SlideShare a Scribd company logo
1 of 25
#1 All-in-One Enterprise
Backup and Continuity
The Enemy Within
February X, 2018
Dick Csaplar – Product Marketing Manager
© 2017 Unitrends 2
Minutes Count!
*Average Cost of Downtime - $9,000 per minute
Source: Ponemon Institute© Research Report https://www.vertivco.com/globalassets/documents/reports/2016-cost-of-data-center-outages-11-11_51190_1.pdf
Availability Downtime (Year) Downtime
(Month)
Downtime Cost
(Month)*
99% 3.7 days 7.2 hours $3.9m
99.9% 8.8 hours 44 minutes 396K
99.99% 52 minutes 4 minutes $36K
© 2017 Unitrends 3
Causes of Downtime
23%
22%
17%
11%
10%
7%
5% 4%
Human Error
SW Issues
Server Room Issues
Power Outage
On-site Disaster
Virus/Malware
Hardware Error
Natural Disaster
Source: CRN Magazine: http://www.crn.com/slide-shows/storage/240006796/8-surprising-disaster-recovery-stats.htm/pgno/0/7
Types of employees for which you need
protection
#1 – Those that Install Untested
Software
© 2017 Unitrends 6
Copy Data Management (CDM)
• Uses backup data (i.e. production copies)
• Orchestrates instant recovery of on-demand labs
• Isolates labs from production
• Controls lab access to key stakeholders
• Supports physical and virtual environments
Easily spin up a Test / Dev environment
Provides instant access to production data, applications, and full
labs for test, dev, compliance, and other business functions with
no impact to the production environment
© 2017 Unitrends 7
Now - Security Integrated Copy Data Management
Add a security scan to any Copy Data Management job
• ClamAV antivirus can scan for threats prior to spinning up test / dev
environments
• Off-loads some security from production servers
• Ensures test / dev environments are virus free
• Another step to attack ransomware
#2 – Malicious Employees
© 2017 Unitrends 9
Role-based Management
What it does? Provides self-service and granular control of backup
and recovery at the system and database level.
How does it work? • Assign backup or recovery operation
• Select scope – system, database
Customer
benefits
“Less work for me. My SQL admin can
do her own recoveries without messing
up the rest of the environment.”
© 2017 Unitrends 10
 3-2-1 Data Protection Strategy
 Off-site replication
 Cloud-based storage
 Infinite retention
 Archives
Limit Damage from File Deletion
© 2017 Unitrends 11
Don’t Forget SaaS Apps - Office 365
• Restore email in seconds
instead of hours
• Recover calendars and
contacts—something
Office 365 can’t do
natively
• Even recover entire
folders, accounts, and
mailboxes
#3 – Ransomware Click Bait
© 2017 Unitrends 13
2016 Ransomware Events by Industry
Source: Baker, Donelson, Bearman, Caldwell & Berkowitz, PC
© 2017 Unitrends 14
Protect Secure Test Detect Recover
The Right Backup Solution Fights Ransomware
Multiple Ways
New!
Often
ignored
!
Over-
looked!
© 2017 Unitrends 15
Simplicity
means fewer
gaps that
ransomware
can exploit
Old World New World
Secure
Hardened Linux
© 2017 Unitrends 16
Get More Confidence with Recovery
AssuranceTest
© 2017 Unitrends 17
Ransomware 2.0
Catch them in the act before the damage is done
 New malware variants operate in stealth mode, encrypting at a
slower rate to stay under the detection radar
 AI in 10.1 runs every backup against every file, analyzing the
randomness of file changes to identify infected backups
 Email and dashboard alerts are immediately sent to
administrators
 Suspected files are flagged with an icon
Detect
#4 – Data Hoarders
© 2017 Unitrends 19
Growing Amounts of Data Being Protected
44%
56%
Many large enterprises
protect over a PB of data.
0%
10%
20%
30%
40%
50%
60%
70%
1 - 25TB 26 - 100TB Over 100TB
2016 2017
© 2017 Unitrends 20
1. Forever Cloud
Long-Term Retention
Purchased in 500GB
increments of protected capacity
Tiered Cloud Structure
2. Choose Your
Retention Window
Available for:
3. Choose Your
DRaaS
Configure various options
4. Add Elite or Premium
DRaaS
per instance
Add 1 or 24 Hour SLA and
Recovery Assurance
© 2017 Unitrends 21
Unitrends Cloud Cost Calculator
https://www.unitrends.com/
cloud-cost-comparison-calculator-
full-version
#5 – Everyone
© 2017 Unitrends 23
Fast Recoveries
You should be able to recover a deleted file in less than 5
minutes
• Log-on to the file being active
• Intuitive User Interface – no training required
• Any IT member should be able to do it
© 2017 Unitrends 24
Easy to Understand Interface
© 2017 Unitrends 25
Call to Action– Visit www.Unitrends.com
Take a 5 Minute DR Health Check
Download at https://unitrends.typeform.com/to/N36LTm?
See what others project as to the size and timing of a downtime event
Request a Demo
Register at https://www.unitrends.com/products/demos/unitrends-backup-live-demo
Talk with One of Our Continuity Experts
Get immediate assistance: https://www.unitrends.com/company/contact

More Related Content

What's hot

Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossarysinglehopsn
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...Veritas Technologies LLC
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuitymarketingunitrends
 
Cloud computingpptx
Cloud computingpptxCloud computingpptx
Cloud computingpptxjohnsonbcs
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisAcronis
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs FactsOPAQ
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudVeritas Technologies LLC
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disastersAlexandra Matthiesen
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldInnoTech
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.Глеб Хохлов
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud Threat Stack
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesVMware
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyVeritas Technologies LLC
 
Unintended consequences
Unintended consequencesUnintended consequences
Unintended consequencessflaig
 

What's hot (20)

Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossary
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuity
 
Cloud computingpptx
Cloud computingpptxCloud computingpptx
Cloud computingpptx
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by Acronis
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs Facts
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloud
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery Mold
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 
Unintended consequences
Unintended consequencesUnintended consequences
Unintended consequences
 

Similar to Your Greatest Threats Come from Within

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Veritas Technologies LLC
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsPaula Koziol
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityJürgen Ambrosi
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomwaremarketingunitrends
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.SoulStoneBR
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsOK2OK
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bankmarketingunitrends
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productivemarketingunitrends
 
Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Lai Yoong Seng
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
 
Backup exec 2015 end user presentation
Backup exec 2015 end user presentationBackup exec 2015 end user presentation
Backup exec 2015 end user presentationTania Macarlupú
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...IRJET Journal
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file servicesMinimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file servicesDavid Finkelstein
 

Similar to Your Greatest Threats Come from Within (20)

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bank
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
 
Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss?
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
Backup exec 2015 end user presentation
Backup exec 2015 end user presentationBackup exec 2015 end user presentation
Backup exec 2015 end user presentation
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file servicesMinimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
 

More from marketingunitrends

8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaSmarketingunitrends
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DRmarketingunitrends
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?marketingunitrends
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?marketingunitrends
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Nightmarketingunitrends
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?marketingunitrends
 
DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?marketingunitrends
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucksmarketingunitrends
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointingmarketingunitrends
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?marketingunitrends
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?marketingunitrends
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinarmarketingunitrends
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloudmarketingunitrends
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First marketingunitrends
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...marketingunitrends
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliancemarketingunitrends
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factorsmarketingunitrends
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinitymarketingunitrends
 

More from marketingunitrends (20)

8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Night
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?DR, IT Resilience, & Continuity: What's the Difference?
DR, IT Resilience, & Continuity: What's the Difference?
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucks
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinity
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Your Greatest Threats Come from Within

  • 1. #1 All-in-One Enterprise Backup and Continuity The Enemy Within February X, 2018 Dick Csaplar – Product Marketing Manager
  • 2. © 2017 Unitrends 2 Minutes Count! *Average Cost of Downtime - $9,000 per minute Source: Ponemon Institute© Research Report https://www.vertivco.com/globalassets/documents/reports/2016-cost-of-data-center-outages-11-11_51190_1.pdf Availability Downtime (Year) Downtime (Month) Downtime Cost (Month)* 99% 3.7 days 7.2 hours $3.9m 99.9% 8.8 hours 44 minutes 396K 99.99% 52 minutes 4 minutes $36K
  • 3. © 2017 Unitrends 3 Causes of Downtime 23% 22% 17% 11% 10% 7% 5% 4% Human Error SW Issues Server Room Issues Power Outage On-site Disaster Virus/Malware Hardware Error Natural Disaster Source: CRN Magazine: http://www.crn.com/slide-shows/storage/240006796/8-surprising-disaster-recovery-stats.htm/pgno/0/7
  • 4. Types of employees for which you need protection
  • 5. #1 – Those that Install Untested Software
  • 6. © 2017 Unitrends 6 Copy Data Management (CDM) • Uses backup data (i.e. production copies) • Orchestrates instant recovery of on-demand labs • Isolates labs from production • Controls lab access to key stakeholders • Supports physical and virtual environments Easily spin up a Test / Dev environment Provides instant access to production data, applications, and full labs for test, dev, compliance, and other business functions with no impact to the production environment
  • 7. © 2017 Unitrends 7 Now - Security Integrated Copy Data Management Add a security scan to any Copy Data Management job • ClamAV antivirus can scan for threats prior to spinning up test / dev environments • Off-loads some security from production servers • Ensures test / dev environments are virus free • Another step to attack ransomware
  • 8. #2 – Malicious Employees
  • 9. © 2017 Unitrends 9 Role-based Management What it does? Provides self-service and granular control of backup and recovery at the system and database level. How does it work? • Assign backup or recovery operation • Select scope – system, database Customer benefits “Less work for me. My SQL admin can do her own recoveries without messing up the rest of the environment.”
  • 10. © 2017 Unitrends 10  3-2-1 Data Protection Strategy  Off-site replication  Cloud-based storage  Infinite retention  Archives Limit Damage from File Deletion
  • 11. © 2017 Unitrends 11 Don’t Forget SaaS Apps - Office 365 • Restore email in seconds instead of hours • Recover calendars and contacts—something Office 365 can’t do natively • Even recover entire folders, accounts, and mailboxes
  • 12. #3 – Ransomware Click Bait
  • 13. © 2017 Unitrends 13 2016 Ransomware Events by Industry Source: Baker, Donelson, Bearman, Caldwell & Berkowitz, PC
  • 14. © 2017 Unitrends 14 Protect Secure Test Detect Recover The Right Backup Solution Fights Ransomware Multiple Ways New! Often ignored ! Over- looked!
  • 15. © 2017 Unitrends 15 Simplicity means fewer gaps that ransomware can exploit Old World New World Secure Hardened Linux
  • 16. © 2017 Unitrends 16 Get More Confidence with Recovery AssuranceTest
  • 17. © 2017 Unitrends 17 Ransomware 2.0 Catch them in the act before the damage is done  New malware variants operate in stealth mode, encrypting at a slower rate to stay under the detection radar  AI in 10.1 runs every backup against every file, analyzing the randomness of file changes to identify infected backups  Email and dashboard alerts are immediately sent to administrators  Suspected files are flagged with an icon Detect
  • 18. #4 – Data Hoarders
  • 19. © 2017 Unitrends 19 Growing Amounts of Data Being Protected 44% 56% Many large enterprises protect over a PB of data. 0% 10% 20% 30% 40% 50% 60% 70% 1 - 25TB 26 - 100TB Over 100TB 2016 2017
  • 20. © 2017 Unitrends 20 1. Forever Cloud Long-Term Retention Purchased in 500GB increments of protected capacity Tiered Cloud Structure 2. Choose Your Retention Window Available for: 3. Choose Your DRaaS Configure various options 4. Add Elite or Premium DRaaS per instance Add 1 or 24 Hour SLA and Recovery Assurance
  • 21. © 2017 Unitrends 21 Unitrends Cloud Cost Calculator https://www.unitrends.com/ cloud-cost-comparison-calculator- full-version
  • 23. © 2017 Unitrends 23 Fast Recoveries You should be able to recover a deleted file in less than 5 minutes • Log-on to the file being active • Intuitive User Interface – no training required • Any IT member should be able to do it
  • 24. © 2017 Unitrends 24 Easy to Understand Interface
  • 25. © 2017 Unitrends 25 Call to Action– Visit www.Unitrends.com Take a 5 Minute DR Health Check Download at https://unitrends.typeform.com/to/N36LTm? See what others project as to the size and timing of a downtime event Request a Demo Register at https://www.unitrends.com/products/demos/unitrends-backup-live-demo Talk with One of Our Continuity Experts Get immediate assistance: https://www.unitrends.com/company/contact

Editor's Notes

  1. Thanks I appreciate you joining today - Hope not to take too much of your time As Kevin said my name is … and I am the Product Marketing Manager for Unitrends. - Burlington Want to take the next 20 minutes or so sharing how you can shorten the time between disaster and recovery.
  2. You may think you are protected but today even the shortest periods of downtime are expensive. Even if you believe you can provide your company uptime of 99% it can still cost you about $4M in costs and lost business – assuming average cost of downtime is $9K per minute The whole reason for recovery technologies is to reduce the amount of enterprise downtime. Even reducing the amount of downtime from 99.9% to 99.99% can save average enterprises over $4 million a year. These numbers are what is driving the adoption of these new technologies.
  3. Previous job was an analyst. This jives with my research Largest cause of downtime is human error – factor in other causes Traditional DR marketing actually covers just 25% of causes 4% natural disaster – compare this with the % of DR material on the web
  4. 5 Currently available technologies – our goal for the webcast. These are available today and they should be in the tool box of every IT organization charged with protecting company’s data and applications
  5. This is the number 2 cause of downtime
  6. Backups are for more than just recovery – touch every aspect of the business Looking for ways to use backups to increase productivity, eliminate downtime This is best practices – spin up Tet Dev environment m- on the backup appliance, on a remote server or in the cloud.
  7. Virus scans can sometimes suck up a lot of server capacity. Sometime certain production machines are too impacted to scan for viruses in production. Security Integrated CDM with Unitrends 10.1 allows you to perform this function against your backups. ClamAV, an open source Linux antivirus software package is now included with 10.1 so you can add a security scan prior to bringing up a test dev environment.
  8. Included in cause #1 – Human error As an analyst it was hard to get data to research this – no admit that HR was so bad or employee rage would be allowed to grow so large. Anacdotal evidence is that this is fairly common
  9. Odd that we are discussing a way to give more people access to backups. But this is critical, especially for mid-sized and large companies. Role-based management – let data owners manage their own data. They see only the data files that you assign, you assign levels of privilege UI is easy enough for non-technical users to understand and perform tasks
  10. Follow best practices in protecting data. 3 copies, 2 formats 1 offsite
  11. As most employees primarily have access to Outlook, that is the data that they would delete The basic data protection from Microsoft will not do it – employee deletes data and empties wastebasket – data gone. This is true for SharePoint and One Drive as well. Unitrends O365 protection allows infinite recovery so nothing is ever really deleted. You should be able to do in 5 minutes what it might take 5 hours to do using Office 365 archiving tools. Plus, you need granular recovery - not just email but things like folders, calendars, contacts, - and broad levels of recovery - entire accounts
  12. Malware / virus is cause number 6 Backups now playing a larger role in limiting impact
  13. Ransomware affects all industries but healthcare and financial the most. We anticipate new, more powerful ransomware attacks in 2018 Introducing enhanced automated detection and recovery from ransomware
  14. You need a 5 step program to fight against ransomware: We all know protect and recover Protect is to have a good virus scanner and educate your users not click on suspect docs Recover is to have a backup solution as this is the only sure way to recover from an attack. Even paying is not really recovering as you then go on a short list of willing to pay targets We are going to focus on three steps most organizations don’t consider – Secure, Test and Detect
  15. The first best practice – use a single vendor to handle your entire backup and recovery solution. A multi-vendor solution opens gaps that can be exploited y ransomware criminals. If you have two or more vendors you will be condemned to trying to figure out where your problem lies and which vendor to call for support. A quick view of our offerings: A Single fully integrated solution If you tried to put together your own solution (that is what some vendors require you to do) it could require at least 9-10 components and then you would have tons of interoperability and support issues The image is our Recovery Series all-in-one hardware backup and continuity appliance. We also have a software appliance call Unitrends Backup that can run on one of your servers and use your existing storage devices. Unitrends appliances include software to fully integrate with our own cloud but we also work with hyperscale clouds such as AWS and Azure
  16. A formal report with detailed information can be used to for compliance reporting Many of our Healthcare customers use the report for HIPAA compliance – to prove they have a recovery plan and can meet their forecasted recovery points and times.
  17. As ransomware evolves, so do we Newer versions encrypt more slowly – we catch it Unitrends 10.1 includes the ability to quickly and accurately identify ransomware activity as part of every backup
  18. While not an official cause of downtime this is increasing the challenge of backup and data proteciton
  19. 2017 Cloud survey found companies protecting larger volumes of data. We find 10% compounding growth rates per year for total volumes of storage are about average. PB volumes of data are now not uncommon Also being told to store them for longer periods of time with data compliance requirements from some industries Example – pharma – examples
  20. Look to Cloud storage as it is much cheaper than buying SANs or NAS devices. You can also use the same data for DRaaS to reduce downtime. Simple to buy - We offer tiered cloud services: You can purchase protection just for what you want to protect. You purchase in 500GB blocks the data you want for long term retention of disaster recovery purposes. We can use the same file for both DR or archiving. Next you purchase the length of time you want the data stored. 90 days – 7 years to forever – most companies have data retention schedules so you can match these to your cloud storage – 3 years for press information, 7 years for tax information, etc. Then you choose DRaaS services you want – unlimited or you select what workloads to come up, in what order - low cost per instance Finally, for critical machines we have Premium DRaaS – with a 1 hour SLA – we do monthly testing and present you a report to address any issues found. We understand what you want to do and we make sure it will happen – this is a contractual SLA that you will never get from Azure or AWS.
  21. Those were just sample configurations. We have on our web site a cloud cost calculator. You can vary the scenarios and make the variables represent your specific requirements. This way you can see for yourself how cloud costs can vary greatly depending on your situation.
  22. Finally – sorry to say – we are all causes of lost data and drags on IT time.
  23. File recovery is the most common, unscheduled, interrupt driven task IT is asked to perform. Many stories of users calling to say “ Don’t know who lost my file but it is just gone”
  24. Here is the dashboard See Recover button – easy to identify previous backups, files that are included and recovery is just pushing a single button These are actually tiles that can be moved
  25. We have some resources that might interest you if you want more information: Take this 5 Minute DR Checkup to see how prepared you are for the future. You will see what others in the industry project as to the size and timing of a downtime event. You will also receive advice on how to reduce that impact and speed the time of your recovery. The tool also includes access to four calculators you can use to fine tune with your specific metrics and gain insights to your specific set of circumstances. We have free trials of both our hardware and software backup and business continuity appliances. Go to our website and click on free-downloads. We have demos and links to contact experts who can go deeper into the solutions I described for you today. Now back to Kevin to host the Q & A portion of the webcast.