This on-demand webcast shows you how you shield your organization from such attacks – as well as how to respond if ransomware does penetrate your organization. Baseline Technologies’ Mike Crowley gives you the inside track on how ransomware works and how to lower your risk of ransomware attacks.
3. Confidential3
The Cost / Benefit analysis
Some IT investments are obvious, others are not
Servers
Automation Tech
Cloud
Backup and Recovery?
4. Confidential4
Each IT investment creates exponential risk
I N V E S T M E N T S
R I S K S
As a firms dependence on IT systems grow, so does their exposure
Servers &
Virtualization
expansion
Automation &
monitoring software
Use of cloud
technology
Virtual machine
sprawl & shorter
SLAs
System interdependence
assures more apps deemed
business or mission critical
Data moved off-site
increases exposure
Few privileged users
Used en mass and
on the go
5. Confidential5
Ransomware on the rise and costing millions
$488
per hour per physician when healthcare
data encryption impacts operations
(AC Group)
10x
Increase in number of attacks in the first 3
months of 2016 over total previous year
(NBCNews.)
84K
Amount a cybercriminal can earn per
month on a $6K investment in an exploit
kit (TrustWave Holdings)
$200M
Cost to victims in first 3 months of 2016
(NBCNews)
$18M
Amount paid to undo CryptoLock
encryption from April 2014 to June 2015
(FBI)
$325M
Amount Cryptowall 3.0 made from US
victims in 2015 alone (DarkReading)
8 of top 10
vulnerabilities used by exploit kits in
2015 were Flash related (DarkReading)
66%
of recipients open phishing messages
used to transmit ransomware and other
malware (LavaSoft)
30%
of ransomware victims pay to regain their
data (Trend Micro, Inc.)
6. Confidential6
C o n f i d e n t
23%
77%
Worried
Less than one quarter of IT groups feel very
confident they can meet business
expectations with current strategies.
V3 Research, 2016
7. Confidential7
Planning and funding backup and recovery
52%
19%
15%
8%
2%
Funding
Strategic plan & budget for entire company
Planned for/purchased by country/line-of-business
Planned for/purchased at a project level
Rely on recovery products bundled with the platforms
Other
8. Confidential8
New technology adds pressure
Mobile Apps Cloud Services Web Services Virtualization Sensors and
cameras
Robotics
Business- growth projects – local and company wide - increasingly falling to IT to implement
9. Confidential9
Putting more pressure on recovery SLAs
Server downtime SLAs - 66% of servers recover in 2hrs or less*
8x faster than just 5 years ago
*ESG data center modernization survey 2015
10. Confidential10
How quickly can you recover from a disaster?
5%
9%
35%
44%
7%
0%
Time
Within the day
Within the hour
Within 15 minutes
Within 5 minutes
Within the week
More than one week
Firms surveyed reported non-critical apps and files take longer
11. Confidential11
What issues have actually effected you recently
75%pointed to hardware failure as
something that had caused them
business harm
Loss of Internet
Loss of WAN connectivity
Accidental deletion of important data
Virus, Trojan or other malware
66%
58%
54%
53%
The need to recover previous document versions53%
Software bug/hang46%
The need to roll-back software updates, fix compatibility issues37%
12. Confidential12
identify the risks then quantify the cost of
doing nothing to mitigate against them
Turn the traditional
cost / benefit
approach on its head;
V3 Research, 2016
13. Confidential13
The cost of doing nothing justifies investment
A simple equation to start the discussion
+
Determine an event
you will simulate
Determine the
number of users
effected
Time it will take to
recover fully
=
The potential loss to
the firm for failure
16. 17
Result: Everything Faster. Client to Cloud.
Quest Data Protection: Our approach vs. theirs
Their solution
- Leaves you with legacy code and bolt-on
modules or point solutions that add
complexity and expense.
It’s time to:
Optimize your application experience
• Get your data back in < 15 minutes
Automate processes
• Make your staff more productive
Modernize for the cloud
• Take backup to the cloud
Enable a data-driven business
• Always on and utilizing your data to meet
business needs
Our approach
+ Be more productive while working the
same (or fewer) hours.
+ Increase time spent on innovation
and win.
+ Prepares you for the digital initiative.
vs.
17. 18
Our approach
• Leverage the proven features of AppAssure and
other leading Dell IP to eliminate downtime.
• Optimized user application experience
• Simplified backup & recovery
• Ability to meet multiple and aggressive SLAs
• Reduced complexity in a hybrid world
• Reduced CAPEX and OPEX by off-siting DR
Quest Data Protection | Rapid Recovery
ZeroIMPACT recovery – anything to anywhere
Protect
Recover entire systems, apps, and data
in < 15 minutes
Users
Ensure zero impact on users by
presenting them with the data they
request instantly, during restores, as if
the outage never happened
Applications
Assure system, application and data
availability everywhere: physical, virtual,
and cloud. Result: Instant recovery for the cloud era
18. 19
Use case | Rapid Recovery
Restore data to virtually any protected platform
Identical
hardware
Cloud
Bare Metal
Restore
Dissimilar
hardware
Virtual
Server
AppAssure
Core
Transform data protection with Universal
Recovery
Restore data flexibly to virtually any platform
regardless of original configuration
For example, administrators can restore protected
physical servers to virtual machines & vice-versa
19. 20
Quest Data Protection | DL Appliance
The power of Rapid Recovery in an easy-to-use appliance.
Integrated
Delivered as integrated appliance
optimized for SMBs and MSPs
Optimized
20 minutes from box to backup,
manage, restore, replicate & archive
from one device
Cloud-Ready
Native cloud support for Microsoft Azure,
Amazon S3, Rackspace, or any
OpenStack provider
Result: Safeguard and quickly recover your data
and applications from unexpected failures.
Our approach
Agentless protection for demanding and dynamic
VMware or Hyper-V environments.
• Remove sizing guesswork with all-inclusive
capacity-based licensing for agents and options.
• In-box upgrades to add capacity in easy, cost-
effective way
• Turn-key with wizard-driven configuration
20. 21
Use case | DL Appliance
Full image in the cloud. Restore servers and users fast
Bring up infrastructure-mission critical servers and
applications - in a virtual cloud environment on an
emergency or as needed basis
1. Full recovery of server and workstation images to physical or
virtual environments including dissimilar hardware
2. Optimized for Windows VMs that manage large quantities of
data
3. Automated systems for provisioning, monitoring, data lifecycle
management, data integrity assurance, software
maintenance,
Full Image replicated to cloud
Users
Effective and Affordable DRaaS
Manage Services Provider
Restore servers or users anywhere including
dissimilar hardware
Dissimilar
hardware
21. 22
Management is more than just Monitoring
Availability is more than just Backup
Foglight & Rapid Recovery – The winning combination
Re-calibrate under and over
allocated virtual resources –
automatically.
TuneInvestigate
Pinpoint performance or
capacity problems in seconds
whether you have 100 or
100,000 virtual machines
See how many resources you
have left and forecast the
impact of future workloads.
Plan
Visualize your enterprise with
a single-pane-of-glass view
into your virtual, physical and
application layers.
Monitor
Recover systems, apps and data in under
15 minutes
Ensure zero impact on users
Assure system, application&
data availability everywhere
Protect
Everything
faster — from
client to cloud
Data Protection
22. 23
vManagement: for virtual environments
Management is more than just Monitoring
Availability is more than just Backup
INVESTIGATE
PLAN
TUNE
PROTECT
PROTECT
PROTECT
PROTECT
MONITOR
23. Watch the On Demand Webcast
here: http://ow.ly/bMLJ30fMtNQ