SlideShare a Scribd company logo
1 of 23
Secure your data. Secure your
business.
WieSie Ransomware undErpressern keineChancegeben
Jan Stöver – Sales EngineerMid-MarketD/A/CH
2
3
4
5
Prevention
• Firewall
• IAM
• CASB
• Email Security
Detection
• XDR
• Intrusion Detection
• Endpoint Security
Investigation
• Digital Forensics
• SIEM
• SOAR
6
Businesses are Under Attack
Data
Enterprise Cloud SaaS
Infrastructure Security
Why are organizations stuck paying ransoms?
Ransomware locks down data
PAY RANSOM
Can Risks Be
Identified and
Investigated?
Option 1: Pay ransom
Can We Recover
Quickly?
Engage
SecOps
Is Data
Resilient?
Engage
IT Ops
Option 2: Attempt to recover
7
Prevention
It's Time For A New Approach
+
Infrastructure Security
Detection Investigation
Data Security
Data Resilience Data Observability Data Recovery
Zero Trust Security
8
9
Data Resilience
10
Is My Data Truly Secure?
Is my backup data immune
from malicious encryption?
Can bad actors snoop
or steal my data?
Can anyone manipulate
my backups?
Can attackers find my backups?
Are admin accounts safe from
compromise?
Our Approach
11
Enterprise Data
Protection
M365 Protection
Cloud Data
Protection
Safeguard your data so it can always be available for
recovery
• Immutable from the first copy
• Append Only File System
• Logical Air Gap – No Open Protocols
• Encryption Everywhere
• Zero Trust by Design (MFA)
• Retention Locks and Two-Person Integrity
Data Resilience
Rubrik Data
Production
Major attack is now
a recoverable event
Logical airgap
Production
12
Data Observability
13
Can I Monitor Data to Find the Biggest Risks?
Was sensitive data
affected by an attack?
Are there indicators of
compromise?
Has there been unusual activity
and what kinds?
What files and applications were
affected in an attack?
14
Sensitive Data
Discovery
Threat Hunting
Ransomware
Investigation
Monitor data risks continuously and remediate threats
quick
• High Fidelity ML Model using Data Time-Series
• Full data view User/App/Content over time
• Anomaly and encryption detection vs baseline
• Data Insights integrate into your SecOps tools
Data Observability
Our Approach
15
Data Recovery
16
How Easy is it to Recover?
How quickly can I recover after a massive attack?
How do I get my most critical
apps back immediately?
How can I test that
everything works?
How do I know if malware is
hiding, and can I isolate it?
How do I plan for recovering
an entire site?
17
Threat Containment
Mass Recovery
Quarantine malware and automate recovery
so business operations can be restored quickly
• In-Place Recovery-of only changes
• Instant Recovery / Live Mount gracefully migrates back to
production storage
• Automated Orchestrated recovery of VMs (War Time for sub
10 min recovery)
• Peace time isolated recovery testing for proactive testing
• Surgical Recovery Malware Free “Last Known Good Copy”
Data Recovery
Our Approach
Orchestrated App
Recovery
18
Threat Containment
Mass Recovery
Orchestrated App
Recovery
Sensitive Data Discovery
Threat Hunting
Ransomware Investigation
M365 Protection
Cloud Data Protection
Enterprise Data Protection
Data Resilience Data Observability Data Recovery
Data Security Command Center
Detection and Analysis Containment Eradication
and Recovery
Preparation
NIST Security Standards
19
Rubrik Keeps Your Data Secure and Recoverable
Enterprise Cloud SaaS
20
Your data is
defended
against cyber
threats
Cyber threats are
monitored
continuously and
analyzed quickly
Your business
operations are
recovered
within hours
Data Recovery
Data Resilience Data Observability
Zero Trust Data Security
Ransomware Recovery Warranty
*Warranty provides payout of up to $5m, based on data protected by Rubrik. For recovery related expenses 21
Furthest to the
Right in Vision
Strongest in
Overall Strategy
Five Years
Running
Widely recognized as leading innovator
22
Jan Stöver (Rubrik Germany)

More Related Content

Similar to Jan Stöver (Rubrik Germany)

Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Dalia Reda
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
Tony Zirnoon, CISSP
 

Similar to Jan Stöver (Rubrik Germany) (20)

Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutions
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 

More from Praxistage

More from Praxistage (20)

Einladung zu den Praxistagen 2024 im virtuellen Landhaus
Einladung zu den Praxistagen 2024 im virtuellen LandhausEinladung zu den Praxistagen 2024 im virtuellen Landhaus
Einladung zu den Praxistagen 2024 im virtuellen Landhaus
 
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
Michael Jäger, MBA, Dipl. Wirtschaftsinformatiker (FH) Christian Kohler (Mait...
 
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
Fr. RA Mag. Birgit Noha, LL.M. (Laws.at)
 
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
Mag.a Mary-Ann Hayes (Unicredit Bank Austria AG)
 
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
OR Dipl.-Ing. Bettina Gastecker, Bakk (Bundesministerium für Finanzen)
 
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
Dipl.-Ing. (FH) Bernd Stockinger (Citycom Telekommunikation GmbH)
 
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
Dipl.-Verww. (FH) Christian Zierau (Stadtrat für Finanzen, Personal, Ordnung ...
 
Bernd Schellnast (Sphinx IT Consulting GmbH)
Bernd Schellnast (Sphinx IT Consulting GmbH)Bernd Schellnast (Sphinx IT Consulting GmbH)
Bernd Schellnast (Sphinx IT Consulting GmbH)
 
Werner Panhauser (Helvetia Versicherungen AG)
Werner Panhauser (Helvetia Versicherungen AG)Werner Panhauser (Helvetia Versicherungen AG)
Werner Panhauser (Helvetia Versicherungen AG)
 
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
Michael Weilguny, Christian Schön (IVM Technical Consultants Wien Ges.m.b.H.)
 
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
Dipl.-Ing. Bob Velkov (Huawei Technologies Austria GmbH)
 
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
Dipl.-Ing. Werner Plessl (Hewlett Packard Enterprise)
 
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
Dipl.-Ing. Marc Haarmeier (Prime Force Group Int. AG)
 
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
Mag.a Verena Becker, BSc. (Wirtschaftskammer Österreich/BSIC)
 
Doris Ingerisch (Axians ICT Austria GmbH)
Doris Ingerisch (Axians ICT Austria GmbH)Doris Ingerisch (Axians ICT Austria GmbH)
Doris Ingerisch (Axians ICT Austria GmbH)
 
Josef Weissinger (Soroban IT-Beratung GmbH)
Josef Weissinger (Soroban IT-Beratung GmbH)Josef Weissinger (Soroban IT-Beratung GmbH)
Josef Weissinger (Soroban IT-Beratung GmbH)
 
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
Fr. Vanessa Kluge, BA (Kontron AIS GmbH)
 
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
Ing. Boris Werner (Breitbandbüro des Bundesministeriums für Finanzen)
 
Praxistage 2024 im virtuellen Landhaus, St. Pölten
Praxistage 2024 im virtuellen Landhaus, St. PöltenPraxistage 2024 im virtuellen Landhaus, St. Pölten
Praxistage 2024 im virtuellen Landhaus, St. Pölten
 
Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)Hr. David Simon (Juniper Networks, Inc.)
Hr. David Simon (Juniper Networks, Inc.)
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Jan Stöver (Rubrik Germany)

  • 1. Secure your data. Secure your business. WieSie Ransomware undErpressern keineChancegeben Jan Stöver – Sales EngineerMid-MarketD/A/CH
  • 2. 2
  • 3. 3
  • 4. 4
  • 5. 5
  • 6. Prevention • Firewall • IAM • CASB • Email Security Detection • XDR • Intrusion Detection • Endpoint Security Investigation • Digital Forensics • SIEM • SOAR 6 Businesses are Under Attack Data Enterprise Cloud SaaS Infrastructure Security
  • 7. Why are organizations stuck paying ransoms? Ransomware locks down data PAY RANSOM Can Risks Be Identified and Investigated? Option 1: Pay ransom Can We Recover Quickly? Engage SecOps Is Data Resilient? Engage IT Ops Option 2: Attempt to recover 7
  • 8. Prevention It's Time For A New Approach + Infrastructure Security Detection Investigation Data Security Data Resilience Data Observability Data Recovery Zero Trust Security 8
  • 10. 10 Is My Data Truly Secure? Is my backup data immune from malicious encryption? Can bad actors snoop or steal my data? Can anyone manipulate my backups? Can attackers find my backups? Are admin accounts safe from compromise?
  • 11. Our Approach 11 Enterprise Data Protection M365 Protection Cloud Data Protection Safeguard your data so it can always be available for recovery • Immutable from the first copy • Append Only File System • Logical Air Gap – No Open Protocols • Encryption Everywhere • Zero Trust by Design (MFA) • Retention Locks and Two-Person Integrity Data Resilience Rubrik Data Production Major attack is now a recoverable event Logical airgap Production
  • 13. 13 Can I Monitor Data to Find the Biggest Risks? Was sensitive data affected by an attack? Are there indicators of compromise? Has there been unusual activity and what kinds? What files and applications were affected in an attack?
  • 14. 14 Sensitive Data Discovery Threat Hunting Ransomware Investigation Monitor data risks continuously and remediate threats quick • High Fidelity ML Model using Data Time-Series • Full data view User/App/Content over time • Anomaly and encryption detection vs baseline • Data Insights integrate into your SecOps tools Data Observability Our Approach
  • 16. 16 How Easy is it to Recover? How quickly can I recover after a massive attack? How do I get my most critical apps back immediately? How can I test that everything works? How do I know if malware is hiding, and can I isolate it? How do I plan for recovering an entire site?
  • 17. 17 Threat Containment Mass Recovery Quarantine malware and automate recovery so business operations can be restored quickly • In-Place Recovery-of only changes • Instant Recovery / Live Mount gracefully migrates back to production storage • Automated Orchestrated recovery of VMs (War Time for sub 10 min recovery) • Peace time isolated recovery testing for proactive testing • Surgical Recovery Malware Free “Last Known Good Copy” Data Recovery Our Approach Orchestrated App Recovery
  • 18. 18 Threat Containment Mass Recovery Orchestrated App Recovery Sensitive Data Discovery Threat Hunting Ransomware Investigation M365 Protection Cloud Data Protection Enterprise Data Protection Data Resilience Data Observability Data Recovery Data Security Command Center Detection and Analysis Containment Eradication and Recovery Preparation NIST Security Standards
  • 19. 19 Rubrik Keeps Your Data Secure and Recoverable Enterprise Cloud SaaS
  • 20. 20 Your data is defended against cyber threats Cyber threats are monitored continuously and analyzed quickly Your business operations are recovered within hours Data Recovery Data Resilience Data Observability Zero Trust Data Security
  • 21. Ransomware Recovery Warranty *Warranty provides payout of up to $5m, based on data protected by Rubrik. For recovery related expenses 21
  • 22. Furthest to the Right in Vision Strongest in Overall Strategy Five Years Running Widely recognized as leading innovator 22