Combat the Threat of Ransomware with Veritas - 26 Gennaio 2022 Forum PA Carlo Viganò
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Combat the Threat of Ransomware with Veritas 26 Gennaio 2022 Forum PA Carlo Viganò Technology Sales Manager
It's no longer a question of IF but WHEN Every 11 seconds an organization is hit by a USD1.85M Ransomware attack 42% average cost (people, of organizations have process, technology) of been hit by Ransomware Ransomware 20% Email attacks remain #1 company data would delivery method be unrecoverable in the event of a complete data loss 64% 1 in 10 of organizations have not organizations unable to kept up with security recover measures 2 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
The Colonial Pipeline event was not the first nor the last but garnered enough attention for CEOs globally to question whether they have done enough to prepare 4 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Acme Engaged Veritas to Restore Confidence in their Resiliency Strategy Acme’s confidence begins to be restored with a Veritas is engaged for health check assessment to From fear to action. concrete resiliency strategy to protect, detect, and recover identify risks and propose recommendations. from ransomware. 1 2 3 CIO and CISO Veritas proposes recommendations respond by reaching for their ransomware resiliency. Recovery solutions to meet out to team realizing RTO and RPO needs. Veritas identifies the risks. they need assistance. Detect anomalies. Veritas conducts ransomware health check for Acme. Protect data from edge to core to cloud. Acme contacts Veritas and Veritas BCS team is involved. The Veritas BCS team is ready on hand to provide ransomware health check assessment. Veritas shares with Acme solutions to Acme’s CEO learns about enable them to be ransomware resilient. Colonial Pipeline attack and sends an email to CIO and CISO asking about their degree of readiness. 5 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Veritas Worked with Acme to Identify Risks and Vulnerabilities • What is your policy on keeping up to • Does your DR plan include the use of date with software versions? Process bulk recovery methods or orchestration? SUCCESS • Do you use immutable • Do you have a Cyber storage? Security Response Plan? • Who is alerted if something • Has your team been trained is detected? in planning and execution before a DR event? People Technology 6 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
With Risks and Gaps Identified… People Process Technology • Loose access management • SLP Backlog greater than • Lack of at-rest data encryption 5 days • Struggling with their lack of • Lack of anomaly detection confidence to restore • Disaster Recovery testing is not consistent • Too many point solutions creating a lack of integration 7 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Acme Acts to Regain Confidence in their Resiliency Strategy Protect Detect Recover — — — Safeguarding data integrity Monitoring and reporting on Automating and with system hardening and system activity to mitigate orchestrating complete immutability threats and vulnerabilities cross-system restoration 8 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Aligned Resiliency Strategy to Universal Best Practice Standards Protect More Complete Industry Certifications Than ANY Competitive Offering • 1st with CA IOT Data Privacy Compliance • DISA STIGs hardened OS and containers • Securities & Exchange Commission 17a-4 WORM Compliant • Commodity Futures Trading Commission 17 1.31 Compliant • AWS GovCloud, AWS C2S, Azure Government Cloud • NIST SP 800-53, NIST SP800-37 RMF, ICD 503, NIST 800-171 • FIPS 140-2 Cryptographic Security • IPv6/USGv6 • TLS 1.3 Encryption 9 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Deployed Zero Trust Authentication, Identity Management and Authorization Protect More Security Features Than ANY Competitive Offerings Immutable and indelible storage Stringent access management to specify who has Ensure data is protected along on-premise and in the cloud for air gap access and control its journey Client Source Data (Objects) NetBackup Granular RBAC Encryption In-flight Server NetBackup Media Server(s) Multi-factor Authentication Encryption At-rest Flex Appliance 10 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Protection Basics Prevention phase Protect 3 – 2 – 1 Backup Rule Hardened Backup Infra Air GAP Immutable backup STUs Auto Image Replication 3 backup copies on NBU Domain 1 NBU Domain 2 NBU PBA SE Linux Intrusion Detecion / 2 types of Media Protection NBU Domain ‘n’ Firewalled Q- Hardened Clo ud S3 Off-Geo Data Center RBAC One to One Flex Appliance Many to One And 1 offsite copy Immutable Storage One to Many
Streamlined and Automated the Data Protection Process Protect Ensuring Business Continuity and Recovery of All Data Across More Workloads and Data Sources Than ANY Competitive Offering Intelligent policies API support Backup snapshots to anywhere and utilize the Automate all the things that you need and focus on same protection policies on-premises and in more high value work-engineering vs. operations the cloud Automation Auto-scale and dynamically resize resources as required for maximum protection needs while optimizing costs and resources 12 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Extended Data Protection to SaaS Applications Single hub for full backup and recovery of your SaaS application data • Automatic data protection for new users, mailboxes, and End-user self- folders requires no action on your part service restores • Time and bandwidth savings from copying only data that has Enterprise-grade Global datacenters changed since the last backup Security for data sovereignty • Flexible restore options whether to its original location or to an alternate location of your choice • Granular restore of a single file, email message, or Teams chat High performance eDiscovery – or a select group of objects. NetBackup SaaS Protection also and scalability search supports bulk restores 13 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Now Available: Seamless Cloud Storage-as-a-Service Single, flexible repository for all your data sources—from on-premises to your public cloud workloads Protect IaaS PaaS SaaS NetBackup Comprehensive Recovery Vault NetBackup Protection Customer’s On-Premise Data Center or Cloud Tenant NetBackup Cloud Storage-as-a-Service 14 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Gained Greater Visibility to Mitigate Threats and Vulnerabilities Monitoring and reporting on system activity Detect Ensure Data is Always Recoverable AI-powered anomaly detection enabling them to take immediate action when ransomware strikes • Leverages trend data for classification and decision trees • Detection and alerting on unexpected changes to backup data • Undertake preventative measures before an event can occur 15 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Automated and Orchestrated Complete Cross-system Restoration for Rapid Recovery Recover Only Veritas can automate and orchestrate complete data center recovery on demand to anywhere from deduped data at scale • Automation and orchestration Execute a resiliency plan with a single click Automate your resiliency operations across all IT services • Full RPO coverage • Test, Validate, Disinfect 16 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Implemented Continuous Data Protection (CDP) to Monitor and Detect Data Changes in Near-Real-Time Recover Ensures recovery for applications across your heterogeneous environment using granular recovery points in Resiliency’s near-real-time data replication 000 • Resiliency through granular recovery of VMs with near-zero RPO • Full RPO coverage 17 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Acme’s Confidence Restored with a Unified Strategy Protect, Detect, and Recover Fewer point solutions Assured Protection Scale confidently from edge to core to cloud Streamlined management and automation 50% less time to complete backups Bullet-proof System hardening and immutability your way Protection Total visibility Anomaly detection Unmatched Detection Malware detection mitigate any threats and Complete vulnerabilities Find ransomware file anywhere Detection Resilient alternate sites Recovery choices Restores in seconds - minutes Recovery at Scale Rapid to meet their RPO and RTO needs New data center, no problem Recovery Ransomware recovery team on call 18 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Always Protected and Recoverable from Edge to Core to Cloud Only with Veritas 9.6 MILLION USERS 100+ EB 700+ PB DATA UNDER PROTECTION IN CLOUD 100% RANSOMWARE RECOVERY SUCCESS “With Veritas, we can restore lost data from backups “For me, Veritas means I can focus on the future with a success rate of 100%.” instead of worrying about the past.” ~ Large European Hospital ~ Global Beverage Company 19 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
16x #1 A LEADER IN GARTNER’S MQ MARKET SHARE FOR BACKUP FOR DATA CENTER BACKUP AND RECOVERY SOFTWARE AND RECOVERY SOLUTIONS 6,000+ 20,000+ 80,000+ 2,000+ 2,140+ 800+ 700+PB 100+EB 87% Employees Global Global Developers Global Supported Driven Cloud Data Under Fortune Global 500 Worldwide Partners Customers Worldwide Patents Workloads Consumption Management Trust Us “With Veritas, we can restore lost data from backups with a success rate of 100%.” ~ Large European Hospital 20 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Join the Path to Restored Confidence We will work with you to assess your environment and equip you with the tools to make ransomware fear you! 21 Copyright © 2022 Veritas Technologies LLC | CONFIDENTIAL
Thank You Copyright © 2022 Veritas Technologies, LLC. All rights reserved. This document is provided for informational purposes only and is not intended as advertising. All w arranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allow ed by law . The information in this document is subject to change w ithout notice.
You can also read