Central to any cyber recovery strategy is an Isolated Recovery Environment (IRE).

Cyber attacks continue to be an existential threat to businesses globally, with all data pointing towards this threat continuing well into the future. While attackers may vary on the tactics and methods used to infiltrate networks and wreak havoc, you can develop a solid strategy for recovering from these attacks as a critical component of a layered cyber resiliency strategy.

Central to any cyber recovery strategy is the requirement of an Isolated Recovery Environment (IRE), also commonly known as a cyber recovery “clean room.” The IRE is an environment typically disconnected from the production data center, which can be used as an isolated clean room to safely and securely power on, inspect, and recover ransomware-infected workloads.

Topics we will discussed in this document:
  • Defining the IRE
  • Configuration and usage of the IRE
  • Suggested best practices
  • Integrations and components that leverage IRE configurations
Topics we will not discuss:
  • Ransomware Recovery (RWR) product and workflow details and usage
  • Configuration and usage of DR and DR Test networks
  • Next Generation Antivirus (NGAV) and VMware NSX usage and best practices

While we primarily focus on configuring and using the IRE, we occasionally refer to related VMware products and components.