SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
SAVE YOUR A$$ WITH BAAS
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Case study : Why backup?
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
• Hospital’scomputersystemswereinfectedbyamalwareprogramcalledLocky.
• Lockyistypicallysenttoanunsuspectinguserviaemail,andrecipientopensan
infectedWorddocumentinordertoinfecttheirsystem.
• Staffweresoonlockedoutoftheircomputersandcybercrooksweredemanding
anunusuallylargeransomforaransomwareattack:USD$17,000(40Bitcoin.)
Case Study: Ransomware
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Backup as a Service (BaaS)
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
What is Backup as a Service (BaaS) ?
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Backing up my Girlfriend’s picture with BaaS
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
What is Backup as a Service (BaaS) ?
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
What happens if you suffer downtime?
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
“The average cost of data center
downtime across industries was
approximately USD $5,600 per minute.”
Ponemon Institute – Understanding the Cost of Data Center Downtime:
An Analysis of the Financial Impact of Infrastructure Vulnerability
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Benefits of using Netpluz BaaS?
• End User can offload complexities associated with backups.
• Fast implementation in the Cloud that is agile and scalable.
• Let Netpluz Managed Backup handle all the difficulties for
you.
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event Backup using 3-2-1 Rule
SSL
Backup
copy
(e.g., daily)
1
offsite
Netpluz
Managed
Cloud
Customer
Production
VM
Backup
(e.g., hourly)
Local
backup
WAN
Offsite
backup
3-2-1 rule
3
copies
2 different
media
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Disaster Recovery as a Service (DRaaS)
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
What is a Disaster Recovery?
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Business Justification
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Case Study: Outage inAirline Systems
• Check-in and online booking systems went down.
• Customers could not board flights.
• Lasted 11 Days -Affecting 50,000 passengers and 400
flights.
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
“80% of businesses affected by a major
incident either never re-open or close
within 18 months.”
(Source,Axa)
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
What is DRaaS?
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Benefits of using Netpluz DRaaS?
• RapidandimmediateRecovery.
• Flexible,differentscenarioscan be presentedduringa DR drillin
NetpluzBCP.
• Use lessresources;Leverageon Netpluzfor vast and
scalableinfrastructure.
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
BaaS Business Scenarios:
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Veeam Cloud Connect Infrastructure
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Offsite Backup For Virtual Environments
Repository Can be located in Netpluz Datacenters
Backup
Hypervisor Can be :
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Benefits of using Netpluz BaaS
• Easy to Setup, no VPN needed.
• Choice of where your datacentre is going to be
 Your own datacenter, Netpluz Data Center
• Data Sovereignty – You know where your data is stored in
the Netpluz Cloud.
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
DRaaS Business Scenario
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Delivering advanced, image-based VM replication.
DRaaS For Virtual Environments
Netpluz Datacenters
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Illustration of Veeam’s Failover to DR Site
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
End User can
Power on DR
Site in event of
disaster
VM1
Replica
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Failback to Prod
Site when it is
restored
VM1
Replica
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Option to Failback
Delta Changes or
Entire VM or
VM1
Replica
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Failback to a
Brand New
Datacenter
VM1
Replica
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Benefits of using Netpluz Managed Cloud for DRaaS
• 1-clickfailoverorchestrationfor site testingfor failoversimulation.
• Multipletraffic-reductiontechnologies,includingbuilt-inWAN
accelerationand replicaseeding
• Single-portconnectivityviaTLS/SSL(TransportLayer
Security/SecureSocketsLayer)connectionto a serviceprovider
with trafficencryption
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event Netpluz and Veeam Offer
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
Netpluz Cyber Security
Event
BE INNOVATIVE. BE THE DISRUPTOR.
Netpluz Cyber Security
Event
Next steps :
1. Start the BaaS and DRaaS conversation with Netpluz
2. Talk to Netpluz for building a business strategy plan.
3. Have a Business Continuity Management Plan with Netpluz today!

Weitere ähnliche Inhalte

Was ist angesagt?

DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.Глеб Хохлов
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2016
 
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesAbhishek Singh
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsSynopsys Software Integrity Group
 
Practical Machine Learning in Information Security
Practical Machine Learning in Information SecurityPractical Machine Learning in Information Security
Practical Machine Learning in Information SecuritySven Krasser
 
Gridstore datasheet-grid technology
Gridstore datasheet-grid technologyGridstore datasheet-grid technology
Gridstore datasheet-grid technologyagibs5588
 
'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFVOPNFV
 
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISECHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISEAlexander Kravchenko
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...Alexander Kravchenko
 
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...Alexander Kravchenko
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 

Was ist angesagt? (14)

DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Practical Machine Learning in Information Security
Practical Machine Learning in Information SecurityPractical Machine Learning in Information Security
Practical Machine Learning in Information Security
 
Gridstore datasheet-grid technology
Gridstore datasheet-grid technologyGridstore datasheet-grid technology
Gridstore datasheet-grid technology
 
'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV
 
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISECHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
 
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
IJCNN 2017
IJCNN 2017IJCNN 2017
IJCNN 2017
 

Ähnlich wie Rhipe @Netpluz CS Event Nov 2017

OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...
OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...
OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...OpenNebula Project
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIGaurav "GP" Pal
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Zscaler
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...AI Frontiers
 
D-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringD-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringStefano Salsano
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211hdmchughgmailcom
 
VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYRohitK71
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud EnvironmentShapeBlue
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
Real Security in a Virtual Environment
Real Security in a Virtual EnvironmentReal Security in a Virtual Environment
Real Security in a Virtual EnvironmentMattias Geniar
 
What's Your Data Worth?
What's Your Data Worth?What's Your Data Worth?
What's Your Data Worth?InteractiveNEC
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskCyxtera Technologies
 

Ähnlich wie Rhipe @Netpluz CS Event Nov 2017 (20)

OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...
OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...
OpenNebulaConf2019 - Building Virtual Environments for Security Analyses of C...
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
D-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringD-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoring
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGY
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud Environment
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
Real Security in a Virtual Environment
Real Security in a Virtual EnvironmentReal Security in a Virtual Environment
Real Security in a Virtual Environment
 
What's Your Data Worth?
What's Your Data Worth?What's Your Data Worth?
What's Your Data Worth?
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Cloud security
Cloud securityCloud security
Cloud security
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
 

Mehr von Netpluz Asia Pte Ltd

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Netpluz Asia Pte Ltd
 
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkNetpluz Asia Pte Ltd
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedNetpluz Asia Pte Ltd
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz Asia Pte Ltd
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Asia Pte Ltd
 
Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Netpluz Asia Pte Ltd
 

Mehr von Netpluz Asia Pte Ltd (20)

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
 
SAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMSSAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMS
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection
 
Netpluz Managed Cyber Security
Netpluz Managed Cyber Security Netpluz Managed Cyber Security
Netpluz Managed Cyber Security
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
SME Cyber Insurance
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance
 
Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services Portfolio
 
Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services
 
Getting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
 

Kürzlich hochgeladen

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 

Kürzlich hochgeladen (20)

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Rhipe @Netpluz CS Event Nov 2017

  • 1. Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. SAVE YOUR A$$ WITH BAAS
  • 2. Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR.
  • 4. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Case study : Why backup?
  • 5. Netpluz Cyber Security Event Netpluz Cyber Security Event • Hospital’scomputersystemswereinfectedbyamalwareprogramcalledLocky. • Lockyistypicallysenttoanunsuspectinguserviaemail,andrecipientopensan infectedWorddocumentinordertoinfecttheirsystem. • Staffweresoonlockedoutoftheircomputersandcybercrooksweredemanding anunusuallylargeransomforaransomwareattack:USD$17,000(40Bitcoin.) Case Study: Ransomware
  • 6. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Backup as a Service (BaaS)
  • 7. Netpluz Cyber Security Event Netpluz Cyber Security Event What is Backup as a Service (BaaS) ?
  • 8. Netpluz Cyber Security Event Netpluz Cyber Security Event Backing up my Girlfriend’s picture with BaaS
  • 9. Netpluz Cyber Security Event Netpluz Cyber Security Event What is Backup as a Service (BaaS) ?
  • 10. Netpluz Cyber Security Event Netpluz Cyber Security Event What happens if you suffer downtime?
  • 11. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event “The average cost of data center downtime across industries was approximately USD $5,600 per minute.” Ponemon Institute – Understanding the Cost of Data Center Downtime: An Analysis of the Financial Impact of Infrastructure Vulnerability
  • 12. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Benefits of using Netpluz BaaS? • End User can offload complexities associated with backups. • Fast implementation in the Cloud that is agile and scalable. • Let Netpluz Managed Backup handle all the difficulties for you.
  • 13. Netpluz Cyber Security Event Netpluz Cyber Security Event Backup using 3-2-1 Rule SSL Backup copy (e.g., daily) 1 offsite Netpluz Managed Cloud Customer Production VM Backup (e.g., hourly) Local backup WAN Offsite backup 3-2-1 rule 3 copies 2 different media
  • 14. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Disaster Recovery as a Service (DRaaS)
  • 15. Netpluz Cyber Security Event Netpluz Cyber Security Event
  • 16. Netpluz Cyber Security Event Netpluz Cyber Security Event What is a Disaster Recovery?
  • 17. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Business Justification
  • 18. Netpluz Cyber Security Event Netpluz Cyber Security Event
  • 19. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Case Study: Outage inAirline Systems • Check-in and online booking systems went down. • Customers could not board flights. • Lasted 11 Days -Affecting 50,000 passengers and 400 flights.
  • 20. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event “80% of businesses affected by a major incident either never re-open or close within 18 months.” (Source,Axa)
  • 21. Netpluz Cyber Security Event Netpluz Cyber Security Event What is DRaaS?
  • 22. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Benefits of using Netpluz DRaaS? • RapidandimmediateRecovery. • Flexible,differentscenarioscan be presentedduringa DR drillin NetpluzBCP. • Use lessresources;Leverageon Netpluzfor vast and scalableinfrastructure.
  • 23. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event BaaS Business Scenarios:
  • 24. Netpluz Cyber Security Event Netpluz Cyber Security Event Veeam Cloud Connect Infrastructure
  • 25. Netpluz Cyber Security Event Netpluz Cyber Security Event Offsite Backup For Virtual Environments Repository Can be located in Netpluz Datacenters Backup Hypervisor Can be :
  • 26. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Benefits of using Netpluz BaaS • Easy to Setup, no VPN needed. • Choice of where your datacentre is going to be  Your own datacenter, Netpluz Data Center • Data Sovereignty – You know where your data is stored in the Netpluz Cloud.
  • 27. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event DRaaS Business Scenario
  • 28. Netpluz Cyber Security Event Netpluz Cyber Security Event Delivering advanced, image-based VM replication. DRaaS For Virtual Environments Netpluz Datacenters
  • 29. Netpluz Cyber Security Event Netpluz Cyber Security Event Illustration of Veeam’s Failover to DR Site
  • 30. Netpluz Cyber Security Event Netpluz Cyber Security Event End User can Power on DR Site in event of disaster VM1 Replica
  • 31. Netpluz Cyber Security Event Netpluz Cyber Security Event Failback to Prod Site when it is restored VM1 Replica
  • 32. Netpluz Cyber Security Event Netpluz Cyber Security Event Option to Failback Delta Changes or Entire VM or VM1 Replica
  • 33. Netpluz Cyber Security Event Netpluz Cyber Security Event Failback to a Brand New Datacenter VM1 Replica
  • 34. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Benefits of using Netpluz Managed Cloud for DRaaS • 1-clickfailoverorchestrationfor site testingfor failoversimulation. • Multipletraffic-reductiontechnologies,includingbuilt-inWAN accelerationand replicaseeding • Single-portconnectivityviaTLS/SSL(TransportLayer Security/SecureSocketsLayer)connectionto a serviceprovider with trafficencryption
  • 35. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Netpluz and Veeam Offer
  • 36. Netpluz Cyber Security Event Netpluz Cyber Security Event Netpluz Cyber Security Event BE INNOVATIVE. BE THE DISRUPTOR. Netpluz Cyber Security Event Next steps : 1. Start the BaaS and DRaaS conversation with Netpluz 2. Talk to Netpluz for building a business strategy plan. 3. Have a Business Continuity Management Plan with Netpluz today!

Hinweis der Redaktion

  1. Hollywood Presbyterian Medical Center: Hollywood Presbyterian is a large hospital in Southern California with almost 500 beds. Earlier this year it was hit by a massive ransomware attack. Specifically, the hospital’s computer systems were infected by a malware program called Locky. Locky is typically sent to an unsuspecting user via email, and recipient opens an infected Word document in order to infect their system. In the case of Hollywood Presbyterian, it’s not clear who downloaded the malware, but it doesn’t matter. Soon after, staff members were soon locked out of their computers and cybercrooks were demanding an unusually large ransom for a ransomware attack: $17,000 (40 Bitcoin.) How did the hospital react? According to their statement, On the evening of February 5th, our staff noticed issues accessing the hospital’s computer network. Our IT department began an immediate investigation and determined we had been subject to a malware attack.  The malware locked access to certain computer systems . . . Law enforcement was immediately notified.  Computer experts immediately began assisting us in determining the outside source of the issue and bringing our systems back online. And then what? Within three days, the hospital paid the ransom: The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key. In the best interest of restoring normal operations, we did this.  The hospital then received the decryption key, unlocked its computers, and went about its normal operations. For them, paying the ransom made sense. But industry watchers and bloggers speculated this meant the hospital did not have a backup plan The devastation of the compromised files can be pitched as: Compromised emails Lockout Electronic Medical Record System [EMR] Encrypted patient data Unable to carry CT Scans of the admitted patients Ferried risky patients to nearby hospitals
  2. Source from http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007
  3. This is an introduction slide to ask people what do they think is a disaster. Ask what do they think about this slide is.
  4. System Outage Nightmare Example: Reservation Desk Customers of the airline were really upset when they couldn't board their scheduled flights, during an outage that lasted up to 11 long days. The outage fired up a lot of negative press, as well costing the company millions in profits. In September 2010, the airline's check-in and online booking systems went down. The airline suffered a hardware failure, on September 26, and subsequent outage of the airline's internet booking, reservations, check-in and boarding systems. The outage severely interrupted the the airline business for a period of 11 days, affecting around 50,000 passengers and 400 flights, and was restored to normal on October 6. The Results: the airline's reservations management company, ended up compensating the airline for up to $20 million. - See more at: http://www.evolven.com/blog/downtime-outages-and-failures-understanding-their-true-costs.html#sthash.LNgKa5r4.dpuf
  5. VPN is not easy to be automatically configured, and usually requires an interaction between the service provider and the customer. With Veeam Cloud Connect, the connection will happen directly over the Internet, using a single TCP port protected by SSL encryption. This will be possible thanks to a new Veeam component, called the Cloud Gateway, responsible for the encapsulation of all the backup traffic inside the SSL tunnel.
  6. With v9, we are taking Veeam Cloud Connect to the next level, by expanding its capability to include Replication – providing cloud-based VM replication that is simple to set-up and easy-to-use for the end customer. This technology also opens service providers to a tremendous Disaster Recovery as a Service (DRaaS) opportunity! What you see at the bottom will be a typical Veeam Cloud Connect replication architecture. The customer replicates their VMs across the network to a cloud host residing within the Service Providers Infrastructure.