SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
11
Dual headquarters
in Switzerland and Singapore
Acronis Cyber Backup
Cloud
Tekvizyon
2
Acronis Cyber Backup Cloud
Azure
Windows
Server
Windows
PC
Exchange
SQL
Server
Share
Point
Active
Directory
Hyper-V
Office
365
Mac iPad
iPhone
Linux
Server
Android
Amazon
EC2
VMware
vSphere
Oracle x86
VM Server
Red Hat
Virtualization
Linux
KVM
Citrix
XenServer
Virtuozzo Nutanix
Acronis Cyber Backup Cloud protects more than 20 platforms and
incorporates the backup industry’s most advanced anti-ransomware
technology, safeguarding data and systems in any environment –
physical or virtualized, on-premises or in the cloud.
G Suite
Oracle
Database
SAP
HANA
Tekvizyon
3
Acronis Cyber Backup Cloud: Key Features
Complete
Business Protection
• Windows, Linux, Mac
• VMware, Hyper-V, Virtuozzo, Citrix
XenServer, RHEV, KVM, Oracle VM
Server, Nutanix Acropolis
• Amazon EC2, Azure VMs
• Office 365, G Suite
• Application-aware backup for
Microsoft Exchange, SQL Server,
SharePoint, Active Directory,
SAP HANA, Oracle Database
• iOS, Android
Flexible
Storage Options
• Acronis Cyber Infrastructure (on
customer premises or in the SP
data center)
• Networked storage –
SMB/CIFS/DFS and NFS shares
• Acronis Cyber Cloud Storage
• Google Cloud Platform
• Microsoft Azure
• External NFS shares
• Amazon S3
• IBM Cloud (S3)
• Alibaba Cloud (S3)
• IIJ (S3)
• Cleversafe (S3)
• Swift object storage
• Softlayer (Swift)
Fastest
Recovery
• Granular recovery
• Bare-metal recovery
• Full-image and file-level recovery
• Acronis Universal Restore
• Acronis Instant Restore
• Acronis vmFlashback
• Remote recovery
• Any-to-any migration
• Self-service recovery web console
Intuitive
Scalable Management
• Multi-tenant service
• Multiple points of custom branding
• Granular control over quotas
• Free customer trials
• Automated backup agent updates
Innovative
Data Protection
• Acronis Active Protection
• Acronis Notary
• Acronis ASign
• TIBX archive format
• Encryption and password protection
Tekvizyon
4
Hybrid Cloud Backup and Recovery with Acronis
Centralized data
protection management
Cloud
Storage
AES-256 data encryption
in transit and at rest
Monitoring and
alerting
Backup
to Cloud
Recovery
from Cloud
Self-service
recovery console
CUSTOMER WORKLOADS
Servers Virtual Workstations Cloud Apps Mobile Websites
Local disks,
network storage
Acronis Cyber
Infrastructure
LOCAL STORAGE
Image-based or file-level backups
Incremental and differential backups
In-archive deduplication and compression
Physical data shipping
BACKUP OPTIONS
Full-image and file-level recovery
Bare-metal recovery
Run as VM with Acronis Instant Restore
Dissimilar hardware recovery
Any-to-any migration
RECOVERY OPTIONS
Backup
to Local Storage
Recovery
from Local Storage
Backup Replication
to Cloud
Tekvizyon
5
Complete Microsoft 365 Protection
Backup for
Microsoft OneDrive
for Business
Backup for
Microsoft Exchange
Online
Backup for
Microsoft SharePoint
Online
• Back up from Microsoft data centers directly to cloud storage
• Automatically protect new Microsoft Office 365 users, groups and sites
• Search through Microsoft Office 365 backups to get quick access to your backed-up data
• Support of Office 365 data centers in Germany
NEW NEW
ENHANCED
Tekvizyon
6
G Suite Data Backup with Acronis Cyber Backup Cloud
Get an efficient cloud-to-
cloud solution with nothing
to install
Flexible restore options – from
single items to a user’s entire
Drive or Gmail data
Protection for Gmail, Drive
(including Team Drives),
Calendar and Contacts
Verify the authenticity
of files in Drive backups with
blockchain
Ready-to-use cloud storage
options include Google,
Microsoft, and Acronis
Search G Suite backups – with
metadata and full-text (email body
copy) capabilities
Tekvizyon
17
Dual headquarters
in Switzerland and Singapore
Acronis Cyber
Disaster Recovery Cloud
Tekvizyon
8
Acronis Cyber Disaster Recovery Cloud
Upsell disaster recovery with the flip of a switch
Built on
Acronis Cyber
Backup Cloud
Turn-key,
SaaS-based
solution
Enable disaster
recovery in
minutes
Virtual and
physical workload
protection
Disaster
recovery
orchestration
Boost your business with a turn-key DRaaS solution for service providers
that is built on top of Acronis Cyber Backup Cloud
Tekvizyon
9
Disaster Recovery to
Acronis Cloud Recovery Site
Full Image Backup
App Replication
Failback
Acronis Cloud Recovery Site
Secure VPN
• Production Failover
• Failover Testing
• Cloud Servers Backup
Recovery & Primary Servers
Customers’ Sites
VIRTUAL SERVERS
PHYSICAL SERVERS
APPLICATIONS
Windows, Linux
With built-in replication
like SQL Server AlwaysOn
VMware vSphere, Microsoft Hyper-V,
Linux KVM, Red Hat Virtualization
Hot and Cold Storage
Tekvizyon
10
Disaster Recovery for Any Workload
Virtualization platforms
• VMware vSphere
• Microsoft Hyper-V
• Linux KVM
• Red Hat Virtualization
• Citrix XenServer
Physical and virtual machines • Windows • Linux
Application-aware backup and recovery • Microsoft Exchange
• Microsoft SQL Server
• Microsoft SharePoint
• Microsoft Active Directory
Cloud servers for real-time
application replication
• For applications with built-in replication
like SQL Server AlwaysOn
Windows
Server
Exchange
SQL
Server
Share
Point
Active
Directory
Hyper-V
Linux
Server
VMware
vSphere
Red Hat
Virtualization
Linux
KVM
Citrix
XenServer
Tekvizyon
11
Improve RTOs and Automate Disaster
Recovery with Runbooks
The new runbooks feature simplifies
and speeds up failover of multiple
machines to a cloud recovery site.
It allows efficient operations to
automate failover and testing and
ensures the systems are recovered
in the right order to address
interdependencies between
applications on different machines.
Tekvizyon
22
Dual headquarters
in Switzerland and Singapore
What’s New in
Acronis Cyber Cloud 9.0
Tekvizyon
13
Anti-Malware
Next-generation, full-stack, AI/ML-
based protection against malware,
including ransomware and cryptominers
Backup and
Recovery
Fast and reliable recovery of your
apps, systems and data on any
device from any incident
Security and
Management
Comprehensive yet simple
endpoint management
toolkit, which saves IT resources
One solution integrates backup, disaster recovery, AI-based protection against malware
and ransomware, remote desktop, and security tools in a single agent
Acronis Cyber Protect
Tekvizyon
24
Dual headquarters
in Switzerland and Singapore
Overview of Key Features
Tekvizyon
15
One Protection Plan
Covers all cyber
protection aspects:
• Backup
• Anti-malware protection
• URL filtering
• Vulnerability assessment
• Patch management
• Data discovery (via data protection map)
• Windows Defender Antivirus and Microsoft
Security Essentials management
Why? Better protection with less effort, automated
Tekvizyon
16
Vulnerability Assessment and Patch Management
Key features:
▪ Continuous, daily updates of
Acronis’ vulnerability and patch
management database
▪ Local-network-traffic optimization,
by using peer-to-peer update
technology
▪ Patch testing and quality control
with auto-approval capability
▪ Windows and Linux support
Tekvizyon
17
Patch Management
Fix an issue before an issue happens
Large common vulnerabilities and
exposures database, 250-300 new
CVEs weekly
• Auto-approval of patches
• Deployment on a schedule
• Manual deployment
• Flexible reboot and maintenance window options
• Staged deployment
• All Windows updates including MS Office, and
Win10 apps
• Support for patch management of Microsoft and
third-party software on Windows
Why? Automates protection, mitigates potential threats, prevents attacks (e.g. Equifax, WannaCry)
Tekvizyon
18
Significantly Extended Anti-Malware Capabilities
Acronis
Active
Protection
Anti-ransomware, anti-
cryptojacking, AI- and
ML-enabled
Acronis
static
AI analyzer
On-access and
on-demand
detection
Acronis
anti-malware
engine
Any malware
(cloud and local
detection)
Acronis
behavioral
engine
On-access
detection
Acronis
Cyber Backup
Acronis Cyber Protect
Native integration with Windows Security Center
Why? Active prevention of downtime and data loss, not just recovery after an attack
Tekvizyon
19
Anti-Malware Protection
Full-stack anti-malware protection for
Windows and macOS
• Real-time protection against malware
• Cryptomining process detection
• Ransomware detection
• On-demand scanning
• Self-protection: Protect Acronis components (e.g. registry,
service stopping, Acronis file protecting)
• Network folder protection: Protect the data in shared
folders on your machine against ransomware
• Server-side protection: Protect the data in shared folders
within your network against ransomware
• Files quarantine
• Exclusions management: Specify processes that will not
be considered malware; exclude folders where file
changes will not be monitored; select files and folders
where scheduled scanning will not be executed
Tekvizyon
20
URL Filtering Controls Access to Malicious URLs
URL filtering allows you to control
access to internet websites by
permitting or denying access to
specific websites based on
information contained in
an URL list.
• HTTP/HTTPS interceptor
• Black/whitelists for URLs
• Payload analysis for malicious URLs
Why? Prevent attacks through malicious/hacked websites, gain better compliance and productivity
Tekvizyon
21
Remote Desktop
Remotely operate any endpoint as if you are near the device
• Assist remote users and avoid a gigantic waste of time
• Reach systems that are sitting in a private network without changing firewall settings or
establishing additional VPN tunnels. It uses outgoing connections (443 port).
Why? Fewer tools, less effort to connect, faster reaction
Tekvizyon
22
1. Continuous Data Protection
Define the list of critical apps for every device that
users are working with most often. Acronis’ agent
monitors every change made in the listed applications.
In case of a malware infection, you can restore the
data from the last backup and apply the latest
collected changes so no data is lost.
▪ Ensures users won’t lose their work in-progress
▪ IT controls what is continuously backed up – Office
documents, financial forms, logs, graphic files, etc.
Gain safe and instant remediation without data loss and close to zero RPOs
Why? Protects customer data even between backups
Tekvizyon
23
2. Safe Recovery
A backed-up OS image can have malware that can reinfect
a machine after recovery.
Patching the machine and applying the latest anti-malware
definitions allows users to restore the OS image with the
latest patches, reducing the chance of a reoccurring
infection.
▪ Updates the anti-malware
database
▪ Installs the latest security
patches
Integration of AV updates and patch management into recovery process
Why? Saves time, efforts and data: recover infected/vulnerable images quickly with no efforts
Tekvizyon
24
3. Anti-Malware Scanning of Backups in the
Acronis Cloud
Scanning full disk backups at a centralized location helps
find potential vulnerabilities and malware infections –
ensuring users restore a malware-free backup.
▪ Increases potential rootkit and bootkit detections
▪ Restores only clean data
▪ Reduces loads of client endpoints
Prevent restoring infected files from backups
Why? Better protection with less effort and resources: offload endpoints, more aggressive scans
Tekvizyon
25
5. Fail-Safe Patching
A bad system patch can render a system
unusable. Patch management rollbacks have
limitations and can be slow. Create an image
backup of selected machines before installing a
system or application patch.
▪ Full image backups are the fastest and easiest
way to revert to a usable state
Back up endpoints before patching to enable
quick rollback to a working state
Why? Saves resources, faster and more reliable operations
Tekvizyon
26
6. Include Backup Information for Forensic
Investigation
By activating a special “Forensic Mode” in the product,
memory dumps and full HDD images on a sector level
can be collected.
▪ Keeps key evidence secure in the backup
▪ Makes future investigations easier and less costly
Back up vital data as well as information
that’s useful for future analysis
Why? Enables investigation, better compliance
Tekvizyon
38
Dual headquarters
in Switzerland and Singapore
Acronis Cyber Protect Cloud
with Advanced Email
Security powered by
Tekvizyon
28
Service providers email security challenges
Increasing email
threats
▪ 94% of malware is delivered via email
▪ Phishing attacks account
for more than 80% of reported
security incidents
▪ 98% of attack rely on social
engineering
▪ 80% of breaches are new
or unknown “zero-day attacks”
Sources: CSO Online; “Phishing and Social Engineering in 2018“, KnowBe4; Security Boulevard; State of Endpoint Security Risk”, Ponemon Institute;
“Cost of Data Breach Report”, Ponemon Institute, 2020; “Security Technology Sprawl Report”, ReliaQuest, 2019
Inefficient
protection
▪ APTs (Advanced persistent threats)
go undetected on average 71 days
in the Americas, 177 days in EMEA,
and 204 days in APAC.
▪ 43% of organizations experience
false-alerts in 1/5 of detection cases
▪ Traditional sandboxing solutions
take between 7 to 20 minutes to
deliver a verdict
Management complexity
and skill shortage
▪ 53% of security professionals admit
that the number of security tools is
so burdensome that it adversely
impacts security and increases risk
▪ 84% of organizations are
experiencing an IT security skills
shortage
Tekvizyon
29
Higher profitability
Expand/Enhance your
stack of services
Start planning your
services’ upgrade
Upgrade your costs,
margins, profitability
Leverage consumption-
based pricing
Unlock new revenue streams
Expand or enhance your
stack of services with
email security
Start planning the upgrade
of your services without
worrying for the time
needed to implement,
email security is enabled
with the flip of a switch.
Upgrade your costs,
margins, profitability, and
business plan and secure
additional revenue
streams
Leverage pricing per
protected mailbox (unique
mailbox per user)
Tekvizyon
30
Stronger protection
Minimize clients’
risks
Prevent email-
borne threats
Block advanced
attacks
Cover 100% of
traffic
Protect your clients’ #1 threat vector from any attack
Leverage a leading
technology
Minimize the risks to
clients when they
communicate via
email and stop threats
before they reach
end-users' Microsoft
365, Google
Workspace, or Open-
Xchange mailboxes
Prevent spam,
phishing, business
email compromise
(BEC), spoofing,
malware, malicious
URLs, zero-days and
APTs (Advanced
Persistent Threats)
Block sophisticated
attacks that evade
conventional
defenses: APTs,
Zero- and N-days
Analyze every bit of
content at any scale
Build your services on
top of a leading
technology in
independent
evaluations (SELabs)
Ensure minimum
delays and receive
clear verdict within 3
seconds on average
with near-zero false
positives, compared
to 7-20 mins for
sandboxing
solutions
Don’t disrupt
processes
Tekvizyon
31
Advanced Email Security: Stop any
email-borne threat
Malware and ransomware. Prevent known and zero-day
malware with multiple antivirus engines and next-
generation dynamic scans. Detect hidden malicious
content. Leverage powerful threat intelligence to stay
ahead of emerging threats.
Phishing. Block known malicious URLs based on four
leading URL reputation engines. Catch unknown malicious
URLs with unique image recognition engine. Unpack
deeply embedded, hidden phishing attempts and leverage
threat intelligence from six market-leading sources.
Business email compromise (BEC). Prevent payload-
less attacks and impersonation attempts through machine-
learning algorithms with IP reputation, SPF, DKIM, and
DMARC record checks. Reduce “further along the line”
BEC attacks with threat intelligence, phishing, and
antivirus engines.
Internal phishing. Prevent lateral phishing with a zero-
trust approach, scanning 100% of traffic at any scale with
Perception Point’s lighting-fast technology.
Account takeover. Stop account takeover attempts with
multiple security layers, including phishing and anti-
malware engines, threat intelligence, and anti-evasion
technology.
Zero-days and APTs. Catch advanced threats that evade
conventional defenses with a unique CPU-level technology
that detects and blocks attacks at the exploit stage, prior to
malware release.
Evasion techniques – Detect hidden malicious content by
recursively unpacking the content into smaller units which
are then dynamically checked by multiple engines.
Tekvizyon
32
What makes Advanced Email Security unique?
Scan 100% of
traffic in real time
Prevent APTs and
zero-day attacks
Effortless rapid
deployment
Incident response
services
Leverage a single, multi-layered email security solution
for lightning-fast detection that’s easy to deploy and manage
Unmatched
detection speed
Ensure every bit of content
(emails, files, and URLs) is
analyzed at any scale and
a clear verdict is delivered
in seconds before the
content reaches end
users.
Block sophisticated threats
that evade conventional
defenses with a unique
CPU-level analysis that
acts earlier in the attack
chain than other
technologies to block
threats at the exploit
stage, prior to malware
release.
Cloud-native deployment
within a few minutes that
integrates the solution
directly in the email
system without a need for
additional configurations to
reduce the administrative
burden, associated with
standard SEG (secure
email gateway) solutions.
Empower your service
delivery team with direct
access to cyber analysts
and email security experts
that monitor all customer
traffic and analyze
malicious intents with
ongoing reporting and
support, including handling
FPs, remediating and
releasing as required.
Leverage an unmatched
detection speed that
enables you to prevent all
threats before they reach
end-users – which is better
than the reactive approach
of standard email security
technologies
Tekvizyon
33
Unmatched detection speed
Legacy sandboxing technologies, are inherently slow:
waiting to see how the malware acts, which leads to detection
delays and forces CISOs to:
• Move their security solution to detection mode, with
post-email delivery analysis
• Scan only a fraction of all incoming data, which leaves gaps
in defenses, especially against unknown attack techniques
Moreover, Content Disarm and Reconstruction (CDR) solutions
can make harm reconstructed content or make it unusable.
Perception Point’s technology shortens content scanning
from up to 20 minutes to under 30 seconds, with no tampering
of any kind
Get proactive and move from detection to prevention due near-zero delays
Advanced
Email Security
Powered by
Perception Point
Sandbox
7-20 min
Tekvizyon
34
Enhance your Microsoft 365 native defenses
Excel where native Microsoft defenses fall short – prevent more threats and
leverage lightning-fast detection
Functionality Advanced Email Security
(powered by Perception Point)
Microsoft 365
Detection speed < 30 sec 5-20 mins
Detection accuracy ● ● ● ● ● ●
Threat coverage ● ● ● ● ● ● ● ●
URL scanning ● ● ● ● ● ● ● ● ●
Detection of zero-days ● ● ● ● ● ● ● ●
Prevention of APTs ● ● ● ● ● ×
Anti-evasion ● ● ● ● ● ×
Incident response services ● ● ● ● ● ×
Tekvizyon
35
Multi-layered protection
7 layers of protection against any email-borne threat
Why? Block any email-borne threat before it reaches end-users
Advanced
Email Security
Powered by
Perception Point
Anti-spam
Engine
Anti-evasion
Anti-spoofing
Static
Detection
Anti-
phishing
Threat Intelligence
Next-generation
Dynamic Detection
(against APTs and
zero-days)
Tekvizyon
47
Dual headquarters
in Switzerland and Singapore
Acronis Cyber Cloud 9.0:
Changes in Licensing
Tekvizyon
37
Acronis Cyber Protect Cloud: Licensing Overview
Tekvizyon

Weitere ähnliche Inhalte

Was ist angesagt?

OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeCybera Inc.
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4Lalit Rawat
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private CloudThe World Bank
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 RecapKevin Groat
 
Cloud Factsheet Ubuntu Open Stack
Cloud  Factsheet Ubuntu Open StackCloud  Factsheet Ubuntu Open Stack
Cloud Factsheet Ubuntu Open StackThe World Bank
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 
VMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQVMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQRichard Common
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeBackup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeSymantec
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityBruno Capuano
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure SecurityRicky Sanders
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareNetgear Italia
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...Netgear Italia
 

Was ist angesagt? (20)

OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information Exchange
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
Cloud Ubuntu Open Stack Private Cloud
Cloud  Ubuntu Open Stack Private CloudCloud  Ubuntu Open Stack Private Cloud
Cloud Ubuntu Open Stack Private Cloud
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
Cloud Factsheet Ubuntu Open Stack
Cloud  Factsheet Ubuntu Open StackCloud  Factsheet Ubuntu Open Stack
Cloud Factsheet Ubuntu Open Stack
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
VMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQVMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQ
 
Resume
ResumeResume
Resume
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeBackup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure security
 
Immutable Infrastructure Security
Immutable Infrastructure SecurityImmutable Infrastructure Security
Immutable Infrastructure Security
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
AndrianinaSystemNetworkAdmin
AndrianinaSystemNetworkAdminAndrianinaSystemNetworkAdmin
AndrianinaSystemNetworkAdmin
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
 

Ähnlich wie Tekvizyon acronis cyber cloud

Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRNetgear Italia
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Netgear Italia
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Netgear Italia
 
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Netgear Italia
 
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...Netgear Italia
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup CloudSamir Jhaveri
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-securityober64
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNASWebinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNASNetgear Italia
 
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Netgear Italia
 
Webinar NETGEAR - Acronis e Netgear - Soluzione per le Aziende
Webinar NETGEAR - Acronis e Netgear - Soluzione per le AziendeWebinar NETGEAR - Acronis e Netgear - Soluzione per le Aziende
Webinar NETGEAR - Acronis e Netgear - Soluzione per le AziendeNetgear Italia
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Netgear Italia
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...Netgear Italia
 
Présentation Veritas Backup Exec 16
Présentation Veritas Backup Exec 16Présentation Veritas Backup Exec 16
Présentation Veritas Backup Exec 16Aymen Mami
 
Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...Netgear Italia
 
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...Wellington Monaco
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Netgear Italia
 

Ähnlich wie Tekvizyon acronis cyber cloud (20)

Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
 
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
 
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNASWebinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
 
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
 
Webinar NETGEAR - Acronis e Netgear - Soluzione per le Aziende
Webinar NETGEAR - Acronis e Netgear - Soluzione per le AziendeWebinar NETGEAR - Acronis e Netgear - Soluzione per le Aziende
Webinar NETGEAR - Acronis e Netgear - Soluzione per le Aziende
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
 
Présentation Veritas Backup Exec 16
Présentation Veritas Backup Exec 16Présentation Veritas Backup Exec 16
Présentation Veritas Backup Exec 16
 
Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis & Netgear, una soluzione concreta per la virtualizz...
 
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
 

Mehr von Tekvizyon Pc Teknoloji Hizmetleri (16)

Tekvizyon Teknoloji Hizmetleri
Tekvizyon Teknoloji HizmetleriTekvizyon Teknoloji Hizmetleri
Tekvizyon Teknoloji Hizmetleri
 
Tekvizyon Narbulut Bulut Yedekleme Hizmeti
Tekvizyon   Narbulut Bulut Yedekleme HizmetiTekvizyon   Narbulut Bulut Yedekleme Hizmeti
Tekvizyon Narbulut Bulut Yedekleme Hizmeti
 
Tekvizyon bitdefender-gravityzone bulut-panel-yapılandırma
Tekvizyon bitdefender-gravityzone bulut-panel-yapılandırmaTekvizyon bitdefender-gravityzone bulut-panel-yapılandırma
Tekvizyon bitdefender-gravityzone bulut-panel-yapılandırma
 
Tekvizyon bitdefender-ürün-tanıtım
Tekvizyon bitdefender-ürün-tanıtımTekvizyon bitdefender-ürün-tanıtım
Tekvizyon bitdefender-ürün-tanıtım
 
Easeus
EaseusEaseus
Easeus
 
Kullanıcı katmanı
Kullanıcı katmanıKullanıcı katmanı
Kullanıcı katmanı
 
Kuresel tehdit gorunumu raporu 2020
Kuresel tehdit gorunumu raporu 2020Kuresel tehdit gorunumu raporu 2020
Kuresel tehdit gorunumu raporu 2020
 
Nanosoft comport-erp
Nanosoft comport-erpNanosoft comport-erp
Nanosoft comport-erp
 
Firewall Yapılandırma
Firewall YapılandırmaFirewall Yapılandırma
Firewall Yapılandırma
 
Nanosoft verim-basic
Nanosoft verim-basicNanosoft verim-basic
Nanosoft verim-basic
 
Bitdefender tekvizyonpc
Bitdefender   tekvizyonpcBitdefender   tekvizyonpc
Bitdefender tekvizyonpc
 
Jetlog tekvizyon
Jetlog   tekvizyonJetlog   tekvizyon
Jetlog tekvizyon
 
E fatura uygulamasi
E fatura uygulamasiE fatura uygulamasi
E fatura uygulamasi
 
Kvkk bitdefender
Kvkk bitdefenderKvkk bitdefender
Kvkk bitdefender
 
100 soruda kvkk
100 soruda kvkk100 soruda kvkk
100 soruda kvkk
 
Kvkk
KvkkKvkk
Kvkk
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Tekvizyon acronis cyber cloud

  • 1. 11 Dual headquarters in Switzerland and Singapore Acronis Cyber Backup Cloud Tekvizyon
  • 2. 2 Acronis Cyber Backup Cloud Azure Windows Server Windows PC Exchange SQL Server Share Point Active Directory Hyper-V Office 365 Mac iPad iPhone Linux Server Android Amazon EC2 VMware vSphere Oracle x86 VM Server Red Hat Virtualization Linux KVM Citrix XenServer Virtuozzo Nutanix Acronis Cyber Backup Cloud protects more than 20 platforms and incorporates the backup industry’s most advanced anti-ransomware technology, safeguarding data and systems in any environment – physical or virtualized, on-premises or in the cloud. G Suite Oracle Database SAP HANA Tekvizyon
  • 3. 3 Acronis Cyber Backup Cloud: Key Features Complete Business Protection • Windows, Linux, Mac • VMware, Hyper-V, Virtuozzo, Citrix XenServer, RHEV, KVM, Oracle VM Server, Nutanix Acropolis • Amazon EC2, Azure VMs • Office 365, G Suite • Application-aware backup for Microsoft Exchange, SQL Server, SharePoint, Active Directory, SAP HANA, Oracle Database • iOS, Android Flexible Storage Options • Acronis Cyber Infrastructure (on customer premises or in the SP data center) • Networked storage – SMB/CIFS/DFS and NFS shares • Acronis Cyber Cloud Storage • Google Cloud Platform • Microsoft Azure • External NFS shares • Amazon S3 • IBM Cloud (S3) • Alibaba Cloud (S3) • IIJ (S3) • Cleversafe (S3) • Swift object storage • Softlayer (Swift) Fastest Recovery • Granular recovery • Bare-metal recovery • Full-image and file-level recovery • Acronis Universal Restore • Acronis Instant Restore • Acronis vmFlashback • Remote recovery • Any-to-any migration • Self-service recovery web console Intuitive Scalable Management • Multi-tenant service • Multiple points of custom branding • Granular control over quotas • Free customer trials • Automated backup agent updates Innovative Data Protection • Acronis Active Protection • Acronis Notary • Acronis ASign • TIBX archive format • Encryption and password protection Tekvizyon
  • 4. 4 Hybrid Cloud Backup and Recovery with Acronis Centralized data protection management Cloud Storage AES-256 data encryption in transit and at rest Monitoring and alerting Backup to Cloud Recovery from Cloud Self-service recovery console CUSTOMER WORKLOADS Servers Virtual Workstations Cloud Apps Mobile Websites Local disks, network storage Acronis Cyber Infrastructure LOCAL STORAGE Image-based or file-level backups Incremental and differential backups In-archive deduplication and compression Physical data shipping BACKUP OPTIONS Full-image and file-level recovery Bare-metal recovery Run as VM with Acronis Instant Restore Dissimilar hardware recovery Any-to-any migration RECOVERY OPTIONS Backup to Local Storage Recovery from Local Storage Backup Replication to Cloud Tekvizyon
  • 5. 5 Complete Microsoft 365 Protection Backup for Microsoft OneDrive for Business Backup for Microsoft Exchange Online Backup for Microsoft SharePoint Online • Back up from Microsoft data centers directly to cloud storage • Automatically protect new Microsoft Office 365 users, groups and sites • Search through Microsoft Office 365 backups to get quick access to your backed-up data • Support of Office 365 data centers in Germany NEW NEW ENHANCED Tekvizyon
  • 6. 6 G Suite Data Backup with Acronis Cyber Backup Cloud Get an efficient cloud-to- cloud solution with nothing to install Flexible restore options – from single items to a user’s entire Drive or Gmail data Protection for Gmail, Drive (including Team Drives), Calendar and Contacts Verify the authenticity of files in Drive backups with blockchain Ready-to-use cloud storage options include Google, Microsoft, and Acronis Search G Suite backups – with metadata and full-text (email body copy) capabilities Tekvizyon
  • 7. 17 Dual headquarters in Switzerland and Singapore Acronis Cyber Disaster Recovery Cloud Tekvizyon
  • 8. 8 Acronis Cyber Disaster Recovery Cloud Upsell disaster recovery with the flip of a switch Built on Acronis Cyber Backup Cloud Turn-key, SaaS-based solution Enable disaster recovery in minutes Virtual and physical workload protection Disaster recovery orchestration Boost your business with a turn-key DRaaS solution for service providers that is built on top of Acronis Cyber Backup Cloud Tekvizyon
  • 9. 9 Disaster Recovery to Acronis Cloud Recovery Site Full Image Backup App Replication Failback Acronis Cloud Recovery Site Secure VPN • Production Failover • Failover Testing • Cloud Servers Backup Recovery & Primary Servers Customers’ Sites VIRTUAL SERVERS PHYSICAL SERVERS APPLICATIONS Windows, Linux With built-in replication like SQL Server AlwaysOn VMware vSphere, Microsoft Hyper-V, Linux KVM, Red Hat Virtualization Hot and Cold Storage Tekvizyon
  • 10. 10 Disaster Recovery for Any Workload Virtualization platforms • VMware vSphere • Microsoft Hyper-V • Linux KVM • Red Hat Virtualization • Citrix XenServer Physical and virtual machines • Windows • Linux Application-aware backup and recovery • Microsoft Exchange • Microsoft SQL Server • Microsoft SharePoint • Microsoft Active Directory Cloud servers for real-time application replication • For applications with built-in replication like SQL Server AlwaysOn Windows Server Exchange SQL Server Share Point Active Directory Hyper-V Linux Server VMware vSphere Red Hat Virtualization Linux KVM Citrix XenServer Tekvizyon
  • 11. 11 Improve RTOs and Automate Disaster Recovery with Runbooks The new runbooks feature simplifies and speeds up failover of multiple machines to a cloud recovery site. It allows efficient operations to automate failover and testing and ensures the systems are recovered in the right order to address interdependencies between applications on different machines. Tekvizyon
  • 12. 22 Dual headquarters in Switzerland and Singapore What’s New in Acronis Cyber Cloud 9.0 Tekvizyon
  • 13. 13 Anti-Malware Next-generation, full-stack, AI/ML- based protection against malware, including ransomware and cryptominers Backup and Recovery Fast and reliable recovery of your apps, systems and data on any device from any incident Security and Management Comprehensive yet simple endpoint management toolkit, which saves IT resources One solution integrates backup, disaster recovery, AI-based protection against malware and ransomware, remote desktop, and security tools in a single agent Acronis Cyber Protect Tekvizyon
  • 14. 24 Dual headquarters in Switzerland and Singapore Overview of Key Features Tekvizyon
  • 15. 15 One Protection Plan Covers all cyber protection aspects: • Backup • Anti-malware protection • URL filtering • Vulnerability assessment • Patch management • Data discovery (via data protection map) • Windows Defender Antivirus and Microsoft Security Essentials management Why? Better protection with less effort, automated Tekvizyon
  • 16. 16 Vulnerability Assessment and Patch Management Key features: ▪ Continuous, daily updates of Acronis’ vulnerability and patch management database ▪ Local-network-traffic optimization, by using peer-to-peer update technology ▪ Patch testing and quality control with auto-approval capability ▪ Windows and Linux support Tekvizyon
  • 17. 17 Patch Management Fix an issue before an issue happens Large common vulnerabilities and exposures database, 250-300 new CVEs weekly • Auto-approval of patches • Deployment on a schedule • Manual deployment • Flexible reboot and maintenance window options • Staged deployment • All Windows updates including MS Office, and Win10 apps • Support for patch management of Microsoft and third-party software on Windows Why? Automates protection, mitigates potential threats, prevents attacks (e.g. Equifax, WannaCry) Tekvizyon
  • 18. 18 Significantly Extended Anti-Malware Capabilities Acronis Active Protection Anti-ransomware, anti- cryptojacking, AI- and ML-enabled Acronis static AI analyzer On-access and on-demand detection Acronis anti-malware engine Any malware (cloud and local detection) Acronis behavioral engine On-access detection Acronis Cyber Backup Acronis Cyber Protect Native integration with Windows Security Center Why? Active prevention of downtime and data loss, not just recovery after an attack Tekvizyon
  • 19. 19 Anti-Malware Protection Full-stack anti-malware protection for Windows and macOS • Real-time protection against malware • Cryptomining process detection • Ransomware detection • On-demand scanning • Self-protection: Protect Acronis components (e.g. registry, service stopping, Acronis file protecting) • Network folder protection: Protect the data in shared folders on your machine against ransomware • Server-side protection: Protect the data in shared folders within your network against ransomware • Files quarantine • Exclusions management: Specify processes that will not be considered malware; exclude folders where file changes will not be monitored; select files and folders where scheduled scanning will not be executed Tekvizyon
  • 20. 20 URL Filtering Controls Access to Malicious URLs URL filtering allows you to control access to internet websites by permitting or denying access to specific websites based on information contained in an URL list. • HTTP/HTTPS interceptor • Black/whitelists for URLs • Payload analysis for malicious URLs Why? Prevent attacks through malicious/hacked websites, gain better compliance and productivity Tekvizyon
  • 21. 21 Remote Desktop Remotely operate any endpoint as if you are near the device • Assist remote users and avoid a gigantic waste of time • Reach systems that are sitting in a private network without changing firewall settings or establishing additional VPN tunnels. It uses outgoing connections (443 port). Why? Fewer tools, less effort to connect, faster reaction Tekvizyon
  • 22. 22 1. Continuous Data Protection Define the list of critical apps for every device that users are working with most often. Acronis’ agent monitors every change made in the listed applications. In case of a malware infection, you can restore the data from the last backup and apply the latest collected changes so no data is lost. ▪ Ensures users won’t lose their work in-progress ▪ IT controls what is continuously backed up – Office documents, financial forms, logs, graphic files, etc. Gain safe and instant remediation without data loss and close to zero RPOs Why? Protects customer data even between backups Tekvizyon
  • 23. 23 2. Safe Recovery A backed-up OS image can have malware that can reinfect a machine after recovery. Patching the machine and applying the latest anti-malware definitions allows users to restore the OS image with the latest patches, reducing the chance of a reoccurring infection. ▪ Updates the anti-malware database ▪ Installs the latest security patches Integration of AV updates and patch management into recovery process Why? Saves time, efforts and data: recover infected/vulnerable images quickly with no efforts Tekvizyon
  • 24. 24 3. Anti-Malware Scanning of Backups in the Acronis Cloud Scanning full disk backups at a centralized location helps find potential vulnerabilities and malware infections – ensuring users restore a malware-free backup. ▪ Increases potential rootkit and bootkit detections ▪ Restores only clean data ▪ Reduces loads of client endpoints Prevent restoring infected files from backups Why? Better protection with less effort and resources: offload endpoints, more aggressive scans Tekvizyon
  • 25. 25 5. Fail-Safe Patching A bad system patch can render a system unusable. Patch management rollbacks have limitations and can be slow. Create an image backup of selected machines before installing a system or application patch. ▪ Full image backups are the fastest and easiest way to revert to a usable state Back up endpoints before patching to enable quick rollback to a working state Why? Saves resources, faster and more reliable operations Tekvizyon
  • 26. 26 6. Include Backup Information for Forensic Investigation By activating a special “Forensic Mode” in the product, memory dumps and full HDD images on a sector level can be collected. ▪ Keeps key evidence secure in the backup ▪ Makes future investigations easier and less costly Back up vital data as well as information that’s useful for future analysis Why? Enables investigation, better compliance Tekvizyon
  • 27. 38 Dual headquarters in Switzerland and Singapore Acronis Cyber Protect Cloud with Advanced Email Security powered by Tekvizyon
  • 28. 28 Service providers email security challenges Increasing email threats ▪ 94% of malware is delivered via email ▪ Phishing attacks account for more than 80% of reported security incidents ▪ 98% of attack rely on social engineering ▪ 80% of breaches are new or unknown “zero-day attacks” Sources: CSO Online; “Phishing and Social Engineering in 2018“, KnowBe4; Security Boulevard; State of Endpoint Security Risk”, Ponemon Institute; “Cost of Data Breach Report”, Ponemon Institute, 2020; “Security Technology Sprawl Report”, ReliaQuest, 2019 Inefficient protection ▪ APTs (Advanced persistent threats) go undetected on average 71 days in the Americas, 177 days in EMEA, and 204 days in APAC. ▪ 43% of organizations experience false-alerts in 1/5 of detection cases ▪ Traditional sandboxing solutions take between 7 to 20 minutes to deliver a verdict Management complexity and skill shortage ▪ 53% of security professionals admit that the number of security tools is so burdensome that it adversely impacts security and increases risk ▪ 84% of organizations are experiencing an IT security skills shortage Tekvizyon
  • 29. 29 Higher profitability Expand/Enhance your stack of services Start planning your services’ upgrade Upgrade your costs, margins, profitability Leverage consumption- based pricing Unlock new revenue streams Expand or enhance your stack of services with email security Start planning the upgrade of your services without worrying for the time needed to implement, email security is enabled with the flip of a switch. Upgrade your costs, margins, profitability, and business plan and secure additional revenue streams Leverage pricing per protected mailbox (unique mailbox per user) Tekvizyon
  • 30. 30 Stronger protection Minimize clients’ risks Prevent email- borne threats Block advanced attacks Cover 100% of traffic Protect your clients’ #1 threat vector from any attack Leverage a leading technology Minimize the risks to clients when they communicate via email and stop threats before they reach end-users' Microsoft 365, Google Workspace, or Open- Xchange mailboxes Prevent spam, phishing, business email compromise (BEC), spoofing, malware, malicious URLs, zero-days and APTs (Advanced Persistent Threats) Block sophisticated attacks that evade conventional defenses: APTs, Zero- and N-days Analyze every bit of content at any scale Build your services on top of a leading technology in independent evaluations (SELabs) Ensure minimum delays and receive clear verdict within 3 seconds on average with near-zero false positives, compared to 7-20 mins for sandboxing solutions Don’t disrupt processes Tekvizyon
  • 31. 31 Advanced Email Security: Stop any email-borne threat Malware and ransomware. Prevent known and zero-day malware with multiple antivirus engines and next- generation dynamic scans. Detect hidden malicious content. Leverage powerful threat intelligence to stay ahead of emerging threats. Phishing. Block known malicious URLs based on four leading URL reputation engines. Catch unknown malicious URLs with unique image recognition engine. Unpack deeply embedded, hidden phishing attempts and leverage threat intelligence from six market-leading sources. Business email compromise (BEC). Prevent payload- less attacks and impersonation attempts through machine- learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks. Reduce “further along the line” BEC attacks with threat intelligence, phishing, and antivirus engines. Internal phishing. Prevent lateral phishing with a zero- trust approach, scanning 100% of traffic at any scale with Perception Point’s lighting-fast technology. Account takeover. Stop account takeover attempts with multiple security layers, including phishing and anti- malware engines, threat intelligence, and anti-evasion technology. Zero-days and APTs. Catch advanced threats that evade conventional defenses with a unique CPU-level technology that detects and blocks attacks at the exploit stage, prior to malware release. Evasion techniques – Detect hidden malicious content by recursively unpacking the content into smaller units which are then dynamically checked by multiple engines. Tekvizyon
  • 32. 32 What makes Advanced Email Security unique? Scan 100% of traffic in real time Prevent APTs and zero-day attacks Effortless rapid deployment Incident response services Leverage a single, multi-layered email security solution for lightning-fast detection that’s easy to deploy and manage Unmatched detection speed Ensure every bit of content (emails, files, and URLs) is analyzed at any scale and a clear verdict is delivered in seconds before the content reaches end users. Block sophisticated threats that evade conventional defenses with a unique CPU-level analysis that acts earlier in the attack chain than other technologies to block threats at the exploit stage, prior to malware release. Cloud-native deployment within a few minutes that integrates the solution directly in the email system without a need for additional configurations to reduce the administrative burden, associated with standard SEG (secure email gateway) solutions. Empower your service delivery team with direct access to cyber analysts and email security experts that monitor all customer traffic and analyze malicious intents with ongoing reporting and support, including handling FPs, remediating and releasing as required. Leverage an unmatched detection speed that enables you to prevent all threats before they reach end-users – which is better than the reactive approach of standard email security technologies Tekvizyon
  • 33. 33 Unmatched detection speed Legacy sandboxing technologies, are inherently slow: waiting to see how the malware acts, which leads to detection delays and forces CISOs to: • Move their security solution to detection mode, with post-email delivery analysis • Scan only a fraction of all incoming data, which leaves gaps in defenses, especially against unknown attack techniques Moreover, Content Disarm and Reconstruction (CDR) solutions can make harm reconstructed content or make it unusable. Perception Point’s technology shortens content scanning from up to 20 minutes to under 30 seconds, with no tampering of any kind Get proactive and move from detection to prevention due near-zero delays Advanced Email Security Powered by Perception Point Sandbox 7-20 min Tekvizyon
  • 34. 34 Enhance your Microsoft 365 native defenses Excel where native Microsoft defenses fall short – prevent more threats and leverage lightning-fast detection Functionality Advanced Email Security (powered by Perception Point) Microsoft 365 Detection speed < 30 sec 5-20 mins Detection accuracy ● ● ● ● ● ● Threat coverage ● ● ● ● ● ● ● ● URL scanning ● ● ● ● ● ● ● ● ● Detection of zero-days ● ● ● ● ● ● ● ● Prevention of APTs ● ● ● ● ● × Anti-evasion ● ● ● ● ● × Incident response services ● ● ● ● ● × Tekvizyon
  • 35. 35 Multi-layered protection 7 layers of protection against any email-borne threat Why? Block any email-borne threat before it reaches end-users Advanced Email Security Powered by Perception Point Anti-spam Engine Anti-evasion Anti-spoofing Static Detection Anti- phishing Threat Intelligence Next-generation Dynamic Detection (against APTs and zero-days) Tekvizyon
  • 36. 47 Dual headquarters in Switzerland and Singapore Acronis Cyber Cloud 9.0: Changes in Licensing Tekvizyon
  • 37. 37 Acronis Cyber Protect Cloud: Licensing Overview Tekvizyon