Menu

Decentralized Storage in the Battle Against Ransomware

Overview: Ransomware has become one of the largest challenges facing IT organizations, consistently ranks as one of their top concerns. Protecting against and recovering from ransomware is a complex area, which typically involves several different strategies, solutions, and technologies. One emerging technology that may be of use in this battle against ransomware is decentralized storage used as a remote backup target.

Decentralized Storage in the Battle Against Ransomware

Analyst Take: What is the role decentralized storage plays in the battle against ransomware? That’s exactly what I set out to tackle here. Ransomware protection, as well as the broader category of cyber resiliency, is a difficult problem and one that requires a layered approach.

Among the many components in the battle against ransomware that require consideration is the resiliency of the technologies storing data – especially for backup copies. If a primary data source has been impacted by malware, it is quite possible that backup copies were corrupted as well. When considering a resilient backup architecture, it is important to consider the fundamental properties of the technologies used. While there are a variety of solutions used – including tape, object storage, and public cloud storage – newer decentralized storage technologies may become a key tool as well.

Backup Architecture, the 3-2-1 Rule, and Where Decentralized Storage Comes In

A good starting place for any backup architecture, whether focused on ransomware protection or otherwise, is the 3-2-1 rule or strategy. The fundamentals of the 3-2-1 strategy are well aligned with ransomware protection – multiple copies, utilization of different media, and a remote copy. The remote copy, in particular, can become a key factor in ransomware protection, and this is where I see decentralized storage playing a role. Traditionally, tape – which has strong fundamental anti-ransomware properties due to its ability to create an air gap – was commonly used as remote storage. However, we are seeing that public clouds are increasingly being utilized as an off-site copy, which can be problematic.

Public cloud storage often comes with a false sense of security. The common assumption is that data is securely in the hands of the public cloud provider, and that this public cloud provider is impenetrable to cyber attacks. While I certainly believe that public cloud providers try their best to keep things as secure as possible, it would be naïve to assume that relying on a public cloud is a silver bullet for avoiding ransomware.

Decentralized storage solutions, or “decentralized clouds” – solutions such as Filecoin, Storj, Sia, or Impossible Cloud – are capable of offering a similar remote storage option, with properties that provide increased security. The key difference between a traditional public cloud and a decentralized cloud is that the data in a decentralized cloud, as the name would suggest, is decentralized and spread out amongst numerous storage hosts. Depending on the exact solution, this may involve replication or erasure coding data across hosts. This solution provides decentralized storage with a unique anti-ransomware property built into the architecture of the solution. Since storage is distributed across hosts, even if one host becomes compromised with ransomware, the data can still be recovered from the other uncorrupted nodes.

Decentralized Clouds Should be Viewed as Another Tool for IT Teams

While public clouds shouldn’t be thought of as a perfect solution to ransomware, decentralized clouds shouldn’t either. The better way to think about this is that decentralized clouds can become yet another tool available to IT organizations in the ongoing battle against ransomware. Specifically, decentralized clouds offer an intriguing new option to the remote portion of a 3-2-1 data protection plan with additional anti-ransomware properties.

The distribution of data in a decentralized storage solution removes the single point of attack that is made available by storing data with a singular public cloud provider. While decentralized storage is a relatively new technology area, its potential as a backup target that provides additional ransomware protection may be a key factor in its future adoption.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

Examining Decentralized Storage

Open Versus Closed Source: What is the State of Kubernetes Protection?

FBI 2022 Internet Crime Report Made Public by Internet Crime Complaint Center

Author Information

Mitch comes to The Futurum Group through the acquisition of the Evaluator Group and is focused on the fast-paced and rapidly evolving areas of cloud computing and data storage. Mitch joined Evaluator Group in 2019 as a Research Associate covering numerous storage technologies and emerging IT trends.

With a passion for all things tech, Mitch brings deep technical knowledge and insight to The Futurum Group’s research by highlighting the latest in data center and information management solutions. Mitch’s coverage has spanned topics including primary and secondary storage, private and public clouds, networking fabrics, and more. With ever changing data technologies and rapidly emerging trends in today’s digital world, Mitch provides valuable insights into the IT landscape for enterprises, IT professionals, and technology enthusiasts alike.

Related Insights
Agentic AI
April 14, 2026

Can HubSpot’s Agentic AI Bet Disrupt Enterprise CRM’s Old Guard?

HubSpot's new AI agents and agentic capabilities position it as a credible challenger to Salesforce and Microsoft, capturing enterprise demand for AI-powered task automation....
Neo4j's Context Gap
April 14, 2026

Does Neo4j’s Context Gap Thesis Expose Enterprise AI’s Biggest Blind Spot?

Neo4j's latest analysis exposes a critical flaw in enterprise AI: the neglect of structural, relational context. Discover why graph databases are positioned as the missing memory layer for agentic AI...
Wasabi Acquires Lyve Cloud. Does This Strengthen Its Storage Position?
April 14, 2026

Wasabi Acquires Lyve Cloud. Does This Strengthen Its Storage Position?

Alex Smith and Brad Shimmin from Futurum examine the Wasabi Lyve Cloud acquisition and whether the deal meaningfully shifts cloud storage dynamics or primarily consolidates customers, capacity, and ecosystem integrations....
Oracle Redefines Mission-Critical Tiers as AI Workloads Demand Always-On Data
April 14, 2026

Oracle Redefines Mission-Critical Tiers as AI Workloads Demand Always-On Data

Brad Shimmin, Research Director at Futurum, explores Oracle's new Diamond-Grade resilience and how sub-millisecond latency and post-quantum security are redefining mission-critical data for the age of agentic AI....
CoreWeave's Anthropic and Meta Partnerships
April 13, 2026

CoreWeave’s Anthropic and Meta Wins Validate Benchmark Outperformance

Brendan Burke, Research Director at Futurum, examines how CoreWeave's $21B Meta deal and Anthropic partnership validate the neocloud model for frontier AI infrastructure built on MLPerf-leading performance....
compute partnership
April 13, 2026

Anthropic’s Google-Broadcom Deal: Model Company or Infrastructure Play?

Anthropic's Google and Broadcom partnership signals a strategic pivot toward supply chain control, raising questions about whether vertical integration will strengthen or dilute its model-first identity....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.