is your use of windows backup opening the door to hackers?

30
© 2017 Unitrends 1 #1 All-in-One Enterpris Backup and Continuit Is Your Use of Windows-based Backup Opening the Door to Hackers? Joe Noonan, VP Product Marketing

Upload: marketingunitrends

Post on 13-Apr-2017

4 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 1#1All-in-One EnterpriseBackup and Continuity

Is Your Use of Windows-based Backup Opening the Door to Hackers?

Joe Noonan, VP Product Marketing

Page 2: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 2

New threats are prevailing!

http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware

Page 3: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 3

50% of business attacks paid more than $10,000

20% paid more than $40,000

Page 4: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 4

Downtime can be more costly!

$700B lost in 2016

Page 5: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 5

"To be honest, we often advise people just to pay the ransom [if they don’t have backups]."  Joseph Bonavolonta, Asst. Special Agent, FBI Cybercrime Boston Division

Page 6: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 6

Protect Secure Test Detect Recover

5 Ways The Right Backup Solution Fights Ransomware

New!

Often ignore

d!

Over-looked

!

Page 7: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 7

Can a backup solution be a gateway for Ransomware and other forms of malware?

Page 8: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 8

Protect Secure Test Detect Recover

Yes, certain backup architectures can lead to backup systems being infected at a much higher probability.

Over-looked

!

Page 9: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 9

Highly targeted Windows-based software

Management complexity Backup Server / Media Server Backup Proxies Backup Repositories Dedicated WAN Accelerators Dedicated Management Servers Dedicated Monitoring & Reporting Servers

What Makes a Backup Architecture Less Secure?

Page 10: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 10

Secure: The New World Approach

Hardened, Linux Backup Appliances

vs.Targeted, Susceptible

Windows Software

Page 11: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 11

Less targeted by Ransomware hackers Hardened: Only turn on what’s need for

backup and continuity All-in-One Simplicity; Integrated Security

Backup Server / Media Server Backup Proxies Backup Repositories Dedicated WAN Accelerators Dedicated Management Servers Dedicated Monitoring & Reporting Servers

What Makes a Linux Backup Appliance More Secure?

Page 12: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 12

What else is important to beat a Ransomware attack?

Page 13: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 13

A Known Good Backup!

Page 14: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 14

Protect Secure Test Detect Recover

5 Ways The Right Backup Solution Fights Ransomware

Often ignore

d!

Page 15: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 15

The need for confidence is pushing a new trend: IT Resilience

Page 16: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 16

Improved IT serviceability, recovery and integrity

Application focused: Virtual, physical and cloud workloads

What is “IT Resilience?”

Page 17: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 17

GitLab: Failure to assure recovery leads to more downtime

Page 18: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 18

Another example…

Page 19: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 19

How do I achieve IT Resilience?

Page 20: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 20

Advanced Testing and Reporting Automation

Old World• Praying that backups recovered successfully• Scrambling during DR exercises• Rarely, if ever, testing DR• Spending hours creating manual DR reports

New World• Fully automated, application-level testing and failover• Proactively uncover recovery issues for physical &

virtual• Business-level DR compliance report automation• Available for local, DR site, and Unitrends Cloud

Page 21: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 21

Boot order sequencing for N-tier applications

What automation technology is required?

Page 22: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 22

Application-specific integrity verification

What automation technology is required?

*Not a complete list!

Page 23: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 23

Network automation to isolate from production Virtual network assignment Network remodeling Re-IP

What automation technology is required?

Page 24: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 24

Compliance reporting for business stakeholders

What automation technology is required?

Page 25: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 25

Protect Secure Test Detect Recover

Even More Advanced Solutions Are Available!

New!

Page 26: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 26

• Uses adaptive & predictive analytics against backup data

Designed to search for ransomware threat conditions

Proactive alerts are sent when ransomware conditions are detected

Proactive Ransomware Detection

Page 27: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 27

“The appliances and services are stable and reliable. Our Unitrends appliance literally paid for itself after being able to restore the 2 million+ files affected by ransomware earlier this year. “– Exco Engineering

What Customers Are Saying…

Page 28: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2016 Unitrends 28

Unitrends TopicPresentation Name | Date 2016

Thanks…can you repeat all that?

Page 29: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2017 Unitrends 29

Windows is highly targeted

Vendors using complex architectures make it even more difficult for you to manage risk

Hardened, Linux appliances with advanced automation and detection are proving more successful at beating Ransomware

Summary: Does Windows Backup Open the Door?

Page 30: Is Your Use of Windows Backup Opening the Door to Hackers?

© 2016 Unitrends 30

Call to Action– Visit www.Unitrends.com

Try Unitrends – with our v9.2 with Ransomware DetectionDownload at http://www.unitrends.com/landing/unitrends-backup-9-2Limited Availability! Get a free T-Shirt designed by Stephen BlissWatch a Live Demo Register at http://www.unitrends.com/company/events/live-demos

Talk With One of Our Continuity ExpertsGet immediate assistance: http://www.unitrends.com/company/contact