SlideShare ist ein Scribd-Unternehmen logo
1 von 40
© 2017 Unitrends 1#1 All-in-One Enterprise
Backup and Continuity
Take the Ransom
Out of
Ransomware
Jordan Warsoff | Solutions Engineer
Kevin Collins | Marketing Manager
© 2017 Unitrends 2
© 2017 Unitrends 3
"To be honest, we often advise people just to pay the
ransom."
Joseph Bonavolonta, Asst. Special Agent, FBI Cybercrime Boston
Division
What is Ransomware?
© 2017 Unitrends 5
 Encrypts victims files with
strong unbreakable encryption
 Demands payment for private
key to unlock data
 Payment typically around $200
to $500 in bitcoins
Ransomware Malware
© 2017 Unitrends 6
 Ransomware is not new
 Recent advances have made it a much larger risk
 Early ransomware was “scareware” and “nagware”
 Didn’t permanently lock files.
 Was easily removed or avoided
 Criminals had difficulty in collecting fees anonymously
 Hacker community not as organized
Long History of Ransomware
© 2017 Unitrends 7
 Cryptolocker
 TorrentLocker
 CryptoWall
 CBT-Locker
 TeslaCrypt
 Locky
 Etc.
Many Variations and Copycats
© 2017 Unitrends 8
Popular Tools of Ransomware Variants
Anonymity Online
Electronic Payment
Unbreakable Encryption
• AES
• RSA
• “Curve” ECC
Network to C&C Server
• Tor
• I2P
• POST/HTTPS
• Hardcoded URLs
© 2017 Unitrends 9
Requires both Public and Private Key
© 2017 Unitrends 10
 Spam Email Campaigns
 CBT Locker & Torrent Locker
preferred vector
 Requires interaction from user
 Can affect fully patched systems
 Exploit Kits
 CryptoWall and TelsaCrypt
preferred vector
 Does not require any interaction
 Uses vulnerable installed
software
Infection Vectors
BOTH ARE HIGHLY EFFECTIVE WAYS INTO YOUR SYSTEMS
© 2017 Unitrends 11
Get 1 Free
Macs
vulnerable
Voice Enabled
Highly
Localized
Threaten to
Leak Data
Ransomware Continuing to Advance
How does an enterprise make
sure they never have to pay?
© 2017 Unitrends 13
Play Defense
Play Offense
Don’t forget about your backup players
© 2017 Unitrends 14
 Keep software up to date
 Use virus detection and antivirus prevention
 Educated users on security protocols such
 Avoid clicking untrusted emails and attachments
 Watch out for obvious and not so obvious file
extensions
Offense: Start With Basic Protection
© 2017 Unitrends 15
 Disable Active-X content in Microsoft offices apps
 Have firewalls block Tor, I2P and restrict ports
 Block active ransomware variants from calling home to encryption key
servers
 Block binaries from running from popular ransomware installation
paths (e.g. %TEMP%)
Defense: Be Proactive with counter-measures
© 2017 Unitrends 16
Backups are Crucial
© 2017 Unitrends 17
Real World Examples
© 2017 Unitrends 18
3 copies of your data
2 different types of media
1 copy off-site
Start With The Rule of Three
© 2017 Unitrends 19
 Backup all data on all systems – not just critical data
 Replication and Continuous Data Protection is great for low RTO/RPO but
can backup the malware with your data
 Create archives that are physically isolated from your production systems
 You can use the archive to go back in time if necessary
 Create “bare metal” images of core systems so you can get back to a
known systems state quickly
 Setup DR Services so you can spin up new VMs for critical systems while
you recover your local production systems
 Prepare NOW! Don’t wait until it too late!
Backup Best Practices: Make Sure You Never Pay
© 2017 Unitrends 20
Local
On
Premise
or
Physical
Appliance
2nd
Site
Public &
Private
Cloud
 Local backup for fast recovery
 Archiving to Cloud offsite
 Fully automated
 Can be isolated
Cloud Can Help
© 2017 Unitrends 21
 Instant Recovery Capabilities
 Be able to spin up workloads from backups in minutes while productions is
cleaned
 Ability to protect Windows, Windows Server, Apple Macs, etc.
 Linux based backup software – not Windows based
 Make sure your backups don’t get encrypted too!
Differentiating Feature Of Backup Solution Against
Ransomware
© 2017 Unitrends 22
Verify your Recoverability
 Simplifies DR processes through
automation of interdepedencies
 Eliminates expensive DR testing
 Confirms RTO/RPO SLA
compliance.
 Provides Failover and failback
with confidence
 Includes Protection for VMware &
Hyper-V virtual machines and
Windows Physical
 Provides Audit Proof Compliance
Reporting
So How Can Unitrends Help?
© 2017 Unitrends 24
Welcome To The Less Is More World
IT has less time, money, downtime
IT faces more risks, work, projects
© 2017 Unitrends 25
2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
IT Professionals Servers & VMs Data
IT has less time, money, and downtime
IT faces more risks, work, and projects
Now is Different
Now is Accelerating
© 2017 Unitrends 26
Now is Different…
and Now is Accelerating
40%
Enterprises Worldwide Attacked
by Ransomware in 2015
259%
Increase in Attacks
63% businesses down > 1 day
© 2017 Unitrends 27
IT DOWNTIME COSTS
NORTH AMERICAN BUSINESSES
$700B ANNUALLY
78% productivity loss, 17% revenue loss, 5% cost to fix
© 2017 Unitrends 28
Delta Airlines August 2016
Data Center Outage
Cost the Company
$150,000,000
Average Cost of a
Single Data Center Outage $730,000
© 2017 Unitrends 29
Apple: $11.1B Profit; $51.5B Revenue Q4-2015
All-in-one integrated personal devices displace separate
telephones, cameras, music players, recorders, etc.
© 2017 Unitrends 30
Nutanix Grows 87% with $445M or Revenue
and > $2B Valuation
Hyperconverged storage displaces servers, storage, hypervisor
© 2017 Unitrends 31
IT Professionals Now Expect
to Have Less & Do More
No Finger
Pointing
More
Flexibility
More
Confidence
Less
Management
More
Free Time
More
Uptime
© 2017 Unitrends 32
All-in-One
Enterprise
Backup and
Continuity
Old World
• More vendors; more finger pointing, more management
• More work setting up and constantly tuning
• Limited continuity; little or no recovery assurance
• Windows deployment malware susceptible
• Fragmented & lower customer satisfaction; more worries
New World
• One vendor; one throat to choke
• Less work - rack, connect, and go
• Local & cloud continuity with recovery assurance
• More security; purpose-built hardened Linux
• Unified & higher customer satisfaction; more confidence
© 2017 Unitrends 33
Have Less:
The Ruthless
Pursuit of
Simplicity
Old World New World
© 2017 Unitrends 34
Best
Customer
Satisfaction:
One Support
Call for
Everything
Old World New World
© 2017 Unitrends 35
Have Less, Do More: Guide to the New World
Recovery Series Physical Appliances
All-in-one physical backup appliances that deliver simple enterprise
backup and continuity. Transform how you protect physical and
virtual environments with the industry’s leading hybrid cloud solution.
Unitrends Backup Software
All-in-one virtual appliances that
deliver enterprise backup and
continuity for all physical, virtual,
and cloud workloads. Get
maximum flexibility to deploy on
your own hardware or in the
cloud.
Office 365
Backup
Automatically protects
Exchange, SharePoint,
and One Drive with
unlimited retention.
Boomerang
Incredibly low-cost
Disaster Recovery in
AWS or Microsoft Azure
for VMware virtual
machines.
© 2017 Unitrends 36
Where does Unitrends fit?
OR
NAS SAN Tape Cloud
Backup Copy
RXDA
Physical Virtual NAS Applications
Protect 200+ OS/Applications/Hypervisors
CIFS
NFS
NDM
P
Hypervisor
Virtual
Appliance
Recovery Site
Second Appliance DR Infrastructure with ReliableDR
DRaaS
WAN
OR
© 2017 Unitrends 37
“The user interface is so simple
and easy to use. It’s completely
point-and-click, and it just does
exactly what you are looking for.”
-David Blair, Englestad Arena
“The thing I really like about the
Unitrends solutions is that we
installed it and it just worked.”
-Michael Bush, Wes-Dell Community
Schools
“Never before have we been able
to combine backup, DR and
storage in one tightly integrated
package.”
-Roland Welsch, Jefferson County Local
Government
“It does it all and it does it well! There has
not been one thing I wanted our system
to do since we purchased it that it can’t.”
-Mike Stewart, Blue Ridge School District
“160 pounds of backup
awesomeness.”
-Clandis S., Lincoln Memorial
“This improved our backup window
from 12 hours down to about 2
hours. This has probably saved
about $15K in FTE resources a
year with the straightforward
approach to administration of the
system.”
-David Kennedy, Financial Asset
Management Systems
WHAT OUR
Customers
Say
© 2016 Unitrends 37
“Unitrends just has the better product. It’s
easier to use, more intuitive and has
better performance”
-Darren Boeck, McNeilus Steel
© 2017 Unitrends 38
Protect Everything You Have
Everywhere You Need Continuity
Guaranteed Recovery and Continuity
Within a Single Intuitive Platform
Unitrends All-in-one Backup and Continuity
© 2017 Unitrends 39
+Unitrends
@Unitrends
@Unitrends
@Unitrends
+Unitrends
@UnitrendsInc
© 2017 Unitrends 40
Any forward-looking indication of plans for products is preliminary and all future
release dates are tentative and are subject to change. Any future release of the
product or planned modifications to product capability, functionality, or feature are
subject to ongoing evaluation by Unitrends, and may or may not be implemented
and should not be considered firm commitments by Unitrends and should not be
relied upon in making purchasing decisions.
Disclaimer

Weitere ähnliche Inhalte

Was ist angesagt?

Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Innovation Network Technologies: InNet
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Skybox Security
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 

Was ist angesagt? (20)

Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
 
Live!™ Product Overview - Griffin Group Global
Live!™ Product Overview  - Griffin Group GlobalLive!™ Product Overview  - Griffin Group Global
Live!™ Product Overview - Griffin Group Global
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 

Ähnlich wie Tech Demo: Take the Ransom Out of Ransomware

Ähnlich wie Tech Demo: Take the Ransom Out of Ransomware (20)

Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bank
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Night
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucks
 
DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Within
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Data Breaches: Protecting Your Database from the Evening News
Data Breaches: Protecting Your Database from the Evening NewsData Breaches: Protecting Your Database from the Evening News
Data Breaches: Protecting Your Database from the Evening News
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 
Empowering Marketing Solutions Teams
Empowering Marketing Solutions TeamsEmpowering Marketing Solutions Teams
Empowering Marketing Solutions Teams
 
Applied tactics for your transformation
Applied tactics for your transformationApplied tactics for your transformation
Applied tactics for your transformation
 

Mehr von marketingunitrends

Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinity
marketingunitrends
 

Mehr von marketingunitrends (15)

8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuity
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinity
 
Docker taylor swift and protection v06
Docker taylor swift and protection v06Docker taylor swift and protection v06
Docker taylor swift and protection v06
 
Boomerang webcast final
Boomerang webcast finalBoomerang webcast final
Boomerang webcast final
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Tech Demo: Take the Ransom Out of Ransomware

  • 1. © 2017 Unitrends 1#1 All-in-One Enterprise Backup and Continuity Take the Ransom Out of Ransomware Jordan Warsoff | Solutions Engineer Kevin Collins | Marketing Manager
  • 3. © 2017 Unitrends 3 "To be honest, we often advise people just to pay the ransom." Joseph Bonavolonta, Asst. Special Agent, FBI Cybercrime Boston Division
  • 5. © 2017 Unitrends 5  Encrypts victims files with strong unbreakable encryption  Demands payment for private key to unlock data  Payment typically around $200 to $500 in bitcoins Ransomware Malware
  • 6. © 2017 Unitrends 6  Ransomware is not new  Recent advances have made it a much larger risk  Early ransomware was “scareware” and “nagware”  Didn’t permanently lock files.  Was easily removed or avoided  Criminals had difficulty in collecting fees anonymously  Hacker community not as organized Long History of Ransomware
  • 7. © 2017 Unitrends 7  Cryptolocker  TorrentLocker  CryptoWall  CBT-Locker  TeslaCrypt  Locky  Etc. Many Variations and Copycats
  • 8. © 2017 Unitrends 8 Popular Tools of Ransomware Variants Anonymity Online Electronic Payment Unbreakable Encryption • AES • RSA • “Curve” ECC Network to C&C Server • Tor • I2P • POST/HTTPS • Hardcoded URLs
  • 9. © 2017 Unitrends 9 Requires both Public and Private Key
  • 10. © 2017 Unitrends 10  Spam Email Campaigns  CBT Locker & Torrent Locker preferred vector  Requires interaction from user  Can affect fully patched systems  Exploit Kits  CryptoWall and TelsaCrypt preferred vector  Does not require any interaction  Uses vulnerable installed software Infection Vectors BOTH ARE HIGHLY EFFECTIVE WAYS INTO YOUR SYSTEMS
  • 11. © 2017 Unitrends 11 Get 1 Free Macs vulnerable Voice Enabled Highly Localized Threaten to Leak Data Ransomware Continuing to Advance
  • 12. How does an enterprise make sure they never have to pay?
  • 13. © 2017 Unitrends 13 Play Defense Play Offense Don’t forget about your backup players
  • 14. © 2017 Unitrends 14  Keep software up to date  Use virus detection and antivirus prevention  Educated users on security protocols such  Avoid clicking untrusted emails and attachments  Watch out for obvious and not so obvious file extensions Offense: Start With Basic Protection
  • 15. © 2017 Unitrends 15  Disable Active-X content in Microsoft offices apps  Have firewalls block Tor, I2P and restrict ports  Block active ransomware variants from calling home to encryption key servers  Block binaries from running from popular ransomware installation paths (e.g. %TEMP%) Defense: Be Proactive with counter-measures
  • 16. © 2017 Unitrends 16 Backups are Crucial
  • 17. © 2017 Unitrends 17 Real World Examples
  • 18. © 2017 Unitrends 18 3 copies of your data 2 different types of media 1 copy off-site Start With The Rule of Three
  • 19. © 2017 Unitrends 19  Backup all data on all systems – not just critical data  Replication and Continuous Data Protection is great for low RTO/RPO but can backup the malware with your data  Create archives that are physically isolated from your production systems  You can use the archive to go back in time if necessary  Create “bare metal” images of core systems so you can get back to a known systems state quickly  Setup DR Services so you can spin up new VMs for critical systems while you recover your local production systems  Prepare NOW! Don’t wait until it too late! Backup Best Practices: Make Sure You Never Pay
  • 20. © 2017 Unitrends 20 Local On Premise or Physical Appliance 2nd Site Public & Private Cloud  Local backup for fast recovery  Archiving to Cloud offsite  Fully automated  Can be isolated Cloud Can Help
  • 21. © 2017 Unitrends 21  Instant Recovery Capabilities  Be able to spin up workloads from backups in minutes while productions is cleaned  Ability to protect Windows, Windows Server, Apple Macs, etc.  Linux based backup software – not Windows based  Make sure your backups don’t get encrypted too! Differentiating Feature Of Backup Solution Against Ransomware
  • 22. © 2017 Unitrends 22 Verify your Recoverability  Simplifies DR processes through automation of interdepedencies  Eliminates expensive DR testing  Confirms RTO/RPO SLA compliance.  Provides Failover and failback with confidence  Includes Protection for VMware & Hyper-V virtual machines and Windows Physical  Provides Audit Proof Compliance Reporting
  • 23. So How Can Unitrends Help?
  • 24. © 2017 Unitrends 24 Welcome To The Less Is More World IT has less time, money, downtime IT faces more risks, work, projects
  • 25. © 2017 Unitrends 25 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 IT Professionals Servers & VMs Data IT has less time, money, and downtime IT faces more risks, work, and projects Now is Different Now is Accelerating
  • 26. © 2017 Unitrends 26 Now is Different… and Now is Accelerating 40% Enterprises Worldwide Attacked by Ransomware in 2015 259% Increase in Attacks 63% businesses down > 1 day
  • 27. © 2017 Unitrends 27 IT DOWNTIME COSTS NORTH AMERICAN BUSINESSES $700B ANNUALLY 78% productivity loss, 17% revenue loss, 5% cost to fix
  • 28. © 2017 Unitrends 28 Delta Airlines August 2016 Data Center Outage Cost the Company $150,000,000 Average Cost of a Single Data Center Outage $730,000
  • 29. © 2017 Unitrends 29 Apple: $11.1B Profit; $51.5B Revenue Q4-2015 All-in-one integrated personal devices displace separate telephones, cameras, music players, recorders, etc.
  • 30. © 2017 Unitrends 30 Nutanix Grows 87% with $445M or Revenue and > $2B Valuation Hyperconverged storage displaces servers, storage, hypervisor
  • 31. © 2017 Unitrends 31 IT Professionals Now Expect to Have Less & Do More No Finger Pointing More Flexibility More Confidence Less Management More Free Time More Uptime
  • 32. © 2017 Unitrends 32 All-in-One Enterprise Backup and Continuity Old World • More vendors; more finger pointing, more management • More work setting up and constantly tuning • Limited continuity; little or no recovery assurance • Windows deployment malware susceptible • Fragmented & lower customer satisfaction; more worries New World • One vendor; one throat to choke • Less work - rack, connect, and go • Local & cloud continuity with recovery assurance • More security; purpose-built hardened Linux • Unified & higher customer satisfaction; more confidence
  • 33. © 2017 Unitrends 33 Have Less: The Ruthless Pursuit of Simplicity Old World New World
  • 34. © 2017 Unitrends 34 Best Customer Satisfaction: One Support Call for Everything Old World New World
  • 35. © 2017 Unitrends 35 Have Less, Do More: Guide to the New World Recovery Series Physical Appliances All-in-one physical backup appliances that deliver simple enterprise backup and continuity. Transform how you protect physical and virtual environments with the industry’s leading hybrid cloud solution. Unitrends Backup Software All-in-one virtual appliances that deliver enterprise backup and continuity for all physical, virtual, and cloud workloads. Get maximum flexibility to deploy on your own hardware or in the cloud. Office 365 Backup Automatically protects Exchange, SharePoint, and One Drive with unlimited retention. Boomerang Incredibly low-cost Disaster Recovery in AWS or Microsoft Azure for VMware virtual machines.
  • 36. © 2017 Unitrends 36 Where does Unitrends fit? OR NAS SAN Tape Cloud Backup Copy RXDA Physical Virtual NAS Applications Protect 200+ OS/Applications/Hypervisors CIFS NFS NDM P Hypervisor Virtual Appliance Recovery Site Second Appliance DR Infrastructure with ReliableDR DRaaS WAN OR
  • 37. © 2017 Unitrends 37 “The user interface is so simple and easy to use. It’s completely point-and-click, and it just does exactly what you are looking for.” -David Blair, Englestad Arena “The thing I really like about the Unitrends solutions is that we installed it and it just worked.” -Michael Bush, Wes-Dell Community Schools “Never before have we been able to combine backup, DR and storage in one tightly integrated package.” -Roland Welsch, Jefferson County Local Government “It does it all and it does it well! There has not been one thing I wanted our system to do since we purchased it that it can’t.” -Mike Stewart, Blue Ridge School District “160 pounds of backup awesomeness.” -Clandis S., Lincoln Memorial “This improved our backup window from 12 hours down to about 2 hours. This has probably saved about $15K in FTE resources a year with the straightforward approach to administration of the system.” -David Kennedy, Financial Asset Management Systems WHAT OUR Customers Say © 2016 Unitrends 37 “Unitrends just has the better product. It’s easier to use, more intuitive and has better performance” -Darren Boeck, McNeilus Steel
  • 38. © 2017 Unitrends 38 Protect Everything You Have Everywhere You Need Continuity Guaranteed Recovery and Continuity Within a Single Intuitive Platform Unitrends All-in-one Backup and Continuity
  • 39. © 2017 Unitrends 39 +Unitrends @Unitrends @Unitrends @Unitrends +Unitrends @UnitrendsInc
  • 40. © 2017 Unitrends 40 Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Unitrends, and may or may not be implemented and should not be considered firm commitments by Unitrends and should not be relied upon in making purchasing decisions. Disclaimer