SlideShare a Scribd company logo
1 of 41
Back-ups:
Hoe ze je kunnen redden
van een cyberaanval
Combell webinar
Pieter Vereecken
Sr. Cloud Systems Engineer
pieter.vereecken@veeam.com
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
You were automatically muted on entry
If you have a question, use the Q&A
or chat functions
We will post the recording and the presentation
This webinar
is being recorded
About this webinar
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
In this session…
Why you can never be protected 100% against hackers
and why you need (off-site) backups.
 Data protection strategy
 Security
 On-site & Off-site backups
 Demo
 Monitoring & Reporting
 Q & A
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
The most trusted
provider of Backup
solutions that deliver
Cloud Data Management
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
A Single Platform for Cloud, Virtual and Physical
Backup & Replication
Backup and replication
Monitoring and analytics
DataLabs
Orchestration
Universal Storage APIs
CloudSaaSPhysicalVirtual
Object Storage
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Why Veeam?
“It Just Works”
Portable data format
Instant recovery
Strong support
Reliable
Built-in intelligence
Actionable insights
100% verified recovery
Scalable architecture
Simple
Software defined
Hardware agnostic
Copy data management
Cloud ready
Flexible
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Ransomware protection
best practices
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Starts with mitigating security risks
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Security is inconvenient!
Let’s meet Dave >
Domain admin
Controls the whole domain for the
organization!
Backup administrator
Can perform all administrative
backup activities!
Storage administrator
Manages the production storage
and the backup storage!
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Production Domain
Dave’s IT operation
DMZ
Offline Domain
Secondary storagePrimary storage
vCenter
server
VM’s
vApp
VM
snapshots
Storage
Clients
Users
Applications
Servers
Production
AD
Separation
By IAM and Firewall
Random Backup
infrastructure
Tape backup policy, weekly full backup to tape (keep 5
weeks) and also a monthly full to tape (keep for 12 months)
Backup policy, daily backup to disk of all
servers and workstations
1. No protection against cyber-attacks
2. Big risk! Everything is running in the
same security domain
3. Only week backups are stored offline
Human Error
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Think about security aspects
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Production Domain Resource domain
Identity and Access Separation
DMZ
Public Cloud IAM
One-Way Trust
Complete
Separation
Complete Separation
Object
Storage
BLOB API
S3 API
Service ProviderOffline Domain
Secret Key + Shared Key + Veeam Encryption
Secret Key + Shared Key + IAM Access Role + Veeam Encryption + Immutability
Backup server
S3 API
Object
Storage
AD Auth (sep.acc)
Windows
Repository
Service Provider
Access Keys
Local Linux Cred.
Linux
Repository
COS APISecret Key + Shared Key + Veeam Encryption
Secondary storagePrimary storage
Backup
Proxies
Restricted Zone
Vendor Spec. Prot
Dedup
Appliances
vCenter
server
VM’s
vApp
VM snapshots
Storage
Clients
Users
Applications
Files
Service
Provider
Recycle Bin
Feature
Production
AD Resource
AD
Human Error
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Design for ‘cyber’-recovery
Infection ExploitDetection Recovery
• 3-2-1 Backup
• SureBackup
• Veeam ONE
• Data Integration API
• Staged Restore
• DataLabs Forensics
• Enhanced NAS Recovery
• Secure Restore
• Cloud Tier with
Immutability
• Cloud Connect
Detection features Recovery features
• Tape backup
• Restore to Azure
• Restore to AWS
• Physical to Virtual
recovery
Cyber Attack
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Avoiding recovery failure
3-2-1-0 Rule
2Different media
3Different copies
of data
1of which is off
site or offline
0No errors
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Offline or air-gapped storage
Likely the single most effective resiliency technique is to have some form of offline
storage: tape, removable disk, etc.
Completely offline when not being written to or read from
Replicated VMs Powered off and, in most situations, can be a different authentication
framework (ex: vSphere and Hyper-V hosts are on a different domain)
Primary storage
snapshots
Can be used as recovery techniques and usually have a different authentication framework
Veeam Cloud Connect
backups
Not connected directly to the backup infrastructure and uses a different authentication mechanism along
with different API and Serviceprovider based Recycle-Bin
Rotating hard drives
(rotating media)
Offline when not being written to or read from (similar to tape)
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
3-2-1-0 in place, recovery covered?
What are you achieving with 3-2-1-0?
Does it have anything to do with recovery?
Does it say anything about how long restore will take?
Does it say anything about where to restore to?
Does it say anything about the order in which to restore?
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Business Continuity is Key
How much time it takes to recover your data and how recent
the backup to restore is are defined in RTO and RPO.
Last backup
Recovery point
Recovery data
Recovery TimeOutage
How far How long
Recovery Time Objective (RTO)
The amount within which a system must be recovered
after an outage
Recovery Point Objective (RPO)
Point in time to which system's data must
be recovered after an outage
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam
Backup & Replication
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam
Backup Server
Source hosts Loadbalancing
Backup
central management of
local and remote
components
Production
Tape Server
Backup
Proxies
Veeam High Level Architecture
Off-site Storage
Secondary copy
and long-term
retention
Scale-out
Repository
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Backup & Replication
Storage Snapshots
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Use of Storage Snapshots for better RTO and RPO
During backup, data transport and consistency processing reduce performance
of applications.
Leverage storage snapshots between the backup for even better Recovery Time
and Recovery Point Objectives.
3 PM
Snap
Backup
+ snap
Snap Snap Snap Snap Snap Snap Snap Snap Snap
Backup
+ snap
8 PM 9 PM 10 PM 11 PM 12 PM 1 AM 4 PM 5 PM
…
6 PM 7 PM 8 PM
…
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Explorer for Storage Snapshots
Instant VM
Recovery
Linux Files
Windows Files
Active
Directory
Exchange
SharePoint
MS SQL
Oracle
Veeam backup and replication
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Backup & Replication
Backups
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Backup of Virtual Machines
Inline data reduction
Change block tracking aware
Agentless backup
256-bit encryption
Policy driven backup automation
Build-in application aware processing of:
• Microsoft Active Directory
• Microsoft Exchange
• Microsoft SQL
• Microsoft SharePoint
• Oracle Databases
Image-level backup with granular restore options
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Policy driven Backup
SLA based policies
Based on tags
Automated through
VMware vCenter
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Backup & Replication
Backup Copies
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Backup Copy
Comply with the 3-2-1-0 rule
Production storage Primary backup storage
WAN acceleration
Secondary backup storage
Secondary backup storage
(offsite)
Backup
Backup copy
Backup copy
Combell
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Build-in WAN Acceleration
Built-in WAN Acceleration with global caching, variable block length data fingerprinting and
traffic compression
Source Backup
Repository
Target Backup
Repository
Data Mover
Service
Target
WAN Accelerator
WAN
Backup Copy
and/or Replica job
Source
WAN Accelerator
Data Mover
Service
Reduce bandwidth needed to copy
your backups to a secondary location
Save on bandwidth costs by efficiently
sent only the missing blocks
Intelligently save time on backup copy
and replica jobs
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Cloud Connect Backup
Client
 Customer has no cloud resources to manage
 Offsite backups can be protected against ransomware
Combell data center
Veeam
Service
Provider
WAN
Cloud
gateway
Backup
repository
Cloud repositories
Production Veeam Environment
Veeam Cloud
Connect SSL tunnel
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Insider Protection
Deleted Backups Protection
 Per tenant setting
 For the tenant, backup files moved to
the "recycle bin" appear as actually
deleted.
 To restore from “recycle bin”, tenant
must contact service provider.
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Recover Full VMs, Files and Folders
Restore functionalities
include:
 Full VM restore
 VM files restore
 VM guest OS files
restore
 Application items
restore
 Disk export
 Backup export
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Demo
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Data Protection
Monitoring & Reporting
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Why do we need analytics?
In order to maintain Availability organizations require analytics into:
 Storage capacity and performance
 Failed VM backups
 Failed compliance
 Data management resources and associated costs
 Tracking configurations
 And more!
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Identify EVERY Unprotected VM
Veeam ONE helps users easily determine which VMs are protected and which are
not by categorizing VMs based on restore points to:
 Provide users valuable time to ensure protection of each VM
 Dramatically reduce the risk of downtime
Are you completely protected?
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Backup Reporting
Including:
 Backup Infrastructure assessment
 Performance and bandwidth savings from built-in WAN acceleration
 Audit operator restore activity
 Status of backup and replication jobs
 Unprotected VMs that are not covered by any backup jobs
 Change tracking for backup job configuration
 GFS Backup files
 VM and computer protection history
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Track backup object changes
Report on who changed what settings and
when.
Governance & Compliance
Audit backup infrastructure changes and
report on user account and modifications.
Object Change Tracking
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Recovery Verification Recovery Verification
Recovery Verification
Overview
Validates the completion status of
SureBackup jobs and displays the results of
recovery verification tests
Governance & Compliance
The report helps you reveal the list of
operational VMs that can be restored
from the produced backup or replicas
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Key takeaways
Design with security in mind
Use multiple backup locations (3-2-1 rule)
Use multiple security domains
Offline and offsite backups can be lifesavers
Document everything (reporting)
Use multiple authentication accounts and roles
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Questions?
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
THANK YOU!

More Related Content

What's hot

Crm implementation (oracle)
Crm implementation (oracle)Crm implementation (oracle)
Crm implementation (oracle)Lauren Taylor
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsSolarWinds
 
Cloud video surveillance
Cloud video surveillanceCloud video surveillance
Cloud video surveillancePete Fernando
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksKappa Data
 
Increasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyIncreasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyNexenta Systems
 
Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_VCAP5_wordpress
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentationSoftechms
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks OverviewAEC Networks
 
2019 Pure Storage Top Ten Benefits
2019 Pure Storage Top Ten Benefits2019 Pure Storage Top Ten Benefits
2019 Pure Storage Top Ten BenefitsMarketingArrowECS_CZ
 
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...Kenny Buntinx
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guidesolarisyougood
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmwareAnton An
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewsolarisyougood
 

What's hot (20)

Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Crm implementation (oracle)
Crm implementation (oracle)Crm implementation (oracle)
Crm implementation (oracle)
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) Solutions
 
Cloud video surveillance
Cloud video surveillanceCloud video surveillance
Cloud video surveillance
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
 
Increasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability TechnologyIncreasing Business Value Through High-Availability Technology
Increasing Business Value Through High-Availability Technology
 
Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Disaster Recovery Cook Book
Disaster Recovery Cook BookDisaster Recovery Cook Book
Disaster Recovery Cook Book
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
2019 Pure Storage Top Ten Benefits
2019 Pure Storage Top Ten Benefits2019 Pure Storage Top Ten Benefits
2019 Pure Storage Top Ten Benefits
 
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmware
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
 

Similar to How Backups Can Save You from a Cyber Attack

VMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability SuiteVMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability SuiteTeck Sze Tay
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxPrince Joseph
 
Veeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longVeeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longS. Hanau
 
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 Wales Chen
 
Mc git ops_incorpbackups_kanister
Mc git ops_incorpbackups_kanisterMc git ops_incorpbackups_kanister
Mc git ops_incorpbackups_kanisterLibbySchulze
 
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in AzureFlash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in AzureYoong Seng Lai
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 
Technical track 2: arcserve UDP for virtualization & cloud
Technical track 2: arcserve UDP for virtualization & cloudTechnical track 2: arcserve UDP for virtualization & cloud
Technical track 2: arcserve UDP for virtualization & cloudarcserve data protection
 
Databarracks zerto - webinar - sept2015-slideshare
Databarracks zerto - webinar - sept2015-slideshareDatabarracks zerto - webinar - sept2015-slideshare
Databarracks zerto - webinar - sept2015-slideshareDatabarracks
 
Dr Training V1 07 17 09 Rev Four 4
 Dr Training V1 07 17 09 Rev Four 4 Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4Ricoh
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRNetgear Italia
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201Michael Hudak
 
Presentazione Zerto @ VMUGIT UserCon 2015
Presentazione Zerto @ VMUGIT UserCon 2015Presentazione Zerto @ VMUGIT UserCon 2015
Presentazione Zerto @ VMUGIT UserCon 2015VMUG IT
 
A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...
A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...
A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...Amazon Web Services
 
eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...
eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...
eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...eFolder
 
veeam_vbo365_short_deck.pptx
veeam_vbo365_short_deck.pptxveeam_vbo365_short_deck.pptx
veeam_vbo365_short_deck.pptxFadhilMuhammad80
 
Slide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 GennaioSlide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 GennaioNetApp
 

Similar to How Backups Can Save You from a Cyber Attack (20)

VMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability SuiteVMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability Suite
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
 
Veeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longVeeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - long
 
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀 2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀
 
Mc git ops_incorpbackups_kanister
Mc git ops_incorpbackups_kanisterMc git ops_incorpbackups_kanister
Mc git ops_incorpbackups_kanister
 
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in AzureFlash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
Technical track 2: arcserve UDP for virtualization & cloud
Technical track 2: arcserve UDP for virtualization & cloudTechnical track 2: arcserve UDP for virtualization & cloud
Technical track 2: arcserve UDP for virtualization & cloud
 
Databarracks zerto - webinar - sept2015-slideshare
Databarracks zerto - webinar - sept2015-slideshareDatabarracks zerto - webinar - sept2015-slideshare
Databarracks zerto - webinar - sept2015-slideshare
 
Technical track 2_Virtualization & Cloud
Technical track 2_Virtualization & CloudTechnical track 2_Virtualization & Cloud
Technical track 2_Virtualization & Cloud
 
Dr Training V1 07 17 09 Rev Four 4
 Dr Training V1 07 17 09 Rev Four 4 Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4
 
VMware
VMwareVMware
VMware
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
 
Ransomeware Recovery by Veeam
Ransomeware Recovery by VeeamRansomeware Recovery by Veeam
Ransomeware Recovery by Veeam
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201
 
Presentazione Zerto @ VMUGIT UserCon 2015
Presentazione Zerto @ VMUGIT UserCon 2015Presentazione Zerto @ VMUGIT UserCon 2015
Presentazione Zerto @ VMUGIT UserCon 2015
 
A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...
A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...
A Deeper Look at How Veeam is Evolving Availability on AWS (STG206-S) - AWS r...
 
eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...
eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...
eFolder Expert Series Webinar – How to Set Up Off-Site Backup for Veeam Deplo...
 
veeam_vbo365_short_deck.pptx
veeam_vbo365_short_deck.pptxveeam_vbo365_short_deck.pptx
veeam_vbo365_short_deck.pptx
 
Slide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 GennaioSlide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 Gennaio
 

More from Combell NV

Play it extra safe! Kies een goede cyberverzekering
Play it extra safe! Kies een goede cyberverzekeringPlay it extra safe! Kies een goede cyberverzekering
Play it extra safe! Kies een goede cyberverzekeringCombell NV
 
Hoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van CombellHoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van CombellCombell NV
 
Managed WordPress bij Combell – wat doet dat precies?
Managed WordPress bij Combell – wat doet dat precies?Managed WordPress bij Combell – wat doet dat precies?
Managed WordPress bij Combell – wat doet dat precies?Combell NV
 
Cyberaanvallen: Overzicht, gevolgen en beveiligingstips
Cyberaanvallen: Overzicht, gevolgen en beveiligingstipsCyberaanvallen: Overzicht, gevolgen en beveiligingstips
Cyberaanvallen: Overzicht, gevolgen en beveiligingstipsCombell NV
 
Hoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van CombellHoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van CombellCombell NV
 
Hoe laat je jouw website scoren in zoekmachines zoals Google
Hoe laat je jouw website scoren in zoekmachines zoals GoogleHoe laat je jouw website scoren in zoekmachines zoals Google
Hoe laat je jouw website scoren in zoekmachines zoals GoogleCombell NV
 
Een webshop bouwen in WooCommerce – advanced sessie
Een webshop bouwen in WooCommerce – advanced sessieEen webshop bouwen in WooCommerce – advanced sessie
Een webshop bouwen in WooCommerce – advanced sessieCombell NV
 
Hoe start je een webshop met WordPress / WooCommerce
Hoe start je een webshop met WordPress / WooCommerceHoe start je een webshop met WordPress / WooCommerce
Hoe start je een webshop met WordPress / WooCommerceCombell NV
 
Keeping the cloud in check cvodmd
Keeping the cloud in check cvodmdKeeping the cloud in check cvodmd
Keeping the cloud in check cvodmdCombell NV
 
Hybrid cloud wiskyweb2012
Hybrid cloud wiskyweb2012Hybrid cloud wiskyweb2012
Hybrid cloud wiskyweb2012Combell NV
 
2012 03-27 developers e-commercedag presentatie5 ssl
2012 03-27 developers e-commercedag presentatie5 ssl2012 03-27 developers e-commercedag presentatie5 ssl
2012 03-27 developers e-commercedag presentatie5 sslCombell NV
 
2012 03-27 developers e-commercedag presentatie2 drupal
2012 03-27 developers e-commercedag presentatie2 drupal2012 03-27 developers e-commercedag presentatie2 drupal
2012 03-27 developers e-commercedag presentatie2 drupalCombell NV
 
2012 03-27 developers e-commercedag presentatie1 magento
2012 03-27 developers e-commercedag presentatie1 magento2012 03-27 developers e-commercedag presentatie1 magento
2012 03-27 developers e-commercedag presentatie1 magentoCombell NV
 
2012 03-27 developers e-commercedag presentatie4 ogone
2012 03-27 developers e-commercedag presentatie4 ogone2012 03-27 developers e-commercedag presentatie4 ogone
2012 03-27 developers e-commercedag presentatie4 ogoneCombell NV
 
10 doe-het-zelf tips om aan e-commerce te doen
10 doe-het-zelf tips om aan e-commerce te doen10 doe-het-zelf tips om aan e-commerce te doen
10 doe-het-zelf tips om aan e-commerce te doenCombell NV
 
Develop and deploy using Hybrid Cloud Strategies confoo2012
Develop and deploy using Hybrid Cloud Strategies confoo2012Develop and deploy using Hybrid Cloud Strategies confoo2012
Develop and deploy using Hybrid Cloud Strategies confoo2012Combell NV
 
Php through the eyes of a hoster confoo
Php through the eyes of a hoster confooPhp through the eyes of a hoster confoo
Php through the eyes of a hoster confooCombell NV
 
Hybrid Cloud PHPUK2012
Hybrid Cloud PHPUK2012Hybrid Cloud PHPUK2012
Hybrid Cloud PHPUK2012Combell NV
 
2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoft2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoftCombell NV
 
11 tips om in de Cloud te raken en er niet uit te vallen
11 tips om in de Cloud te raken en er niet uit te vallen11 tips om in de Cloud te raken en er niet uit te vallen
11 tips om in de Cloud te raken en er niet uit te vallenCombell NV
 

More from Combell NV (20)

Play it extra safe! Kies een goede cyberverzekering
Play it extra safe! Kies een goede cyberverzekeringPlay it extra safe! Kies een goede cyberverzekering
Play it extra safe! Kies een goede cyberverzekering
 
Hoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van CombellHoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van Combell
 
Managed WordPress bij Combell – wat doet dat precies?
Managed WordPress bij Combell – wat doet dat precies?Managed WordPress bij Combell – wat doet dat precies?
Managed WordPress bij Combell – wat doet dat precies?
 
Cyberaanvallen: Overzicht, gevolgen en beveiligingstips
Cyberaanvallen: Overzicht, gevolgen en beveiligingstipsCyberaanvallen: Overzicht, gevolgen en beveiligingstips
Cyberaanvallen: Overzicht, gevolgen en beveiligingstips
 
Hoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van CombellHoe gebruik je het resellerplatform als partner van Combell
Hoe gebruik je het resellerplatform als partner van Combell
 
Hoe laat je jouw website scoren in zoekmachines zoals Google
Hoe laat je jouw website scoren in zoekmachines zoals GoogleHoe laat je jouw website scoren in zoekmachines zoals Google
Hoe laat je jouw website scoren in zoekmachines zoals Google
 
Een webshop bouwen in WooCommerce – advanced sessie
Een webshop bouwen in WooCommerce – advanced sessieEen webshop bouwen in WooCommerce – advanced sessie
Een webshop bouwen in WooCommerce – advanced sessie
 
Hoe start je een webshop met WordPress / WooCommerce
Hoe start je een webshop met WordPress / WooCommerceHoe start je een webshop met WordPress / WooCommerce
Hoe start je een webshop met WordPress / WooCommerce
 
Keeping the cloud in check cvodmd
Keeping the cloud in check cvodmdKeeping the cloud in check cvodmd
Keeping the cloud in check cvodmd
 
Hybrid cloud wiskyweb2012
Hybrid cloud wiskyweb2012Hybrid cloud wiskyweb2012
Hybrid cloud wiskyweb2012
 
2012 03-27 developers e-commercedag presentatie5 ssl
2012 03-27 developers e-commercedag presentatie5 ssl2012 03-27 developers e-commercedag presentatie5 ssl
2012 03-27 developers e-commercedag presentatie5 ssl
 
2012 03-27 developers e-commercedag presentatie2 drupal
2012 03-27 developers e-commercedag presentatie2 drupal2012 03-27 developers e-commercedag presentatie2 drupal
2012 03-27 developers e-commercedag presentatie2 drupal
 
2012 03-27 developers e-commercedag presentatie1 magento
2012 03-27 developers e-commercedag presentatie1 magento2012 03-27 developers e-commercedag presentatie1 magento
2012 03-27 developers e-commercedag presentatie1 magento
 
2012 03-27 developers e-commercedag presentatie4 ogone
2012 03-27 developers e-commercedag presentatie4 ogone2012 03-27 developers e-commercedag presentatie4 ogone
2012 03-27 developers e-commercedag presentatie4 ogone
 
10 doe-het-zelf tips om aan e-commerce te doen
10 doe-het-zelf tips om aan e-commerce te doen10 doe-het-zelf tips om aan e-commerce te doen
10 doe-het-zelf tips om aan e-commerce te doen
 
Develop and deploy using Hybrid Cloud Strategies confoo2012
Develop and deploy using Hybrid Cloud Strategies confoo2012Develop and deploy using Hybrid Cloud Strategies confoo2012
Develop and deploy using Hybrid Cloud Strategies confoo2012
 
Php through the eyes of a hoster confoo
Php through the eyes of a hoster confooPhp through the eyes of a hoster confoo
Php through the eyes of a hoster confoo
 
Hybrid Cloud PHPUK2012
Hybrid Cloud PHPUK2012Hybrid Cloud PHPUK2012
Hybrid Cloud PHPUK2012
 
2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoft2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoft
 
11 tips om in de Cloud te raken en er niet uit te vallen
11 tips om in de Cloud te raken en er niet uit te vallen11 tips om in de Cloud te raken en er niet uit te vallen
11 tips om in de Cloud te raken en er niet uit te vallen
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

How Backups Can Save You from a Cyber Attack

  • 1. Back-ups: Hoe ze je kunnen redden van een cyberaanval Combell webinar Pieter Vereecken Sr. Cloud Systems Engineer pieter.vereecken@veeam.com
  • 2. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. You were automatically muted on entry If you have a question, use the Q&A or chat functions We will post the recording and the presentation This webinar is being recorded About this webinar
  • 3. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. In this session… Why you can never be protected 100% against hackers and why you need (off-site) backups.  Data protection strategy  Security  On-site & Off-site backups  Demo  Monitoring & Reporting  Q & A
  • 4. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. The most trusted provider of Backup solutions that deliver Cloud Data Management
  • 5. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. A Single Platform for Cloud, Virtual and Physical Backup & Replication Backup and replication Monitoring and analytics DataLabs Orchestration Universal Storage APIs CloudSaaSPhysicalVirtual Object Storage
  • 6. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Why Veeam? “It Just Works” Portable data format Instant recovery Strong support Reliable Built-in intelligence Actionable insights 100% verified recovery Scalable architecture Simple Software defined Hardware agnostic Copy data management Cloud ready Flexible
  • 7. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Ransomware protection best practices
  • 8. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Starts with mitigating security risks
  • 9. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Security is inconvenient! Let’s meet Dave > Domain admin Controls the whole domain for the organization! Backup administrator Can perform all administrative backup activities! Storage administrator Manages the production storage and the backup storage!
  • 10. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Production Domain Dave’s IT operation DMZ Offline Domain Secondary storagePrimary storage vCenter server VM’s vApp VM snapshots Storage Clients Users Applications Servers Production AD Separation By IAM and Firewall Random Backup infrastructure Tape backup policy, weekly full backup to tape (keep 5 weeks) and also a monthly full to tape (keep for 12 months) Backup policy, daily backup to disk of all servers and workstations 1. No protection against cyber-attacks 2. Big risk! Everything is running in the same security domain 3. Only week backups are stored offline Human Error
  • 11. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Think about security aspects
  • 12. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Production Domain Resource domain Identity and Access Separation DMZ Public Cloud IAM One-Way Trust Complete Separation Complete Separation Object Storage BLOB API S3 API Service ProviderOffline Domain Secret Key + Shared Key + Veeam Encryption Secret Key + Shared Key + IAM Access Role + Veeam Encryption + Immutability Backup server S3 API Object Storage AD Auth (sep.acc) Windows Repository Service Provider Access Keys Local Linux Cred. Linux Repository COS APISecret Key + Shared Key + Veeam Encryption Secondary storagePrimary storage Backup Proxies Restricted Zone Vendor Spec. Prot Dedup Appliances vCenter server VM’s vApp VM snapshots Storage Clients Users Applications Files Service Provider Recycle Bin Feature Production AD Resource AD Human Error
  • 13. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Design for ‘cyber’-recovery Infection ExploitDetection Recovery • 3-2-1 Backup • SureBackup • Veeam ONE • Data Integration API • Staged Restore • DataLabs Forensics • Enhanced NAS Recovery • Secure Restore • Cloud Tier with Immutability • Cloud Connect Detection features Recovery features • Tape backup • Restore to Azure • Restore to AWS • Physical to Virtual recovery Cyber Attack
  • 14. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Avoiding recovery failure 3-2-1-0 Rule 2Different media 3Different copies of data 1of which is off site or offline 0No errors
  • 15. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Offline or air-gapped storage Likely the single most effective resiliency technique is to have some form of offline storage: tape, removable disk, etc. Completely offline when not being written to or read from Replicated VMs Powered off and, in most situations, can be a different authentication framework (ex: vSphere and Hyper-V hosts are on a different domain) Primary storage snapshots Can be used as recovery techniques and usually have a different authentication framework Veeam Cloud Connect backups Not connected directly to the backup infrastructure and uses a different authentication mechanism along with different API and Serviceprovider based Recycle-Bin Rotating hard drives (rotating media) Offline when not being written to or read from (similar to tape)
  • 16. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 3-2-1-0 in place, recovery covered? What are you achieving with 3-2-1-0? Does it have anything to do with recovery? Does it say anything about how long restore will take? Does it say anything about where to restore to? Does it say anything about the order in which to restore?
  • 17. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Business Continuity is Key How much time it takes to recover your data and how recent the backup to restore is are defined in RTO and RPO. Last backup Recovery point Recovery data Recovery TimeOutage How far How long Recovery Time Objective (RTO) The amount within which a system must be recovered after an outage Recovery Point Objective (RPO) Point in time to which system's data must be recovered after an outage
  • 18. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication
  • 19. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup Server Source hosts Loadbalancing Backup central management of local and remote components Production Tape Server Backup Proxies Veeam High Level Architecture Off-site Storage Secondary copy and long-term retention Scale-out Repository
  • 20. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication Storage Snapshots
  • 21. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Use of Storage Snapshots for better RTO and RPO During backup, data transport and consistency processing reduce performance of applications. Leverage storage snapshots between the backup for even better Recovery Time and Recovery Point Objectives. 3 PM Snap Backup + snap Snap Snap Snap Snap Snap Snap Snap Snap Snap Backup + snap 8 PM 9 PM 10 PM 11 PM 12 PM 1 AM 4 PM 5 PM … 6 PM 7 PM 8 PM …
  • 22. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Explorer for Storage Snapshots Instant VM Recovery Linux Files Windows Files Active Directory Exchange SharePoint MS SQL Oracle Veeam backup and replication
  • 23. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication Backups
  • 24. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Backup of Virtual Machines Inline data reduction Change block tracking aware Agentless backup 256-bit encryption Policy driven backup automation Build-in application aware processing of: • Microsoft Active Directory • Microsoft Exchange • Microsoft SQL • Microsoft SharePoint • Oracle Databases Image-level backup with granular restore options
  • 25. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Policy driven Backup SLA based policies Based on tags Automated through VMware vCenter
  • 26. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication Backup Copies
  • 27. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Backup Copy Comply with the 3-2-1-0 rule Production storage Primary backup storage WAN acceleration Secondary backup storage Secondary backup storage (offsite) Backup Backup copy Backup copy Combell
  • 28. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Build-in WAN Acceleration Built-in WAN Acceleration with global caching, variable block length data fingerprinting and traffic compression Source Backup Repository Target Backup Repository Data Mover Service Target WAN Accelerator WAN Backup Copy and/or Replica job Source WAN Accelerator Data Mover Service Reduce bandwidth needed to copy your backups to a secondary location Save on bandwidth costs by efficiently sent only the missing blocks Intelligently save time on backup copy and replica jobs
  • 29. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Cloud Connect Backup Client  Customer has no cloud resources to manage  Offsite backups can be protected against ransomware Combell data center Veeam Service Provider WAN Cloud gateway Backup repository Cloud repositories Production Veeam Environment Veeam Cloud Connect SSL tunnel
  • 30. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Insider Protection Deleted Backups Protection  Per tenant setting  For the tenant, backup files moved to the "recycle bin" appear as actually deleted.  To restore from “recycle bin”, tenant must contact service provider.
  • 31. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Recover Full VMs, Files and Folders Restore functionalities include:  Full VM restore  VM files restore  VM guest OS files restore  Application items restore  Disk export  Backup export
  • 32. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Demo
  • 33. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Data Protection Monitoring & Reporting
  • 34. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Why do we need analytics? In order to maintain Availability organizations require analytics into:  Storage capacity and performance  Failed VM backups  Failed compliance  Data management resources and associated costs  Tracking configurations  And more!
  • 35. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Identify EVERY Unprotected VM Veeam ONE helps users easily determine which VMs are protected and which are not by categorizing VMs based on restore points to:  Provide users valuable time to ensure protection of each VM  Dramatically reduce the risk of downtime Are you completely protected?
  • 36. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Backup Reporting Including:  Backup Infrastructure assessment  Performance and bandwidth savings from built-in WAN acceleration  Audit operator restore activity  Status of backup and replication jobs  Unprotected VMs that are not covered by any backup jobs  Change tracking for backup job configuration  GFS Backup files  VM and computer protection history
  • 37. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Track backup object changes Report on who changed what settings and when. Governance & Compliance Audit backup infrastructure changes and report on user account and modifications. Object Change Tracking
  • 38. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Recovery Verification Recovery Verification Recovery Verification Overview Validates the completion status of SureBackup jobs and displays the results of recovery verification tests Governance & Compliance The report helps you reveal the list of operational VMs that can be restored from the produced backup or replicas
  • 39. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Key takeaways Design with security in mind Use multiple backup locations (3-2-1 rule) Use multiple security domains Offline and offsite backups can be lifesavers Document everything (reporting) Use multiple authentication accounts and roles
  • 40. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Questions?
  • 41. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. THANK YOU!