backup is undermined if the backup platform management credentials are the same as production infrastructure credentials, or if the same privileged accounts that manage production infrastructure also manage the backup platform. Backup management credentials should be maintained in a separate privileged account tier with separate MFA enrollment, separate password rotation schedule, and ideally separate administrative identity provider configuration from production infrastructure administration.

The bottom line

Rubrik is the right choice for organizations where ransomware recovery capability is the primary driver of the data protection platform evaluation, security leadership is the primary decision maker, and the premium pricing of a security-first architecture is justified by the sector's ransomware risk profile. Its integrated anomaly detection, retrospective threat hunting, and architecturally enforced immutability represent the most security-focused backup platform design available.

Veeam is the right choice for organizations that require the broadest workload coverage across VMware, Hyper-V, physical infrastructure, and Kubernetes, have existing Veeam deployments that can be extended with hardened repository and immutable object storage configuration, or operate in environments where a large managed service provider ecosystem is a practical requirement. Veeam's ransomware recovery capabilities, properly configured, are strong; the platform's advantage is breadth and ecosystem, not security-first design.

Cohesity is the right choice for large enterprises with complex multi-cloud backup infrastructure who want unified management across distributed environments through Helios and a turnkey vendor-managed isolated vault through FortKnox. Its DataHawk security layer and CrowdStrike integration provide meaningful threat detection within backup data, and FortKnox's vendor-managed isolation is the most operationally accessible air-gap equivalent available from any of the three vendors.

For any of the three platforms, the ransomware recovery assurance is only as strong as the implementation. Immutability must be configured and verified, recovery runbooks must be tested before incidents occur, and backup credentials must be managed separately from production infrastructure credentials. A well-configured Veeam deployment provides stronger ransomware recovery assurance than a poorly configured Rubrik deployment.

Frequently asked questions

What is an immutable backup and how does it protect against ransomware?

An immutable backup is a backup copy that cannot be modified, overwritten, or deleted once written, even by administrators or systems with full management credentials. Immutability is enforced at the storage layer through WORM (Write Once Read Many) controls, object lock policies in object storage, or proprietary file system implementations that prevent modification at the hardware or operating system level rather than through access control policies alone. The protection against ransomware derives from the fundamental property of immutability: even if an attacker compromises full administrative credentials to the backup platform, the backup data itself cannot be altered or deleted because the storage layer enforces immutability independent of credential-based access controls. An attacker who obtains Rubrik administrator credentials cannot modify or delete RIFT-protected snapshots. An attacker who compromises the Veeam management server cannot delete backups stored on a hardened Linux repository with immutability enabled. An attacker who gains access to Cohesity management cannot delete backup data protected by DataLock WORM policies. The critical distinction is between immutability enforced at the storage layer and immutability enforced through access control policies. Access control-based 'immutability' (preventing deletion by requiring multi-factor authentication or dual approval) is a softer control that can be bypassed by an attacker who has compromised administrative accounts or who can manipulate the authentication system. True immutability at the storage layer cannot be bypassed through credential compromise alone, which is why it is the appropriate control against ransomware operators who specifically target and compromise backup administrator accounts.

Does Veeam's hardened repository provide the same protection as Rubrik's immutability?

Veeam's hardened repository and Rubrik's RIFT (Rubrik Instantly Recoverable File System) both implement genuine immutability controls, but through different architectural approaches with different operational characteristics. Veeam's hardened repository uses a Linux-based server configured with immutability flags set on backup files using the Linux chattr +i command combined with a non-root service account architecture. The Linux operating system's immutability flag prevents modification or deletion of flagged files even by the root user if the immutable flag is set through the file system interface, providing a meaningful immutability guarantee. Veeam also supports object storage targets (Amazon S3, Azure Blob, Google Cloud Storage) with S3 Object Lock enabled, which provides cloud-native WORM immutability enforced by the cloud provider's storage infrastructure. Rubrik's RIFT is a purpose-built file system designed from the ground up with immutability as a core property rather than an added feature. RIFT enforces a property Rubrik calls Zero Trust Data Security: even Rubrik support engineers accessing a customer's system through a support session cannot modify or delete backup data because the file system architecture prevents it at a level below administrative access. This represents a stronger immutability guarantee than Veeam's Linux chattr-based approach for the specific threat scenario of a highly privileged insider threat or a support credential compromise. For most enterprise ransomware scenarios, both implementations provide adequate immutability: ransomware operators who compromise backup platform credentials will be blocked from modifying backup data by either platform's immutability implementation. The difference between them is more relevant for sophisticated, targeted attacks against organizations with highly privileged attacker access, or for regulatory compliance scenarios where auditors require documented proof of administrative-bypass-proof immutability.

What is Cohesity FortKnox and how does it differ from standard immutable backup?

Cohesity FortKnox is a vendor-managed isolated vault service that provides an additional layer of protection beyond on-premises or customer-managed immutable backup. FortKnox stores an isolated copy of backup data in a Cohesity-managed cloud environment that is separated from the customer's production infrastructure, managed credentials, and administrative access. The isolation is the key differentiator: even if an attacker has compromised all administrative access to a customer's Cohesity environment, they cannot reach the FortKnox vault because it is managed by Cohesity in a separate cloud account with separate credentials that the customer's administrative team does not control. Standard immutable backup (including Rubrik's RIFT and Veeam's hardened repository) protects backup data from modification or deletion but the backup repositories remain reachable from the customer's network. An attacker with sufficient time and resources could potentially reach an on-premises immutable repository through network connectivity, even if they cannot modify the data. FortKnox eliminates this network reachability by placing the vault outside the customer's network perimeter and outside the customer's credential scope. The FortKnox model is similar in concept to Rubrik Cloud Vault and to the air-gapped tape or object storage configurations that organizations build manually, but FortKnox is delivered as a managed service that eliminates the operational complexity of maintaining an isolated vault independently. The trade-off is that FortKnox recovery depends on Cohesity's service availability and the network connectivity to retrieve data from Cohesity's cloud environment during an incident, which may be slower than recovering from an on-premises immutable repository in the same data center.

How does ransomware detection within backups work?

Ransomware detection within backup platforms is the capability to identify, within the backup repository itself, when ransomware or other malware was present in the backup data and when it was introduced. This capability addresses a specific recovery challenge: after a ransomware attack, organizations need to know which backup snapshot represents the last clean state before ransomware activity began in order to recover to that point without restoring the malware along with the data. Rubrik's anomaly detection monitors data change rates across snapshots to identify unusual patterns consistent with ransomware encryption activity (dramatic increase in the number of files modified, file extension changes consistent with encryption, entropy increases in file data that indicate encrypted content). When Rubrik detects these anomalies, it identifies the approximate time window when ransomware activity began and flags which snapshots precede and follow the activity. This helps recovery teams identify the last clean snapshot without manually testing each recovery point. Rubrik's threat hunting capability extends this further: security teams can search across all backup snapshots for specific indicators of compromise (file hashes, file paths, registry keys associated with known ransomware families) to identify exactly when specific malware was introduced to the environment, even before it began encrypting files. This retrospective threat hunting is valuable for understanding the attacker's dwell time and ensuring that the selected recovery point is genuinely clean rather than simply pre-encryption. Cohesity DataHawk integrates with CrowdStrike and Tenable to scan backup data with commercial threat intelligence, flagging snapshots that contain files matching known malware signatures. Veeam relies more on integration with third-party antivirus and malware scanning tools through its SureBackup verified recovery workflow, which boots backup VMs in an isolated environment and runs security scans before confirming recoverability.

What is the difference between backup immutability and backup air-gapping?

Backup immutability and backup air-gapping address different threat scenarios and are complementary rather than equivalent controls. Immutability prevents modification or deletion of backup data by ensuring that once data is written, it cannot be altered even by administrators. Immutability is most effective against the most common ransomware tactic of deleting or encrypting backup repositories: even if the attacker has administrative access to the backup platform, immutable backups cannot be destroyed through that access path. Immutability does not prevent an attacker from reaching the backup repository through network connectivity; it only prevents them from modifying the data once they reach it. Air-gapping physically or logically separates backup data from network-connected infrastructure, preventing an attacker from reaching the backup repository through network paths at all. Traditional air-gapping uses physical disconnection (tape libraries physically transported off-site, or storage systems with network interfaces disabled between backup windows). Modern air-gapping uses logical network isolation (backup data stored in a separate cloud account with no persistent network connectivity from the production environment, or backup systems with firewall rules allowing only one-way data transfer during backup windows). The highest ransomware recovery assurance combines both controls: immutable backup data stored in an air-gapped or isolated vault environment. An attacker who compromises production credentials cannot modify the data (immutability) and cannot reach the data through network connectivity (air-gap). Cohesity FortKnox, Rubrik Cloud Vault, and manually configured isolated object storage with S3 Object Lock implement this combination. The trade-off is recovery time: data in an air-gapped or isolated vault must be retrieved over network connections before it can be restored, which is slower than recovering from an on-premises repository in the same data center.

How quickly can each platform restore a 10TB file server after a ransomware attack?

Recovery time for a 10TB file server varies substantially based on storage infrastructure, network bandwidth, and the specific recovery workflow used, and vendor-published recovery time figures should be treated as best-case scenarios achieved in controlled test environments rather than expected times in production incidents. Veeam's Instant Recovery capability mounts backup data directly from the backup repository as a live VM without copying data first, allowing a failed server to be running from backup storage within minutes for verification, then migrated to production storage in the background. For a 10TB file server, Instant Recovery can have the server online and serving files within 15 to 30 minutes of initiating recovery, with data migration to production storage continuing over hours in the background. This is Veeam's strongest differentiator for recovery speed. Rubrik's Live Mount capability provides a similar instant recovery function, mounting backup snapshots directly to serve production workloads while the background migration to permanent storage occurs. Rubrik Cyber Recovery adds orchestrated recovery runbooks that automate multi-step recovery workflows, reducing the manual steps required and the risk of recovery errors during an incident when teams are operating under pressure. Cohesity's instant mass restore capability can recover multiple VMs simultaneously, which is relevant for ransomware scenarios where many systems need recovery at once. Recovery from FortKnox adds retrieval time for data stored in the remote vault, which depends on network bandwidth between the customer environment and Cohesity's cloud infrastructure. In practice, the recovery time bottleneck in ransomware incidents is rarely the backup platform's restoration speed. The primary delays are: time to declare the incident and authorize recovery, time to identify the last clean recovery point (which requires threat hunting through backup snapshots), time to provision clean infrastructure to recover to (if production systems are compromised, restoring to the same systems may reintroduce malware), and time to complete post-recovery security validation before returning to production. Organizations that have defined and tested recovery runbooks in advance reduce these operational delays more effectively than selecting the platform with the fastest raw data transfer rate.

What cyber insurance implications does backup architecture have?

Cyber insurance underwriters have increasingly incorporated backup architecture assessment into their underwriting questionnaires and premium calculations, recognizing that organizations with robust ransomware recovery capabilities represent lower expected claim costs than organizations without them. Immutable backup is now a common requirement in cyber insurance applications. Many underwriters ask specifically whether backups are stored with immutability enabled and whether backups are isolated from production network segments. Organizations that cannot affirmatively answer these questions may face higher premiums, coverage exclusions for ransomware incidents, or sublimits on ransomware-related claims that do not apply to other covered incidents. Organizations with isolated vault capabilities (FortKnox, Rubrik Cloud Vault, or independently configured air-gapped backups) are positioned to demonstrate to underwriters that recovery is feasible even in a worst-case scenario where production infrastructure is completely compromised. This representation can support lower premiums and higher coverage limits. The documentation required by underwriters typically includes: confirmation that immutable backups are enabled and tested, evidence of regular backup restoration testing (SureBackup verification reports from Veeam, or equivalent automated verification from Rubrik and Cohesity), confirmation of backup isolation from production credentials, and evidence of an incident response plan that includes backup-based recovery procedures. Organizations renewing cyber insurance should engage their broker before renewal to understand which backup architecture improvements would have the most favorable impact on their premium and coverage terms. Adding immutability and isolated vault capabilities before renewal, and documenting those improvements in the renewal application, can produce premium reductions that offset a significant portion of the backup platform investment cost.

Sources & references

  1. Rubrik Security Cloud Documentation
  2. Veeam Data Platform Documentation
  3. Cohesity DataProtect and DataHawk Documentation
  4. CISA Ransomware Guide (Updated 2023)
  5. Verizon Data Breach Investigations Report 2024

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.