SlideShare a Scribd company logo
1 of 35
Download to read offline
© 2016 Unitrends 1
Uni*
r
Take the Ransom Out of Ransomware
© 2016 Unitrends 2
© 2016 Unitrends 3
"To be honest, we often advise people just to pay the ransom."
Joseph Bonavolonta,Asst. Special Agent, FBI Cybercrime Boston Division
© 2016 Unitrends 4
What is Ransomware?
© 2016 Unitrends 5
 Encrypts victims files with strong
unbreakable encryption
 Demands payment for private
key to unlock data
 Payment typically around $200
to $500 in bitcoins
Ransomware Malware
© 2016 Unitrends 6
 Ransomware is not new
 Recent advances have made it a much larger risk
 Early ransomware was “scareware” and “nagware”
 Didn’t permanently lock files.
 Was easily removed or avoided
 Criminals had difficulty in collecting fees anonymously
 Hacker community not as organized
Long History of Ransomware
© 2016 Unitrends 7
A Growing Menace
© 2016 Unitrends 8
 Cryptolocker
 TorrentLocker
 CryptoWall
 CBT-Locker
 TeslaCrypt
 Locky
 Etc.
Many Variations and Copycats
© 2016 Unitrends 9
Popular Tools of RansomwareVariants
Anonymity Online
Electronic Payment
Unbreakable Encryption
• AES
• RSA
• “Curve” ECC
Network to C&C Server
• Tor
• I2P
• POST/HTTPS
• Hardcoded URLs
© 2016 Unitrends 10
Requires both Public and PrivateKey
© 2016 Unitrends 11
 Spam Email Campaigns
 CBT Locker & Torrent Locker
preferred vector
 Requires interaction from user
 Can affect fully patched systems
 Exploit Kits
 CryptoWall and TelsaCrypt
preferred vector
 Does not require any interaction
 Uses vulnerable installed software
Infection Vectors
BOTH ARE HIGHLY EFFECTIVE WAYS INTO YOUR SYSTEMS
© 2016 Unitrends 12
Get 1 Free
Macs
vulnerable
Voice Enabled
Highly
Localized
Ransomware Continuing to Advance
© 2016 Unitrends 13
How does an enterprise make
sure they never have to pay?
© 2016 Unitrends 14
Play Defense
Play Offense
Don’t forget about your backup players
© 2016 Unitrends 15
 Keep software up to date
 Use virus detection and antivirus prevention
 Educated users on security protocols such
 Avoid clicking untrusted emails and attachments
 Watch out for obvious and not so obvious file
extensions
Offense: StartWith Basic Protection
© 2016 Unitrends 16
 Disable Active-X content in Microsoft offices apps
 Have firewalls block Tor, I2P and restrict ports
 Block active ransomware variants from calling home to encryption key servers
 Block binaries from running from popular ransomware installation paths
(e.g. %TEMP%)
Defense: Be Proactive with counter-measures
© 2016 Unitrends 17
Backups are Crucial
© 2016 Unitrends 18
Real World Examples
© 2016 Unitrends 19
3 copies of your data
2 different types of media
1 copy off-site
StartWith The Rule of Three
© 2016 Unitrends 20
 Backup all data on all systems – not just critical data
 Replication and Continuous Data Protection is great for low RTO/RPO but can
backup the malware with your data
 Create archives that are physically isolated from your production systems
 You can use the archive to go back in time if necessary
 Create “bare metal” images of core systems so you can get back to a known
systems state quickly
 Setup DR Services so you can spin up new VMs for critical systems while you
recover your local production systems
 Prepare NOW! Don’t wait until it too late!
Backup Best Practices: Make Sure You Never Pay
© 2016 Unitrends 21
Local
On
Premise
or
Physical
Appliance
2nd
Site
Public &
Private
Cloud
 Local backup for fast recovery
 Archiving to Cloud offsite
 Fully automated
 Can be isolated
Cloud Can Help
© 2016 Unitrends 22
 Instant Recovery Capabilities
 Be able to spin up workloads from backups in minutes while productions is
cleaned
 Ability to protect Windows, Windows Server, Apple Macs, etc.
 Linux based backup software – not Windows based
 Make sure your backups don’t get encrypted too!
DifferentiatingFeatureOf Backup Solution Against
Ransomware
© 2016 Unitrends 23
Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence
Keep Your Business Running
With Unitrends
© 2016 Unitrends 24
Re-imagineRecovery for your digital world
Unitrends Connected Continuity Platform™ brings togetherthe
industry’s leading portfolio of cloud-empoweredcontinuity services
in a single, super intuitive platform that gives you unmatched
flexibility as your business needs evolve.
Discover the power of the platform to capitalize on the potential of cloud,
reduce your overall spend on IT and gain total confidence in the recovery
point to come.
© 2016 Unitrends 25
Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence
© 2016 Unitrends 26
Protect Everything You Have
Everywhere You Need Continuity
Guaranteed Recovery and Continuity
Within a Single Intuitive Platform
Unitrends Connected Continuity Platform
© 2016 Unitrends 27
Protect Everything You Have
Protect your ideas/business
Protect Your Ideas/Business
© 2016 Unitrends 28
Everywhere you need continuity
Local
On Premise or
Physical
Appliance Virtual Appliance
/ Software
2nd Site
Public &
Private Cloud
© 2016 Unitrends 29
Recovery Assurance allows you to have absolute certainty in your
recovery
 Usable in your local environment, your DR site, or the Unitrends Cloud
 Fully automated, flexible application-aware testing
 Recover confidently from Certified Recovery Points
Guaranteed Recovery via Recover Assurance
Recovery
Assurance
© 2016 Unitrends 30
IncredibleEasy to Use UI and Automated Reports
© 2016 Unitrends 31
Transforming Continuity
On Premise All-In-One Data Protection
• Deploy as a virtual or physical backup appliance
• Adaptive inline deduplication (20 to 1 ratio)
• Instant Recovery Options for VMs and windows
• Built-in real-time replication engine
DRaaS
Spinup critical workloads in
less than 1 hour
Forever Cloud
Best value for cloud storage &
long term retentionRecovery Assurance
• Automated Backup &
DR failover testing
• Assured recovery in
the cloud & on
premise
© 2016 Unitrends 32
Scalable and Flexible
 Industry’s #1 hybrid cloud
solution
 Deployment options to fit any
environment
 All-in-one software that runs on
your hardware
Recovery Assurance
 Automated testing of backup
and DR
 100% confidence in the
recovery point to come
 RPO/RTO Actual reporting
Intuitive UI
 One simple interface
 Real time alerts and
reporting
 Enterprise
management
What Makes UnitrendsUnique
© 2016 Unitrends 33
About Unitrends
15,000+ customers globally
8,000+ registered partners globally
EBs of data protected
30PB+ of Cloud Data Managed
Industry leading 98% Customer Satisfaction
Worldwide HQ: Burlington, MA
International HQ: London, UK
Global Datacenter Presence
USA (multiple), Canada, U.K., Germany, Australia
Canada
USA (Multiple)
UK
GermanyMadrid
Sydney
© 2016 Unitrends 34
Unitrends is Redefining Recovery For Your Digital World
How can we help you protect what matters most to you?
Are you ready to never worry
about recovery again?
Can you imagine not spending
time on “backup”?
© 2016 Unitrends 35
Try Us Out – Visit www.Unitrends.com
Unitrends
Enterprise Backup
Get a free trial
7 New Rules of Recovery
Download now

More Related Content

What's hot

Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryBright Technology
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemClickSSL
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomwareCharles Steve
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomwareRaghavendra P.V
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware EventArt Ocain
 
Crack the Code
Crack the CodeCrack the Code
Crack the CodeInnoTech
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions ErnestStaats
 

What's hot (20)

Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 

Viewers also liked

How to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicHow to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicTripwire
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and MitigationNoel Waterman
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro AreaSims Recycling Solutions
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Technology
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew JamesKonica Minolta
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testingTestplant
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮NSFOCUS
 
Pramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingPramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingTidemark Systems Inc.
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysPanos Kontopoulos
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterTegile Systems
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEStefanini
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITSymplified
 

Viewers also liked (15)

How to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicHow to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware Epidemic
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew James
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 
Pramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingPramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social Sharing
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDays
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 

Similar to Ransomware Protection with Unitrends Backup

How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?marketingunitrends
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinarmarketingunitrends
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First marketingunitrends
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomwaremarketingunitrends
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointingmarketingunitrends
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Netgear Italia
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastDiana Frolova
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůMarketingArrowECS_CZ
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery SolutionsManuel Daza
 

Similar to Ransomware Protection with Unitrends Backup (20)

How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentation
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery Solutions
 

Recently uploaded

Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...kalichargn70th171
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf
[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf
[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdfSteve Caron
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 

Recently uploaded (20)

Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf
[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf
[ CNCF Q1 2024 ] Intro to Continuous Profiling and Grafana Pyroscope.pdf
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 

Ransomware Protection with Unitrends Backup

  • 1. © 2016 Unitrends 1 Uni* r Take the Ransom Out of Ransomware
  • 3. © 2016 Unitrends 3 "To be honest, we often advise people just to pay the ransom." Joseph Bonavolonta,Asst. Special Agent, FBI Cybercrime Boston Division
  • 4. © 2016 Unitrends 4 What is Ransomware?
  • 5. © 2016 Unitrends 5  Encrypts victims files with strong unbreakable encryption  Demands payment for private key to unlock data  Payment typically around $200 to $500 in bitcoins Ransomware Malware
  • 6. © 2016 Unitrends 6  Ransomware is not new  Recent advances have made it a much larger risk  Early ransomware was “scareware” and “nagware”  Didn’t permanently lock files.  Was easily removed or avoided  Criminals had difficulty in collecting fees anonymously  Hacker community not as organized Long History of Ransomware
  • 7. © 2016 Unitrends 7 A Growing Menace
  • 8. © 2016 Unitrends 8  Cryptolocker  TorrentLocker  CryptoWall  CBT-Locker  TeslaCrypt  Locky  Etc. Many Variations and Copycats
  • 9. © 2016 Unitrends 9 Popular Tools of RansomwareVariants Anonymity Online Electronic Payment Unbreakable Encryption • AES • RSA • “Curve” ECC Network to C&C Server • Tor • I2P • POST/HTTPS • Hardcoded URLs
  • 10. © 2016 Unitrends 10 Requires both Public and PrivateKey
  • 11. © 2016 Unitrends 11  Spam Email Campaigns  CBT Locker & Torrent Locker preferred vector  Requires interaction from user  Can affect fully patched systems  Exploit Kits  CryptoWall and TelsaCrypt preferred vector  Does not require any interaction  Uses vulnerable installed software Infection Vectors BOTH ARE HIGHLY EFFECTIVE WAYS INTO YOUR SYSTEMS
  • 12. © 2016 Unitrends 12 Get 1 Free Macs vulnerable Voice Enabled Highly Localized Ransomware Continuing to Advance
  • 13. © 2016 Unitrends 13 How does an enterprise make sure they never have to pay?
  • 14. © 2016 Unitrends 14 Play Defense Play Offense Don’t forget about your backup players
  • 15. © 2016 Unitrends 15  Keep software up to date  Use virus detection and antivirus prevention  Educated users on security protocols such  Avoid clicking untrusted emails and attachments  Watch out for obvious and not so obvious file extensions Offense: StartWith Basic Protection
  • 16. © 2016 Unitrends 16  Disable Active-X content in Microsoft offices apps  Have firewalls block Tor, I2P and restrict ports  Block active ransomware variants from calling home to encryption key servers  Block binaries from running from popular ransomware installation paths (e.g. %TEMP%) Defense: Be Proactive with counter-measures
  • 17. © 2016 Unitrends 17 Backups are Crucial
  • 18. © 2016 Unitrends 18 Real World Examples
  • 19. © 2016 Unitrends 19 3 copies of your data 2 different types of media 1 copy off-site StartWith The Rule of Three
  • 20. © 2016 Unitrends 20  Backup all data on all systems – not just critical data  Replication and Continuous Data Protection is great for low RTO/RPO but can backup the malware with your data  Create archives that are physically isolated from your production systems  You can use the archive to go back in time if necessary  Create “bare metal” images of core systems so you can get back to a known systems state quickly  Setup DR Services so you can spin up new VMs for critical systems while you recover your local production systems  Prepare NOW! Don’t wait until it too late! Backup Best Practices: Make Sure You Never Pay
  • 21. © 2016 Unitrends 21 Local On Premise or Physical Appliance 2nd Site Public & Private Cloud  Local backup for fast recovery  Archiving to Cloud offsite  Fully automated  Can be isolated Cloud Can Help
  • 22. © 2016 Unitrends 22  Instant Recovery Capabilities  Be able to spin up workloads from backups in minutes while productions is cleaned  Ability to protect Windows, Windows Server, Apple Macs, etc.  Linux based backup software – not Windows based  Make sure your backups don’t get encrypted too! DifferentiatingFeatureOf Backup Solution Against Ransomware
  • 23. © 2016 Unitrends 23 Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence Keep Your Business Running With Unitrends
  • 24. © 2016 Unitrends 24 Re-imagineRecovery for your digital world Unitrends Connected Continuity Platform™ brings togetherthe industry’s leading portfolio of cloud-empoweredcontinuity services in a single, super intuitive platform that gives you unmatched flexibility as your business needs evolve. Discover the power of the platform to capitalize on the potential of cloud, reduce your overall spend on IT and gain total confidence in the recovery point to come.
  • 25. © 2016 Unitrends 25 Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence
  • 26. © 2016 Unitrends 26 Protect Everything You Have Everywhere You Need Continuity Guaranteed Recovery and Continuity Within a Single Intuitive Platform Unitrends Connected Continuity Platform
  • 27. © 2016 Unitrends 27 Protect Everything You Have Protect your ideas/business Protect Your Ideas/Business
  • 28. © 2016 Unitrends 28 Everywhere you need continuity Local On Premise or Physical Appliance Virtual Appliance / Software 2nd Site Public & Private Cloud
  • 29. © 2016 Unitrends 29 Recovery Assurance allows you to have absolute certainty in your recovery  Usable in your local environment, your DR site, or the Unitrends Cloud  Fully automated, flexible application-aware testing  Recover confidently from Certified Recovery Points Guaranteed Recovery via Recover Assurance Recovery Assurance
  • 30. © 2016 Unitrends 30 IncredibleEasy to Use UI and Automated Reports
  • 31. © 2016 Unitrends 31 Transforming Continuity On Premise All-In-One Data Protection • Deploy as a virtual or physical backup appliance • Adaptive inline deduplication (20 to 1 ratio) • Instant Recovery Options for VMs and windows • Built-in real-time replication engine DRaaS Spinup critical workloads in less than 1 hour Forever Cloud Best value for cloud storage & long term retentionRecovery Assurance • Automated Backup & DR failover testing • Assured recovery in the cloud & on premise
  • 32. © 2016 Unitrends 32 Scalable and Flexible  Industry’s #1 hybrid cloud solution  Deployment options to fit any environment  All-in-one software that runs on your hardware Recovery Assurance  Automated testing of backup and DR  100% confidence in the recovery point to come  RPO/RTO Actual reporting Intuitive UI  One simple interface  Real time alerts and reporting  Enterprise management What Makes UnitrendsUnique
  • 33. © 2016 Unitrends 33 About Unitrends 15,000+ customers globally 8,000+ registered partners globally EBs of data protected 30PB+ of Cloud Data Managed Industry leading 98% Customer Satisfaction Worldwide HQ: Burlington, MA International HQ: London, UK Global Datacenter Presence USA (multiple), Canada, U.K., Germany, Australia Canada USA (Multiple) UK GermanyMadrid Sydney
  • 34. © 2016 Unitrends 34 Unitrends is Redefining Recovery For Your Digital World How can we help you protect what matters most to you? Are you ready to never worry about recovery again? Can you imagine not spending time on “backup”?
  • 35. © 2016 Unitrends 35 Try Us Out – Visit www.Unitrends.com Unitrends Enterprise Backup Get a free trial 7 New Rules of Recovery Download now