Research Library

Predatar – Product Brief

Last updated January 16th, 2023 for end of year updates. Concise 3-page overview of Predatar data protection software. Includes overview, usage and more. Download the full product brief now!

Predatar is software-as-a-service that automates repeatable actions and recovery from cybercrime, and that provides remote management and monitoring, for IBM Spectrum Protect and Spectrum Protect Plus administrators. Additionally, Predatar provides a platform for the delivery of backup and recovery as-a-service – effectively, turning IBM Spectrum Protect and Protect Plus deployments into more consumable, consumption-based offerings that can be multitenant and that can have outsourced administration. Further information on IBM Spectrum Protect and Spectrum Protect Plus is available in Evaluator Group’s separate Product Brief and Data Protection Software Vendor Comparison Matrix documents.

A strategic use case for Predatar is for disaster recovery orchestration and testing, for cyber resiliency. In the event that a customer is hit with ransomware, they can use Predatar’s orchestrated workflows to automatically search for and identify the most recent backup that shows no signs of infection. They can then quarantine this data into an on-premises or cloud-based sandbox environment, to verify that the data is clean via automated scanning for malware. Individual nodes or the entire environment can then automatically be restored back into production. This process can occur for customer-designated application or recovery groups.

Because the recovery testing process occurs out of band, customers can schedule a recovery into the sandbox environment on a regular basis, in order to preemptively test, validate and document recoverability. Predatar uses machine learning to identify high-risk systems and prioritize tests on those environments. It also runs regular tests in the background, selecting systems at random, for thorough coverage of the environment. To support attack detection, the solution includes artificial intelligence (AI)-based detection for anomalous behavior. To control the volume of alerts requiring attention, administrators can control thresholds for alerting and triggering of automated workflows. Data can be integrated into QRadar, IBM’s security information and event management (SIEM) tool, for recovery testing and malware scanning spanning components of the IT infrastructure outside of the backup environment.

Predatar Product Brief Includes:

  • Overview
  • Highlights
  • Usage and Deployment
  • Evaluator Group Opinion

Download now to read the full product brief.

Available with Subscription or Purchase. Contact us below.

Forgot your password? Reset it here.