SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
The cost of doing nothing
Confidential2
The cost of
doing nothing
Confidential3
The Cost / Benefit analysis
Some IT investments are obvious, others are not
Servers
Automation Tech
Cloud
Backup and Recovery?
Confidential4
Each IT investment creates exponential risk
I N V E S T M E N T S
R I S K S
As a firms dependence on IT systems grow, so does their exposure
Servers &
Virtualization
expansion
Automation &
monitoring software
Use of cloud
technology
Virtual machine
sprawl & shorter
SLAs
System interdependence
assures more apps deemed
business or mission critical
Data moved off-site
increases exposure
Few privileged users
Used en mass and
on the go
Confidential5
Ransomware on the rise and costing millions
$488
per hour per physician when healthcare
data encryption impacts operations
(AC Group)
10x
Increase in number of attacks in the first 3
months of 2016 over total previous year
(NBCNews.)
84K
Amount a cybercriminal can earn per
month on a $6K investment in an exploit
kit (TrustWave Holdings)
$200M
Cost to victims in first 3 months of 2016
(NBCNews)
$18M
Amount paid to undo CryptoLock
encryption from April 2014 to June 2015
(FBI)
$325M
Amount Cryptowall 3.0 made from US
victims in 2015 alone (DarkReading)
8 of top 10
vulnerabilities used by exploit kits in
2015 were Flash related (DarkReading)
66%
of recipients open phishing messages
used to transmit ransomware and other
malware (LavaSoft)
30%
of ransomware victims pay to regain their
data (Trend Micro, Inc.)
Confidential6
C o n f i d e n t
23%
77%
Worried
Less than one quarter of IT groups feel very
confident they can meet business
expectations with current strategies.
V3 Research, 2016
Confidential7
Planning and funding backup and recovery
52%
19%
15%
8%
2%
Funding
Strategic plan & budget for entire company
Planned for/purchased by country/line-of-business
Planned for/purchased at a project level
Rely on recovery products bundled with the platforms
Other
Confidential8
New technology adds pressure
Mobile Apps Cloud Services Web Services Virtualization Sensors and
cameras
Robotics
Business- growth projects – local and company wide - increasingly falling to IT to implement
Confidential9
Putting more pressure on recovery SLAs
Server downtime SLAs - 66% of servers recover in 2hrs or less*
8x faster than just 5 years ago
*ESG data center modernization survey 2015
Confidential10
How quickly can you recover from a disaster?
5%
9%
35%
44%
7%
0%
Time
Within the day
Within the hour
Within 15 minutes
Within 5 minutes
Within the week
More than one week
Firms surveyed reported non-critical apps and files take longer
Confidential11
What issues have actually effected you recently
75%pointed to hardware failure as
something that had caused them
business harm
Loss of Internet
Loss of WAN connectivity
Accidental deletion of important data
Virus, Trojan or other malware
66%
58%
54%
53%
The need to recover previous document versions53%
Software bug/hang46%
The need to roll-back software updates, fix compatibility issues37%
Confidential12
identify the risks then quantify the cost of
doing nothing to mitigate against them
Turn the traditional
cost / benefit
approach on its head;
V3 Research, 2016
Confidential13
The cost of doing nothing justifies investment
A simple equation to start the discussion
+
Determine an event
you will simulate
Determine the
number of users
effected
Time it will take to
recover fully
=
The potential loss to
the firm for failure
Confidential14
How much have
you budgeted for
data loss in 2016
Confidential16
Quest Data Protection Portfolio
Everything faster — from client to cloud
17
Result: Everything Faster. Client to Cloud.
Quest Data Protection: Our approach vs. theirs
Their solution
- Leaves you with legacy code and bolt-on
modules or point solutions that add
complexity and expense.
It’s time to:
Optimize your application experience
• Get your data back in < 15 minutes
Automate processes
• Make your staff more productive
Modernize for the cloud
• Take backup to the cloud
Enable a data-driven business
• Always on and utilizing your data to meet
business needs
Our approach
+ Be more productive while working the
same (or fewer) hours.
+ Increase time spent on innovation
and win.
+ Prepares you for the digital initiative.
vs.
18
Our approach
• Leverage the proven features of AppAssure and
other leading Dell IP to eliminate downtime.
• Optimized user application experience
• Simplified backup & recovery
• Ability to meet multiple and aggressive SLAs
• Reduced complexity in a hybrid world
• Reduced CAPEX and OPEX by off-siting DR
Quest Data Protection | Rapid Recovery
ZeroIMPACT recovery – anything to anywhere
Protect
Recover entire systems, apps, and data
in < 15 minutes
Users
Ensure zero impact on users by
presenting them with the data they
request instantly, during restores, as if
the outage never happened
Applications
Assure system, application and data
availability everywhere: physical, virtual,
and cloud. Result: Instant recovery for the cloud era
19
Use case | Rapid Recovery
Restore data to virtually any protected platform
Identical
hardware
Cloud
Bare Metal
Restore
Dissimilar
hardware
Virtual
Server
AppAssure
Core
Transform data protection with Universal
Recovery
Restore data flexibly to virtually any platform
regardless of original configuration
For example, administrators can restore protected
physical servers to virtual machines & vice-versa
20
Quest Data Protection | DL Appliance
The power of Rapid Recovery in an easy-to-use appliance.
Integrated
Delivered as integrated appliance
optimized for SMBs and MSPs
Optimized
20 minutes from box to backup,
manage, restore, replicate & archive
from one device
Cloud-Ready
Native cloud support for Microsoft Azure,
Amazon S3, Rackspace, or any
OpenStack provider
Result: Safeguard and quickly recover your data
and applications from unexpected failures.
Our approach
Agentless protection for demanding and dynamic
VMware or Hyper-V environments.
• Remove sizing guesswork with all-inclusive
capacity-based licensing for agents and options.
• In-box upgrades to add capacity in easy, cost-
effective way
• Turn-key with wizard-driven configuration
21
Use case | DL Appliance
Full image in the cloud. Restore servers and users fast
Bring up infrastructure-mission critical servers and
applications - in a virtual cloud environment on an
emergency or as needed basis
1. Full recovery of server and workstation images to physical or
virtual environments including dissimilar hardware
2. Optimized for Windows VMs that manage large quantities of
data
3. Automated systems for provisioning, monitoring, data lifecycle
management, data integrity assurance, software
maintenance,
Full Image replicated to cloud
Users
Effective and Affordable DRaaS
Manage Services Provider
Restore servers or users anywhere including
dissimilar hardware
Dissimilar
hardware
22
Management is more than just Monitoring
Availability is more than just Backup
Foglight & Rapid Recovery – The winning combination
Re-calibrate under and over
allocated virtual resources –
automatically.
TuneInvestigate
Pinpoint performance or
capacity problems in seconds
whether you have 100 or
100,000 virtual machines
See how many resources you
have left and forecast the
impact of future workloads.
Plan
Visualize your enterprise with
a single-pane-of-glass view
into your virtual, physical and
application layers.
Monitor
Recover systems, apps and data in under
15 minutes
Ensure zero impact on users
Assure system, application&
data availability everywhere
Protect
Everything
faster — from
client to cloud
Data Protection
23
vManagement: for virtual environments
Management is more than just Monitoring
Availability is more than just Backup
INVESTIGATE
PLAN
TUNE
PROTECT
PROTECT
PROTECT
PROTECT
MONITOR
Watch the On Demand Webcast
here: http://ow.ly/bMLJ30fMtNQ
Thank You

Contenu connexe

Tendances

Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions ErnestStaats
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware EventArt Ocain
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeCristian Garcia G.
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksAPNIC
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Fidelis Cybersecurity
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallAlienVault
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseRahul Neel Mani
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureFidelis Cybersecurity
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Huntsman Security
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration Fidelis Cybersecurity
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSFidelis Cybersecurity
 

Tendances (20)

Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 

Similaire à The Cost of Doing Nothing: A Ransomware Backup Story

Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryMark McHenry
 
The Data lake hidden in your backups - Big Data Expo 2019
The Data lake hidden in your backups - Big Data Expo 2019The Data lake hidden in your backups - Big Data Expo 2019
The Data lake hidden in your backups - Big Data Expo 2019webwinkelvakdag
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...iland Cloud
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
RapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale
 
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudPart 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudCloudera, Inc.
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM Events
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsPaula Koziol
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
 
Cloud Migration.pdf
Cloud Migration.pdfCloud Migration.pdf
Cloud Migration.pdfZen Bit Tech
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
 

Similaire à The Cost of Doing Nothing: A Ransomware Backup Story (20)

Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
The Data lake hidden in your backups - Big Data Expo 2019
The Data lake hidden in your backups - Big Data Expo 2019The Data lake hidden in your backups - Big Data Expo 2019
The Data lake hidden in your backups - Big Data Expo 2019
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
RapidScale CloudRecovery
RapidScale CloudRecoveryRapidScale CloudRecovery
RapidScale CloudRecovery
 
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudPart 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
Cloud computing whitepaper(2)
Cloud computing whitepaper(2)Cloud computing whitepaper(2)
Cloud computing whitepaper(2)
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Cloud Migration.pdf
Cloud Migration.pdfCloud Migration.pdf
Cloud Migration.pdf
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 

Plus de Quest

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioQuest
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?Quest
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowQuest
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededQuest
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongQuest
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update ManagementQuest
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Quest
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingQuest
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Quest
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutQuest
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTQuest
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Quest
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemQuest
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemQuest
 

Plus de Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 

Dernier

Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Dernier (20)

Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

The Cost of Doing Nothing: A Ransomware Backup Story

  • 1. The cost of doing nothing
  • 3. Confidential3 The Cost / Benefit analysis Some IT investments are obvious, others are not Servers Automation Tech Cloud Backup and Recovery?
  • 4. Confidential4 Each IT investment creates exponential risk I N V E S T M E N T S R I S K S As a firms dependence on IT systems grow, so does their exposure Servers & Virtualization expansion Automation & monitoring software Use of cloud technology Virtual machine sprawl & shorter SLAs System interdependence assures more apps deemed business or mission critical Data moved off-site increases exposure Few privileged users Used en mass and on the go
  • 5. Confidential5 Ransomware on the rise and costing millions $488 per hour per physician when healthcare data encryption impacts operations (AC Group) 10x Increase in number of attacks in the first 3 months of 2016 over total previous year (NBCNews.) 84K Amount a cybercriminal can earn per month on a $6K investment in an exploit kit (TrustWave Holdings) $200M Cost to victims in first 3 months of 2016 (NBCNews) $18M Amount paid to undo CryptoLock encryption from April 2014 to June 2015 (FBI) $325M Amount Cryptowall 3.0 made from US victims in 2015 alone (DarkReading) 8 of top 10 vulnerabilities used by exploit kits in 2015 were Flash related (DarkReading) 66% of recipients open phishing messages used to transmit ransomware and other malware (LavaSoft) 30% of ransomware victims pay to regain their data (Trend Micro, Inc.)
  • 6. Confidential6 C o n f i d e n t 23% 77% Worried Less than one quarter of IT groups feel very confident they can meet business expectations with current strategies. V3 Research, 2016
  • 7. Confidential7 Planning and funding backup and recovery 52% 19% 15% 8% 2% Funding Strategic plan & budget for entire company Planned for/purchased by country/line-of-business Planned for/purchased at a project level Rely on recovery products bundled with the platforms Other
  • 8. Confidential8 New technology adds pressure Mobile Apps Cloud Services Web Services Virtualization Sensors and cameras Robotics Business- growth projects – local and company wide - increasingly falling to IT to implement
  • 9. Confidential9 Putting more pressure on recovery SLAs Server downtime SLAs - 66% of servers recover in 2hrs or less* 8x faster than just 5 years ago *ESG data center modernization survey 2015
  • 10. Confidential10 How quickly can you recover from a disaster? 5% 9% 35% 44% 7% 0% Time Within the day Within the hour Within 15 minutes Within 5 minutes Within the week More than one week Firms surveyed reported non-critical apps and files take longer
  • 11. Confidential11 What issues have actually effected you recently 75%pointed to hardware failure as something that had caused them business harm Loss of Internet Loss of WAN connectivity Accidental deletion of important data Virus, Trojan or other malware 66% 58% 54% 53% The need to recover previous document versions53% Software bug/hang46% The need to roll-back software updates, fix compatibility issues37%
  • 12. Confidential12 identify the risks then quantify the cost of doing nothing to mitigate against them Turn the traditional cost / benefit approach on its head; V3 Research, 2016
  • 13. Confidential13 The cost of doing nothing justifies investment A simple equation to start the discussion + Determine an event you will simulate Determine the number of users effected Time it will take to recover fully = The potential loss to the firm for failure
  • 14. Confidential14 How much have you budgeted for data loss in 2016
  • 15. Confidential16 Quest Data Protection Portfolio Everything faster — from client to cloud
  • 16. 17 Result: Everything Faster. Client to Cloud. Quest Data Protection: Our approach vs. theirs Their solution - Leaves you with legacy code and bolt-on modules or point solutions that add complexity and expense. It’s time to: Optimize your application experience • Get your data back in < 15 minutes Automate processes • Make your staff more productive Modernize for the cloud • Take backup to the cloud Enable a data-driven business • Always on and utilizing your data to meet business needs Our approach + Be more productive while working the same (or fewer) hours. + Increase time spent on innovation and win. + Prepares you for the digital initiative. vs.
  • 17. 18 Our approach • Leverage the proven features of AppAssure and other leading Dell IP to eliminate downtime. • Optimized user application experience • Simplified backup & recovery • Ability to meet multiple and aggressive SLAs • Reduced complexity in a hybrid world • Reduced CAPEX and OPEX by off-siting DR Quest Data Protection | Rapid Recovery ZeroIMPACT recovery – anything to anywhere Protect Recover entire systems, apps, and data in < 15 minutes Users Ensure zero impact on users by presenting them with the data they request instantly, during restores, as if the outage never happened Applications Assure system, application and data availability everywhere: physical, virtual, and cloud. Result: Instant recovery for the cloud era
  • 18. 19 Use case | Rapid Recovery Restore data to virtually any protected platform Identical hardware Cloud Bare Metal Restore Dissimilar hardware Virtual Server AppAssure Core Transform data protection with Universal Recovery Restore data flexibly to virtually any platform regardless of original configuration For example, administrators can restore protected physical servers to virtual machines & vice-versa
  • 19. 20 Quest Data Protection | DL Appliance The power of Rapid Recovery in an easy-to-use appliance. Integrated Delivered as integrated appliance optimized for SMBs and MSPs Optimized 20 minutes from box to backup, manage, restore, replicate & archive from one device Cloud-Ready Native cloud support for Microsoft Azure, Amazon S3, Rackspace, or any OpenStack provider Result: Safeguard and quickly recover your data and applications from unexpected failures. Our approach Agentless protection for demanding and dynamic VMware or Hyper-V environments. • Remove sizing guesswork with all-inclusive capacity-based licensing for agents and options. • In-box upgrades to add capacity in easy, cost- effective way • Turn-key with wizard-driven configuration
  • 20. 21 Use case | DL Appliance Full image in the cloud. Restore servers and users fast Bring up infrastructure-mission critical servers and applications - in a virtual cloud environment on an emergency or as needed basis 1. Full recovery of server and workstation images to physical or virtual environments including dissimilar hardware 2. Optimized for Windows VMs that manage large quantities of data 3. Automated systems for provisioning, monitoring, data lifecycle management, data integrity assurance, software maintenance, Full Image replicated to cloud Users Effective and Affordable DRaaS Manage Services Provider Restore servers or users anywhere including dissimilar hardware Dissimilar hardware
  • 21. 22 Management is more than just Monitoring Availability is more than just Backup Foglight & Rapid Recovery – The winning combination Re-calibrate under and over allocated virtual resources – automatically. TuneInvestigate Pinpoint performance or capacity problems in seconds whether you have 100 or 100,000 virtual machines See how many resources you have left and forecast the impact of future workloads. Plan Visualize your enterprise with a single-pane-of-glass view into your virtual, physical and application layers. Monitor Recover systems, apps and data in under 15 minutes Ensure zero impact on users Assure system, application& data availability everywhere Protect Everything faster — from client to cloud Data Protection
  • 22. 23 vManagement: for virtual environments Management is more than just Monitoring Availability is more than just Backup INVESTIGATE PLAN TUNE PROTECT PROTECT PROTECT PROTECT MONITOR
  • 23. Watch the On Demand Webcast here: http://ow.ly/bMLJ30fMtNQ