SlideShare a Scribd company logo
1 of 29
Zero Day RecoveryTM
Your last line of defence against ransomware and cyber attack
© Copyright Tectrade Computers 2019
2
Data is the DNA of any business, and at
Tectrade we make it our mission to protect
it.
TheTectrade data platform uses the world’s
best people and industry leading
technologies to provide the very best in
data protection and recovery.
© Copyright Tectrade Computers 2019
By 2019, despite increasing
effectiveness of
countermeasures, successful
ransomware attacks will double
in frequency year over year, up
from 2 to 3 million in 2016.
Cyber
Security
Protection
Perimeter
Security
Endpoint
Security
Application
Security
Data
Security
Focus of nearly all cyber security vendors:
Protection or Defence against cyber threats not
recovery from attack.
Cyber
Defence
Cyber
Recovery
© Copyright Tectrade Computers 2019
What is Zero Day Recovery?
Cyber
Defence
Cyber
Recovery
Very few vendors talk about cyber recovery but
cyber recovery is essential to full cyber protection.
Hacker
discovers
vulnerability
Exploit
created to
leverage
vulnerability
Attack is
launched
Public/Vendor
awareness
Vendor builds
signature
Vendor
distributes
signature
IT admin
installs
signature to
protect
against attack
Day
Zero
Attack
DefendedWindow of
Vulnerability
The window of vulnerability is where business are most at risk. Providing fast recovery and backup allows them to defeat a zero
day/ransomware attack using cyber recovery.
This is most important when looking at
Zero day and Ransomware attacks which
are extremely difficult to defend against.
Example of Zero-Day Attack
© Copyright Tectrade Computers 2019
How serious is the issue?
50 percent chance of
employees suffering
productivity loss
30 percent chance that the
business will shut down
temporarily
20 percent chance of
corporate revenue loss
• There are ever increasing amounts of new code and a
robust underworld economy that will be stoking the
market for zero day and ransomware attacks
• It is expected that zero day exploits will rise from one
per week in 2015 to one per day by 20211
Ransomware and Zero day attacks are increasing
• Servers involved in processing retail
transactions can no longer do so, resulting in
delayed or lost sales
• Hospitals whose systems become inaccessible
can see lives put at risk, such as NHS
patients whose cancer treatments were
delayed as a result of a May 2017 attack.
• Manufacturing operations can be temporarily
shut down such as Renault factories in France
and Slovenia in May 2017.
© Copyright Tectrade Computers 2019
What are the key problems?
Downtime,
revenue loss, and
reputation
damage due to
attack
Inability to
recover from
attack quickly
Cost and pain of
designing and
building to
recover fast
IT and security
teams working in
silos with backup
not considered
part of the
solution to cyber
attack
© Copyright Tectrade Computers 2019
Policy
Technology
Enhanced service and operational model
Discover
& justify
Define &
Design
Deliver Operate Optimize
Volume
Cost
Value
Risk
© Copyright Tectrade Computers 2019
Tectrade’s Zero-Day Recovery
service enables you to rely on
and trust your data platform to
recover applications and data
quickly after an attack
We become your last line of
defence.
What if you could
confidently and
quickly roll back to
an uncompromised
version of your
data?
© Copyright Tectrade Computers 2019
Plan
• Decide your policy,
clean, rebuild, or
restore?
• Identify critical
workloads and
data
• Identify
Dependencies in
workloads
• Create a zero day
recovery catalogue
Build
• Deploy a
technology
platforms to
automate failover,
or backup and
recovery activity
• Create an out of
band data recovery
vault (‘air-gap’)
• Build a ‘clean
room’ for Gold
images
Continuously
Test
• Conduct regular
restore testing,
ideally automated
• Test the integrity
of your recovery
data
Monitor and
detect
• Monitor your
environment for
unexpected
behaviours using
cybersecurity
tooling
• Monitor and
manage your data
protection
environment to
ensure RPO
objectives are met
Recover
• Perform Forensics
and Damage
Assessment
• Restore
applications direct
from recovery
vault
• Review status and
reset
Creating a Zero-Day Recovery architecture
© Copyright Tectrade Computers 2019
How does Zero Day Recovery work?
Time
Return to
service
Tectrade’s Zero day recovery
platform continuously
generates immutable restore
points as defined by client
policy (RPO)
Tectrade implement and
deploy the highly secured
Helix Protect appliance with
an immutable recovery vault
Client conducts digital
analysis to identify
compromised machines.
Confirms a point in time to
restore to.
Continuous monitoring,
testing, and management
ensures viability of restore
points
Client or Tectrade restores
image or data quickly from
the vault, aligned to Policy
Incident /
Detection
© Copyright Tectrade Computers 2019
Fast Recovery Near instant recovery
Recovers a workload in 1-2 hours
Stand alone secured backup and
recovery platform
Recovers workloads in minutes
Technology integrated into your
environment built around a
snapshot architecture
ZDR combines both models to meet your recovery needs
ZDR Architecture – The right solution for your business
Immutable snapshot technology
creates instant recovery points for
immediate re-deployment
© Copyright Tectrade Computers 2019
Benefits of Tectrade Zero Day Recovery
The ability to recover
critical systems quickly
after a zero day or
ransomware attack
No ransom ever needs
to be paid
Cost effective
managed service
ensures recoveries are
always available
Visibility of estate
allows prioritisation of
critical systems
Works in hybrid
environments
including cloud
Managed service
option – Takes the
worry of Zero day and
ransomware attacks
away
155+ Customers managed
20+ Years experience
Over 132PB of data protected
2m+ systems monitored daily
© Copyright Tectrade Computers 2019
With over 23 years experience at the cutting edge of data management, we have a host of
certifications in proven enterprise-class solutions and a customer list that spans industries and
continents.
Our creds/expertise summary
With international operations and over 35 technical specialists, Tectrade has helped hundreds of
clients to gain comprehensive control of their data and manage it effectively as their organisation
grows.
155+ Customers managed
20+ Years experience
Over 132PB of data protected
2m+ systems monitored daily
UK & US
Strong Financials
ISO, PCI, CRB
Qualifications &
Certificates
Work with all
leading vendors
Over 59 people
69% technical
© Copyright Tectrade Computers 2019
Tectrade UK
1st Floor, River Court
Old Mill Lane
Godalming
Surrey
GU7 1EZ
Tectrade US
379 West Broadway
New York, 10012
www.tectrade.com
Thank you
© Copyright Tectrade Computers 2019
Healthcare
Zero Day Recovery
© Copyright Tectrade Computers 2019
How serious is the issue for healthcare?
50 percent chance of
healthcare employees
suffering productivity loss
30 percent chance that the
healthcare services will
shut down temporarily
20 percent chance of
revenue loss and adverse
affect on patient care
In 2015, 3 of the 7 largest cyber breaches occurred in the healthcare
sector. The Anthem incident was the largest cyber security breach in
the healthcare industry in 2015. Hospitals whose systems become
inaccessible can see lives put at risk, such as NHS patients whose
cancer treatments were delayed as a result of a May 2017 attack.
Ransomware attacks are growing and the prime target is healthcare
organisations due to:
• A heavy reliance on critical administrative and clinical systems
affecting the whole care delivery process
• Patient suffering if these fail - far different from a business that
loses revenue
• Faced with the choice of “ransom for data” most healthcare
professional often pay attackers
• Healthcare is also traditionally behind in adoption of data
security solutions and upgrades to their IT estate mostly due to
inadequate funding and focus
Ransomware and Zero day attacks are increasing© Copyright Tectrade Computers 2019
Saving lives with backup and recovery
Zero Day Recovery - Piece of mind for healthcare organisations against
data loss and attack with cost effective back up and recovery
Electronic Health Record
Recovery
Healthcare Clinics
Administration System
Recovery
HIPPA Compliance &
Enterprise Data
Recovery
© Copyright Tectrade Computers 2019
Finance & Insurance
Zero Day Recovery
© Copyright Tectrade Computers 2019
How serious is the issue for finance and insurance?
50 percent chance of finance &
insurance employees suffering
productivity loss
30 percent chance that the
financial and insurance services
will shut down temporarily
20 percent chance of revenue
loss and adverse affect on
customer perception
Financial services and insurance sector was attacked more than any
other industry over the last 12 months.
Ransomware attacks are growing in financial service and insurance
sector due to:
• Breadth of information stored about customers makes them
prime targets
• Online systems for banking and insurance transactions if taken
offline due to ransomware can render an organisation unable to
operate
• Faced with the choice of “ransom for data” most financial and
insurance professionals often pay attackers
• Large amount of data in disparate systems makes recovery of
data difficult.
Ransomware and Zero day attacks are increasing
© Copyright Tectrade Computers 2019
Reduce Risk. Recover Fast.
Zero Day Recovery - Piece of mind for finance & insurance organisations
against data loss and attack with cost effective back up and recovery
Financial Records
Recovery
Customer online system
recovery
Enterprise Data
Recovery
© Copyright Tectrade Computers 2019
Retail
Zero Day Recovery
© Copyright Tectrade Computers 2019
How serious is the issue for retail?
50 percent chance of retail
employees suffering
productivity loss
30 percent chance that the
retail services will shut
down temporarily
20 percent chance of
revenue loss and adverse
affect on customer service
In 2017 ransomware attacks on retail organisations have doubled
and they are increasingly focussed on business critical systems with
bigger ransom demands.
Ransomware attacks are growing and one of their prime targets is
retail organisations due to:
• A heavy reliance on online shopping platforms and point of sale
payment systems that could be held to ransom
• Customer trust and investor confidence lost if ransomware hits
• Faced with the choice of “ransom for data” most retailers often
pay attackers
• Retail is tipped by cyber watchers to be the next target of a large
scale ransomware attack
Ransomware and Zero day attacks are increasing© Copyright Tectrade Computers 2019
Recover Instantly. No Ransom Required.
Zero Day Recovery - Piece of mind for retails organisations against data
loss and attack with cost effective back up and recovery
Customer account details
and payment information
Online commerce systems Enterprise Data
Recovery
© Copyright Tectrade Computers 2019
Manufacturing
Zero Day Recovery
© Copyright Tectrade Computers 2019
How serious is the issue for manufacturing?
50 percent chance of
manufacturing employees
suffering productivity loss
30 percent chance that the
manufacturing production
will shut down temporarily
20 percent chance of
revenue loss
Just over a third of all documented attacks in the second quarter of
2017 targeted the manufacturing industry, with manufacturers
appearing in the top three targets in five of six geographic regions
throughout 2016.
Ransomware attacks are growing and the prime target is healthcare
organisations due to:
• Legacy systems that operate production that are open to exploits
commonly used in ransomware attacks
• Downtime in production that affects productivity and profitability
such as Renault factories in France and Slovenia in May 2017.
• Faced with the choice of “ransom for data” most manufacturing
organisations often pay attackers
• Manufacturing is also traditionally behind in adoption of data
security solutions
Ransomware and Zero day attacks are increasing© Copyright Tectrade Computers 2019
Ransomware Defeated.
Zero Day Recovery - Piece of mind for manufacturing organisations against
data loss and attack with cost effective back up and recovery
Production data and
operational blueprint
recovery
Live Production System
Recovery
Enterprise Data
Recovery
© Copyright Tectrade Computers 2019
With over 23 years experience at the cutting edge of data management, we have a host of
certifications in proven enterprise-class solutions and a customer list that spans industries and
continents.
Our creds/expertise summary
With international operations and over 35 technical specialists, Tectrade has helped hundreds of
clients to gain comprehensive control of their data and manage it effectively as their organisation
grows.
155+ Customers managed
20+ Years experience
Over 132PB of data protected
2m+ systems monitored daily
UK & US
Strong Financials
ISO, PCI, CRB
Qualifications &
Certificates
Work with all
leading vendors
Over 59 people
69% technical
© Copyright Tectrade Computers 2019
Tectrade UK
1st Floor, River Court
Old Mill Lane
Godalming
Surrey
GU7 1EZ
Tectrade US
379 West Broadway
New York, 10012
www.tectrade.com
Thank you
© Copyright Tectrade Computers 2019

More Related Content

What's hot

Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 

What's hot (20)

Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Cyber security
Cyber securityCyber security
Cyber security
 
AI and Accountability
AI and AccountabilityAI and Accountability
AI and Accountability
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Internet security
Internet securityInternet security
Internet security
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 

Similar to Understanding Zero Day Recovery - Your last defence against ransomware attacks

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveCyber Watching
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Conor Bronsdon
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Storage Switzerland
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...Aggregage
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 

Similar to Understanding Zero Day Recovery - Your last defence against ransomware attacks (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
Omzig
OmzigOmzig
Omzig
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 

Recently uploaded

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 

Recently uploaded (20)

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 

Understanding Zero Day Recovery - Your last defence against ransomware attacks

  • 1. Zero Day RecoveryTM Your last line of defence against ransomware and cyber attack © Copyright Tectrade Computers 2019
  • 2. 2 Data is the DNA of any business, and at Tectrade we make it our mission to protect it. TheTectrade data platform uses the world’s best people and industry leading technologies to provide the very best in data protection and recovery. © Copyright Tectrade Computers 2019
  • 3. By 2019, despite increasing effectiveness of countermeasures, successful ransomware attacks will double in frequency year over year, up from 2 to 3 million in 2016. Cyber Security Protection Perimeter Security Endpoint Security Application Security Data Security Focus of nearly all cyber security vendors: Protection or Defence against cyber threats not recovery from attack. Cyber Defence Cyber Recovery © Copyright Tectrade Computers 2019
  • 4. What is Zero Day Recovery? Cyber Defence Cyber Recovery Very few vendors talk about cyber recovery but cyber recovery is essential to full cyber protection. Hacker discovers vulnerability Exploit created to leverage vulnerability Attack is launched Public/Vendor awareness Vendor builds signature Vendor distributes signature IT admin installs signature to protect against attack Day Zero Attack DefendedWindow of Vulnerability The window of vulnerability is where business are most at risk. Providing fast recovery and backup allows them to defeat a zero day/ransomware attack using cyber recovery. This is most important when looking at Zero day and Ransomware attacks which are extremely difficult to defend against. Example of Zero-Day Attack © Copyright Tectrade Computers 2019
  • 5. How serious is the issue? 50 percent chance of employees suffering productivity loss 30 percent chance that the business will shut down temporarily 20 percent chance of corporate revenue loss • There are ever increasing amounts of new code and a robust underworld economy that will be stoking the market for zero day and ransomware attacks • It is expected that zero day exploits will rise from one per week in 2015 to one per day by 20211 Ransomware and Zero day attacks are increasing • Servers involved in processing retail transactions can no longer do so, resulting in delayed or lost sales • Hospitals whose systems become inaccessible can see lives put at risk, such as NHS patients whose cancer treatments were delayed as a result of a May 2017 attack. • Manufacturing operations can be temporarily shut down such as Renault factories in France and Slovenia in May 2017. © Copyright Tectrade Computers 2019
  • 6. What are the key problems? Downtime, revenue loss, and reputation damage due to attack Inability to recover from attack quickly Cost and pain of designing and building to recover fast IT and security teams working in silos with backup not considered part of the solution to cyber attack © Copyright Tectrade Computers 2019
  • 7. Policy Technology Enhanced service and operational model Discover & justify Define & Design Deliver Operate Optimize Volume Cost Value Risk © Copyright Tectrade Computers 2019
  • 8. Tectrade’s Zero-Day Recovery service enables you to rely on and trust your data platform to recover applications and data quickly after an attack We become your last line of defence. What if you could confidently and quickly roll back to an uncompromised version of your data? © Copyright Tectrade Computers 2019
  • 9. Plan • Decide your policy, clean, rebuild, or restore? • Identify critical workloads and data • Identify Dependencies in workloads • Create a zero day recovery catalogue Build • Deploy a technology platforms to automate failover, or backup and recovery activity • Create an out of band data recovery vault (‘air-gap’) • Build a ‘clean room’ for Gold images Continuously Test • Conduct regular restore testing, ideally automated • Test the integrity of your recovery data Monitor and detect • Monitor your environment for unexpected behaviours using cybersecurity tooling • Monitor and manage your data protection environment to ensure RPO objectives are met Recover • Perform Forensics and Damage Assessment • Restore applications direct from recovery vault • Review status and reset Creating a Zero-Day Recovery architecture © Copyright Tectrade Computers 2019
  • 10. How does Zero Day Recovery work? Time Return to service Tectrade’s Zero day recovery platform continuously generates immutable restore points as defined by client policy (RPO) Tectrade implement and deploy the highly secured Helix Protect appliance with an immutable recovery vault Client conducts digital analysis to identify compromised machines. Confirms a point in time to restore to. Continuous monitoring, testing, and management ensures viability of restore points Client or Tectrade restores image or data quickly from the vault, aligned to Policy Incident / Detection © Copyright Tectrade Computers 2019
  • 11. Fast Recovery Near instant recovery Recovers a workload in 1-2 hours Stand alone secured backup and recovery platform Recovers workloads in minutes Technology integrated into your environment built around a snapshot architecture ZDR combines both models to meet your recovery needs
  • 12. ZDR Architecture – The right solution for your business Immutable snapshot technology creates instant recovery points for immediate re-deployment © Copyright Tectrade Computers 2019
  • 13. Benefits of Tectrade Zero Day Recovery The ability to recover critical systems quickly after a zero day or ransomware attack No ransom ever needs to be paid Cost effective managed service ensures recoveries are always available Visibility of estate allows prioritisation of critical systems Works in hybrid environments including cloud Managed service option – Takes the worry of Zero day and ransomware attacks away 155+ Customers managed 20+ Years experience Over 132PB of data protected 2m+ systems monitored daily © Copyright Tectrade Computers 2019
  • 14. With over 23 years experience at the cutting edge of data management, we have a host of certifications in proven enterprise-class solutions and a customer list that spans industries and continents. Our creds/expertise summary With international operations and over 35 technical specialists, Tectrade has helped hundreds of clients to gain comprehensive control of their data and manage it effectively as their organisation grows. 155+ Customers managed 20+ Years experience Over 132PB of data protected 2m+ systems monitored daily UK & US Strong Financials ISO, PCI, CRB Qualifications & Certificates Work with all leading vendors Over 59 people 69% technical © Copyright Tectrade Computers 2019
  • 15. Tectrade UK 1st Floor, River Court Old Mill Lane Godalming Surrey GU7 1EZ Tectrade US 379 West Broadway New York, 10012 www.tectrade.com Thank you © Copyright Tectrade Computers 2019
  • 16. Healthcare Zero Day Recovery © Copyright Tectrade Computers 2019
  • 17. How serious is the issue for healthcare? 50 percent chance of healthcare employees suffering productivity loss 30 percent chance that the healthcare services will shut down temporarily 20 percent chance of revenue loss and adverse affect on patient care In 2015, 3 of the 7 largest cyber breaches occurred in the healthcare sector. The Anthem incident was the largest cyber security breach in the healthcare industry in 2015. Hospitals whose systems become inaccessible can see lives put at risk, such as NHS patients whose cancer treatments were delayed as a result of a May 2017 attack. Ransomware attacks are growing and the prime target is healthcare organisations due to: • A heavy reliance on critical administrative and clinical systems affecting the whole care delivery process • Patient suffering if these fail - far different from a business that loses revenue • Faced with the choice of “ransom for data” most healthcare professional often pay attackers • Healthcare is also traditionally behind in adoption of data security solutions and upgrades to their IT estate mostly due to inadequate funding and focus Ransomware and Zero day attacks are increasing© Copyright Tectrade Computers 2019
  • 18. Saving lives with backup and recovery Zero Day Recovery - Piece of mind for healthcare organisations against data loss and attack with cost effective back up and recovery Electronic Health Record Recovery Healthcare Clinics Administration System Recovery HIPPA Compliance & Enterprise Data Recovery © Copyright Tectrade Computers 2019
  • 19. Finance & Insurance Zero Day Recovery © Copyright Tectrade Computers 2019
  • 20. How serious is the issue for finance and insurance? 50 percent chance of finance & insurance employees suffering productivity loss 30 percent chance that the financial and insurance services will shut down temporarily 20 percent chance of revenue loss and adverse affect on customer perception Financial services and insurance sector was attacked more than any other industry over the last 12 months. Ransomware attacks are growing in financial service and insurance sector due to: • Breadth of information stored about customers makes them prime targets • Online systems for banking and insurance transactions if taken offline due to ransomware can render an organisation unable to operate • Faced with the choice of “ransom for data” most financial and insurance professionals often pay attackers • Large amount of data in disparate systems makes recovery of data difficult. Ransomware and Zero day attacks are increasing © Copyright Tectrade Computers 2019
  • 21. Reduce Risk. Recover Fast. Zero Day Recovery - Piece of mind for finance & insurance organisations against data loss and attack with cost effective back up and recovery Financial Records Recovery Customer online system recovery Enterprise Data Recovery © Copyright Tectrade Computers 2019
  • 22. Retail Zero Day Recovery © Copyright Tectrade Computers 2019
  • 23. How serious is the issue for retail? 50 percent chance of retail employees suffering productivity loss 30 percent chance that the retail services will shut down temporarily 20 percent chance of revenue loss and adverse affect on customer service In 2017 ransomware attacks on retail organisations have doubled and they are increasingly focussed on business critical systems with bigger ransom demands. Ransomware attacks are growing and one of their prime targets is retail organisations due to: • A heavy reliance on online shopping platforms and point of sale payment systems that could be held to ransom • Customer trust and investor confidence lost if ransomware hits • Faced with the choice of “ransom for data” most retailers often pay attackers • Retail is tipped by cyber watchers to be the next target of a large scale ransomware attack Ransomware and Zero day attacks are increasing© Copyright Tectrade Computers 2019
  • 24. Recover Instantly. No Ransom Required. Zero Day Recovery - Piece of mind for retails organisations against data loss and attack with cost effective back up and recovery Customer account details and payment information Online commerce systems Enterprise Data Recovery © Copyright Tectrade Computers 2019
  • 25. Manufacturing Zero Day Recovery © Copyright Tectrade Computers 2019
  • 26. How serious is the issue for manufacturing? 50 percent chance of manufacturing employees suffering productivity loss 30 percent chance that the manufacturing production will shut down temporarily 20 percent chance of revenue loss Just over a third of all documented attacks in the second quarter of 2017 targeted the manufacturing industry, with manufacturers appearing in the top three targets in five of six geographic regions throughout 2016. Ransomware attacks are growing and the prime target is healthcare organisations due to: • Legacy systems that operate production that are open to exploits commonly used in ransomware attacks • Downtime in production that affects productivity and profitability such as Renault factories in France and Slovenia in May 2017. • Faced with the choice of “ransom for data” most manufacturing organisations often pay attackers • Manufacturing is also traditionally behind in adoption of data security solutions Ransomware and Zero day attacks are increasing© Copyright Tectrade Computers 2019
  • 27. Ransomware Defeated. Zero Day Recovery - Piece of mind for manufacturing organisations against data loss and attack with cost effective back up and recovery Production data and operational blueprint recovery Live Production System Recovery Enterprise Data Recovery © Copyright Tectrade Computers 2019
  • 28. With over 23 years experience at the cutting edge of data management, we have a host of certifications in proven enterprise-class solutions and a customer list that spans industries and continents. Our creds/expertise summary With international operations and over 35 technical specialists, Tectrade has helped hundreds of clients to gain comprehensive control of their data and manage it effectively as their organisation grows. 155+ Customers managed 20+ Years experience Over 132PB of data protected 2m+ systems monitored daily UK & US Strong Financials ISO, PCI, CRB Qualifications & Certificates Work with all leading vendors Over 59 people 69% technical © Copyright Tectrade Computers 2019
  • 29. Tectrade UK 1st Floor, River Court Old Mill Lane Godalming Surrey GU7 1EZ Tectrade US 379 West Broadway New York, 10012 www.tectrade.com Thank you © Copyright Tectrade Computers 2019

Editor's Notes

  1. Right now, organisations are facing extraordinary data challenges. Much of the world’s data is currently trapped in old architectures – architectures that are failing to handle the pace of data growth, and preventing organisations from using data to develop revolutionary new products, services and ways of working. Getting a handle on your data is not just important – it's business critical.
  2. A recent survey by cyber-edge.com found that only 51% payments of a ransom resulted in data recovery. https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf
  3. A recent survey by cyber-edge.com found that only 51% payments of a ransom resulted in data recovery. https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf
  4. Just over a third of all documented attacks in the second quarter targeted the manufacturing industry, with manufacturers appearing in the top three targets in five of six geographic regions throughout 2016. Manufacturing (34%) was followed by finance (25%) and health care (13%) as the most targeted sectors.
  5. The impact of ransomware on small to mid-sized businesses can be crippling Ransom demands are not the small business killer, downtime is. Most small to midsized businesses impacted by ransomware experienced hours of downtime For many, the source of ransomware cannot be identified Ransomware infections often spread to other endpoints once they take hold Current technology solutions do not seem to be solving the problem There are ever increasing amounts of new code and a robust underworld economy that will be stoking the market It is expected that zero day exploits will rise from one per week in 2015 to one per day by 20211 Servers involved in processing retail transactions can no longer do so, resulting in delayed or lost sales Hospitals whose systems become inaccessible can see lives put at risk, such as NHS patients whose cancer treatments were delayed as a result of a May 2017 attack. Manufacturing operations can be temporarily shut down Renault factories in France and Slovenia in May 2017.
  6. Risk How much downtime (cost) can we withstand? What impact to my business (revenue) would be disastrous? What is our risk profile? Value Which are our most valuable applications or data? Which applications are business critical to sustaining our business?   Cost What is a reasonable cost to mitigate risks to valuable apps? How do I procure? OPEX or CAPEX? How much does it cost to recover today?   Volume How much of our data and application estate must be protected to the highest level? How do I want to recover infected workloads? How many cyber incidents occur?
  7. Typically recovery from a cyber attack requires manually disinfecting or re-building their machine. This is time consuming, and with Zero-day attacks, disinfection is almost impossible. The ZDR service provides confidence and trust in your recovery points.
  8. It is our play to capture a chunk of the cyber-security spend in clients and diversifies our offering away from IT operations by targeting new people. The proposition is called Zero Day recovery. Zero-day recovery is based upon the idea that a security breach is matter of when, not if, and that the breach is likely to be achieved using unknown or unpatched vulnerabilities in an organisation. It focuses on the process of recovering from a breach by using Helix Protect to restore data in hours. This compares to days required for the traditional disinfection or rebuild process. There are three differences between our current data protection go to market and Zero Day Recovery: We have created marketing and positioning language to focus on the recovery from cyber-attack instead of our traditional focus on infrastructure, application, or user failure. We’ve added cyber monitoring tools into the portfolio to help clients spot attacks in progress and to perform post discovery forensic work to find the attack vector. The rate and expected speed of recoveries (restores) particularly of VM images is likely to be higher than our current client expectation. The Zero Day recovery story will sit alongside our traditional data protection messaging but will represent our big bet to win new clients at an accelerated rate. Alex will expand on this at the kick off.
  9. Note, clients wanting instant access to data can mount their images using SPP or SPVE to get data, but their performance will only be as good as the performance of the DP storage. Therefore, if they are looking to build out a fast recovery to business as usual, then a true snapshot architecture is needed.
  10. Three tier architecture, designed to provide fast recoveries with insurance against data loss using data protection technologies.
  11. Electronic Health Records Healthcare Clinics Enterprise Data Reasons: Clinicians need fast access to patient data at all times, Big Data and bring your own device impacts are real and growing, The budget isn’t growing as fast as protected health information
  12. Electronic Health Records Healthcare Clinics Enterprise Data
  13. Electronic Health Records Healthcare Clinics Enterprise Data
  14. Production data and operational blueprints Live production systems Enterprise Data