
Derive Tech deployed Dell CyberVault at the Port of NY/NJ’s largest terminal, closing ransomware gaps and meeting cyber insurance requirements.
At the Port of New York and New Jersey, a network outage isn't a simple IT problem. It stops cranes. It holds containers. It costs the business millions of lost revenue per day. When the Port's largest privately held container terminal needed to close its ransomware exposure and satisfy cyber insurance requirements, they called Derive Technologies.
Derive designed an air-gapped cyber recovery architecture built on Dell CyberVault as part of their managed IT services engagement.
The architecture keeps backup data behind a hardware air gap, completely off the production network. Machine-learning detection from CyberSense identifies when an attack happened and which backups stayed clean.
Largest privately held multi-user container terminal operator at Port of NY/NJ
Marine Logistics / Critical Infrastructure
Ransomware exposure with backups accessible via production network; unmet cyber insurance requirements
Dell CyberVault air-gapped cyber recovery solution, delivered as part of managed IT services
Derive Technologies: MBE-Certified managed IT services provider
Container terminal operations run on data. Crane movements, vessel scheduling, cargo manifests, customs clearances: everything is networked. If ransomware gets in, the terminal stops.
Derive's review found the existing Dell backup environment had no airgap. The backup infrastructure sat on the same network as production, which meant an attacker who got into production could also reach the backups. No clean restore point. No defensible answer for the cyber insurance auditors who required one.
1. Hardware-Level Air Gap with Dell CyberVault
PowerProtect DataDomain replicates into the vault without touching production networks. The vault has no network connection to production systems. Ransomware can't reach what it can't see.
2. Ransomware Detection with CyberSense
CyberSense analyzes backup data with machine learning, identifying exactly when corruption started and which restore points are still clean. Ransomware recovery stops being guesswork and becomes a documented, repeatable process.
3. Cyber Recovery Software and Network Isolation
Enforces security at the hardware level by controlling all access to and from the vault. This protection is embedded in the network's physical design, not dependent on policy compliance.
• Ransomware exposure eliminated. The vault has no network connection to production systems.
• Cyber insurance requirements satisfied with a documented, auditable architecture
• Clean restore points identified by CyberSense. Ransomware recovery is now a repeatable process as opposed tobeing improvised.
• Backup data sits completely off the production network, enforced at the hardware level
Before vs. After: Cyber Recovery Transformation
For critical infrastructure operators, ransomware is a reality, not a hypothetical. The question is what happens when it gets in. Derive's cybersecurity services and managed IT services give you an air-gapped cyber recovery architecture that holds up under both an attack and a cyber insurance audit.
Learn more about Derive's cybersecurity services and managed IT services at derivetech.com
Derive Technologies is a managed IT services provider based in Manhattan. They serve logistics operators, healthcare organizations, and financial services firms across the Tri-State area. MBE-certified and ISO 9001:2015-certified, with a specialty in cyber recovery architecture and ransomware planning for critical infrastructure environments. Their Lower Manhattan staging facility handles configuration and testing before any live deployment.



Ready to optimize, secure, and future-proof your technology? Our experts will assess your current IT environment, identify opportunities for improvement, and create a tailored roadmap to help your business thrive.