Ransomware has not gone away. In fact, ransomware criminals have evolved their malware so they can encrypt more data before detection and increase the likelihood you will pay their ransom.
Thanks
I appreciate you joining today - Hope not to take too much of your time
As Kevin said my name is … and I am the Product Marketing Manager for Unitrends. - Burlington
Want to take the next 20 minutes or so sharing how you can shorten the time between disaster and recovery.
You may think you are protected but today even the shortest periods of downtime are expensive. Even if you believe you can provide your company uptime of 99% it can still cost you about $4M in costs and lost business – assuming average cost of downtime is $9K per minute
The whole reason for recovery technologies is to reduce the amount of enterprise downtime.
Even reducing the amount of downtime from 99.9% to 99.99% can save average enterprises over $4 million a year.
These numbers are what is driving the adoption of these new technologies.
Ransomware affects all industries but healthcare and financial the most.
We anticipate new, more powerful ransomware attacks in 2018
Introducing enhanced automated detection and recovery from ransomware
They don’t just ask for tiny amounts of money; it can be impactful
Kind of table stakes – works for backups as well
Follow best practices in protecting data.
3 copies, 2 formats 1 offsite
Backups are for more than just recovery – touch every aspect of the business
Looking for ways to use backups to increase productivity, eliminate downtime
This is best practices – spin up Tet Dev environment m- on the backup appliance, on a remote server or in the cloud.
Virus scans can sometimes suck up a lot of server capacity. Sometime certain production machines are too impacted to scan for viruses in production. Security Integrated CDM with Unitrends 10.1 allows you to perform this function against your backups.
ClamAV, an open source Linux antivirus software package is now included with 10.1 so you can add a security scan prior to bringing up a test dev environment.
And according to our expert speaker Tim as well as Gartner, Office 365 doesn't have native backup and flexible recovery capabilities for user data.
Rather, Office 365 relies on recycle bins and file version histories as recovery mechanisms, which is not true backup functionality. These tools have many limitations, making it difficult for organizations to rely on them to recover from serious internal and external attacks. Increase Recycle Bin retention levels may cause organizations to incur additional costs that blow their budgets.
As most employees primarily have access to Outlook, that is the data that they would delete
The basic data protection from Microsoft will not do it – employee deletes data and empties wastebasket – data gone. This is true for SharePoint and One Drive as well. Unitrends O365 protection allows infinite recovery so nothing is ever really deleted.
You should be able to do in 5 minutes what it might take 5 hours to do using Office 365 archiving tools. Plus, you need granular recovery - not just email but things like folders, calendars, contacts, - and broad levels of recovery - entire accounts
You need a 5 step program to fight against ransomware:
We all know protect and recover
Protect is to have a good virus scanner and educate your users not click on suspect docs
Recover is to have a backup solution as this is the only sure way to recover from an attack. Even paying is not really recovering as you then go on a short list of willing to pay targets
We are going to focus on three steps most organizations don’t consider – Secure, Test and Detect
Unitrends appliances are delivered in hardened Linux, not Windows
Windows targeted by ransomware – vast majority of targets – don’t have a windows-based ransomware solution
The difference is approach – Windows open , Linux closed
But the real difference is complexity of the solution
Complexity creates gaps that can be exploited by ransomware
Complex solutions invite infection
The first best practice – use a single vendor to handle your entire backup and recovery solution. A multi-vendor solution opens gaps that can be exploited y ransomware criminals. If you have two or more vendors you will be condemned to trying to figure out where your problem lies and which vendor to call for support.
A quick view of our offerings:
A Single fully integrated solution
If you tried to put together your own solution (that is what some vendors require you to do) it could require at least 9-10 components and then you would have tons of interoperability and support issues
The image is our Recovery Series all-in-one hardware backup and continuity appliance. We also have a software appliance call Unitrends Backup that can run on one of your servers and use your existing storage devices.
Unitrends appliances include software to fully integrate with our own cloud but we also work with hyperscale clouds such as AWS and Azure
The point…you need to know exactly when your last good recovery point
Sounds obvious
Ransomware makes it tricky
A formal report with detailed information can be used to for compliance reporting
Many of our Healthcare customers use the report for HIPAA compliance – to prove they have a recovery plan and can meet their forecasted recovery points and times.
As ransomware evolves, so do we
Newer versions encrypt more slowly – we catch it
Unitrends 10.1 includes the ability to quickly and accurately identify ransomware activity as part of every backup
In short a proactive approach will save you and minimize the impact of a ransomware event.
Check out ransomware success stories
We have some resources that might interest you if you want more information:
Take this 5 Minute DR Checkup to see how prepared you are for the future. You will see what others in the industry project as to the size and timing of a downtime event. You will also receive advice on how to reduce that impact and speed the time of your recovery. The tool also includes access to four calculators you can use to fine tune with your specific metrics and gain insights to your specific set of circumstances.
We have free trials of both our hardware and software backup and business continuity appliances. Go to our website and click on free-downloads.
We have demos and links to contact experts who can go deeper into the solutions I described for you today.
Now back to Kevin to host the Q & A portion of the webcast.