Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò

Page created by Joanne Patterson
 
CONTINUE READING
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Combat the Threat of
      Ransomware
        with Veritas
     26 Gennaio 2022 Forum PA

                Carlo Viganò
    Technology Sales Manager
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
It's no longer a question of IF but WHEN
                                                                           Every
                                                                    11 seconds
                                                                 an organization is hit by a
                       USD1.85M                                    Ransomware attack                    42%
                     average cost (people,                                                       of organizations have
                    process, technology) of                                                     been hit by Ransomware
                        Ransomware

                                  20%                                                                  Email attacks remain   #1
                   company data would                                                                      delivery method
               be unrecoverable in the event
                  of a complete data loss

                                                                                               64%
                                                          1 in 10                      of organizations have not
                                                 organizations unable to                  kept up with security
                                                        recover                                measures
2   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Are you prepared?

3   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
The Colonial Pipeline event was not the first nor the last but garnered enough
attention for CEOs globally to question whether they have done enough to prepare

4   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Acme Engaged Veritas to Restore Confidence in their Resiliency Strategy
                                                                                                                         Acme’s confidence begins to be restored with a
                                                      Veritas is engaged for health check assessment to
                From fear to action.                                                                                 concrete resiliency strategy to protect, detect, and recover
                                                        identify risks and propose recommendations.
                                                                                                                                         from ransomware.

                     1                                     2                                                                    3

                                   CIO and CISO                                           Veritas proposes recommendations
                                   respond by reaching                                    for their ransomware resiliency.                                         Recovery solutions to meet
                                   out to team realizing                                                                                                           RTO and RPO needs.
                                                                             Veritas identifies the risks.
                                   they need assistance.
                                                                                                                                                       Detect anomalies.
                                                                  Veritas conducts ransomware
                                                                  health check for Acme.                                                  Protect data from
                                                                                                                                          edge to core to cloud.
                                Acme contacts Veritas and Veritas BCS team is
                                involved. The Veritas BCS team is ready on hand
                                to provide ransomware health check assessment.

                                                                                                              Veritas shares with Acme solutions to
          Acme’s CEO learns about                                                                            enable them to be ransomware resilient.
          Colonial Pipeline attack and sends
          an email to CIO and CISO asking
          about their degree of readiness.

5   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Veritas Worked with Acme to Identify Risks and Vulnerabilities

          •    What is your policy on keeping up to                                          •   Does your DR plan include the use of
               date with software versions?
                                                                            Process              bulk recovery methods or orchestration?

                                                                            SUCCESS
                                                                                                        •   Do you use immutable
    •      Do you have a Cyber
                                                                                                            storage?
           Security Response Plan?
                                                                                                        •   Who is alerted if something
    •      Has your team been trained
                                                                                                            is detected?
           in planning and execution
           before a DR event?                                      People             Technology

6       Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
With Risks and Gaps Identified…

                        People                                         Process                           Technology
            •    Loose access management                       •   SLP Backlog greater than       •   Lack of at-rest data encryption
                                                                   5 days
            •    Struggling with their lack of                                                    •   Lack of anomaly detection
                 confidence to restore                         •   Disaster Recovery testing is
                                                                   not consistent                 •   Too many point solutions creating
                                                                                                      a lack of integration

7   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Acme Acts to Regain Confidence in their Resiliency Strategy

                        Protect                                      Detect                    Recover
                          —                                           —                          —
                Safeguarding data integrity                    Monitoring and reporting on       Automating and
                with system hardening and                      system activity to mitigate   orchestrating complete
                           immutability                        threats and vulnerabilities   cross-system restoration

8   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Aligned Resiliency Strategy to Universal Best
         Practice Standards                                                                                                 Protect

                                                               More Complete Industry Certifications
                                                               Than ANY Competitive Offering
                                                               • 1st with CA IOT Data Privacy Compliance
                                                               • DISA STIGs hardened OS and containers
                                                               • Securities & Exchange Commission 17a-4 WORM Compliant
                                                               • Commodity Futures Trading Commission 17 1.31 Compliant
                                                               • AWS GovCloud, AWS C2S, Azure Government Cloud

                                                               • NIST SP 800-53, NIST SP800-37 RMF, ICD 503, NIST 800-171
                                                               • FIPS 140-2 Cryptographic Security
                                                               • IPv6/USGv6
                                                               • TLS 1.3 Encryption

9   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
Deployed Zero Trust Authentication, Identity Management
          and Authorization                                                                                                                       Protect

                                                More Security Features Than ANY Competitive Offerings

           Immutable and indelible storage                      Stringent access management to specify who has   Ensure data is protected along
        on-premise and in the cloud for air gap                               access and control                          its journey

                        Client
                     Source Data
                      (Objects)

                     NetBackup                                                    Granular RBAC                         Encryption In-flight
                       Server

                      NetBackup
                        Media
                       Server(s)

                                                                             Multi-factor Authentication                Encryption At-rest
                         Flex
                       Appliance

10   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Protection Basics
 Prevention phase
                                                                                                            Protect

3 – 2 – 1 Backup Rule       Hardened Backup Infra            Air GAP                 Immutable backup STUs

                                                       Auto Image Replication

  3 backup copies on
                                                    NBU Domain 1      NBU Domain 2

                                  NBU PBA
                                  SE Linux
                            Intrusion Detecion /
  2 types of Media               Protection                  NBU Domain ‘n’
                                 Firewalled
   Q-
                                 Hardened
   Clo
   ud
         S3     Off-Geo
              Data Center           RBAC
                                                            One to One
                                                                                          Flex Appliance
                                                            Many to One
  And 1 offsite copy                                                                    Immutable Storage
                                                            One to Many
Streamlined and Automated the Data Protection Process
                                                                                                                                                                      Protect
                                       Ensuring Business Continuity and Recovery of All Data
                               Across More Workloads and Data Sources Than ANY Competitive Offering

         Intelligent policies                                                                                                         API support
 Backup snapshots to anywhere and utilize the                                                                           Automate all the things that you need and focus on
  same protection policies on-premises and in                                                                            more high value work-engineering vs. operations
                   the cloud

                                                                            Automation
                                                         Auto-scale and dynamically resize resources as required for
                                                        maximum protection needs while optimizing costs and resources

12   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Extended Data Protection to SaaS Applications
          Single hub for full backup and recovery of your SaaS application data

                                                                                      •   Automatic data protection for new users, mailboxes, and
                                           End-user self-
                                                                                          folders requires no action on your part
                                              service
                                             restores
                                                                                      •   Time and bandwidth savings from copying only data that has
                Enterprise-grade                                Global datacenters        changed since the last backup
                    Security                                         for data
                                                                   sovereignty
                                                                                      •   Flexible restore options whether to its original location or to an
                                                                                          alternate location of your choice
                                                                                      •   Granular restore of a single file, email message, or Teams chat
          High performance                                               eDiscovery
                                                                                          – or a select group of objects. NetBackup SaaS Protection also
            and scalability                                                search         supports bulk restores

13   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Now Available: Seamless Cloud Storage-as-a-Service
          Single, flexible repository for all your data sources—from on-premises to your public cloud workloads     Protect

                                   IaaS       PaaS     SaaS

                                                                                       NetBackup
                              Comprehensive                                           Recovery Vault
                                NetBackup
                                Protection

                         Customer’s On-Premise Data Center or Cloud Tenant   NetBackup Cloud Storage-as-a-Service

14   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Gained Greater Visibility to Mitigate Threats and Vulnerabilities
          Monitoring and reporting on system activity                                                                            Detect

                                                                Ensure Data is Always Recoverable
                                                                       AI-powered anomaly detection enabling them to
                                                                       take immediate action when ransomware strikes

                                                                •   Leverages trend data for classification and decision trees
                                                                •   Detection and alerting on unexpected changes to backup data
                                                                •   Undertake preventative measures before an event can occur

15   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Automated and Orchestrated Complete Cross-system
          Restoration for Rapid Recovery                                                                   Recover

     Only Veritas can automate and orchestrate complete
        data center recovery on demand to anywhere
                  from deduped data at scale

       • Automation and orchestration                            Execute a resiliency
                                                                plan with a single click
                                                                                           Automate your resiliency
                                                                                           operations across all IT
                                                                                                  services
       • Full RPO coverage
       • Test, Validate, Disinfect

16   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Implemented Continuous Data Protection (CDP) to Monitor
          and Detect Data Changes in Near-Real-Time                   Recover

         Ensures recovery for applications
            across your heterogeneous
        environment using granular recovery
        points in Resiliency’s near-real-time
                  data replication
                                                                000

     • Resiliency through granular recovery of
       VMs with near-zero RPO
     • Full RPO coverage

17   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Acme’s Confidence Restored with a Unified Strategy
          Protect, Detect, and Recover

                                                                          Fewer point solutions
                                                                                                              Assured Protection
                                                                            Scale confidently                    from edge to core to cloud
                                                                 Streamlined management and automation
                                                                                                             50% less time to complete backups
                       Bullet-proof
                                                                System hardening and immutability your way
                       Protection

                                                                              Total visibility

                                                                            Anomaly detection                  Unmatched Detection
                                                                            Malware detection                       mitigate any threats and
                        Complete                                                                                          vulnerabilities
                                                                      Find ransomware file anywhere
                        Detection

                                                                         Resilient alternate sites

                                                                            Recovery choices

                                                                      Restores in seconds - minutes
                                                                                                                  Recovery at Scale
                         Rapid                                                                                  to meet their RPO and RTO needs
                                                                       New data center, no problem
                        Recovery
                                                                    Ransomware recovery team on call

18   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Always Protected and Recoverable from Edge to Core to Cloud
          Only with Veritas

                                                                                        9.6
                                                                                     MILLION USERS

                           100+ EB                                                                                700+ PB
                  DATA UNDER PROTECTION                                                                                IN CLOUD

                                                                                      100%
                                                                   RANSOMWARE RECOVERY SUCCESS

     “With Veritas, we can restore lost data from backups                                            “For me, Veritas means I can focus on the future
                 with a success rate of 100%.”                                                             instead of worrying about the past.”
                                                         ~ Large European Hospital                                              ~ Global Beverage Company

19   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
16x                                                                                                     #1
            A LEADER IN GARTNER’S MQ                                                                                  MARKET SHARE FOR BACKUP
             FOR DATA CENTER BACKUP                                                                                   AND RECOVERY SOFTWARE
            AND RECOVERY SOLUTIONS

               6,000+             20,000+             80,000+      2,000+            2,140+           800+       700+PB         100+EB           87%

              Employees              Global              Global    Developers         Global         Supported   Driven Cloud   Data Under Fortune Global 500
              Worldwide             Partners           Customers   Worldwide          Patents        Workloads   Consumption    Management      Trust Us

                               “With Veritas, we can restore lost data from backups with a success rate of 100%.”
                                                                                ~ Large European Hospital

20   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Join the Path to Restored Confidence
          We will work with you to assess your environment and equip you with the tools to make ransomware fear you!

21   Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Thank You

Copyright © 2022 Veritas Technologies, LLC. All rights reserved.
This document is provided for informational purposes only and is not intended as advertising. All w arranties relating to the information in this document,
either express or implied, are disclaimed to the maximum extent allow ed by law . The information in this document is subject to change w ithout notice.
You can also read