is your use of windows backup opening the door to hackers?

Post on 13-Apr-2017

4 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2017 Unitrends 1#1All-in-One EnterpriseBackup and Continuity

Is Your Use of Windows-based Backup Opening the Door to Hackers?

Joe Noonan, VP Product Marketing

© 2017 Unitrends 2

New threats are prevailing!

http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware

© 2017 Unitrends 3

50% of business attacks paid more than $10,000

20% paid more than $40,000

© 2017 Unitrends 4

Downtime can be more costly!

$700B lost in 2016

© 2017 Unitrends 5

"To be honest, we often advise people just to pay the ransom [if they don’t have backups]."  Joseph Bonavolonta, Asst. Special Agent, FBI Cybercrime Boston Division

© 2017 Unitrends 6

Protect Secure Test Detect Recover

5 Ways The Right Backup Solution Fights Ransomware

New!

Often ignore

d!

Over-looked

!

© 2017 Unitrends 7

Can a backup solution be a gateway for Ransomware and other forms of malware?

© 2017 Unitrends 8

Protect Secure Test Detect Recover

Yes, certain backup architectures can lead to backup systems being infected at a much higher probability.

Over-looked

!

© 2017 Unitrends 9

Highly targeted Windows-based software

Management complexity Backup Server / Media Server Backup Proxies Backup Repositories Dedicated WAN Accelerators Dedicated Management Servers Dedicated Monitoring & Reporting Servers

What Makes a Backup Architecture Less Secure?

© 2017 Unitrends 10

Secure: The New World Approach

Hardened, Linux Backup Appliances

vs.Targeted, Susceptible

Windows Software

© 2017 Unitrends 11

Less targeted by Ransomware hackers Hardened: Only turn on what’s need for

backup and continuity All-in-One Simplicity; Integrated Security

Backup Server / Media Server Backup Proxies Backup Repositories Dedicated WAN Accelerators Dedicated Management Servers Dedicated Monitoring & Reporting Servers

What Makes a Linux Backup Appliance More Secure?

© 2017 Unitrends 12

What else is important to beat a Ransomware attack?

© 2017 Unitrends 13

A Known Good Backup!

© 2017 Unitrends 14

Protect Secure Test Detect Recover

5 Ways The Right Backup Solution Fights Ransomware

Often ignore

d!

© 2017 Unitrends 15

The need for confidence is pushing a new trend: IT Resilience

© 2017 Unitrends 16

Improved IT serviceability, recovery and integrity

Application focused: Virtual, physical and cloud workloads

What is “IT Resilience?”

© 2017 Unitrends 17

GitLab: Failure to assure recovery leads to more downtime

© 2017 Unitrends 18

Another example…

© 2017 Unitrends 19

How do I achieve IT Resilience?

© 2017 Unitrends 20

Advanced Testing and Reporting Automation

Old World• Praying that backups recovered successfully• Scrambling during DR exercises• Rarely, if ever, testing DR• Spending hours creating manual DR reports

New World• Fully automated, application-level testing and failover• Proactively uncover recovery issues for physical &

virtual• Business-level DR compliance report automation• Available for local, DR site, and Unitrends Cloud

© 2017 Unitrends 21

Boot order sequencing for N-tier applications

What automation technology is required?

© 2017 Unitrends 22

Application-specific integrity verification

What automation technology is required?

*Not a complete list!

© 2017 Unitrends 23

Network automation to isolate from production Virtual network assignment Network remodeling Re-IP

What automation technology is required?

© 2017 Unitrends 24

Compliance reporting for business stakeholders

What automation technology is required?

© 2017 Unitrends 25

Protect Secure Test Detect Recover

Even More Advanced Solutions Are Available!

New!

© 2017 Unitrends 26

• Uses adaptive & predictive analytics against backup data

Designed to search for ransomware threat conditions

Proactive alerts are sent when ransomware conditions are detected

Proactive Ransomware Detection

© 2017 Unitrends 27

“The appliances and services are stable and reliable. Our Unitrends appliance literally paid for itself after being able to restore the 2 million+ files affected by ransomware earlier this year. “– Exco Engineering

What Customers Are Saying…

© 2016 Unitrends 28

Unitrends TopicPresentation Name | Date 2016

Thanks…can you repeat all that?

© 2017 Unitrends 29

Windows is highly targeted

Vendors using complex architectures make it even more difficult for you to manage risk

Hardened, Linux appliances with advanced automation and detection are proving more successful at beating Ransomware

Summary: Does Windows Backup Open the Door?

© 2016 Unitrends 30

Call to Action– Visit www.Unitrends.com

Try Unitrends – with our v9.2 with Ransomware DetectionDownload at http://www.unitrends.com/landing/unitrends-backup-9-2Limited Availability! Get a free T-Shirt designed by Stephen BlissWatch a Live Demo Register at http://www.unitrends.com/company/events/live-demos

Talk With One of Our Continuity ExpertsGet immediate assistance: http://www.unitrends.com/company/contact

top related