Creating a safe place for your IBM Spectrum Protect® Backups
Vital ransomware protection for IBM Spectrum Protect® backup volumes running within Microsoft® Windows® environments.
Get Your 14 Day Free Trial

Your Last Line of Defense
Backups should be your insurance policy against Ransomware attacks, providing the ability to restore your production environment to a stable state. It comes as no surprise that sophisticated Malware is now heading straight for your backups and compromising everything there before heading for your live systems.
Blocky for TSM® is especially designed to protect your IBM Spectrum Protect backups by denying any unauthorized data access to application processes that may have breached other security measures such as firewall and anti-virus scanners.
Fast Recovery
Blocky protects backups held on local or SAN attached storage which provides the fastest possible recovery time.
Early Detection
Blocky will alert of any attempt to write to protected backup volumes which can provide essential early warning of malware activity.
Get your 14 day free trial
Vital protection for IBM Spectrum Protect® backup volumes running within Microsoft® Windows® environments.
Protecting your Microsoft® IBM Spectrum Protect® environment
IBM Spectrum Protect running within a Microsoft Windows Environment does not have a native immutability function for backup volumes. This is a role that can be very effectively filled with Blocky for TSM®.
What does Blocky for TSM® protect?
Protected objects include the IBM Spectrum Protect instance folders, storage pools (disk, file, container), database volumes, active & archive logs, and the DRM disaster recovery plan files.
Blocky should be installed on all servers running instances of IBM Spectrum Protect and provides protection for instance folders, storage pools, database volumes and active & archive logs. residing on local disk or mount points over iSCSI/FC SAN LUNs in the case of the server being connected to a SAN fabric.

About us
Blocky for TSM® was born from the strategic technology partnership formed in 2019 between GRAU DATA GmbH and Cristie Data GmbH.
Key facts & features
85% of Ransomware attacks target Windows® systems
Blocky turns the volumes containing IBM Spectrum Protect instance folders, storage pools, databases and active & archive logs into a protected device.
Security your organisation cannot afford to be without
A Ransomware attack will take place every 11 seconds by 2021. The average cost of a Ransomware attack in 2019 was €100,000.
Intelligent rapid attack recovery
Unlike solutions based on offsite storage media or cloud-based strategies, Blocky protects your local archives for the fastest possible recovery time.
Simple installation
Blocky is easy to install with a filter driver tightly coupled to the Windows® OS, but only requiring minimal system resources.
Continuous protection
Blocky will continue to protect against Malware even if a virus has entered the program and damaged the Blocky software.
Cost effective insurance
Based on the total backup disk volume capacity and insignificant compared to the costs of a successful Ransomware attack.
Get your 14 day free trial
Vital protection for IBM Spectrum Protect® backup volumes running within Microsoft® Windows® environments.
FAQ
Your questions, already answered.
Blocky is compatible with all current IBM Spectrum Protect® versions.
Blocky supports Windows Server 2012, 2016 and 2019.
Please note that only Windows Server operating systems are supported and, for example, the protection function does not work under Windows 10.
IBM Spectrum Protect users should protect their backup volumes with Blocky for TSM. In the event of an encryption attack, the backup will remain intact and enable the infected servers and data to be restored quickly.
Blocky protects Windows NTFS or ReFS volumes and mount points that appear with a drive letter in the Windows Device Manager.
Network-attached storage (NAS devices) have their own security environment and unfortunately cannot be protected via Blocky.
Yes, these volumes must not be used by other applications, for example, as a cache or dump or similar. This use is theoretically possible, but the function of the other applications cannot be guaranteed, since the blocky whitelisting may not identify all DLLs belonging to the application and provide them with a fingerprint.
Latest from our blog
Check out the latest news and insights.