SlideShare a Scribd company logo
1 of 17
Druva © 2020. All rights reserved 1
SJ Tan (Accounts Manager)
Territory: ASEAN
Secure & Protect your
Data with Druva
2
Who is Druva?
Customer globally
4000+ 200PB+
Top 5 Storage Partner &
recommended by AWS
Data under management
(Post-Dedupe)
3
Trusted by the Government
Accredited by IMDA since 2018Invested in 2018
Singapore United States
Valued customers in APAC
Singapore Enterprises APAC EnterpriseSingapore SMBs
5
What’s “wrong” with backup today?
Corporate Servers
Scenario 1:
Complex Architecture
Backup software + Server
Tapes (Archiving) Offsite Logistics
Offsite replication
Scenario 2:
Data Blind spots
Challenges:
• How much time/$ is spend managing infrastructure?
• What happens when your hardware is at is limits?
• What if your backup is affected by Ransomware?
Challenges:
• Are your WFH users protected?
• Are you aware of gaps in O365/Gsuite/SFDC?
Corporate Servers
WFH users
I don’t need backup...
I am using a cloud app like O365/Gsuite
Right?
False Assumptions…
6
• Microsoft service agreement
- Microsoft is not liable for any disruption or loss you may suffer… … We recommend that you regularly
backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services.
(https://www.microsoft.com/en-us/servicesagreement).
• Limited Data Retention
- deleted items are purged by default 30-90 days.
• Ransomware attacks in O365
- https://www.youtube.com/watch?v=j7CZwKpIMzw&list=WL&index=7&t=41s
Think Again! Cloud application ≠ backup
• Coming soon… from SFDC
- “Data Recovery Retirement: Effective July 31, 2020, Data Recovery as a paid feature will
be deprecated... We recommend that you use a partner backup solution”
(https://help.salesforce.com/articleView?language=en_US&type=1&mode=1&id=000352139)
8
Ransomware attack in Exchange Online
Ransomware attack in One Drive
Ransomware attack in One Drive
Ransomware attack in One Drive
Druva: Backup as-a-Service
Why is the Druva Platform more secure?
• Data is shard, scrambled, and stored in AWS’s serverless architecture
• Independent security certification on top of AWS’s security framework
• No access to customer data via envelope encryption methodology
• AES 256-bit encryption (at rest) and TLS 1.2 encryption (in transit)
14
Other reasons customers choose Druva
Performance
• Fast network performance with high deduplication
• Single pane of glass for multiple workloads
• Multiple storage regions to choose from
TCO
• SaaS model, all-inclusive pricing
• Zero infrastructure to manage
• Up to 50% lower TCO
Value-added services
• DR-as-a-Service in AWS
• e-Discovery & Compliance features
• Auto-tiering to Deep Glacier for long-term archiving
Why NOW?
16
1. Protect your “un-protected” data
WFH Users, O365, SFDC, Remote workloads
2. NOW is the best time to embark Digital Transformation
your on-premise backup should be one of the first to go
Never let a good crisis go to waste – Winston Churchill
17
Next steps
Get a Demo
Start a
POC
TCO
assessment
18
Are you ready to change the way you protect your data?
sj@druva.com
Thank You!

More Related Content

What's hot

Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
Softechms
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
Kappa Data
 

What's hot (20)

Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
The Advent of Serverless Technologies
The Advent of Serverless TechnologiesThe Advent of Serverless Technologies
The Advent of Serverless Technologies
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart Routing
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Why Stream Video with Cloudflare?
Why Stream Video with Cloudflare?Why Stream Video with Cloudflare?
Why Stream Video with Cloudflare?
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 

Similar to Secure & Protect your Data with Druva

Logical Architecture for Protection
Logical Architecture for ProtectionLogical Architecture for Protection
Logical Architecture for Protection
Sunita Shrivastava
 

Similar to Secure & Protect your Data with Druva (20)

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Logical Architecture for Protection
Logical Architecture for ProtectionLogical Architecture for Protection
Logical Architecture for Protection
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
How to successfully sell cloud backup
How to successfully sell cloud backupHow to successfully sell cloud backup
How to successfully sell cloud backup
 
Cloud Computing & Cloud Storage
Cloud Computing & Cloud Storage Cloud Computing & Cloud Storage
Cloud Computing & Cloud Storage
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Cloud storage presentation.pptx
Cloud storage presentation.pptxCloud storage presentation.pptx
Cloud storage presentation.pptx
 
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data PlatformHow to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
 
Data core overview - haluk-final
Data core overview - haluk-finalData core overview - haluk-final
Data core overview - haluk-final
 
Cloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptxCloud-Storage-PPT.pptx
Cloud-Storage-PPT.pptx
 
Your only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward OgdenYour only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward Ogden
 
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONDELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 

More from Netpluz Asia Pte Ltd

More from Netpluz Asia Pte Ltd (20)

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
 
SAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMSSAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMS
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection
 
Netpluz Managed Cyber Security
Netpluz Managed Cyber Security Netpluz Managed Cyber Security
Netpluz Managed Cyber Security
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
SME Cyber Insurance
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance
 
Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services Portfolio
 
Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services
 
Getting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Email Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the UsersEmail Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the Users
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDR
 
Understanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSUnderstanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOS
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Secure & Protect your Data with Druva

  • 1. Druva © 2020. All rights reserved 1 SJ Tan (Accounts Manager) Territory: ASEAN Secure & Protect your Data with Druva
  • 2. 2 Who is Druva? Customer globally 4000+ 200PB+ Top 5 Storage Partner & recommended by AWS Data under management (Post-Dedupe)
  • 3. 3 Trusted by the Government Accredited by IMDA since 2018Invested in 2018 Singapore United States
  • 4. Valued customers in APAC Singapore Enterprises APAC EnterpriseSingapore SMBs
  • 5. 5 What’s “wrong” with backup today? Corporate Servers Scenario 1: Complex Architecture Backup software + Server Tapes (Archiving) Offsite Logistics Offsite replication Scenario 2: Data Blind spots Challenges: • How much time/$ is spend managing infrastructure? • What happens when your hardware is at is limits? • What if your backup is affected by Ransomware? Challenges: • Are your WFH users protected? • Are you aware of gaps in O365/Gsuite/SFDC? Corporate Servers WFH users
  • 6. I don’t need backup... I am using a cloud app like O365/Gsuite Right? False Assumptions… 6
  • 7. • Microsoft service agreement - Microsoft is not liable for any disruption or loss you may suffer… … We recommend that you regularly backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services. (https://www.microsoft.com/en-us/servicesagreement). • Limited Data Retention - deleted items are purged by default 30-90 days. • Ransomware attacks in O365 - https://www.youtube.com/watch?v=j7CZwKpIMzw&list=WL&index=7&t=41s Think Again! Cloud application ≠ backup • Coming soon… from SFDC - “Data Recovery Retirement: Effective July 31, 2020, Data Recovery as a paid feature will be deprecated... We recommend that you use a partner backup solution” (https://help.salesforce.com/articleView?language=en_US&type=1&mode=1&id=000352139)
  • 8. 8 Ransomware attack in Exchange Online
  • 10. Ransomware attack in One Drive
  • 11. Ransomware attack in One Drive
  • 13. Why is the Druva Platform more secure? • Data is shard, scrambled, and stored in AWS’s serverless architecture • Independent security certification on top of AWS’s security framework • No access to customer data via envelope encryption methodology • AES 256-bit encryption (at rest) and TLS 1.2 encryption (in transit)
  • 14. 14 Other reasons customers choose Druva Performance • Fast network performance with high deduplication • Single pane of glass for multiple workloads • Multiple storage regions to choose from TCO • SaaS model, all-inclusive pricing • Zero infrastructure to manage • Up to 50% lower TCO Value-added services • DR-as-a-Service in AWS • e-Discovery & Compliance features • Auto-tiering to Deep Glacier for long-term archiving
  • 15. Why NOW? 16 1. Protect your “un-protected” data WFH Users, O365, SFDC, Remote workloads 2. NOW is the best time to embark Digital Transformation your on-premise backup should be one of the first to go Never let a good crisis go to waste – Winston Churchill
  • 16. 17 Next steps Get a Demo Start a POC TCO assessment
  • 17. 18 Are you ready to change the way you protect your data? sj@druva.com Thank You!