Zero day cyber attacks are almost impossible to detect and defeat as they use exploits that are previously unknown. This threat is increasing and Zero Day Recovery™ from Tectrade is the best option available to get business systems and data back to operational - fast. Learn more with our slide share all about it.
11. Fast Recovery Near instant recovery
Recovers a workload in 1-2 hours
Stand alone secured backup and
recovery platform
Recovers workloads in minutes
Technology integrated into your
environment built around a
snapshot architecture
ZDR combines both models to meet your recovery needs
Right now, organisations are facing extraordinary data challenges.
Much of the world’s data is currently trapped in old architectures – architectures that are failing to handle the pace of data growth, and preventing organisations from using data to develop revolutionary new products, services and ways of working.
Getting a handle on your data is not just important – it's business critical.
A recent survey by cyber-edge.com found that only 51% payments of a ransom resulted in data recovery.
https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf
A recent survey by cyber-edge.com found that only 51% payments of a ransom resulted in data recovery.
https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf
Just over a third of all documented attacks in the second quarter targeted the manufacturing industry, with manufacturers appearing in the top three targets in five of six geographic regions throughout 2016. Manufacturing (34%) was followed by finance (25%) and health care (13%) as the most targeted sectors.
The impact of ransomware on small to mid-sized businesses can be crippling
Ransom demands are not the small business killer, downtime is. Most small to midsized businesses impacted by ransomware experienced hours of downtime
For many, the source of ransomware cannot be identified
Ransomware infections often spread to other endpoints once they take hold
Current technology solutions do not seem to be solving the problem
There are ever increasing amounts of new code and a robust underworld economy that will be stoking the market
It is expected that zero day exploits will rise from one per week in 2015 to one per day by 20211
Servers involved in processing retail transactions can no longer do so, resulting in delayed or lost sales
Hospitals whose systems become inaccessible can see lives put at risk, such as NHS patients whose cancer treatments were delayed as a result of a May 2017 attack.
Manufacturing operations can be temporarily shut down Renault factories in France and Slovenia in May 2017.
Risk
How much downtime (cost) can we withstand?
What impact to my business (revenue) would be disastrous?
What is our risk profile?
Value
Which are our most valuable applications or data?
Which applications are business critical to sustaining our business?
Cost
What is a reasonable cost to mitigate risks to valuable apps?
How do I procure? OPEX or CAPEX?
How much does it cost to recover today?
Volume
How much of our data and application estate must be protected to the highest level?
How do I want to recover infected workloads?
How many cyber incidents occur?
Typically recovery from a cyber attack requires manually disinfecting or re-building their machine.
This is time consuming, and with Zero-day attacks, disinfection is almost impossible.
The ZDR service provides confidence and trust in your recovery points.
It is our play to capture a chunk of the cyber-security spend in clients and diversifies our offering away from IT operations by targeting new people.
The proposition is called Zero Day recovery.
Zero-day recovery is based upon the idea that a security breach is matter of when, not if, and that the breach is likely to be achieved using unknown or unpatched vulnerabilities in an organisation. It focuses on the process of recovering from a breach by using Helix Protect to restore data in hours. This compares to days required for the traditional disinfection or rebuild process.
There are three differences between our current data protection go to market and Zero Day Recovery:
We have created marketing and positioning language to focus on the recovery from cyber-attack instead of our traditional focus on infrastructure, application, or user failure.
We’ve added cyber monitoring tools into the portfolio to help clients spot attacks in progress and to perform post discovery forensic work to find the attack vector.
The rate and expected speed of recoveries (restores) particularly of VM images is likely to be higher than our current client expectation.
The Zero Day recovery story will sit alongside our traditional data protection messaging but will represent our big bet to win new clients at an accelerated rate. Alex will expand on this at the kick off.
Note, clients wanting instant access to data can mount their images using SPP or SPVE to get data, but their performance will only be as good as the performance of the DP storage.
Therefore, if they are looking to build out a fast recovery to business as usual, then a true snapshot architecture is needed.
Three tier architecture, designed to provide fast recoveries with insurance against data loss using data protection technologies.
Electronic Health Records
Healthcare Clinics
Enterprise Data
Reasons: Clinicians need fast access to patient data at all times, Big Data and bring your own device impacts are real and growing, The budget isn’t growing as fast as protected health information
Electronic Health Records
Healthcare Clinics
Enterprise Data
Electronic Health Records
Healthcare Clinics
Enterprise Data
Production data and operational blueprints
Live production systems
Enterprise Data