SlideShare une entreprise Scribd logo
1  sur  23
Secure your data. Secure your
business.
WieSie Ransomware undErpressern keineChancegeben
Jan Stöver – Sales EngineerMid-MarketD/A/CH
2
3
4
5
Prevention
• Firewall
• IAM
• CASB
• Email Security
Detection
• XDR
• Intrusion Detection
• Endpoint Security
Investigation
• Digital Forensics
• SIEM
• SOAR
6
Businesses are Under Attack
Data
Enterprise Cloud SaaS
Infrastructure Security
Why are organizations stuck paying ransoms?
Ransomware locks down data
PAY RANSOM
Can Risks Be
Identified and
Investigated?
Option 1: Pay ransom
Can We Recover
Quickly?
Engage
SecOps
Is Data
Resilient?
Engage
IT Ops
Option 2: Attempt to recover
7
Prevention
It's Time For A New Approach
+
Infrastructure Security
Detection Investigation
Data Security
Data Resilience Data Observability Data Recovery
Zero Trust Security
8
9
Data Resilience
10
Is My Data Truly Secure?
Is my backup data immune
from malicious encryption?
Can bad actors snoop
or steal my data?
Can anyone manipulate
my backups?
Can attackers find my backups?
Are admin accounts safe from
compromise?
Our Approach
11
Enterprise Data
Protection
M365 Protection
Cloud Data
Protection
Safeguard your data so it can always be available for
recovery
• Immutable from the first copy
• Append Only File System
• Logical Air Gap – No Open Protocols
• Encryption Everywhere
• Zero Trust by Design (MFA)
• Retention Locks and Two-Person Integrity
Data Resilience
Rubrik Data
Production
Major attack is now
a recoverable event
Logical airgap
Production
12
Data Observability
13
Can I Monitor Data to Find the Biggest Risks?
Was sensitive data
affected by an attack?
Are there indicators of
compromise?
Has there been unusual activity
and what kinds?
What files and applications were
affected in an attack?
14
Sensitive Data
Discovery
Threat Hunting
Ransomware
Investigation
Monitor data risks continuously and remediate threats
quick
• High Fidelity ML Model using Data Time-Series
• Full data view User/App/Content over time
• Anomaly and encryption detection vs baseline
• Data Insights integrate into your SecOps tools
Data Observability
Our Approach
15
Data Recovery
16
How Easy is it to Recover?
How quickly can I recover after a massive attack?
How do I get my most critical
apps back immediately?
How can I test that
everything works?
How do I know if malware is
hiding, and can I isolate it?
How do I plan for recovering
an entire site?
17
Threat Containment
Mass Recovery
Quarantine malware and automate recovery
so business operations can be restored quickly
• In-Place Recovery-of only changes
• Instant Recovery / Live Mount gracefully migrates back to
production storage
• Automated Orchestrated recovery of VMs (War Time for sub
10 min recovery)
• Peace time isolated recovery testing for proactive testing
• Surgical Recovery Malware Free “Last Known Good Copy”
Data Recovery
Our Approach
Orchestrated App
Recovery
18
Threat Containment
Mass Recovery
Orchestrated App
Recovery
Sensitive Data Discovery
Threat Hunting
Ransomware Investigation
M365 Protection
Cloud Data Protection
Enterprise Data Protection
Data Resilience Data Observability Data Recovery
Data Security Command Center
Detection and Analysis Containment Eradication
and Recovery
Preparation
NIST Security Standards
19
Rubrik Keeps Your Data Secure and Recoverable
Enterprise Cloud SaaS
20
Your data is
defended
against cyber
threats
Cyber threats are
monitored
continuously and
analyzed quickly
Your business
operations are
recovered
within hours
Data Recovery
Data Resilience Data Observability
Zero Trust Data Security
Ransomware Recovery Warranty
*Warranty provides payout of up to $5m, based on data protected by Rubrik. For recovery related expenses 21
Furthest to the
Right in Vision
Strongest in
Overall Strategy
Five Years
Running
Widely recognized as leading innovator
22
Jan Stöver (Rubrik Germany)

Contenu connexe

Similaire à Jan Stöver (Rubrik Germany)

Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingRichard Kennedy
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutionsxKinAnx
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceTony Zirnoon, CISSP
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in securityOsama Ellahi
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEMThomas Springer
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 

Similaire à Jan Stöver (Rubrik Germany) (20)

Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutions
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 

Plus de Praxistage

Einladung zu den Praxistagen 2024 im virtuellen Landhaus
Einladung zu den Praxistagen 2024 im virtuellen LandhausEinladung zu den Praxistagen 2024 im virtuellen Landhaus
Einladung zu den Praxistagen 2024 im virtuellen LandhausPraxistage
 
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Praxistage
 
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)Praxistage
 
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)Praxistage
 
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)Praxistage
 
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)Praxistage
 
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...Praxistage
 
Bernd Schellnast (Sphinx IT Consulting GmbH)
Bernd Schellnast (Sphinx IT Consulting GmbH)Bernd Schellnast (Sphinx IT Consulting GmbH)
Bernd Schellnast (Sphinx IT Consulting GmbH)Praxistage
 
Werner Panhauser (Helvetia Versicherungen AG)
Werner Panhauser (Helvetia Versicherungen AG)Werner Panhauser (Helvetia Versicherungen AG)
Werner Panhauser (Helvetia Versicherungen AG)Praxistage
 
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)Praxistage
 
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)Praxistage
 
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)Praxistage
 
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)Praxistage
 
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)Praxistage
 
Doris Ingerisch (Axians ICT Austria GmbH)
Doris Ingerisch (Axians ICT Austria GmbH)Doris Ingerisch (Axians ICT Austria GmbH)
Doris Ingerisch (Axians ICT Austria GmbH)Praxistage
 
Josef Weissinger (Soroban IT-Beratung GmbH)
Josef Weissinger (Soroban IT-Beratung GmbH)Josef Weissinger (Soroban IT-Beratung GmbH)
Josef Weissinger (Soroban IT-Beratung GmbH)Praxistage
 
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)Praxistage
 
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)Praxistage
 
Praxistage 2024 im virtuellen Landhaus, St. Pölten
Praxistage 2024 im virtuellen Landhaus, St. PöltenPraxistage 2024 im virtuellen Landhaus, St. Pölten
Praxistage 2024 im virtuellen Landhaus, St. PöltenPraxistage
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Praxistage
 

Plus de Praxistage (20)

Einladung zu den Praxistagen 2024 im virtuellen Landhaus
Einladung zu den Praxistagen 2024 im virtuellen LandhausEinladung zu den Praxistagen 2024 im virtuellen Landhaus
Einladung zu den Praxistagen 2024 im virtuellen Landhaus
 
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
 
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
 
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
 
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
 
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
 
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
 
Bernd Schellnast (Sphinx IT Consulting GmbH)
Bernd Schellnast (Sphinx IT Consulting GmbH)Bernd Schellnast (Sphinx IT Consulting GmbH)
Bernd Schellnast (Sphinx IT Consulting GmbH)
 
Werner Panhauser (Helvetia Versicherungen AG)
Werner Panhauser (Helvetia Versicherungen AG)Werner Panhauser (Helvetia Versicherungen AG)
Werner Panhauser (Helvetia Versicherungen AG)
 
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
 
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
 
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
 
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
 
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
 
Doris Ingerisch (Axians ICT Austria GmbH)
Doris Ingerisch (Axians ICT Austria GmbH)Doris Ingerisch (Axians ICT Austria GmbH)
Doris Ingerisch (Axians ICT Austria GmbH)
 
Josef Weissinger (Soroban IT-Beratung GmbH)
Josef Weissinger (Soroban IT-Beratung GmbH)Josef Weissinger (Soroban IT-Beratung GmbH)
Josef Weissinger (Soroban IT-Beratung GmbH)
 
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
 
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
 
Praxistage 2024 im virtuellen Landhaus, St. Pölten
Praxistage 2024 im virtuellen Landhaus, St. PöltenPraxistage 2024 im virtuellen Landhaus, St. Pölten
Praxistage 2024 im virtuellen Landhaus, St. Pölten
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)
 

Dernier

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Jan Stöver (Rubrik Germany)

  • 1. Secure your data. Secure your business. WieSie Ransomware undErpressern keineChancegeben Jan Stöver – Sales EngineerMid-MarketD/A/CH
  • 2. 2
  • 3. 3
  • 4. 4
  • 5. 5
  • 6. Prevention • Firewall • IAM • CASB • Email Security Detection • XDR • Intrusion Detection • Endpoint Security Investigation • Digital Forensics • SIEM • SOAR 6 Businesses are Under Attack Data Enterprise Cloud SaaS Infrastructure Security
  • 7. Why are organizations stuck paying ransoms? Ransomware locks down data PAY RANSOM Can Risks Be Identified and Investigated? Option 1: Pay ransom Can We Recover Quickly? Engage SecOps Is Data Resilient? Engage IT Ops Option 2: Attempt to recover 7
  • 8. Prevention It's Time For A New Approach + Infrastructure Security Detection Investigation Data Security Data Resilience Data Observability Data Recovery Zero Trust Security 8
  • 10. 10 Is My Data Truly Secure? Is my backup data immune from malicious encryption? Can bad actors snoop or steal my data? Can anyone manipulate my backups? Can attackers find my backups? Are admin accounts safe from compromise?
  • 11. Our Approach 11 Enterprise Data Protection M365 Protection Cloud Data Protection Safeguard your data so it can always be available for recovery • Immutable from the first copy • Append Only File System • Logical Air Gap – No Open Protocols • Encryption Everywhere • Zero Trust by Design (MFA) • Retention Locks and Two-Person Integrity Data Resilience Rubrik Data Production Major attack is now a recoverable event Logical airgap Production
  • 13. 13 Can I Monitor Data to Find the Biggest Risks? Was sensitive data affected by an attack? Are there indicators of compromise? Has there been unusual activity and what kinds? What files and applications were affected in an attack?
  • 14. 14 Sensitive Data Discovery Threat Hunting Ransomware Investigation Monitor data risks continuously and remediate threats quick • High Fidelity ML Model using Data Time-Series • Full data view User/App/Content over time • Anomaly and encryption detection vs baseline • Data Insights integrate into your SecOps tools Data Observability Our Approach
  • 16. 16 How Easy is it to Recover? How quickly can I recover after a massive attack? How do I get my most critical apps back immediately? How can I test that everything works? How do I know if malware is hiding, and can I isolate it? How do I plan for recovering an entire site?
  • 17. 17 Threat Containment Mass Recovery Quarantine malware and automate recovery so business operations can be restored quickly • In-Place Recovery-of only changes • Instant Recovery / Live Mount gracefully migrates back to production storage • Automated Orchestrated recovery of VMs (War Time for sub 10 min recovery) • Peace time isolated recovery testing for proactive testing • Surgical Recovery Malware Free “Last Known Good Copy” Data Recovery Our Approach Orchestrated App Recovery
  • 18. 18 Threat Containment Mass Recovery Orchestrated App Recovery Sensitive Data Discovery Threat Hunting Ransomware Investigation M365 Protection Cloud Data Protection Enterprise Data Protection Data Resilience Data Observability Data Recovery Data Security Command Center Detection and Analysis Containment Eradication and Recovery Preparation NIST Security Standards
  • 19. 19 Rubrik Keeps Your Data Secure and Recoverable Enterprise Cloud SaaS
  • 20. 20 Your data is defended against cyber threats Cyber threats are monitored continuously and analyzed quickly Your business operations are recovered within hours Data Recovery Data Resilience Data Observability Zero Trust Data Security
  • 21. Ransomware Recovery Warranty *Warranty provides payout of up to $5m, based on data protected by Rubrik. For recovery related expenses 21
  • 22. Furthest to the Right in Vision Strongest in Overall Strategy Five Years Running Widely recognized as leading innovator 22