SlideShare a Scribd company logo
1 of 63
Ransomware Jail
Is there any way out? (asking for a friend)
The Threat!
Exploring the Threat – New Developments
The Theory!
The Theory vs. The Reality
New Hope!
Practical Solution + Real World Examples
*A bit about me first - Andrew Miller - @andriven
2
1
2
3
Agenda
3
1. The Threat!
Exploring the Threat – New Developments
ran · som · ware
/`ransəm , we(ə)r/
noun
a type of malicious software designed to block access to a computer system
until a sum of money is paid.
5
Base Definition
We’ll make it fast.
• Malware that typically infects endpoints (laptops, etc.)
• Spread via browser vulnerabilities (malicious pages), e-mail attachments
• Encrypts local filesystems and attached network mounts
• Targeted attacks on individual storage vendors plausible – immutability will come
into play over time.
• (Previous) Best known name = Cryptolocker
6
Can’t ignore this…
8
The world has gotten scarier.
And it’s not slowing down…
9
What’s New…
• ZDNet – 2016 = $1B Cost
• 2015 = $24M
• Confusion – FBI Recommendation & About Face
• High Profile Targets – SF Muni, Education, Healthcare, many more.
• Challenges are not just 1) Data Accessibility but 2) Speed of Restore.
• Not If but When – Why?
10
What’s New…
Maturing Market
• RaaS Kits – Ransomware as a Service Kits
• Market Segmentation
• Customer Service Improvements
• Reliable Payment Model – Bitcoin Impact
11
This is a maturing business
that competes with YOU.
12
Classic Defense Recommendations
Operational Overhead?
1. Education
2. Antivirus, Patching, Filtering
3. Insurance
4. Data Protection - Backups
13
2. The Theory!
The Theory vs. The Reality
14
“Backups are a must.”
FBI, HIPAA, Sophos, Kaspersky, etc.
15
“Conducting frequent backups and ensuring the ability to
recover data from backups is crucial to recovering from a
ransomware attack and ensuring the integrity of PHI
affected by ransomware.”
http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf
16
Easy, right?
17
Traditional Architecture
1990s – Present
Backup &
Replication
Software
Backup Storage
Backup
Software
Backup
Servers
Backup
Proxies
Replication Catalog
Database
Tape Off-site Archive
Let’s Be Fair
There have been a few incremental improvements
19
Improvements!
1990s – Present
Backup &
Replication
Software
Backup Storage
Backup
Software
Backup
Servers
Backup
Proxies
Replication Catalog
Database
Tape Off-site ArchiveBackup Storage
a
Dedupe
Metadata
2000s – Present
Results may vary
21
It Starts Easy Enough …
Win VM
Hypervisor
Production Servers
SAN
Backup Proxy
Backup Server
Tape Archive Offsite Tape Archive
22
… But Quickly Becomes Complex
Hypervisor
Production Servers
SANDisk-based
Backup
Backup Proxy
Backup Server
Database Server
Tape Archive Offsite Tape Archive
Search Server
VM DB VMLin Win VM
23
Multiple Scale and Touch Points
Win DB
Lin DB
VM
VM
Hypervisor
Production Servers
SANDisk-based
Backup
Backup Proxies
Backup Server
Tape Archive Offsite Tape Archive
VM VM
VM VM
Win
Lin
Database Server
Search Server
24
Availability Bandages for SPOFs
Hypervisor
Production Servers
SANDisk-based
Backup
Backup Proxies
Backup Server
Tape Archive Offsite Tape Archive
Database Server
Search Server
Win DB
Lin DB
VM
VM
VM VM
VM VM
Win
Lin
25
Master Server – Control & Manage SPOF
Hypervisor
Production Servers
SANDisk-based
Backup
Backup Proxies
Backup Server
Tape Archive Offsite Tape Archive
Database Server
Search Server
Win DB
Lin DB
VM
VM
VM VM
VM VM
Win
Lin
26
Database – Catalog / Metadata SPOF
Hypervisor
Production Servers
SANDisk-based
Backup
Backup Proxies
Backup Server
Tape Archive Offsite Tape Archive
Database Server
Search Server
Win DB
Lin DB
VM
VM
VM VM
VM VM
Win
Lin
27
28
Today’s Recovery Landscape Challenges
• Reliability of Data Recovery
• Speed of Data Recovery
29
Risk, Threats, and Vulnerabilities
Risk is a function of the likelihood of a given threat acting upon
a particular potential vulnerability, and the resulting impact of
that adverse event on the organization.
30
Complexity
Hypervisor
Production Servers
SANDisk-based
Backup
Backup Proxies
Backup Server
Tape Archive Offsite Tape Archive
Database Server
Search Server
Win DB
Lin DB
VM
VM
VM VM
VM VM
Win
Lin
31
3. New Hope!
Practical Solution + Real World Examples
32
Complexity is the enemy of reliability.
Whatever you do,
Whatever you buy,
Simplify your Backup Architecture.
33
Key Solution Concepts
What we’ve seen that makes a difference…
• Reliability of Data Recovery
• Simplicity of Setup + Day to Day Operation
34
“We have already gone through two deployments with Rubrik,
and have been really pleased with the ease of set-up. It takes
about twenty minutes to rack the appliance, and four minutes to
setup. We input our configuration details, the Rubrik system
maps our VM environment, and we’re ready to start protecting
our data”
Nathan Bach, Senior Systems Engineer @ Driscoll’s
35
“We were using two leading Gartner Magic Quadrant vendors for
backup software and backup storage. Just deploying backup
software took a week, but with Rubrik’s turnkey appliance, the
system was running and protecting our virtual environment
within 30 minutes.
Unboxing and racking the appliance was the hardest part”
Jake Warren, Systems Administrator @ Red Hawk Casino
Meet Rubrik
36
Backup
Software
Backup
Servers
Backup
Proxies
Replication Catalog
Database
Tape Off-site ArchiveBackup Storage
a
Dedupe
Metadata
Private Public
Software fabric for orchestrating data across clouds. No forklift upgrades.
Converges Backup Software & Globally Deduplicated Storage
What’s the hardware?
37
The Smartest Dense Machine
• 2U Supermicro appliance – “Brik”
• Derived from Rubrik
Rubrik Appliance
38
The Smartest Dense Machine
• 2U Supermicro appliance – “Brik”
• 4 nodes per appliance
1 2 3 4
The hardware is simple.
39
The Smartest Dense Machine
• 2U Supermicro appliance – “Brik”
• 4 nodes per appliance
• Unlimited scale-out fabric
• Distributed file system
• Shared-nothing architecture
• Global deduplication
• Inherent data protection
• Cloud Providers for archive
• Can run in AWS & Azure
SLA
ENGINE
40
Simple is hard.
CLOUD DATA MANAGEMENT PLATFORM
DISTRIBUTED
METADATA
DISTRIBUTED
TASK
FRAMEWORK
CLUSTER
MANAGEMENT
SECURITYFILE SYSTEM
Backup
Recovery
Search
Replication
Archival
41
Rack, Stack, Configure
42
20 Minutes
Example - VMware
43
vCenter Server
vCenter Server
vSphere Connectivity – Inventory Collection via API
44
vCenter Server
VM VM VM VM
VM VM VM VM
Data Protection Policies with SLA Domains
45
vCenter Server
Lin Win VM VM
DB Win VM VM
Silver SLA
Gold SLA
Bronze SLA
46
Recovery Point Objective (RPO)
Availability Duration (Retention)
When to Archive (RTO)
Replication Schedule (DR)
{SLA
47
RPOs Availability
48
49
“The system is simple to implement, allowing us to think about
the things you really care about, such as the SLA policies to
apply for protection.”
Nathan Bach, Senior Systems Engineer @ Driscoll’s
50
There’s More! It’s not just VMware.
Physical Linux Physical SQL
Simplify protection of
Linux servers with policy-
driven automation and
granular protection.
Erasure Coding
Deliver forever
incremental, point-in-time
recovery, intelligent log
management with single
SLA policy engine.
Rubrik Edge
Increase storage
utilization and efficiency
while delivering industry
leading fault tolerance
and performance.
Extend data management
to all business locations
with full-featured software
appliance.
RBAC
Secure management
plane with granular
control of user access to
data across hybrid cloud.
d0 d1 d2 d3
c0 c1
Physical Windows Encryption Custom Reporting
Your Data Center Today
51
Backup Proxy
SAN
Production Servers
Backup Server
Search Server
Disk-Based
Backup
Tape Archive Offsite
Tape Vault
Scale Out
Scale Out
52
Simplification via Rubrik
VM VM
VM VM
VM
VM
Hypervisor
Production Servers
SAN
Rubrik
Replication + Long Term
Retention + Search
Private
53
Key Solution Concepts
What we’ve seen that makes a difference…
• Reliability of Data Recovery
• Simplicity of Setup + Day to Day Operation
• Immutability of Snapshots
54
Key Solution Concepts
What we’ve seen that makes a difference…
• Reliability of Data Recovery
• Simplicity of Setup + Day to Day Operation
• Immutability of Snapshots
• Speed of Data Recovery
• Speed of restore via live mount
55
Live Mount
Quick Start: Rack and go. Auto-
discovery.
Rapid Ingest: Flash-optimized,
parallel ingest accelerates snapshots.
Scale-out dedupe and compress.
Automate: SLA policy engine for
hands-free management.
Recover: Instant and point-in-time
recovery. Search and restore files.
Recover from Ransomware.
Customer Example #1
Secure: End-to-end encryption.
Cloud: Secure “CloudOut” instantly
accessible with global search.
Primary Environment
SLA Policy Engine
Log Management
NAS
Private Public
56
Key Solution Concepts
What we’ve seen that makes a difference…
• Reliability of Data Recovery
• Simplicity of Setup + Day to Day Operation
• Immutability of Snapshots
• Speed of Data Recovery
• Speed of restore via live mount
• Automation/API to enhance Restore Capabilities
57
Automation & API’s
Your AppNow OpenAPI
58
In their own words…
Lang’s Video Case Study
59
Today’s Recovery Landscape
• Reliability of Data Recovery
• Speed of Data Recovery
60
Rubrik Manages All Your Data - Anywhere
NAS
Production Rubrik Cloud Data Management Platform
Backup &
Recovery
Disaster
Recovery
Archival &
Compliance
Search
Copy Data
Management
Analytics
Automated,
secured data
management
anywhere.
EDGE
61
Last but not least…
Join the Rubrik Alliance,
get your Backup Wars kit.
bit.ly/VMUG-Swag
62
Q & A
Thanks for attending!
Don’t Backup. Go Forward.

More Related Content

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Ransomware Jail - Is There Any Way Out? (asking for a friend)

  • 1. Ransomware Jail Is there any way out? (asking for a friend)
  • 2. The Threat! Exploring the Threat – New Developments The Theory! The Theory vs. The Reality New Hope! Practical Solution + Real World Examples *A bit about me first - Andrew Miller - @andriven 2 1 2 3 Agenda
  • 3. 3 1. The Threat! Exploring the Threat – New Developments
  • 4. ran · som · ware /`ransəm , we(ə)r/ noun a type of malicious software designed to block access to a computer system until a sum of money is paid.
  • 5. 5 Base Definition We’ll make it fast. • Malware that typically infects endpoints (laptops, etc.) • Spread via browser vulnerabilities (malicious pages), e-mail attachments • Encrypts local filesystems and attached network mounts • Targeted attacks on individual storage vendors plausible – immutability will come into play over time. • (Previous) Best known name = Cryptolocker
  • 7.
  • 8. 8 The world has gotten scarier. And it’s not slowing down…
  • 9. 9 What’s New… • ZDNet – 2016 = $1B Cost • 2015 = $24M • Confusion – FBI Recommendation & About Face • High Profile Targets – SF Muni, Education, Healthcare, many more. • Challenges are not just 1) Data Accessibility but 2) Speed of Restore. • Not If but When – Why?
  • 10. 10 What’s New… Maturing Market • RaaS Kits – Ransomware as a Service Kits • Market Segmentation • Customer Service Improvements • Reliable Payment Model – Bitcoin Impact
  • 11. 11 This is a maturing business that competes with YOU.
  • 12. 12 Classic Defense Recommendations Operational Overhead? 1. Education 2. Antivirus, Patching, Filtering 3. Insurance 4. Data Protection - Backups
  • 13. 13 2. The Theory! The Theory vs. The Reality
  • 14. 14 “Backups are a must.” FBI, HIPAA, Sophos, Kaspersky, etc.
  • 15. 15 “Conducting frequent backups and ensuring the ability to recover data from backups is crucial to recovering from a ransomware attack and ensuring the integrity of PHI affected by ransomware.” http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf
  • 17. 17 Traditional Architecture 1990s – Present Backup & Replication Software Backup Storage Backup Software Backup Servers Backup Proxies Replication Catalog Database Tape Off-site Archive
  • 18. Let’s Be Fair There have been a few incremental improvements
  • 19. 19 Improvements! 1990s – Present Backup & Replication Software Backup Storage Backup Software Backup Servers Backup Proxies Replication Catalog Database Tape Off-site ArchiveBackup Storage a Dedupe Metadata 2000s – Present
  • 21. 21 It Starts Easy Enough … Win VM Hypervisor Production Servers SAN Backup Proxy Backup Server Tape Archive Offsite Tape Archive
  • 22. 22 … But Quickly Becomes Complex Hypervisor Production Servers SANDisk-based Backup Backup Proxy Backup Server Database Server Tape Archive Offsite Tape Archive Search Server VM DB VMLin Win VM
  • 23. 23 Multiple Scale and Touch Points Win DB Lin DB VM VM Hypervisor Production Servers SANDisk-based Backup Backup Proxies Backup Server Tape Archive Offsite Tape Archive VM VM VM VM Win Lin Database Server Search Server
  • 24. 24 Availability Bandages for SPOFs Hypervisor Production Servers SANDisk-based Backup Backup Proxies Backup Server Tape Archive Offsite Tape Archive Database Server Search Server Win DB Lin DB VM VM VM VM VM VM Win Lin
  • 25. 25 Master Server – Control & Manage SPOF Hypervisor Production Servers SANDisk-based Backup Backup Proxies Backup Server Tape Archive Offsite Tape Archive Database Server Search Server Win DB Lin DB VM VM VM VM VM VM Win Lin
  • 26. 26 Database – Catalog / Metadata SPOF Hypervisor Production Servers SANDisk-based Backup Backup Proxies Backup Server Tape Archive Offsite Tape Archive Database Server Search Server Win DB Lin DB VM VM VM VM VM VM Win Lin
  • 27. 27
  • 28. 28 Today’s Recovery Landscape Challenges • Reliability of Data Recovery • Speed of Data Recovery
  • 29. 29 Risk, Threats, and Vulnerabilities Risk is a function of the likelihood of a given threat acting upon a particular potential vulnerability, and the resulting impact of that adverse event on the organization.
  • 30. 30 Complexity Hypervisor Production Servers SANDisk-based Backup Backup Proxies Backup Server Tape Archive Offsite Tape Archive Database Server Search Server Win DB Lin DB VM VM VM VM VM VM Win Lin
  • 31. 31 3. New Hope! Practical Solution + Real World Examples
  • 32. 32 Complexity is the enemy of reliability. Whatever you do, Whatever you buy, Simplify your Backup Architecture.
  • 33. 33 Key Solution Concepts What we’ve seen that makes a difference… • Reliability of Data Recovery • Simplicity of Setup + Day to Day Operation
  • 34. 34 “We have already gone through two deployments with Rubrik, and have been really pleased with the ease of set-up. It takes about twenty minutes to rack the appliance, and four minutes to setup. We input our configuration details, the Rubrik system maps our VM environment, and we’re ready to start protecting our data” Nathan Bach, Senior Systems Engineer @ Driscoll’s
  • 35. 35 “We were using two leading Gartner Magic Quadrant vendors for backup software and backup storage. Just deploying backup software took a week, but with Rubrik’s turnkey appliance, the system was running and protecting our virtual environment within 30 minutes. Unboxing and racking the appliance was the hardest part” Jake Warren, Systems Administrator @ Red Hawk Casino
  • 36. Meet Rubrik 36 Backup Software Backup Servers Backup Proxies Replication Catalog Database Tape Off-site ArchiveBackup Storage a Dedupe Metadata Private Public Software fabric for orchestrating data across clouds. No forklift upgrades. Converges Backup Software & Globally Deduplicated Storage
  • 37. What’s the hardware? 37 The Smartest Dense Machine • 2U Supermicro appliance – “Brik” • Derived from Rubrik
  • 38. Rubrik Appliance 38 The Smartest Dense Machine • 2U Supermicro appliance – “Brik” • 4 nodes per appliance 1 2 3 4
  • 39. The hardware is simple. 39 The Smartest Dense Machine • 2U Supermicro appliance – “Brik” • 4 nodes per appliance • Unlimited scale-out fabric • Distributed file system • Shared-nothing architecture • Global deduplication • Inherent data protection • Cloud Providers for archive • Can run in AWS & Azure
  • 40. SLA ENGINE 40 Simple is hard. CLOUD DATA MANAGEMENT PLATFORM DISTRIBUTED METADATA DISTRIBUTED TASK FRAMEWORK CLUSTER MANAGEMENT SECURITYFILE SYSTEM Backup Recovery Search Replication Archival
  • 41. 41
  • 43. Example - VMware 43 vCenter Server vCenter Server
  • 44. vSphere Connectivity – Inventory Collection via API 44 vCenter Server VM VM VM VM VM VM VM VM
  • 45. Data Protection Policies with SLA Domains 45 vCenter Server Lin Win VM VM DB Win VM VM Silver SLA Gold SLA Bronze SLA
  • 46. 46 Recovery Point Objective (RPO) Availability Duration (Retention) When to Archive (RTO) Replication Schedule (DR) {SLA
  • 48. 48
  • 49. 49 “The system is simple to implement, allowing us to think about the things you really care about, such as the SLA policies to apply for protection.” Nathan Bach, Senior Systems Engineer @ Driscoll’s
  • 50. 50 There’s More! It’s not just VMware. Physical Linux Physical SQL Simplify protection of Linux servers with policy- driven automation and granular protection. Erasure Coding Deliver forever incremental, point-in-time recovery, intelligent log management with single SLA policy engine. Rubrik Edge Increase storage utilization and efficiency while delivering industry leading fault tolerance and performance. Extend data management to all business locations with full-featured software appliance. RBAC Secure management plane with granular control of user access to data across hybrid cloud. d0 d1 d2 d3 c0 c1 Physical Windows Encryption Custom Reporting
  • 51. Your Data Center Today 51 Backup Proxy SAN Production Servers Backup Server Search Server Disk-Based Backup Tape Archive Offsite Tape Vault
  • 52. Scale Out Scale Out 52 Simplification via Rubrik VM VM VM VM VM VM Hypervisor Production Servers SAN Rubrik Replication + Long Term Retention + Search Private
  • 53. 53 Key Solution Concepts What we’ve seen that makes a difference… • Reliability of Data Recovery • Simplicity of Setup + Day to Day Operation • Immutability of Snapshots
  • 54. 54 Key Solution Concepts What we’ve seen that makes a difference… • Reliability of Data Recovery • Simplicity of Setup + Day to Day Operation • Immutability of Snapshots • Speed of Data Recovery • Speed of restore via live mount
  • 55. 55 Live Mount Quick Start: Rack and go. Auto- discovery. Rapid Ingest: Flash-optimized, parallel ingest accelerates snapshots. Scale-out dedupe and compress. Automate: SLA policy engine for hands-free management. Recover: Instant and point-in-time recovery. Search and restore files. Recover from Ransomware. Customer Example #1 Secure: End-to-end encryption. Cloud: Secure “CloudOut” instantly accessible with global search. Primary Environment SLA Policy Engine Log Management NAS Private Public
  • 56. 56 Key Solution Concepts What we’ve seen that makes a difference… • Reliability of Data Recovery • Simplicity of Setup + Day to Day Operation • Immutability of Snapshots • Speed of Data Recovery • Speed of restore via live mount • Automation/API to enhance Restore Capabilities
  • 58. 58 In their own words… Lang’s Video Case Study
  • 59. 59 Today’s Recovery Landscape • Reliability of Data Recovery • Speed of Data Recovery
  • 60. 60 Rubrik Manages All Your Data - Anywhere NAS Production Rubrik Cloud Data Management Platform Backup & Recovery Disaster Recovery Archival & Compliance Search Copy Data Management Analytics Automated, secured data management anywhere. EDGE
  • 61. 61 Last but not least… Join the Rubrik Alliance, get your Backup Wars kit. bit.ly/VMUG-Swag
  • 62. 62 Q & A Thanks for attending!
  • 63. Don’t Backup. Go Forward.

Editor's Notes

  1. What’s the story here? There’s a real and growing threat, there’s a way out and it may not be the one you think.
  2. am presuming if you’re attending this webinar are already concerned, know some things but want to do a bit of education Theory = doesn’t equal day to day reality….we’ll talk about how that applies here and why from a very real world perspective Solution – no, not a silver bullet but something that can appreciably move the dial & increase your chances of not paying a ransom. Yes, it involves Rubrik…but we’ll spell it out as more than “buy Rubrik!” Harp on operational background - Barracuda spam filter, firewalls, permissions, etc. "That’s 60 seconds too much about me."
  3. Let’s be upfront – I’m here to scare you a bit….but it’s not our fault….and if you’re not aware of this you’ll be even worse b/c you’ll find out the worst way - when it’s too late
  4. Has been true for 3 years – wouldn’t be here if this was all. Immutable file systems -
  5. Has been true for 3 years – wouldn’t be here if this was all. Immutable file systems -
  6. Deutsche Bahn timetable from last Friday – May 12
  7. We’re not here to scare you – a Google search alone will do that. But this i
  8. $209M through 1st quarter - $1B this year, why the surge? Will explore that next… http://www.zdnet.com/article/the-cost-of-ransomware-attacks-1-billion-this-year/ Joseph Bonavolonta, the Assistant Special Agent who oversees the FBI’s CYBER and Counterintelligence Program in Boston, spoke at the 2015 Cyber Security Summit and advised that companies infected with ransomware may want to give in to the criminal’s demands. “The ransomware is that good,” Bonavolonta explained to an audience of business and technology leaders during the Q&A. “To be honest, we often advise people just to pay the ransom.” https://insidesmallbusiness.com.au/planning-management/ransomware-the-next-battlefield-for-smes SF Muni – had to let people ride free for a day. “San Francisco’s public transit riders were greeted with an unusual message at ticket kiosks over the weekend: “You hacked.” https://techcrunch.com/2016/11/28/san-francisco-transit-system-hit-with-ransomware/ http://www.theregister.co.uk/2016/11/27/san_francisco_muni_ransomware/ Hollywood Presbyterian Medical Center – paid $17k (1 full week of ambulances were diverted, electronic medical records disappeared, email was unavailable, and there was no access to X-ray or CT scan information.) and then hit for second demand - https://nakedsecurity.sophos.com/2016/05/25/ransomware-hit-hospital-faces-second-demand-despite-paying-up/ Horry County – paid ransom – CNN story – had a friend in a meeting about security where had to cut meeting short due to the outbreak. The Pearland Independent School District near Houston refused to fork over about $1,600 in ransom demanded in two attacks this year, losing about three days of work from teachers and students. Instead, the district invested tens of thousands of dollars on security software, said Jonathan Block, the district's desktop support services manager. Not If but When - Multiple surveys out there – some say 50%, some say 72% - some companies have been hit multiple time even. Bitcoin has also made the business model feasible.
  9. Can buy kits to build your own ransomware – come with instructions. This broadens out who can try this – classic model is 80% you take, kit author takes 20%. It’s a franchise model frankly that only requires medium computer skills Market segmentation - Different price ranges – different amounts of configurability. https://www.engadget.com/2016/09/09/customer-service-matters-when-it-comes-to-ransomware/
  10. We’re used to competition in some ways – SaaS, rogue or phantom IT, vendors that package separate products into a simple solution. But we’re not used to someone who competes with the core inefficiency of most IT today…keeping track of everything, keeping everything up to date, keeping everyone intelligent about how they use their computers. This is the reality…and this is why slowing the growth of ransomware in the near term will be almost impossible.
  11. Defense in depth - security is about having multiple layers and protections. Need layers that are low operational maintenance or can’t have very many layers. Before the fact human focused – user Before the fact tech focused Before the fact financially focused After the fact tech focused
  12. What’s the story here? There’s a real and growing threat, there’s a way out and it may not be the one you think.
  13. We’re not here to scare you – a Google search alone will do that. But this i
  14. We’re not here to scare you – a Google search alone will do that. But this i
  15. Let me take you back in time Not much has really changed since 1990 We have large levels of complexity Backup software components (servers & proxies) that reside on servers Backup media agents Replication components Catalog database Tape and offsite storage Any one of the components can fail at any one point in time over a 3-5 year period.
  16. Let me take you back in time Not much has really changed since 1990 We have large levels of complexity Backup software components (servers & proxies) that reside on servers Backup media agents Replication components Catalog database Tape and offsite storage Any one of the components can fail at any one point in time over a 3-5 year period.
  17. Add disk based backup & more robust backup solution with dedicated database and search capabilities.
  18. Have to scale out various points as environment grows.
  19. Need bandaids to protect against SPOF - think about n-1 and n-2 scenarios
  20. Master server protection
  21. Protect database server and most importantly your catalog. In most extreme situation, it leads to something like this.
  22. Chris Wahl tells a story as a customer admin new to a company where asked about restoring in the event of a major issue – everyone laughed and talked about how that was why they kept their resumes up to date.
  23. All of what we’ve talked about boils down to 2 main challenges - related but separate
  24. Full disclosure – over the years I’ve had a lot of conversations around Business Impact Analysis – looking at how much data can lose (RPO), how long to bring systems back online (RTO), and then all the second and third level impacts of those decisions. <read definition> As IT practitioners we provide a certain level of risk to our organization – might sound odd to say it that way but it’s true. In exchange for certain staffing and funding levels, we provide a certain level of risk – hopefully a mutually agreed upon level of risk. How do you protect against low probability, high impact scenarios? <next slide>
  25. However you protect against high impact, low probability scenarios you don’t do it with via complexity that requires daily maintenance just to keep going. I’m not walking back comments about how common ransomware attacks are – they’re common but not common an “every day of the week”. Keeping backups going requires effort each day.
  26. What’s the story here? There’s a real and growing threat, there’s a way out and it may not be the one you think.
  27. You might not agree with this everywhere…but it’s just about always true in IT systems. The more complexity we have, the more pieces to check/update/upgrade/monitor – the less reliability we have. What’s worst is when that “check/update/upgrade/monitor price” must be paid each day but we only reap the benefit at essentially random times. So how do we do that and how do we address the reliability of data recovery and the speed of data recovery? Well, I’m glad you asked.
  28. Immutability -
  29. Data protection for the Modern Data Center Converged data management Storage and software together in a single box Scales like Google & Facebook Runs on commodity hardware True tightly coupled clustering capabilities Masterless architecture (unlike competitive offerings wherein one node is the Master) Each node runs identical software Global file system, incremental scale out, auto adapting, and self healing While Data Domain supports multiple nodes, it is not a true cluster. Data on each node is in a silo and each node essentially operates independently. Cloud for long term retention There’s a war going on between Amazon, Microsoft, & Google for Cloud related marketshare Prices are rapidly dropping making it very cost effective Tell IT Director - take backup off your plate and give it someone junior to manage. Personas that resonate with Rubrik The guy who has backup as an ancilliary task then he becomes a champion. Ideal person - Vmware architect. Cloud architect. IT Director. Mid level (2nd level). Problem personas Backup admins with a long tenure in backup (and a PhD in Commvault!) - job security issues
  30. But the secret sauce isn’t the hardware – it’s the software. Yes – I’m glossing over this overall – but serious underpinnings.
  31. VADP, CBT, NBD - no backup proxies
  32. Physical Linux – Lightweight connector installation process. Post-installation, automated connector upgrades (compare to individual agent manual upgrade process) Physical SQL – Same agent benefits as Linux. Forever incremental results in space savings and network traffic optimization. PITR allows recovery granularity down to minute level. One snapshot coupled with log management allows for granular recovery.
  33. Take out the legacy systems Think about what the hyperconvergence movement is doing to the modern data center You can’t maintain and deploy all of the legacy infrastructure when you are moving to hyperconvergence.
  34. Take out the legacy systems Think about what the hyperconvergence movement is doing to the modern data center You can’t maintain and deploy all of the legacy infrastructure when you are moving to hyperconvergence. Public & private clouds play a key role as well and are natively supported by Rubrik (not an afterthought) Yes, can do DR as well.
  35. Immutability -
  36. Immutability -
  37. Immutability -
  38. Our UI uses own API but not going to talk about this one as much as let you hear it from a customer.
  39. What’s the story here? There’s a real and growing threat, there’s a way out and it may not be the one you think.
  40. Have gone a long way around – logical links are tenuous at a theoretical level - but the reason I’m comfortable with drawing these correlations is my operations and architecture background. I hope today has helped you with seeing where theory meets reality when it comes to Reliability of Data Recovery & Speed of Data Recovery and how Rubrik can help you in times when those truly matter.
  41. One platform that unlocks multiple use cases. Beyond backup.
  42. Have gone a long way around – logical links are tenuous at a theoretical level - but the reason I’m comfortable with drawing these correlations is my operations and architecture background. I hope today has helped you with seeing where theory meets reality when it comes to Reliability of Data Recovery & Speed of Data Recovery and how Rubrik can help you in times when those truly matter.
  43. What’s the story here? There’s a real and growing threat, there’s a way out and it may not be the one you think.