Decentralized Storage in the Battle Against Ransomware

Overview: Ransomware has become one of the largest challenges facing IT organizations, consistently ranks as one of their top concerns. Protecting against and recovering from ransomware is a complex area, which typically involves several different strategies, solutions, and technologies. One emerging technology that may be of use in this battle against ransomware is decentralized storage used as a remote backup target.

Decentralized Storage in the Battle Against Ransomware

Analyst Take: What is the role decentralized storage plays in the battle against ransomware? That’s exactly what I set out to tackle here. Ransomware protection, as well as the broader category of cyber resiliency, is a difficult problem and one that requires a layered approach.

Among the many components in the battle against ransomware that require consideration is the resiliency of the technologies storing data – especially for backup copies. If a primary data source has been impacted by malware, it is quite possible that backup copies were corrupted as well. When considering a resilient backup architecture, it is important to consider the fundamental properties of the technologies used. While there are a variety of solutions used – including tape, object storage, and public cloud storage – newer decentralized storage technologies may become a key tool as well.

Backup Architecture, the 3-2-1 Rule, and Where Decentralized Storage Comes In

A good starting place for any backup architecture, whether focused on ransomware protection or otherwise, is the 3-2-1 rule or strategy. The fundamentals of the 3-2-1 strategy are well aligned with ransomware protection – multiple copies, utilization of different media, and a remote copy. The remote copy, in particular, can become a key factor in ransomware protection, and this is where I see decentralized storage playing a role. Traditionally, tape – which has strong fundamental anti-ransomware properties due to its ability to create an air gap – was commonly used as remote storage. However, we are seeing that public clouds are increasingly being utilized as an off-site copy, which can be problematic.

Public cloud storage often comes with a false sense of security. The common assumption is that data is securely in the hands of the public cloud provider, and that this public cloud provider is impenetrable to cyber attacks. While I certainly believe that public cloud providers try their best to keep things as secure as possible, it would be naïve to assume that relying on a public cloud is a silver bullet for avoiding ransomware.

Decentralized storage solutions, or “decentralized clouds” – solutions such as Filecoin, Storj, Sia, or Impossible Cloud – are capable of offering a similar remote storage option, with properties that provide increased security. The key difference between a traditional public cloud and a decentralized cloud is that the data in a decentralized cloud, as the name would suggest, is decentralized and spread out amongst numerous storage hosts. Depending on the exact solution, this may involve replication or erasure coding data across hosts. This solution provides decentralized storage with a unique anti-ransomware property built into the architecture of the solution. Since storage is distributed across hosts, even if one host becomes compromised with ransomware, the data can still be recovered from the other uncorrupted nodes.

Decentralized Clouds Should be Viewed as Another Tool for IT Teams

While public clouds shouldn’t be thought of as a perfect solution to ransomware, decentralized clouds shouldn’t either. The better way to think about this is that decentralized clouds can become yet another tool available to IT organizations in the ongoing battle against ransomware. Specifically, decentralized clouds offer an intriguing new option to the remote portion of a 3-2-1 data protection plan with additional anti-ransomware properties.

The distribution of data in a decentralized storage solution removes the single point of attack that is made available by storing data with a singular public cloud provider. While decentralized storage is a relatively new technology area, its potential as a backup target that provides additional ransomware protection may be a key factor in its future adoption.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

Examining Decentralized Storage

Open Versus Closed Source: What is the State of Kubernetes Protection?

FBI 2022 Internet Crime Report Made Public by Internet Crime Complaint Center

Author Information

Mitch comes to The Futurum Group through the acquisition of the Evaluator Group and is focused on the fast-paced and rapidly evolving areas of cloud computing and data storage. Mitch joined Evaluator Group in 2019 as a Research Associate covering numerous storage technologies and emerging IT trends.

With a passion for all things tech, Mitch brings deep technical knowledge and insight to The Futurum Group’s research by highlighting the latest in data center and information management solutions. Mitch’s coverage has spanned topics including primary and secondary storage, private and public clouds, networking fabrics, and more. With ever changing data technologies and rapidly emerging trends in today’s digital world, Mitch provides valuable insights into the IT landscape for enterprises, IT professionals, and technology enthusiasts alike.

Related Insights
Brand Visibility Solution
April 21, 2026

Will Adobe’s Brand Visibility Solution Rewrite the Rules of AI-Driven Customer Experience?

Adobe expands Experience Manager with a brand visibility solution for AI-driven customer engagement, positioning itself against Salesforce, Oracle, and SAP as generative AI becomes enterprises' primary discovery channel....
Mirantis and NVIDIA
April 21, 2026

Can Mirantis and NVIDIA Run:ai Automation Break the AI Factory Bottleneck?

Mirantis and NVIDIA's k0rdent AI and Run:ai integration solves GPU infrastructure deployment by delivering fully orchestrated, multi-tenant AI environments in minutes instead of weeks....
agentic AI
April 21, 2026

Adobe CX Enterprise Coworker Aims to Disrupt Agentic AI in Customer Experience

Adobe launches CX Enterprise Coworker, an agentic AI platform orchestrating customer experience workflows across siloed systems, positioning itself against legacy CX suites and AI-native competitors....
Federal Crypto
April 21, 2026

CIQ Bets on Compliance: Can Enterprise Linux Really Deliver Federal Crypto and Post-Quantum Readiness?

CIQ unveiled the first Enterprise Linux compliance platform for Federal Crypto validation and post-quantum readiness, addressing critical security gaps for regulated enterprises and government agencies facing quantum threats....
Can LogicMonitor's LM Envision Redefine Hybrid Observability for the AI Era?
April 21, 2026

Can LogicMonitor’s LM Envision Redefine Hybrid Observability for the AI Era?

LogicMonitor's LM Envision unifies cloud and on-premises monitoring with AI-driven noise reduction, enabling faster incident response and improved operational agility....
Can LogicMonitor's AI Observability Push Disrupt the Enterprise Monitoring Status Quo?
April 21, 2026

Can LogicMonitor’s AI Observability Push Disrupt the Enterprise Monitoring Status Quo?

LogicMonitor's AI observability platform disrupts enterprise monitoring by unifying hybrid IT visibility, automating incident response, and challenging entrenched vendors....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.