Menu

Enhance Cyber-Resiliency with VMware Ransomware Recovery

IT providers of all shapes and sizes, ranging from object storage vendors though backup and recovery software vendors, are evolving their portfolios and market messaging to address ransomware. The imminence and impact of ransomware threats has catapulted cyber-security – and in particular cyber-recovery – to become arguably the hottest topic pertaining to IT.

C-Suite executives are pressuring IT organizations to validate and demonstrate cyber resiliency. This is a tall order, because of the nature of ransomware. Ransomware is not a typical disaster. It is infiltrating not only production environments, but also targets protection environments. Strains of ransomware are designed to penetrate and lay dormant before executing malicious activity, so that IT does not have visibility into when the attack occurred. This not only delays the recovery process, but it also creates the risk of re-infection if infected files are restored into production. Finally, getting back up and running as quickly as possible to mitigate the hit to business productivity is critical. Adding another hurdle, ransomware is blurring typical boundaries and responsibilities between IT operations and security teams, creating a new requirement for joint collaboration. In order to address these cyber resiliency requirements, automation, predictability and visibility are table stakes.

Last week’s VMware Explore conference reflected the prominence of ransomware resiliency, across the show floor and as well as in the conference’s keynote and breakout sessions. Notably, VMware itself introduced a new Ransomware Recovery solution that adds a number of capabilities to VMware Cloud Disaster Recovery, in order to create a “ransomware recovery-as-a-service” offering.

Key attributes of the VMware Ransomware Recovery solution include:

  • The ability to identify and validate recovery point candidates, supported by:
    • Malware scanning from VMware Carbon Black
    • Analysis of behavioral patterns such as VMDK rate of change, to identify anomalous activity that could indicate an attack.
  • An isolated cloud-based recovery environment coupled with network isolation to prevent re-infection of production workloads.
  • Guided recovery workflows executed via the VMware Cloud DR user interface

VMware is Helping to Mitigate Business Repercussions from Ransomware Attacks

VMware Ransomware Recovery caters to VMware’s large base of virtualization admins with important checkmark capabilities for cyber-resiliency.

The new service helps to mitigate data loss by increasing visibility into the VMware environment while streamlining recovery from a ransomware attack.

The as-a-service delivery and recovery playbooks reduces the need for manual configuration and the chance of human error. It also allows for faster recovery especially in the event of turnover within and collaboration between data protection and security teams. The service is complemented by other VMware capabilities including the company’s Scale Out Cloud Filesystem, which allows for the storage of immutable snapshots, as well as the ability to instantly power on VMs for fast vulnerability assessment.

Author Information

Krista Case

Krista Case brings over 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.

Related Insights
Glean Doubles ARR to $200M. Can Its Knowledge Graph Beat Copilot
April 3, 2026

Glean Doubles ARR to $200M. Can Its Knowledge Graph Beat Copilot?

Nick Patience, VP & Practice Lead at Futurum, examines Glean's platform evolution from enterprise search to agentic AI, as it doubles ARR to $200M and battles Microsoft 365 Copilot for...
LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?
April 1, 2026

LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, analyzes the LevelBlue SentinelOne partnership and its focus on integrating threat intelligence, AI detection, and response to improve...
Snowflake's SnowWork Targets the Gap Between Data Insight and Business Action
March 25, 2026

Snowflake’s SnowWork Targets the Gap Between Data Insight and Business Action

Brad Shimmin and Nick Patience explore Snowflake’s Project SnowWork and how the Agentic Enterprise Control Plane turns the AI Data Cloud into a "system of action" for autonomous workflows across...
Mistral Forge Takes Aim at RAG. But Who Actually Needs Custom Models
March 25, 2026

Mistral Forge Takes Aim at RAG. But Who Actually Needs Custom Models?

Nick Patience, AI Platforms Practice Lead at Futurum, examines Mistral Forge, a custom enterprise AI model training platform, and argues that while its approach is sound, the addressable market may...
Oracle Positions AI Database 26ai to Lead $1.2 Trillion Market by Bridging the Agentic Reasoning Gap
March 25, 2026

Oracle Positions AI Database 26ai to Lead $1.2 Trillion Market by Bridging the Agentic Reasoning Gap

Brad Shimmin and Keith Kirkpatrick of Futurum explore Oracle's pivot to agentic plumbing. Oracle is embedding autonomous reasoning directly into Oracle AI Database 26ai to solve the enterprise data latency...
Grounding the Agentic Mandate As the Semantic Layer Market Eyes 19% Growth, Microsoft Fabric IQ Targets Leaders Prioritizing AI Investment
March 20, 2026

Grounding the Agentic Mandate: As the Semantic Layer Market Eyes 19% Growth, Microsoft Fabric IQ Targets Leaders Prioritizing AI Investment

Brad Shimmin, VP and Practice Lead at Futurum, shares insights from FabCon and SQLCon 2026 on how Microsoft is leveraging the new Database Hub and Fabric IQ to unify transactional...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.