SlideShare una empresa de Scribd logo
1 de 21
The current state of ransomware
76% of companies threatened admit to paying a ransom
!
200% increase in new ransomware variants
!
#1 cause of loss (at 51%) of total incident costs, followed by hacking
!
#1 AWS Recovery
$1.54 Million average (mean) ransom. Almost 2X the $812,380 of 2022
!
92% increase in policy premiums for cyber insurance since last year
!
236.7 Million ransomware attacks in the first half of 2022
!
Notable recent ransomware attacks
Minneapolis School District —March 2023
• After failing to pay $1 million to keep its information from being leaked, hackers posted online
sensitive data going back to 1995
• The event shut down many Minneapolis schools, but the school district downplayed it calling
it ‘an encryption event’ and not providing safety protocol in a timely manner (i.e. change
passwords, use multi-factor authentication, be vigilant of credit card purchases)
Although forced to disclose data breaches, companies and institutions often downplay them…
!
!
#1 AWS Recovery
Rackspace —December 2022
• The attack caused significant outages and disruptions for its Hosted Exchange services.
Beginning Dec. 2, customers were unable to access their mail services in what the cloud
service provider called a "security incident."
• Four days later, Rackspace confirmed the outages were caused by ransomware and began
migrating its Hosted Exchange customers to Microsoft 365.
• Rackspace declined to comment on whether it received or paid a ransom
To pay or not to pay the ransom?
MYTH: Paying ransom guarantees your data back
� Only 42% of companies report being able to fully
recover data after an attack
� Many times bad guys will attack a 2nd time knowing
they can extort another payment
TRUTH: The only guarantee of returning your data is to have a
reliable backup & recovery solution in place.
#1 AWS Recovery
The biggest cost isn’t the ransom
❌ Data damage
❌ Restoration of host systems and data
❌ Downtime due to attacks (no productivity/revenue)
❌ Forensic investigation
❌ Damage to the reputations of victims
Downtime creates loss of productivity of users and responders, exposure
of sensitive data, loss of revenue – current and future costs include:
*Loss of productivity & non-availability is the primary business impact of ransomware
#1 AWS Recovery
Ransomware-as-a-service
Most Popular: RaaS Affiliate Model
RaaS Operator (Seller) RaaS Affiliate (Buyer)
Recruits affiliates on forums Pays to use ransomware
Gives affiliates access to ransomware
through a ‘builder’
Targets victims
Sets up payment portal Sets ransomware demand
Assists with negotiations Communicates and negotiates with
victim
Wall of Shame: Manages dedicated leak
site
Manages decryption keys
❌ The RaaS market is competitive,
sophisticated, BIG, and growing.
❌ Low barrier of entry and versatile
models depending on profit sharing,
flat fees vs monthly subscriptions, etc.
Remote working
❌ Weaker controls on home IT
❌ Higher likelihood of users clicking on
ransomware lure
❌ Firms are negotiating and paying
ransom! This perpetuates and
encourages malicious attacks.
❌ Anonymity of cryptocurrency creates
minimal criminal traceability.
Easy money
#1 AWS Recovery
Why is ransomware surging?
“Ransomware-proofing” the Castle Analogy
Any single element does
not provide a complete
security solution against
ransomware.
Backup and DR is the
last line of defense.
Anti Malware/ Anti
Phishing
Email Filtering/Web
blocking
Software Updates &
Employee Training
Effective Backup
and DR
#1 AWS Recovery
#1 AWS Recovery
How ransomware works
Image source: https://blog.alta.org/2022/03/ransomware-101.html
Satisfy compliance
requirements
Protect
against bugs
Protect against
malicious attacks
Protect against
accidental deletion
Protect against
human error
Capture a
“Golden Copy”
Immutablity = unchanging over time
#1 AWS Recovery
Immutable backups —what are they?
✅Enabled by WORM-compliant data
storage (write once, read many)
✅This ensures that the backup copy
created is not altered or deleted
✅Configurable: A fixed retention period
is configured during which the data
stored in it remains locked
Write Once Read Many
#1 AWS Recovery
Immutable backups + the WORM model
Operational backup & disaster
recovery (DR) built for AWS.
Flexible policies —scheduling from
minutes to months.
Distributed as an AMI through AWS
Marketplace.
Near-zero RTO, recover in seconds
from any type of outage across AWS
regions and accounts.
N2WS #1 backup & recovery for AWS
User-friendly interface with
dashboards, monitoring, alerting,
reporting, and third-party integrations.
#1 AWS Recovery
• Founded in 2012 with a mission to simplify Backup
and Recovery for AWS
• Top rated on AWS Marketplace and AWS Premier
Partner
• Purpose-built for AWS & distributed via AWS
Marketplace
• Thousands of global clients, backing up hundreds of
thousands of EC2 instances
•Winner of 18+ industry awards
N2WS: A pioneer in data lifecycle
management on AWS
#1 AWS Recovery
✅For snapshots you’re uploading to S3 for long-term cost
savings, N2WS provides additional security protection
using S3 Object Lock
✅Retention settings are applied on the version level. Once
you create a bucket with S3 Object Lock, you can’t disable
Object Lock or Suspend Versioning for the bucket
✅Use Object Lock and N2WS to store to any S3 storage
class, including S3 Glacier
✅No additional cost —from N2WS v4.1
LONG-TERM Immutability
https://n2ws.com/blog/amazon-s3-object-lock-part-1 #1 AWS Recovery
Immutable S3 backup using object lock
✅Native snapshots by default cannot be
altered. But the risk of deletion remains.
✅For extra security on short-term, high
availability workloads, copy snapshots to
a DR account and do not give N2WS
permission to delete. If there is a
malicious attack or attempt, this will have
a faster RTO than S3.
✅Protect against BOTH region failure and
account compromise.
#1 AWS Recovery
Create a highly secure “snapshot vault”
SHORT-TERM, HIGHLY AVAILABLE
✅Test your recover operations. Execute
an ad hoc restore to specific points in
time with just a few clicks.
✅ Verify certain resource properties are
recovered (i.e. VPC, subnet, security
group, key pair, instance type)
✅Set recovery order – Determine the
order each target is recovered
✅Easily check issue via logs in the case
of a failed Recovery Scenario
#1 AWS Recovery
Disaster recovery drills & testing
https://aws.amazon.com/blogs/apn/how-to-orchestrate-and-test-recovery-scenarios-with-n2ws/
✅ Automatically copy to Azure blob
storage using Leases for Immutability
protection
✅ Ensures governments are prepared
for a multi-cloud future (new multi-
cloud compliance rules will soon
come into effect)
#1 AWS Recovery
Cloud-native, agentless cross-cloud DR
Available with N2WS Backup & Recovery 4.2
Modern ransomware attacks
disable known backup products
before encrypting data.
The infrastructure-as-a-service
(IaaS) model of N2WS eliminates
the attack surface.
#1 AWS Recovery
Total data sovereignty with N2WS
❌ The Problem ✅ The Solution
N2WS can restore itself
Even if your N2WS server becomes
compromised, N2WS can restore
itself from snapshots using metadata
that is automatically backed up.
Backups continue running
Backups can continue to run
even if N2WS Agent is disabled.
Even without an active Agent,
backups are fully restorable.
Backups are always restorable
N2WS backups can be restored —
even without N2WS— using EC2
console (for native snapshots)
Total data sovereignty with N2WS
Indestructible backups
Backups aren’t kept on any Windows/Linux
machine or network share —so an attacker
can’t destroy them.
#1 AWS Recovery
1 2
3 4
✅Setting up your S3 Buckets with Object Lock
✅Using N2WS Support for Object Lock
✅Using N2WS to create a highly secure
Snapshot Vault
#1 AWS Recovery
Let’s see this in action: live demo
We’ll walk through:
We’re top-rated on the AWS Marketplace and you can install
directly from there or Azure Marketplace.
You can also request a custom quote + plan directly from us.
Sign up for a full-featured 30-day FREE trial: get.n2ws.com/trial
#1 AWS Recovery
How to get started
Get it from
Questions?

Más contenido relacionado

La actualidad más candente

Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 
VMware vCloud and vRealize Operations
VMware vCloud and vRealize OperationsVMware vCloud and vRealize Operations
VMware vCloud and vRealize OperationsPedro Silva
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy☁ Hicham KADIRI ☁
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architectureAbdelghani Azri
 
IBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEIBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEsandipg123
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 
Introduction to Vault
Introduction to VaultIntroduction to Vault
Introduction to VaultKnoldus Inc.
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxPrince Joseph
 
Secure Spring Boot Microservices with Keycloak
Secure Spring Boot Microservices with KeycloakSecure Spring Boot Microservices with Keycloak
Secure Spring Boot Microservices with KeycloakRed Hat Developers
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting StartedTaswar Bhatti
 
Gravitee API Management - Ahmet AYDIN
 Gravitee API Management  -  Ahmet AYDIN Gravitee API Management  -  Ahmet AYDIN
Gravitee API Management - Ahmet AYDINkloia
 

La actualidad más candente (20)

Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Cloudhub and Mule
Cloudhub and MuleCloudhub and Mule
Cloudhub and Mule
 
Private cloud
Private cloudPrivate cloud
Private cloud
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
VMware vCloud and vRealize Operations
VMware vCloud and vRealize OperationsVMware vCloud and vRealize Operations
VMware vCloud and vRealize Operations
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
 
Containerization
ContainerizationContainerization
Containerization
 
IBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEIBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWE
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Introduction to Vault
Introduction to VaultIntroduction to Vault
Introduction to Vault
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
 
Secure Spring Boot Microservices with Keycloak
Secure Spring Boot Microservices with KeycloakSecure Spring Boot Microservices with Keycloak
Secure Spring Boot Microservices with Keycloak
 
Cloud computing What Why How
Cloud computing What Why HowCloud computing What Why How
Cloud computing What Why How
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Virtualization
Virtualization Virtualization
Virtualization
 
Gravitee API Management - Ahmet AYDIN
 Gravitee API Management  -  Ahmet AYDIN Gravitee API Management  -  Ahmet AYDIN
Gravitee API Management - Ahmet AYDIN
 

Similar a Immutable Backups Slides.pptx

How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudOK2OK
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...OK2OK
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOK2OK
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsOK2OK
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.pptArunKumbi1
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideHTS Hosting
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Simplified backup for Azure and AWS
Simplified backup for Azure and AWSSimplified backup for Azure and AWS
Simplified backup for Azure and AWSChris Bullock
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Jürgen Ambrosi
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicSagi Brody
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 

Similar a Immutable Backups Slides.pptx (20)

How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS Cloud
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS session
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.ppt
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Simplified backup for Azure and AWS
Simplified backup for Azure and AWSSimplified backup for Azure and AWS
Simplified backup for Azure and AWS
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable Epidemic
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 

Último

Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 

Último (20)

Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 

Immutable Backups Slides.pptx

  • 1.
  • 2. The current state of ransomware 76% of companies threatened admit to paying a ransom ! 200% increase in new ransomware variants ! #1 cause of loss (at 51%) of total incident costs, followed by hacking ! #1 AWS Recovery $1.54 Million average (mean) ransom. Almost 2X the $812,380 of 2022 ! 92% increase in policy premiums for cyber insurance since last year ! 236.7 Million ransomware attacks in the first half of 2022 !
  • 3. Notable recent ransomware attacks Minneapolis School District —March 2023 • After failing to pay $1 million to keep its information from being leaked, hackers posted online sensitive data going back to 1995 • The event shut down many Minneapolis schools, but the school district downplayed it calling it ‘an encryption event’ and not providing safety protocol in a timely manner (i.e. change passwords, use multi-factor authentication, be vigilant of credit card purchases) Although forced to disclose data breaches, companies and institutions often downplay them… ! ! #1 AWS Recovery Rackspace —December 2022 • The attack caused significant outages and disruptions for its Hosted Exchange services. Beginning Dec. 2, customers were unable to access their mail services in what the cloud service provider called a "security incident." • Four days later, Rackspace confirmed the outages were caused by ransomware and began migrating its Hosted Exchange customers to Microsoft 365. • Rackspace declined to comment on whether it received or paid a ransom
  • 4. To pay or not to pay the ransom? MYTH: Paying ransom guarantees your data back � Only 42% of companies report being able to fully recover data after an attack � Many times bad guys will attack a 2nd time knowing they can extort another payment TRUTH: The only guarantee of returning your data is to have a reliable backup & recovery solution in place. #1 AWS Recovery
  • 5. The biggest cost isn’t the ransom ❌ Data damage ❌ Restoration of host systems and data ❌ Downtime due to attacks (no productivity/revenue) ❌ Forensic investigation ❌ Damage to the reputations of victims Downtime creates loss of productivity of users and responders, exposure of sensitive data, loss of revenue – current and future costs include: *Loss of productivity & non-availability is the primary business impact of ransomware #1 AWS Recovery
  • 6. Ransomware-as-a-service Most Popular: RaaS Affiliate Model RaaS Operator (Seller) RaaS Affiliate (Buyer) Recruits affiliates on forums Pays to use ransomware Gives affiliates access to ransomware through a ‘builder’ Targets victims Sets up payment portal Sets ransomware demand Assists with negotiations Communicates and negotiates with victim Wall of Shame: Manages dedicated leak site Manages decryption keys ❌ The RaaS market is competitive, sophisticated, BIG, and growing. ❌ Low barrier of entry and versatile models depending on profit sharing, flat fees vs monthly subscriptions, etc. Remote working ❌ Weaker controls on home IT ❌ Higher likelihood of users clicking on ransomware lure ❌ Firms are negotiating and paying ransom! This perpetuates and encourages malicious attacks. ❌ Anonymity of cryptocurrency creates minimal criminal traceability. Easy money #1 AWS Recovery Why is ransomware surging?
  • 7. “Ransomware-proofing” the Castle Analogy Any single element does not provide a complete security solution against ransomware. Backup and DR is the last line of defense. Anti Malware/ Anti Phishing Email Filtering/Web blocking Software Updates & Employee Training Effective Backup and DR #1 AWS Recovery
  • 8. #1 AWS Recovery How ransomware works Image source: https://blog.alta.org/2022/03/ransomware-101.html
  • 9. Satisfy compliance requirements Protect against bugs Protect against malicious attacks Protect against accidental deletion Protect against human error Capture a “Golden Copy” Immutablity = unchanging over time #1 AWS Recovery Immutable backups —what are they?
  • 10. ✅Enabled by WORM-compliant data storage (write once, read many) ✅This ensures that the backup copy created is not altered or deleted ✅Configurable: A fixed retention period is configured during which the data stored in it remains locked Write Once Read Many #1 AWS Recovery Immutable backups + the WORM model
  • 11. Operational backup & disaster recovery (DR) built for AWS. Flexible policies —scheduling from minutes to months. Distributed as an AMI through AWS Marketplace. Near-zero RTO, recover in seconds from any type of outage across AWS regions and accounts. N2WS #1 backup & recovery for AWS User-friendly interface with dashboards, monitoring, alerting, reporting, and third-party integrations. #1 AWS Recovery
  • 12. • Founded in 2012 with a mission to simplify Backup and Recovery for AWS • Top rated on AWS Marketplace and AWS Premier Partner • Purpose-built for AWS & distributed via AWS Marketplace • Thousands of global clients, backing up hundreds of thousands of EC2 instances •Winner of 18+ industry awards N2WS: A pioneer in data lifecycle management on AWS #1 AWS Recovery
  • 13. ✅For snapshots you’re uploading to S3 for long-term cost savings, N2WS provides additional security protection using S3 Object Lock ✅Retention settings are applied on the version level. Once you create a bucket with S3 Object Lock, you can’t disable Object Lock or Suspend Versioning for the bucket ✅Use Object Lock and N2WS to store to any S3 storage class, including S3 Glacier ✅No additional cost —from N2WS v4.1 LONG-TERM Immutability https://n2ws.com/blog/amazon-s3-object-lock-part-1 #1 AWS Recovery Immutable S3 backup using object lock
  • 14. ✅Native snapshots by default cannot be altered. But the risk of deletion remains. ✅For extra security on short-term, high availability workloads, copy snapshots to a DR account and do not give N2WS permission to delete. If there is a malicious attack or attempt, this will have a faster RTO than S3. ✅Protect against BOTH region failure and account compromise. #1 AWS Recovery Create a highly secure “snapshot vault” SHORT-TERM, HIGHLY AVAILABLE
  • 15. ✅Test your recover operations. Execute an ad hoc restore to specific points in time with just a few clicks. ✅ Verify certain resource properties are recovered (i.e. VPC, subnet, security group, key pair, instance type) ✅Set recovery order – Determine the order each target is recovered ✅Easily check issue via logs in the case of a failed Recovery Scenario #1 AWS Recovery Disaster recovery drills & testing https://aws.amazon.com/blogs/apn/how-to-orchestrate-and-test-recovery-scenarios-with-n2ws/
  • 16. ✅ Automatically copy to Azure blob storage using Leases for Immutability protection ✅ Ensures governments are prepared for a multi-cloud future (new multi- cloud compliance rules will soon come into effect) #1 AWS Recovery Cloud-native, agentless cross-cloud DR Available with N2WS Backup & Recovery 4.2
  • 17. Modern ransomware attacks disable known backup products before encrypting data. The infrastructure-as-a-service (IaaS) model of N2WS eliminates the attack surface. #1 AWS Recovery Total data sovereignty with N2WS ❌ The Problem ✅ The Solution
  • 18. N2WS can restore itself Even if your N2WS server becomes compromised, N2WS can restore itself from snapshots using metadata that is automatically backed up. Backups continue running Backups can continue to run even if N2WS Agent is disabled. Even without an active Agent, backups are fully restorable. Backups are always restorable N2WS backups can be restored — even without N2WS— using EC2 console (for native snapshots) Total data sovereignty with N2WS Indestructible backups Backups aren’t kept on any Windows/Linux machine or network share —so an attacker can’t destroy them. #1 AWS Recovery 1 2 3 4
  • 19. ✅Setting up your S3 Buckets with Object Lock ✅Using N2WS Support for Object Lock ✅Using N2WS to create a highly secure Snapshot Vault #1 AWS Recovery Let’s see this in action: live demo We’ll walk through:
  • 20. We’re top-rated on the AWS Marketplace and you can install directly from there or Azure Marketplace. You can also request a custom quote + plan directly from us. Sign up for a full-featured 30-day FREE trial: get.n2ws.com/trial #1 AWS Recovery How to get started Get it from