Kyndryl and Dell Technologies launch Cyber Incident Recovery. Kyndryl uses Dell’s high-performance hardware to implement waterproof backup and recovery systems for customers.
The two have been working together for some time. Kyndryl split off from IBM in 2021 and consists of its former IT infrastructure service branch. The organization regularly works as an intermediary. Clients share a digital goal; Kyndryl finds, connects and manages the necessary infrastructure. To this end, the organisation regularly works with major infrastructure players, including AWS, Google Cloud, IBM and Dell Technologies.
The partnership with Dell Technologies has been strengthened. Kyndryl and Dell launched Cyber Incident Recovery, a new joint service. The aim is twofold. First, the partners promise a highly secure backup storage system for customers’ most critical data. Second, Kyndryl ensures that backups are automatically and securely restored to their original location after data loss. Dell provides the necessary hardware and software, including an air-gapped data vault. Kyndryl integrates the system into a customer’s environment.
Cyber Incident Recovery
The organizations emphasise that Cyber Incident Recovery was designed primarily for customers that already work with a backup and recovery system. In other words: the service lends itself to enhancing existing solutions. Cyber Incident Recovery focuses on organisations that handle extremely important and sensitive data. The partners find that, for them, existing solutions aren’t enough. Cyber Incident Recovery is aimed at organisations that want to reduce any risk of downtime and data loss.
Kyndryl and Dell
Since 2021, Kyndryl and Dell Technologies have collaborated on D4PCI, a service for organizations looking to use in-house hardware for a private cloud. Kyndryl developed an architecture to connect various devices and virtualisation software. Dell recently appointed the service provider as a Titanium Black Global Partner, a title for its most important strategic partners.
Tip: Ransomware — how dangerous is it, and how to protect your company?