Products and Solutions
EMA®
 EMA® Mail
 EMA® Cyber Defense
 EMA® Print
 EMA® Scan
 EMA® File
 EMA® Voice
EMA® for SAP Solutions
 SAP Metadata
 SAP Live Migration
 SAP Scan
 S/4 HANA Relief
ARTEC SMART Integration Tools
 SMART Link
 API/SDK
Firegate VPN
eDiscovery Solutions
Case Management
VSTOR® Vault
 Product Details
 Object Storage
ARTEC Cloud Solutions
 Cloud Models
 Managed Services
 Microsoft 365
Topics
Advantages
Mailserver migration
Microsoft 365 tips
EMA® is Easy to Use
Data Formats
Protect Your Investment
Comprehensive Archiving
Storage Technology
Data Security Concept
Protection Against Cyber Attacks
Big Data - Knowledge is Power
Features
Overview
Software Architecture
Single Sign-On
Four-Eye-Principle
Folder Synchronization
Encryption
User Access
Full-Text Search
Backup and Recovery
ANA Server
Trusted EMA®
Hot Standby
Digital Signatures
Attributes and Metadata
Department archives/Linking
Federated Search
Retroactive Archiving
WAN Synchronization
EMA® DeDup Server
EMA® App
Outlook extension
Good to Know
Legally Compliant Archiving
Protecting Personal Information
Why WORM Is No Solution
Problems with certifications
Stubbing - (Not) A Solution
Who Uses EMA®?
Why Bother with Archiving
Benefits of an Appliance
Dealing with private e-mails
Laws and Regulations
Overview of the Most Important Regulations
General Data Protection Regulation (DSGVO)
Right to be "forgotten"
News
News
Events and Webinars
Press Releases
Press Review
Partners
Resellers
Distributors
Partner Program
Partner Portal
ARTEC Promotional Program
ARTEC Expert Network
Services & Support
Consulting Services
Technical Consulting
Software Development
Software Subscription & Warranty
Product Support
Downloads
About ARTEC
Company History
Visions
Green responsibility
Where to Find Us
Job Openings
Terms and Conditions
Protected Trademarks and Patents
References
Information for Investors
Privacy Policy
Corporate Information

EMA® Cyber Defense

The protection and availability of important, compliant, and sensitive data is essential to securing operational continuity and is fundamental for sound business or government processes. The EMA Cyber Defense system includes all that is required to maintain continuous data availability with maximum data security, for true peace of mind.

Instant Security

EMA Cyber Defense is up and running with zero-downtime and goes to work instantly to protect your data. But the true power of the EMA Cyber Defense solution is fully realized when an attack happens. In such an event, all indexed data on EMA is immediately available to be restored or accessed directly. This makes your company immune to the crippling effects of cyber-attacks, ransomware trojans, and the ensuing criminal extortion that comes from having your all-important data held captive and encrypted by cyber-criminals.

Unreachable for Cyber Attacks

EMA isolates, secures, encrypts and block-chain certifies immutable copies of all the unstructured data and stores it in the direct attached VSTOR® Cyber Recovery Vault. In effect, it lets you create an impenetrable, and inaccessible "data vault" that is invisible to ransomware attackers. Thanks to EMA, in the event of an attack, your already indexed data can now be searched, accessed, shared or restored in a matter of seconds, at the click of a mouse.

Optimal Addition to Your IT Security Infrastructure

The added security of EMA reduces the consequences of a successful cyber-attack to a bare minimum, thereby complementing your existing frontline defensive security solutions. While conventional systems are designed to protect reactively against already known patterns of malware, EMA Cyber-Defense provides real reliability and continuity when those frontline systems fail to do their job.

The focus of current attacks is now increasingly on storage media and back-up systems themselves. The inconspicuously placed malware only becomes active after the files have been restored. This causes double damage to systems after an initial attack. And in the end, no insurance policy can compensate for lost data, and time spent restoring operations and systems to full productivity.

With EMA Cyber Defense, your data is also optimally protected against these new, increasingly sophisticated attack methods. Thus, your data is secured against new or modified cyber-attacks in the best possible way.

Special EMA Cyber Defense Offer

Contact us now for your customized EMA Cyber-Defense package. Depending on your data management requirements, EMA Cyber Defense can be hosted directly at your site or in the ARTEC Trusted Cloud.

We would be happy to discuss the requirements of your IT security architecture with you in a personal meeting!s

Further information about EMA Cyber Defense and the current cyber security situation can also be found in the following documents: