SlideShare ist ein Scribd-Unternehmen logo
1 von 32
© 2017 Unitrends 1#1 All-in-One Enterprise
Backup and Continuity
Ransomware: Why
Are Backup
Vendors Trying To
Scare You?
Mark Jordan, VP Technology
© 2017 Unitrends 2
It was the best of times, it was the
worst of times, it
was the age of wisdom, it was the
age of foolishness
© 2017 Unitrends 3
 St Louis Public Libraries
 Cannot return or borrow books, cannot access computer facilities in 16
branches
 City refuses to pay $35,000 ransom
 Will wipe and build from scratch, a solution that will take weeks
© 2017 Unitrends 4
 Bethlehem, NY Central School District
 5000 students, 800 staff
 Multiple ransomware attacks
 Quick, full recovery from backup, $0 ransom paid
© 2017 Unitrends 5
Source: Palo Alto Networks
© 2017 Unitrends 6
Ransomware took in $1-billion in 2016
© 2017 Unitrends 7
© 2017 Unitrends 8
Delta Airlines August 2016
Data Center Outage
Cost the Company
$150,000,000
Average Cost of a
Single Data Center Outage $730,000
© 2017 Unitrends 9
CryptoWorms – the future of
ransomware
• Self-propagating
• Find vulnerable network targets
• Targets unprotected executable files
• Avoids detection
Jigsaw – encrypts and deletes
• Starts deleting files if the ransom is
not paid
© 2017 Unitrends 10
Source: Singapore Computer Emergency Response
Team
© 2017 Unitrends 11
Sadly, sadly, the sun rose; it rose
upon no sadder sight than the
man of good abilities and good
emotions, incapable of their
directed exercise, incapable of his
own help
© 2017 Unitrends 12
© 2017 Unitrends 13
• Are you sending data to a shared network
drive?
• Are you using a cloud backup service?
• Do your backups sit on a Windows-based
target?
Backups are not necessarily safe
© 2017 Unitrends 14
© 2017 Unitrends 15
© 2017 Unitrends 16
Then tell the Wind and Fire where
to stop, but don't tell me
© 2017 Unitrends 17
Play Defense
Play Offense
Don’t forget about your backup players
© 2017 Unitrends 18
 Keep software up to date
 Use virus detection and antivirus prevention
 Educated users on security protocols such
 Avoid clicking untrusted emails and attachments
 Watch out for obvious and not so obvious file
extensions
Offense: Start With Basic Protection
© 2017 Unitrends 19
 Disable Active-X content in Microsoft offices apps
 Have firewalls block Tor, I2P and restrict ports
 Block active ransomware variants from calling home to encryption key
servers
 Block binaries from running from popular ransomware installation
paths (e.g. %TEMP%)
Defense: Be Proactive with counter-measures
© 2017 Unitrends 20
Backups are Crucial
© 2017 Unitrends 21
Backups are Crucial
• Backup your data
• Know your recovery objectives
• Have instant recovery
• Have multiple recovery points
• Get your data offsite
Test Recovery!
© 2017 Unitrends 22
How does Unitrends fit
into this story?
© 2017 Unitrends 23
All-in-One
Enterprise
Backup and
Continuity
Old World
• More vendors; more finger pointing, more management
• More work setting up and constantly tuning
• Limited continuity; little or no recovery assurance
• Windows deployment malware susceptible
• Fragmented & lower customer satisfaction; more worries
New World
• One vendor; one throat to choke
• Less work - rack, connect, and go
• Local & cloud continuity with recovery assurance
• More security; purpose-built hardened Linux
• Unified & higher customer satisfaction; more confidence
© 2017 Unitrends 24
Have Less:
The
Ruthless
Pursuit of
Simplicity
Old World New World
© 2017 Unitrends 25
Best
Customer
Satisfaction
: One
Support Call
for
Everything
Old World New World
© 2017 Unitrends 26
Unitrends
Cloud
Old World
• Third-party cloud vendors, limited or no DRaaS
• No recovery assurance, limited retention; more worries
• No SLAs, more worries, network bottlenecks
New World
• No finger-pointing; less management: single vendor
• Physical & virtual DRaaS
• Industry only physical & virtual recovery assurance
• Infinite retention available; more confidence
• 1 hour recovery SLA available; more confidence
• WAN optimized & Rapid Data Seeding
WAN
OpenVPN
w/Throttling
OR
© 2017 Unitrends 27
Confidence
from
Recovery
Assurance
Old World
• Praying that backups recovered successfully
• Scrambling during DR exercises
• Rarely, if ever, testing DR
• Spending hours creating manual DR reports
New World
• Fully automated, application-level testing and failover
• Proactively uncover recovery issues for physical & virtual
• Business-level DR compliance report automation
• Available for local, DR site, and Unitrends Cloud
© 2017 Unitrends 28
It is a far, far better thing that I do,
than I have ever done; it is a far,
far better rest that I go to than I
have ever known
© 2017 Unitrends 29
+Unitrends
@Unitrends
@Unitrends
@Unitrends
+Unitrends
@UnitrendsInc
© 2017 Unitrends 30
+Unitrends
@Unitrends
@Unitrends
@Unitrends
+Unitrends
@UnitrendsInc
Questions?
© 2017 Unitrends 31
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomwaremarketingunitrends
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateFidelis Cybersecurity
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Fidelis Cybersecurity
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRNetpluz Asia Pte Ltd
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration Fidelis Cybersecurity
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureFidelis Cybersecurity
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensiveFidelis Cybersecurity
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchFidelis Cybersecurity
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Storage Switzerland
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 

Was ist angesagt? (20)

Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDR
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teaming
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 

Ähnlich wie Ransomware: Why Are Backup Vendors Trying To Scare You?

Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?marketingunitrends
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Nightmarketingunitrends
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?marketingunitrends
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of RansomwareUnitrends
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bankmarketingunitrends
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucksmarketingunitrends
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointingmarketingunitrends
 
DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?marketingunitrends
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisAcronis
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Storage Switzerland
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First marketingunitrends
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuitymarketingunitrends
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Withinmarketingunitrends
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DRmarketingunitrends
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItStorage Switzerland
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021Adrian Sanabria
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSASrikrupa Srivatsan
 
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
Don’t WannaCry? Here’s How to Stop Those Ransomware BluesDon’t WannaCry? Here’s How to Stop Those Ransomware Blues
Don’t WannaCry? Here’s How to Stop Those Ransomware BluesSynopsys Software Integrity Group
 

Ähnlich wie Ransomware: Why Are Backup Vendors Trying To Scare You? (20)

Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Night
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bank
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucks
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by Acronis
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuity
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Within
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSA
 
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
Don’t WannaCry? Here’s How to Stop Those Ransomware BluesDon’t WannaCry? Here’s How to Stop Those Ransomware Blues
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
 

Mehr von marketingunitrends

8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaSmarketingunitrends
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?marketingunitrends
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productivemarketingunitrends
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?marketingunitrends
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?marketingunitrends
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinarmarketingunitrends
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloudmarketingunitrends
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...marketingunitrends
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliancemarketingunitrends
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factorsmarketingunitrends
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinitymarketingunitrends
 
Docker taylor swift and protection v06
Docker taylor swift and protection v06Docker taylor swift and protection v06
Docker taylor swift and protection v06marketingunitrends
 

Mehr von marketingunitrends (13)

8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinity
 
Docker taylor swift and protection v06
Docker taylor swift and protection v06Docker taylor swift and protection v06
Docker taylor swift and protection v06
 
Boomerang webcast final
Boomerang webcast finalBoomerang webcast final
Boomerang webcast final
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Ransomware: Why Are Backup Vendors Trying To Scare You?

  • 1. © 2017 Unitrends 1#1 All-in-One Enterprise Backup and Continuity Ransomware: Why Are Backup Vendors Trying To Scare You? Mark Jordan, VP Technology
  • 2. © 2017 Unitrends 2 It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness
  • 3. © 2017 Unitrends 3  St Louis Public Libraries  Cannot return or borrow books, cannot access computer facilities in 16 branches  City refuses to pay $35,000 ransom  Will wipe and build from scratch, a solution that will take weeks
  • 4. © 2017 Unitrends 4  Bethlehem, NY Central School District  5000 students, 800 staff  Multiple ransomware attacks  Quick, full recovery from backup, $0 ransom paid
  • 5. © 2017 Unitrends 5 Source: Palo Alto Networks
  • 6. © 2017 Unitrends 6 Ransomware took in $1-billion in 2016
  • 8. © 2017 Unitrends 8 Delta Airlines August 2016 Data Center Outage Cost the Company $150,000,000 Average Cost of a Single Data Center Outage $730,000
  • 9. © 2017 Unitrends 9 CryptoWorms – the future of ransomware • Self-propagating • Find vulnerable network targets • Targets unprotected executable files • Avoids detection Jigsaw – encrypts and deletes • Starts deleting files if the ransom is not paid
  • 10. © 2017 Unitrends 10 Source: Singapore Computer Emergency Response Team
  • 11. © 2017 Unitrends 11 Sadly, sadly, the sun rose; it rose upon no sadder sight than the man of good abilities and good emotions, incapable of their directed exercise, incapable of his own help
  • 13. © 2017 Unitrends 13 • Are you sending data to a shared network drive? • Are you using a cloud backup service? • Do your backups sit on a Windows-based target? Backups are not necessarily safe
  • 16. © 2017 Unitrends 16 Then tell the Wind and Fire where to stop, but don't tell me
  • 17. © 2017 Unitrends 17 Play Defense Play Offense Don’t forget about your backup players
  • 18. © 2017 Unitrends 18  Keep software up to date  Use virus detection and antivirus prevention  Educated users on security protocols such  Avoid clicking untrusted emails and attachments  Watch out for obvious and not so obvious file extensions Offense: Start With Basic Protection
  • 19. © 2017 Unitrends 19  Disable Active-X content in Microsoft offices apps  Have firewalls block Tor, I2P and restrict ports  Block active ransomware variants from calling home to encryption key servers  Block binaries from running from popular ransomware installation paths (e.g. %TEMP%) Defense: Be Proactive with counter-measures
  • 20. © 2017 Unitrends 20 Backups are Crucial
  • 21. © 2017 Unitrends 21 Backups are Crucial • Backup your data • Know your recovery objectives • Have instant recovery • Have multiple recovery points • Get your data offsite Test Recovery!
  • 22. © 2017 Unitrends 22 How does Unitrends fit into this story?
  • 23. © 2017 Unitrends 23 All-in-One Enterprise Backup and Continuity Old World • More vendors; more finger pointing, more management • More work setting up and constantly tuning • Limited continuity; little or no recovery assurance • Windows deployment malware susceptible • Fragmented & lower customer satisfaction; more worries New World • One vendor; one throat to choke • Less work - rack, connect, and go • Local & cloud continuity with recovery assurance • More security; purpose-built hardened Linux • Unified & higher customer satisfaction; more confidence
  • 24. © 2017 Unitrends 24 Have Less: The Ruthless Pursuit of Simplicity Old World New World
  • 25. © 2017 Unitrends 25 Best Customer Satisfaction : One Support Call for Everything Old World New World
  • 26. © 2017 Unitrends 26 Unitrends Cloud Old World • Third-party cloud vendors, limited or no DRaaS • No recovery assurance, limited retention; more worries • No SLAs, more worries, network bottlenecks New World • No finger-pointing; less management: single vendor • Physical & virtual DRaaS • Industry only physical & virtual recovery assurance • Infinite retention available; more confidence • 1 hour recovery SLA available; more confidence • WAN optimized & Rapid Data Seeding WAN OpenVPN w/Throttling OR
  • 27. © 2017 Unitrends 27 Confidence from Recovery Assurance Old World • Praying that backups recovered successfully • Scrambling during DR exercises • Rarely, if ever, testing DR • Spending hours creating manual DR reports New World • Fully automated, application-level testing and failover • Proactively uncover recovery issues for physical & virtual • Business-level DR compliance report automation • Available for local, DR site, and Unitrends Cloud
  • 28. © 2017 Unitrends 28 It is a far, far better thing that I do, than I have ever done; it is a far, far better rest that I go to than I have ever known
  • 29. © 2017 Unitrends 29 +Unitrends @Unitrends @Unitrends @Unitrends +Unitrends @UnitrendsInc
  • 30. © 2017 Unitrends 30 +Unitrends @Unitrends @Unitrends @Unitrends +Unitrends @UnitrendsInc Questions?