SlideShare a Scribd company logo
© 2017 Unitrends 1#1 All-in-One Enterprise
Backup and Continuity
Combating the IT
Monsters That
Keep You Up at
Night
Joe Noonan, VP Product Marketing
© 2017 Unitrends 2
What do the IT monsters look
like?
© 2017 Unitrends 3
0
50
100
150
200
250
300
350
400
450
500
What Backup and Recovery Challenges Are You Facing?
They seem to lurk everywhere…
Source: Unitrends 2016 Survey (N=898)
© 2017 Unitrends 4
10xGrowth in
Servers
50xGrowth
in
Data
75xGrowth in
Files
1.5x
Growth in
IT Admins
Source: The IDC Digital Universe Study.
Data is increasing but IT professionals are not.
OVER THE NEXT 10 YRS
© 2017 Unitrends 5
 Office 365 data lives in a Microsoft
Azure Cloud, not on your own server
 Deleted email is gone after 14-30
days—totally unrecoverable
 Deleted SharePoint & OneDrive files
are gone after 186 days
 Most lost data is due to user error
 Users can choose to permanently
delete files & email
The monsters live in the cloud too!
32% of companies have lost data in the cloud1
1January 2013 SaaS report by the Aberdeen Group
Sources of Data Loss
User Error Hackers
Closing an Account Malicious Deletion
Third-Party Software
© 2017 Unitrends 6
Even your
friends can
be IT
monsters
sometimes!
© 2017 Unitrends 7
New threats are prevailing!
http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware
© 2017 Unitrends 8
50% of business attacks paid
more than $10,000
20% paid more than $40,000
© 2017 Unitrends 9
Downtime can be more costly!
$700B lost in 2016
© 2017 Unitrends 10
How can I be safe from them?
© 2017 Unitrends 11
1. Align recovery with the business
2. Focus your strategy
3. Kill complexity
4. Get IT Resilience from analytics and automation
5. Understand your support structure
5 Ways to Combat the IT Monsters (and Be a Hero)
Align Recovery to the Business
© 2017 Unitrends 13
• Is it backed up?
• Was it replicated?
• Is retention set?
• Will it recover?
Data focused
Answering the right questions
© 2017 Unitrends 14
• How much data will I lose?
• How long will I be down?
• Is my data going to the right places?
• Can I go back in time just enough?
• How do I make backup a better ROI?
• How do I control infrastructure costs?
• How do I keep applications performing?
• How do I control access?
Business focused
Answering the right questions
© 2017 Unitrends 15
 Focus on individual backup tasks, not business requirements
 Leave IT blind about recovery compliance
 No confidence in achieving or communicating SLAs
 Act only as a cost (insurance policy) rather than a value driver:
 Increase productivity
 Reduced infrastructure costs
 Proactive analytics
Challenge: Most solutions are not business focused
Focus Your Strategy
© 2017 Unitrends 17
Protect your ideas/business
Align continuity with criticality
Protect Everything You Have
Which workloads matter the most?
© 2017 Unitrends 18
Cold
High Downtime
Low Cost
What meets your budget and business
requirements?
Hot
No Downtime
High Cost
Warm
Little Downtime
Medium Cost
Kill Complexity
© 2017 Unitrends 20
Complexity
More
Vendors
More
Management
Less
Security
Less
Flexibility
© 2017 Unitrends 21
 Vendor Complexity
 Management Complexity
 Backup Server / Media Server
 Backup Proxies
 Backup Repositories
 Dedicated WAN Accelerators
 Dedicated Management Servers
 Dedicated Monitoring & Reporting Servers
Backup Architecture Complexity
© 2017 Unitrends 22
The New World Approach
Hardened, Linux Backup
Appliances
vs.
Windows Backup Software
Get IT Resilience from Analytics and
Automation
© 2017 Unitrends 24
Protect Secure Test Detect Recover
5 Ways The Right Backup Solution Fights
Ransomware
© 2017 Unitrends 25
Protect Secure Test Detect Recover
5 Ways The Right Backup Solution Fights
Ransomware
© 2017 Unitrends 26
Recovery Analytics and Automation
Old World
• Praying that backups recovered successfully
• Scrambling during DR exercises
• Rarely, if ever, testing DR
• Spending hours creating manual DR reports
New World
• Fully automated, application-level testing and failover
• Proactively uncover recovery issues for physical & virtual
• Business-level DR compliance report automation
• Needed for local, DR site, and Cloud
© 2017 Unitrends 27
Data
integrity
checks
Mount a
database
Screenshot
verification
N-Tier
application
analytics
Examples
© 2017 Unitrends 28
Boot order
sequencing for N-tier
applications
What automation technology is
required?
© 2017 Unitrends 29
Application-specific
integrity verification
What automation technology is
required?
*Not a complete list!
© 2017 Unitrends 30
Network automation to isolate from production
 Virtual network assignment
 Network remodeling
 Re-IP
What automation technology is
required?
© 2017 Unitrends 31
Compliance reporting
for business
stakeholders
What automation technology is
required?
© 2017 Unitrends 32
Protect Secure Test Detect Recover
Analytics Built for Threat Detection
© 2017 Unitrends 33
• Uses adaptive &
predictive analytics
against backup data
 Designed to search for
ransomware threat
conditions
 Proactive alerts are
sent when ransomware
conditions are detected
Proactive Ransomware Detection
Understand Your Support Structure
© 2016 Unitrends 35
Unitrends Topic
Presentation Name | Date 2016
You’re not alone!
© 2016 Unitrends 36
Unitrends Topic
Presentation Name | Date 2016
 Bias: Fewer is simpler. Simpler is better.
 Are they proactive or reactive?
 Are they responsive in social media?
Understand Vendor Dependencies
How Can Unitrends Help?
© 2017 Unitrends 38
Unitrends Topic
Presentation Name | Date 2016All-in-One
Enterprise
Backup and
Continuity
Old World
• More vendors; more finger pointing, more management
• More work setting up and constantly tuning
• Limited continuity; little or no recovery assurance
• Windows deployment malware susceptible
• Fragmented & lower customer satisfaction; more worries
New World
• One vendor; one throat to choke
• Less work - rack, connect, and go
• Local & cloud continuity with recovery assurance
• More security; purpose-built hardened Linux
• Unified & higher customer satisfaction; more confidence
© 2017 Unitrends 39
Unitrends Topic
Presentation Name | Date 2016
Have Less:
The
Ruthless
Pursuit of
Simplicity
Old World New World
© 2017 Unitrends 40
Unitrends Topic
Presentation Name | Date 2016
Unitrends
Cloud
Old World
• Third-party cloud vendors
• Limited or no DRaaS
• No recovery assurance
• Limited retention; more worries
• No SLAs, more worries
• Network bottlenecks
New World
• No finger-pointing; less management: single vendor
• Physical & virtual DRaaS
• Industry only physical & virtual recovery assurance
• Infinite retention available; more confidence
• 1 hour recovery SLA available; more confidence
• WAN optimized & Rapid Data Seeding
WAN
OpenVPN
w/Throttling
OR
© 2017 Unitrends 41
Unitrends Topic
Presentation Name | Date 2016
Customer
Obsessed
Support
Old World
• Support only for Windows binary software
• 7x24x52 support optional
• Holistic CSAT low; claimed CSAT high
• Off-shored and outsourced
• Reactive to issues; slow to resolve
New World
• Holistic support for all-in-one backup & continuity
• 7x24x52 support only
• Holistic CSAT > 98%
• 100% US-based; co-located with R&D
• Proactive resolution through predictive analytics
© 2017 Unitrends 42
Unitrends Topic
Presentation Name | Date 2016
Define Analyze Report
June)
Align IT with the Business with End-to-End SLA
Management
© 2017 Unitrends 43
Unitrends Topic
Presentation Name | Date 2016
Defin
e
Your
SLAs
© 2017 Unitrends 44
Unitrends Topic
Presentation Name | Date 2016
Analytics
and
Complianc
e
© 2016 Unitrends 45
Unitrends Topic
Presentation Name | Date 2016
1. Align recovery with the business
2. Focus your strategy
3. Kill complexity
4. Get IT Resilience from analytics and automation
5. Understand your support structure
Summary:
5 Ways to Combat the IT Monsters (and Be a Hero)
© 2016 Unitrends 46
Call to Action– Visit www.Unitrends.com
Try Unitrends - equipped with Ransomware Detection
Download at https://www.unitrends.com/products/enterprise-backup-software
Limited Availability! Get a free T-Shirt designed by Stephen Bliss
Request a Demo of v10 (ANNOUNCED TODAY!)
Register at http://pages.unitrends.com/version-10
Talk With One of Our Continuity Experts
Get immediate assistance: http://www.unitrends.com/company/contact

More Related Content

What's hot

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
Dell World
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
Dell EMC World
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
Dell EMC World
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
Robert Kloots
 
DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...
DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...
DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...
Amazon Web Services
 
Information Map around the world in 80 clicks
Information Map around the world in 80 clicksInformation Map around the world in 80 clicks
Information Map around the world in 80 clicks
Veritas Technologies LLC
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
RapidScale
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned About
Luong Trung Thanh
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
Corporacion Colombia Digital
 
VDI Endpoints: Assets & Liabilities
VDI Endpoints: Assets & LiabilitiesVDI Endpoints: Assets & Liabilities
VDI Endpoints: Assets & Liabilities
Neverware
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?
marketingunitrends
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
Dell World
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
Digital Realty
 
Are you ready for Big Data 2.0? EMA Analyst Research
Are you ready for Big Data 2.0? EMA Analyst ResearchAre you ready for Big Data 2.0? EMA Analyst Research
Are you ready for Big Data 2.0? EMA Analyst Research
Enterprise Management Associates
 
Dell Cloud Solutions
Dell Cloud SolutionsDell Cloud Solutions
Dell Cloud Solutions
Juergen Domnik
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?
marketingunitrends
 
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten
 
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix themWebinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
Storage Switzerland
 
How Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data CenterHow Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data Center
Hostway|HOSTING
 

What's hot (20)

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...
DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...
DELWP’s Data Lake: Investing in Asset Wealth for Public/Community Benefit – B...
 
Information Map around the world in 80 clicks
Information Map around the world in 80 clicksInformation Map around the world in 80 clicks
Information Map around the world in 80 clicks
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned About
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
VDI Endpoints: Assets & Liabilities
VDI Endpoints: Assets & LiabilitiesVDI Endpoints: Assets & Liabilities
VDI Endpoints: Assets & Liabilities
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
 
Are you ready for Big Data 2.0? EMA Analyst Research
Are you ready for Big Data 2.0? EMA Analyst ResearchAre you ready for Big Data 2.0? EMA Analyst Research
Are you ready for Big Data 2.0? EMA Analyst Research
 
Dell Cloud Solutions
Dell Cloud SolutionsDell Cloud Solutions
Dell Cloud Solutions
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?
 
SLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of SupportSLBdiensten XP sessie: Windows XP End of Support
SLBdiensten XP sessie: Windows XP End of Support
 
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix themWebinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
 
How Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data CenterHow Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data Center
 

Similar to Combating the IT Monsters That Keep You Up at Night

3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR
marketingunitrends
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuity
marketingunitrends
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bank
marketingunitrends
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
marketingunitrends
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
marketingunitrends
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
marketingunitrends
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
marketingunitrends
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Storage Switzerland
 
Data & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customersData & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customers
Nick Smith
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?
marketingunitrends
 
Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud Networks
ThousandEyes
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
marketingunitrends
 
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to ImproveWebinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Storage Switzerland
 
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
DevOps.com
 
Oil & Gas ICT Leader 2017 - Day 2 April 20th
Oil & Gas ICT Leader 2017 - Day 2 April 20thOil & Gas ICT Leader 2017 - Day 2 April 20th
Oil & Gas ICT Leader 2017 - Day 2 April 20th
Ray Bugg
 
Implement DevOps Like a Unicorn—Even If You’re Not One
Implement DevOps Like a Unicorn—Even If You’re Not OneImplement DevOps Like a Unicorn—Even If You’re Not One
Implement DevOps Like a Unicorn—Even If You’re Not One
TechWell
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
David J Rosenthal
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
ThousandEyes
 
Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...
Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...
Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...
Amazon Web Services
 
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Veritas Technologies LLC
 

Similar to Combating the IT Monsters That Keep You Up at Night (20)

3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuity
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bank
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
 
Data & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customersData & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customers
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?
 
Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud Networks
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to ImproveWebinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
 
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
 
Oil & Gas ICT Leader 2017 - Day 2 April 20th
Oil & Gas ICT Leader 2017 - Day 2 April 20thOil & Gas ICT Leader 2017 - Day 2 April 20th
Oil & Gas ICT Leader 2017 - Day 2 April 20th
 
Implement DevOps Like a Unicorn—Even If You’re Not One
Implement DevOps Like a Unicorn—Even If You’re Not OneImplement DevOps Like a Unicorn—Even If You’re Not One
Implement DevOps Like a Unicorn—Even If You’re Not One
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...
Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...
Disaster Recovery Best Practices and Customer Use Cases: CGS and Health Quest...
 
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
 

More from marketingunitrends

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
marketingunitrends
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Within
marketingunitrends
 
8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
marketingunitrends
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
marketingunitrends
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
marketingunitrends
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance
marketingunitrends
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
marketingunitrends
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
marketingunitrends
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinity
marketingunitrends
 
Docker taylor swift and protection v06
Docker taylor swift and protection v06Docker taylor swift and protection v06
Docker taylor swift and protection v06
marketingunitrends
 
Boomerang webcast final
Boomerang webcast finalBoomerang webcast final
Boomerang webcast final
marketingunitrends
 

More from marketingunitrends (11)

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Within
 
8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Flash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup TrinityFlash, Cloud, and Appliances: The Holy Backup Trinity
Flash, Cloud, and Appliances: The Holy Backup Trinity
 
Docker taylor swift and protection v06
Docker taylor swift and protection v06Docker taylor swift and protection v06
Docker taylor swift and protection v06
 
Boomerang webcast final
Boomerang webcast finalBoomerang webcast final
Boomerang webcast final
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Combating the IT Monsters That Keep You Up at Night

  • 1. © 2017 Unitrends 1#1 All-in-One Enterprise Backup and Continuity Combating the IT Monsters That Keep You Up at Night Joe Noonan, VP Product Marketing
  • 2. © 2017 Unitrends 2 What do the IT monsters look like?
  • 3. © 2017 Unitrends 3 0 50 100 150 200 250 300 350 400 450 500 What Backup and Recovery Challenges Are You Facing? They seem to lurk everywhere… Source: Unitrends 2016 Survey (N=898)
  • 4. © 2017 Unitrends 4 10xGrowth in Servers 50xGrowth in Data 75xGrowth in Files 1.5x Growth in IT Admins Source: The IDC Digital Universe Study. Data is increasing but IT professionals are not. OVER THE NEXT 10 YRS
  • 5. © 2017 Unitrends 5  Office 365 data lives in a Microsoft Azure Cloud, not on your own server  Deleted email is gone after 14-30 days—totally unrecoverable  Deleted SharePoint & OneDrive files are gone after 186 days  Most lost data is due to user error  Users can choose to permanently delete files & email The monsters live in the cloud too! 32% of companies have lost data in the cloud1 1January 2013 SaaS report by the Aberdeen Group Sources of Data Loss User Error Hackers Closing an Account Malicious Deletion Third-Party Software
  • 6. © 2017 Unitrends 6 Even your friends can be IT monsters sometimes!
  • 7. © 2017 Unitrends 7 New threats are prevailing! http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware
  • 8. © 2017 Unitrends 8 50% of business attacks paid more than $10,000 20% paid more than $40,000
  • 9. © 2017 Unitrends 9 Downtime can be more costly! $700B lost in 2016
  • 10. © 2017 Unitrends 10 How can I be safe from them?
  • 11. © 2017 Unitrends 11 1. Align recovery with the business 2. Focus your strategy 3. Kill complexity 4. Get IT Resilience from analytics and automation 5. Understand your support structure 5 Ways to Combat the IT Monsters (and Be a Hero)
  • 12. Align Recovery to the Business
  • 13. © 2017 Unitrends 13 • Is it backed up? • Was it replicated? • Is retention set? • Will it recover? Data focused Answering the right questions
  • 14. © 2017 Unitrends 14 • How much data will I lose? • How long will I be down? • Is my data going to the right places? • Can I go back in time just enough? • How do I make backup a better ROI? • How do I control infrastructure costs? • How do I keep applications performing? • How do I control access? Business focused Answering the right questions
  • 15. © 2017 Unitrends 15  Focus on individual backup tasks, not business requirements  Leave IT blind about recovery compliance  No confidence in achieving or communicating SLAs  Act only as a cost (insurance policy) rather than a value driver:  Increase productivity  Reduced infrastructure costs  Proactive analytics Challenge: Most solutions are not business focused
  • 17. © 2017 Unitrends 17 Protect your ideas/business Align continuity with criticality Protect Everything You Have Which workloads matter the most?
  • 18. © 2017 Unitrends 18 Cold High Downtime Low Cost What meets your budget and business requirements? Hot No Downtime High Cost Warm Little Downtime Medium Cost
  • 20. © 2017 Unitrends 20 Complexity More Vendors More Management Less Security Less Flexibility
  • 21. © 2017 Unitrends 21  Vendor Complexity  Management Complexity  Backup Server / Media Server  Backup Proxies  Backup Repositories  Dedicated WAN Accelerators  Dedicated Management Servers  Dedicated Monitoring & Reporting Servers Backup Architecture Complexity
  • 22. © 2017 Unitrends 22 The New World Approach Hardened, Linux Backup Appliances vs. Windows Backup Software
  • 23. Get IT Resilience from Analytics and Automation
  • 24. © 2017 Unitrends 24 Protect Secure Test Detect Recover 5 Ways The Right Backup Solution Fights Ransomware
  • 25. © 2017 Unitrends 25 Protect Secure Test Detect Recover 5 Ways The Right Backup Solution Fights Ransomware
  • 26. © 2017 Unitrends 26 Recovery Analytics and Automation Old World • Praying that backups recovered successfully • Scrambling during DR exercises • Rarely, if ever, testing DR • Spending hours creating manual DR reports New World • Fully automated, application-level testing and failover • Proactively uncover recovery issues for physical & virtual • Business-level DR compliance report automation • Needed for local, DR site, and Cloud
  • 27. © 2017 Unitrends 27 Data integrity checks Mount a database Screenshot verification N-Tier application analytics Examples
  • 28. © 2017 Unitrends 28 Boot order sequencing for N-tier applications What automation technology is required?
  • 29. © 2017 Unitrends 29 Application-specific integrity verification What automation technology is required? *Not a complete list!
  • 30. © 2017 Unitrends 30 Network automation to isolate from production  Virtual network assignment  Network remodeling  Re-IP What automation technology is required?
  • 31. © 2017 Unitrends 31 Compliance reporting for business stakeholders What automation technology is required?
  • 32. © 2017 Unitrends 32 Protect Secure Test Detect Recover Analytics Built for Threat Detection
  • 33. © 2017 Unitrends 33 • Uses adaptive & predictive analytics against backup data  Designed to search for ransomware threat conditions  Proactive alerts are sent when ransomware conditions are detected Proactive Ransomware Detection
  • 35. © 2016 Unitrends 35 Unitrends Topic Presentation Name | Date 2016 You’re not alone!
  • 36. © 2016 Unitrends 36 Unitrends Topic Presentation Name | Date 2016  Bias: Fewer is simpler. Simpler is better.  Are they proactive or reactive?  Are they responsive in social media? Understand Vendor Dependencies
  • 38. © 2017 Unitrends 38 Unitrends Topic Presentation Name | Date 2016All-in-One Enterprise Backup and Continuity Old World • More vendors; more finger pointing, more management • More work setting up and constantly tuning • Limited continuity; little or no recovery assurance • Windows deployment malware susceptible • Fragmented & lower customer satisfaction; more worries New World • One vendor; one throat to choke • Less work - rack, connect, and go • Local & cloud continuity with recovery assurance • More security; purpose-built hardened Linux • Unified & higher customer satisfaction; more confidence
  • 39. © 2017 Unitrends 39 Unitrends Topic Presentation Name | Date 2016 Have Less: The Ruthless Pursuit of Simplicity Old World New World
  • 40. © 2017 Unitrends 40 Unitrends Topic Presentation Name | Date 2016 Unitrends Cloud Old World • Third-party cloud vendors • Limited or no DRaaS • No recovery assurance • Limited retention; more worries • No SLAs, more worries • Network bottlenecks New World • No finger-pointing; less management: single vendor • Physical & virtual DRaaS • Industry only physical & virtual recovery assurance • Infinite retention available; more confidence • 1 hour recovery SLA available; more confidence • WAN optimized & Rapid Data Seeding WAN OpenVPN w/Throttling OR
  • 41. © 2017 Unitrends 41 Unitrends Topic Presentation Name | Date 2016 Customer Obsessed Support Old World • Support only for Windows binary software • 7x24x52 support optional • Holistic CSAT low; claimed CSAT high • Off-shored and outsourced • Reactive to issues; slow to resolve New World • Holistic support for all-in-one backup & continuity • 7x24x52 support only • Holistic CSAT > 98% • 100% US-based; co-located with R&D • Proactive resolution through predictive analytics
  • 42. © 2017 Unitrends 42 Unitrends Topic Presentation Name | Date 2016 Define Analyze Report June) Align IT with the Business with End-to-End SLA Management
  • 43. © 2017 Unitrends 43 Unitrends Topic Presentation Name | Date 2016 Defin e Your SLAs
  • 44. © 2017 Unitrends 44 Unitrends Topic Presentation Name | Date 2016 Analytics and Complianc e
  • 45. © 2016 Unitrends 45 Unitrends Topic Presentation Name | Date 2016 1. Align recovery with the business 2. Focus your strategy 3. Kill complexity 4. Get IT Resilience from analytics and automation 5. Understand your support structure Summary: 5 Ways to Combat the IT Monsters (and Be a Hero)
  • 46. © 2016 Unitrends 46 Call to Action– Visit www.Unitrends.com Try Unitrends - equipped with Ransomware Detection Download at https://www.unitrends.com/products/enterprise-backup-software Limited Availability! Get a free T-Shirt designed by Stephen Bliss Request a Demo of v10 (ANNOUNCED TODAY!) Register at http://pages.unitrends.com/version-10 Talk With One of Our Continuity Experts Get immediate assistance: http://www.unitrends.com/company/contact

Editor's Notes

  1. Thanks I appreciate you joining today Hope not to take too much of your time And if we’re lucky, I’ll have helped you learned some interesting things for organization’s backup and continuity needs
  2. The key question for this webinar topic – how does your choice of backup solution affect your ransomware situation
  3. My own bias, but the scariest monster (not the biggest) Has to be when you’re in a panic and recovery doesn’t work! These impact your time professionally, personally
  4. Although admittedly, it’s no picnic and getting tougher
  5. Let’s revisit the ways data can be lost in Office 365. - Most data is lost due to user error, but malicious deletion, hackers, closing an account without capturing data, and unexpected inference from 3rd party software also causes data loss. As you can see here, a report from the Aberdeen group shows that 32% of companies have lost data in the cloud, and this number as likely only grown since this study concluded since cloud adoption is increasing. - Office 365 permanently deletes data from the Recycle Bin once the retention period is over – 14 to 30 days for exchange, and 186 days for OneDrive and SharePoint.
  6. Love them, love their APIs They can be monsters sometimes Hurts us all – we have to break the news, you have bad backups
  7. Ransomware is here to stay: $1B Government: 4000 attacks released daily Expected to continue and evolve We even have RaaS Talk about board level conversation and how it is causing CIOs and CSOs to think a lot more about backup Plug the eBook
  8. They don’t just ask for tiny amounts of money; it can be impactful
  9. The biggest monster of all Not just about ransomware Can put us out of business, or at least out of a job
  10. Key messages:
  11. Mention ransomware regarding will it recover
  12. You have a few different ways of implementing it Ultimately, they trade off cost and downtime
  13. Complexity can lead to…
  14. Ransomware targets Windows predominantly Many folks that were hit by ransomware had their backups impacted as well This is because many incumbent backup solutions are also Windows based The new approach is a hardened, locked down, purpose-built backup appliance (often one that is a hybrid cloud appliance)
  15. Not all doom and gloom Backup solutions can play a bigger part in your anti-ransomware strategy than you might have thought We’ll cover these in detail later
  16. Obviously, testing helps But it’s painful and arduous Automation around this is becoming more prevalent There are some nuances to it
  17. You’re not resilient unless the complete application works for the end users.
  18. Using functionality from Unitrends to display some of this
  19. Backup vendors have access to a lot of information that can be put to use
  20. Key messages:
  21. And that’s where our idea of all-in-one enterprise backup and continuity comes into play. I like to talk about these from an old world / new world perspective because some of the traditional ways of handling things can have a few extra challenges. So we want to highlight how we’re different. For example, most solutions today require you to pull together multiple vendors, which adds finger pointing, more setup and a lot of manual tuning to get things just right. Sometimes that can mean you’re using more products to get the capabilities that you really need. Additionally, with Windows being the OS used for most backup vendors today, the threat of Ransomware impacting all your backups becomes much higher. Backup should be your insurance policy. You don’t want to have to fight the same fires with your backups that you do in production. And ultimately, the old world concept makes it very difficult to support with high customer satisfaction, which hurts confidence. Contrast that with where we think we play in the New World and the all-in-one approach. One vendor Really quick setup and no manual tuning needed because everything is preintegrated. Really broad capabilities cover you locally, at second sites and in the cloud, with some really advanced automation for recovery that we call recovery assurance. We’ll talk about that more in a bit. And our solutions are hardened, locked-down, Linux appliances that aren’t as susceptible to attacks as the Windows vendors And finally….we’ve had a 98% customer satisfaction rating for years. It’s just one support call. [note: you want to read this slide a bit…normally not good practice, but it is key to set the stage about old vs. new world in order to differentiate]
  22. When you look at backup and DR on the left side, you might have different vendors and products all the way through the stack. And the stack is more complex now with so many people leveraging cloud-based solutions for offsite backup and failover. We bring it all together in a single vendor and interface. The hardware and software comes fully loaded in our Recovery Series appliances and it can optionally integrate with the Unitrends Cloud for offsite storage, long-term compliance and even full failover. That Recovery Assurance piece at the top is pretty unique too. It means we’ll actually do automated testing of your DR plan every month and send you a report of how we did. You don’t have to lift a finger. Which is a big part of how we prove we can legitimately provide a 1-hour SLA in our cloud. That pretty much how we deliver the benefits on the left side there.
  23. We support a number of cloud options, including AWS, Azure and even Google. However, we also have our own purpose-built cloud for long-term retention and full DRaaS Not saying that AWS and Azure are bad, but there can be big limitations with respect to getting any type of SLA for recovery. Getting bulk data in and out can also be a challenge. They have services for this, but you have to hope your vendor supports these properly. So you’re back to the whole finger-pointing situation again. And of course, they aren’t going to act as a partner when it comes to setting up and fulfilling a DR strategy. In the Unitrends Cloud, you’re back to a single vendor, single interface, since support call. We cover both physical Windows and virtual machines running in VMware and Hyper-V We have full recovery assurance, meaning we’ll actually automate testing and prove it all works. And we back that with a real SLA – not a promise. We give you something in writing. Of course, we also have a great service for bulk seeding data in and coming back out from the cloud.
  24. Plus our support is 24x7 as a standard offering. We don’t have a lower level of support. And it’s all 100% US based and co-located with our R&D team to give us the best chance of fixing issues fast. That’s very different than what you see in the old world where a lot of vendors still live.
  25. Here’s how you learn more with us You can also access the blog