SlideShare a Scribd company logo
1Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore
COMPLETE DATA
PROTECTION FOR YOUR
BUSINESS
Andrey Shipitkov, Business Development Director APAC
2Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
25+ offices
in 18 countries
Customers in
150 countries
5,000+ Petabytes of data
under Acronis’ protection
Acronis is a Global Leader in Cyber Protection
1,000+
employees
around the World
50,000+
partners
in 145 countries
500,000+
business customers
5,000,000+
consumer customers
79%
of Top100 Most
Valuable Brands
75%
of Tech Top20
Americas 200,000+ Companies
Europe 200,000+ Companies
APJ / MEA 100,000+ Companies
3Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Safety Accessibility Privacy Authenticity Security
Vectors of protection contradict to each other
and require a balancing force
Protection in the Digital World
5 Vectors of SAPAS
4Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Safety Accessibility Privacy Authenticity Security
Cyber Protection
Cyber SecurityData Protection
Cyber Protection is the Balancing Force
5Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Innovation
AnyData
Technology
Reliable protection
for any workload
in any environment,
with 10s of millions
workloads over 15+
years
Software-Defined
Infrastructure
Scale-out cost-efficient
high-performance multi-
purpose software-
defined infrastructure –
compute, storage and
network
Hybrid Cloud
Architecture
Full Control and
flexibility for data
management, privacy
for data, and
business control for
partners
Blockchain
Digital Notary,
electronic signatures,
data authenticity
and consistency
validation and more
Artificial
Intelligence
Behavioral
security, automated
configuration, data
classification
AI-assisted
management
Work with Acronis and Innovate!
6Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis’ Unique Cloud Architecture Gives You Control Over Your Data
Management software deployed and controlled independently, enabling data protection control by customer,
service provider, vendor, partner, or third-party from public/partner/private cloud or customer premises
ANY MANAGEMENT
ANY PROTECTION
ANY DEPLOYMENT
ANY RECOVERY
Backup
Storage
Disaster
Recovery
Notary/ASign
Sync & Share
ANY WORKLOAD
On-premises
Virtual
Acronis CloudPartner Cloud
Mobile
Physical
Applications
Ransomware
protection
Cloud
Private Cloud
Virtual
Mobile
Applications Files
Local Private Cloud
Public Cloud
ANY STORAGE
Disk, Tape
Public Cloud
Partner Cloud Private Cloud
NAS, SAN
Acronis Cloud
Files
Cloud
7Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
ACRONIS SOLUTIONS
FOR BUSINESS
8Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Scalability
Deployment grows with
business growth
Low Cost
One solution for
various needs
No Downtime
Quick recovery of
production systems
Data Protection Addressing
Expectations and Challenges
Business
Expectations
Predictability
Flat budget with local
and private cloud
deployment
Efficient
Low RTO and low RPO,
automatic recovery from
ransomware strikes
Complete
Physical and
virtual, servers and
endpoints
IT Challenges
9Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Entire system and granular
application-aware backup and
recovery for Physical, Virtual,
Cloud and Mobile
Acronis Backup
Close to instant recovery with
vmFlashback and Acronis
Instant Restore
AI-based proactive protection
from ransomware
Recovery to dissimilar hardware,
migration between Cloud-
Physical-Virtual
Web and Mobile friendly user
interface in 18 languages
10Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Disaster recovery for all
popular workloads – Windows
and Linux, six major
hypervisors, and business
applications
Acronis Disaster Recovery
Instant off-site failover
Automated recoverability
testing
Fast recovery with 15-minute
RTO SLA
Isolated testing environment
11Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Software-Defined Infrastructure
Compute, network, block, file,
and object workloads using
industry-standard hardware
High-performance hyper-
converged computing
Built-in Prometheus engine and
Grafana dashboards
High availability features,
including reboot-less update
Full virtual private networking
and virtual distributed switching
12Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Secure access, sharing and
collaboration from the desktop,
web and mobile devices
Acronis Files Advanced
Data hosted in existing
on-premise storage
Policy-based controls for users,
access and retention
Active Directory integration
Secure in-app document
creation, editing and annotation
13Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Snap Deploy
Provision hundreds of systems as
fast as you can provision one
Rapid bare-metal deployments: on
Schedule, upon event, initiated by
user, standalone
Mass deployment and on-going
redeployment
Post-deployment configuration:
individual settings for each target
computer
Designed for desktops PCs,
laptops, tablets
New
System
New
Laptop
New
Laptop
Acronis Snap
Deploy Server
IT Administrator
Master
Image
2
PXE
3
Image
Deployed
Adaptation to the Target
Hardware using Acronis
Universal Deploy
4
5
Master
Machine
Upload Agent to
PXE/Burn CD
Boot new
Machines from
CD/PXE
1
14Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Application-aware
SAP HANA backup
To protect the database data from disk storage
failures and logical errors, you can create consistent
disk-level backups of servers running SAP HANA in a
simple, straightforward manner that does not require
any SAP HANA knowledge or expertise.
You can then reliably recover SAP HANA servers to
bare metal, same or different hardware, migrate them
from a physical machine to a virtual machine and
vice versa – the SAP HANA data inside the backup
will be consistent.
Enable quick, reliable recovery of SAP
HANA database servers
Snapshots via SAP HANA
Snapshots via Acronis SnapAPI
Image backups
with consistent database volumes
Physical server or VM
SAP HANA database
Data volume
Log volume
System volumes
Acronis Agent
for Linux
Local and/or cloud
storage
Snapshot
15Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
KEY FEATURES OF EFFICIENT SAP HANA
BACKUP
16Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
KEY FEATURES OF EFFICIENT SAP HANA
BACKUP
17Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Data Cloud at a Glance
RMM & PSA TOOLS
Acronis Backup Cloud
Acronis Disaster
Recovery Cloud
Accounts Management
Branding
Audit
Integrations
Identity Management
Features Management
Usage Reporting
Reseller Management
RESTful API
Acronis Files Cloud
Acronis Notary Cloud
PLATFORM COMPONENTS
ManagementConsole
DATA PROTECTION SERVICES
CUSTOMER
OFFERINGS
 Backup
 Disaster Recovery
 Anti-Ransomware
Protection
 File Sync & Share
 Files Notarization
 E-Signature
 StaaS
Acronis Software-
Defined Infrastructure
Future Services
18Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis’ Innovations
What makes Acronis unique
19Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Active Protection
• Actively protects files (including local backups) from unauthorized
modification and/or encryption
• Actively protects cloud backups from alteration by hardening the
Acronis agent application from attacks
• Based on a behavioral heuristic approach and whitelisting, active
data protection is future-proofed.
• The result? Data can never be compromised. If any files were
impacted prior to the deflection of an attack, they can be easily and
automatically restored.
Proactively prevents downtime
Ransomware
Active Protection
detection and restore
Physical data loss due
to various reasons
Acronis Cloud
copy
Data restored from
Acronis Cloud in
case of attack
Cloud backups
secured by
Acronis Active
Protection
See Acronis Active Protection Demo 
20Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Active Protection
No magic, just computer science
Clean processes
Infected processes
ntkrnlpa.exe,ntdll.dll,KernelBase.dll,mscorlib.ni.dll, …, clean
KernelBase.dll,kernel32.dll,kernel32.dll,ntdll.dll, …, clean
NetSetupSvc.dll,ELSCore.dll,ELSCore.dll, ,…,clean
com.docker.9pdb.exe, n/a,cryptsp.dll, …, infected
ntkrnlpa.exe,ntdll.dll,KernelBase.dll,mscorlib.ni.dll, clean
…
…
…
ntkrnlpa.exe,ntdll.dll,KernelBase.dll,mscorlib.ni.dll, clean
n/a,clr.dll,clr.dll,clr.dll, combase.dll,rpcrt4.dll, …, clean
Training dataset
Data
transformation
Data
transformation
Model: Decision Tree
1
Stack-traces collected from
hundreds of clean and infected
systems
2
More than 100M events related to data
modification combined into a training dataset
3
Random tree model is trained.
Resulting model size is 15 MB,
compressed 1 MB
4
Decision made by average voting of random
trees analyzing the sequence of stack frames
and modules. Average accuracy is 99.95%,
execution time 1-2 mins.
1 2
3
4
21Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Leadership
“Among all the products we tested,
only Acronis True Image 2017 Next
Generation was able to protect the
backups from every Ransomware
family. The other solutions have
basically zero backup protection when
it comes to Ransomware… Acronis
won most performance tests, and
when it did not win, it finished second.”
Zoltan Balazs,
CTO at MRG Effitas
“Acronis provided excellent
performance, is easy to use and has a
rich feature set. On top of that it is the
only solution in the test to provide
dedicated protection from ransomware
attacks. This earned Acronis the first
ever APPROVED BACKUP & DATA
SECURITY certificate of AV-TEST.”
David Walkiewicz,
Director Test Research, av-test.org
“Our test of the personal backup
software showed that their self-
defense is far from ideal. Only one of
the seven products tested by us,
namely Acronis True Image, was
able to demonstrate a good result.”
Ilya Shabanov,
Managing Partner
at Anti-Malware Test Lab
Proven by 3rd party tests
22Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
Acronis Notary with Blockchain
 Acronis Notary protects data from
tampering using blockchain
 Highly scalable micro-service
architecture
 API interface (REST), queue
interface (AMPQ) for integration
 High throughput (хx10,000 objects
per blockchain transaction)
 Notarization certificates with built-
in verification
23Proprietary and Confidential © 2019Dual headquarters
in Switzerland and Singapore
www.acronis.org
CREATE, SPREAD
AND PROTECT
KNOWLEDGE WITH US!
Building new schools • Publishing books • Providing educational programs

More Related Content

What's hot

Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředí
MarketingArrowECS_CZ
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database Security
Johan Louwers
 
Tekpros Solutions and Services
Tekpros Solutions and ServicesTekpros Solutions and Services
Tekpros Solutions and Services
VamsiKrishna815
 
Capgemini Oracle Engineered Systems Support Model
Capgemini Oracle Engineered Systems Support Model Capgemini Oracle Engineered Systems Support Model
Capgemini Oracle Engineered Systems Support Model
Johan Louwers
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
Ingram Micro Cloud
 
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMwareTransformace IT s technologiemi VMware
Transformace IT s technologiemi VMware
MarketingArrowECS_CZ
 
25438_Intel_Cisco_RedHat_Tech_Overview_r01
25438_Intel_Cisco_RedHat_Tech_Overview_r0125438_Intel_Cisco_RedHat_Tech_Overview_r01
25438_Intel_Cisco_RedHat_Tech_Overview_r01Vish Nadkarni
 
Cisco Connect Ottawa 2018 multi cloud connect, protect, and consume
Cisco Connect Ottawa 2018 multi cloud   connect, protect, and consumeCisco Connect Ottawa 2018 multi cloud   connect, protect, and consume
Cisco Connect Ottawa 2018 multi cloud connect, protect, and consume
Cisco Canada
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
ePlus
 
RapidScale CloudApps
RapidScale CloudAppsRapidScale CloudApps
RapidScale CloudApps
RapidScale
 
Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...
Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...
Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...
MarketingArrowECS_CZ
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
ePlus
 
Dell EMC: Virtualizace není jen hypervisor!
Dell EMC: Virtualizace není jen hypervisor!Dell EMC: Virtualizace není jen hypervisor!
Dell EMC: Virtualizace není jen hypervisor!
MarketingArrowECS_CZ
 
Citrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heavenCitrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heaven
MarketingArrowECS_CZ
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
ePlus Virtualized Network
ePlus Virtualized NetworkePlus Virtualized Network
ePlus Virtualized Network
ePlus
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
 
Evident io Continuous Compliance - Mar 2017
Evident io Continuous Compliance - Mar 2017Evident io Continuous Compliance - Mar 2017
Evident io Continuous Compliance - Mar 2017
Sebastian Taphanel CISSP-ISSEP
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
Amazon Web Services
 

What's hot (20)

Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředí
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database Security
 
Acronis presentation
Acronis presentationAcronis presentation
Acronis presentation
 
Tekpros Solutions and Services
Tekpros Solutions and ServicesTekpros Solutions and Services
Tekpros Solutions and Services
 
Capgemini Oracle Engineered Systems Support Model
Capgemini Oracle Engineered Systems Support Model Capgemini Oracle Engineered Systems Support Model
Capgemini Oracle Engineered Systems Support Model
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMwareTransformace IT s technologiemi VMware
Transformace IT s technologiemi VMware
 
25438_Intel_Cisco_RedHat_Tech_Overview_r01
25438_Intel_Cisco_RedHat_Tech_Overview_r0125438_Intel_Cisco_RedHat_Tech_Overview_r01
25438_Intel_Cisco_RedHat_Tech_Overview_r01
 
Cisco Connect Ottawa 2018 multi cloud connect, protect, and consume
Cisco Connect Ottawa 2018 multi cloud   connect, protect, and consumeCisco Connect Ottawa 2018 multi cloud   connect, protect, and consume
Cisco Connect Ottawa 2018 multi cloud connect, protect, and consume
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
 
RapidScale CloudApps
RapidScale CloudAppsRapidScale CloudApps
RapidScale CloudApps
 
Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...
Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...
Thin Client and VDI Evolution: Igel Technology and the bright future of IT En...
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Dell EMC: Virtualizace není jen hypervisor!
Dell EMC: Virtualizace není jen hypervisor!Dell EMC: Virtualizace není jen hypervisor!
Dell EMC: Virtualizace není jen hypervisor!
 
Citrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heavenCitrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heaven
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
ePlus Virtualized Network
ePlus Virtualized NetworkePlus Virtualized Network
ePlus Virtualized Network
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Evident io Continuous Compliance - Mar 2017
Evident io Continuous Compliance - Mar 2017Evident io Continuous Compliance - Mar 2017
Evident io Continuous Compliance - Mar 2017
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 

Similar to Complete Data Protection for Your Business - Datacomm Seminar

Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
PT Datacomm Diangraha
 
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Netgear Italia
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
Samir Jhaveri
 
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Netgear Italia
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Netgear Italia
 
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNASWebinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
Netgear Italia
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Netgear Italia
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Netgear Italia
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Storage Switzerland
 
Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018
Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018
Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018
Amazon Web Services
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Symmetry™
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
SAP Customer Experience
 
Dr Training V1 07 17 09 Rev Four 4
 Dr Training V1 07 17 09 Rev Four 4 Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4
Ricoh
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Netgear Italia
 
Slide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 GennaioSlide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 Gennaio
NetApp
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Netgear Italia
 
Get your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldGet your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital world
Veritas Technologies LLC
 
Acronis Meet and Learn
Acronis Meet and LearnAcronis Meet and Learn
Acronis Meet and Learn
Yusuf Hadiwinata Sutandar
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
ITSitio.com
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public Cloud
ZNetLive
 

Similar to Complete Data Protection for Your Business - Datacomm Seminar (20)

Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
 
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
 
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
 
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNASWebinar NETGEAR - Le novità di Acronis & ReadyNAS
Webinar NETGEAR - Le novità di Acronis & ReadyNAS
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la Virtualizz...
 
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
Webinar NETGEAR - Acronis e Netgear, una soluzione concreta per la virtualizz...
 
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
 
Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018
Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018
Production-Ready Environments for Kubernetes (CON307-S) - AWS re:Invent 2018
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Dr Training V1 07 17 09 Rev Four 4
 Dr Training V1 07 17 09 Rev Four 4 Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
 
Slide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 GennaioSlide Webinar NetApp 30 Gennaio
Slide Webinar NetApp 30 Gennaio
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
 
Get your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldGet your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital world
 
Acronis Meet and Learn
Acronis Meet and LearnAcronis Meet and Learn
Acronis Meet and Learn
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public Cloud
 

More from PT Datacomm Diangraha

Openshift Workshop
Openshift Workshop Openshift Workshop
Openshift Workshop
PT Datacomm Diangraha
 
Start Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationStart Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with Containerization
PT Datacomm Diangraha
 
Disaster Recovery Cook Book
Disaster Recovery Cook BookDisaster Recovery Cook Book
Disaster Recovery Cook Book
PT Datacomm Diangraha
 
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
PT Datacomm Diangraha
 
Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021
PT Datacomm Diangraha
 
Darwin - PT IMI
Darwin - PT IMIDarwin - PT IMI
Darwin - PT IMI
PT Datacomm Diangraha
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
PT Datacomm Diangraha
 
Aditya - Connecting Future
Aditya - Connecting FutureAditya - Connecting Future
Aditya - Connecting Future
PT Datacomm Diangraha
 
Wiranto
WirantoWiranto
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
PT Datacomm Diangraha
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
PT Datacomm Diangraha
 
Micro services container - Nam Khong
Micro services container - Nam KhongMicro services container - Nam Khong
Micro services container - Nam Khong
PT Datacomm Diangraha
 
Kubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiKubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo Tjahjadi
PT Datacomm Diangraha
 
OCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchOCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes Launch
PT Datacomm Diangraha
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0
PT Datacomm Diangraha
 
Cloud technology for hospitality
Cloud technology for hospitalityCloud technology for hospitality
Cloud technology for hospitality
PT Datacomm Diangraha
 
Why build sap on cloud
Why build sap on cloudWhy build sap on cloud
Why build sap on cloud
PT Datacomm Diangraha
 
Sap migration to cloud
Sap migration to cloudSap migration to cloud
Sap migration to cloud
PT Datacomm Diangraha
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
PT Datacomm Diangraha
 
Hot Disaster Recovery Using Zerto
Hot Disaster Recovery Using ZertoHot Disaster Recovery Using Zerto
Hot Disaster Recovery Using Zerto
PT Datacomm Diangraha
 

More from PT Datacomm Diangraha (20)

Openshift Workshop
Openshift Workshop Openshift Workshop
Openshift Workshop
 
Start Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with ContainerizationStart Your Cloud Native Journey with Containerization
Start Your Cloud Native Journey with Containerization
 
Disaster Recovery Cook Book
Disaster Recovery Cook BookDisaster Recovery Cook Book
Disaster Recovery Cook Book
 
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
Converting Your Existing SAP Server Infrastructure to a Modern Cloud-Based Ar...
 
Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021Sutedjo - open banking may 27, 2021
Sutedjo - open banking may 27, 2021
 
Darwin - PT IMI
Darwin - PT IMIDarwin - PT IMI
Darwin - PT IMI
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
Aditya - Connecting Future
Aditya - Connecting FutureAditya - Connecting Future
Aditya - Connecting Future
 
Wiranto
WirantoWiranto
Wiranto
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
 
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent EnterpriseNam Khong - SAP on Cloud for Your Intelligent Enterprise
Nam Khong - SAP on Cloud for Your Intelligent Enterprise
 
Micro services container - Nam Khong
Micro services container - Nam KhongMicro services container - Nam Khong
Micro services container - Nam Khong
 
Kubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo TjahjadiKubernetes Benefits - Sutedjo Tjahjadi
Kubernetes Benefits - Sutedjo Tjahjadi
 
OCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes LaunchOCP Datacomm RedHat - Kubernetes Launch
OCP Datacomm RedHat - Kubernetes Launch
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0
 
Cloud technology for hospitality
Cloud technology for hospitalityCloud technology for hospitality
Cloud technology for hospitality
 
Why build sap on cloud
Why build sap on cloudWhy build sap on cloud
Why build sap on cloud
 
Sap migration to cloud
Sap migration to cloudSap migration to cloud
Sap migration to cloud
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
Hot Disaster Recovery Using Zerto
Hot Disaster Recovery Using ZertoHot Disaster Recovery Using Zerto
Hot Disaster Recovery Using Zerto
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Complete Data Protection for Your Business - Datacomm Seminar

  • 1. 1Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Dual headquarters in Switzerland and Singapore COMPLETE DATA PROTECTION FOR YOUR BUSINESS Andrey Shipitkov, Business Development Director APAC
  • 2. 2Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore 25+ offices in 18 countries Customers in 150 countries 5,000+ Petabytes of data under Acronis’ protection Acronis is a Global Leader in Cyber Protection 1,000+ employees around the World 50,000+ partners in 145 countries 500,000+ business customers 5,000,000+ consumer customers 79% of Top100 Most Valuable Brands 75% of Tech Top20 Americas 200,000+ Companies Europe 200,000+ Companies APJ / MEA 100,000+ Companies
  • 3. 3Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Safety Accessibility Privacy Authenticity Security Vectors of protection contradict to each other and require a balancing force Protection in the Digital World 5 Vectors of SAPAS
  • 4. 4Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Safety Accessibility Privacy Authenticity Security Cyber Protection Cyber SecurityData Protection Cyber Protection is the Balancing Force
  • 5. 5Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Innovation AnyData Technology Reliable protection for any workload in any environment, with 10s of millions workloads over 15+ years Software-Defined Infrastructure Scale-out cost-efficient high-performance multi- purpose software- defined infrastructure – compute, storage and network Hybrid Cloud Architecture Full Control and flexibility for data management, privacy for data, and business control for partners Blockchain Digital Notary, electronic signatures, data authenticity and consistency validation and more Artificial Intelligence Behavioral security, automated configuration, data classification AI-assisted management Work with Acronis and Innovate!
  • 6. 6Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis’ Unique Cloud Architecture Gives You Control Over Your Data Management software deployed and controlled independently, enabling data protection control by customer, service provider, vendor, partner, or third-party from public/partner/private cloud or customer premises ANY MANAGEMENT ANY PROTECTION ANY DEPLOYMENT ANY RECOVERY Backup Storage Disaster Recovery Notary/ASign Sync & Share ANY WORKLOAD On-premises Virtual Acronis CloudPartner Cloud Mobile Physical Applications Ransomware protection Cloud Private Cloud Virtual Mobile Applications Files Local Private Cloud Public Cloud ANY STORAGE Disk, Tape Public Cloud Partner Cloud Private Cloud NAS, SAN Acronis Cloud Files Cloud
  • 7. 7Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore ACRONIS SOLUTIONS FOR BUSINESS
  • 8. 8Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Scalability Deployment grows with business growth Low Cost One solution for various needs No Downtime Quick recovery of production systems Data Protection Addressing Expectations and Challenges Business Expectations Predictability Flat budget with local and private cloud deployment Efficient Low RTO and low RPO, automatic recovery from ransomware strikes Complete Physical and virtual, servers and endpoints IT Challenges
  • 9. 9Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Entire system and granular application-aware backup and recovery for Physical, Virtual, Cloud and Mobile Acronis Backup Close to instant recovery with vmFlashback and Acronis Instant Restore AI-based proactive protection from ransomware Recovery to dissimilar hardware, migration between Cloud- Physical-Virtual Web and Mobile friendly user interface in 18 languages
  • 10. 10Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Disaster recovery for all popular workloads – Windows and Linux, six major hypervisors, and business applications Acronis Disaster Recovery Instant off-site failover Automated recoverability testing Fast recovery with 15-minute RTO SLA Isolated testing environment
  • 11. 11Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Software-Defined Infrastructure Compute, network, block, file, and object workloads using industry-standard hardware High-performance hyper- converged computing Built-in Prometheus engine and Grafana dashboards High availability features, including reboot-less update Full virtual private networking and virtual distributed switching
  • 12. 12Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Secure access, sharing and collaboration from the desktop, web and mobile devices Acronis Files Advanced Data hosted in existing on-premise storage Policy-based controls for users, access and retention Active Directory integration Secure in-app document creation, editing and annotation
  • 13. 13Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Snap Deploy Provision hundreds of systems as fast as you can provision one Rapid bare-metal deployments: on Schedule, upon event, initiated by user, standalone Mass deployment and on-going redeployment Post-deployment configuration: individual settings for each target computer Designed for desktops PCs, laptops, tablets New System New Laptop New Laptop Acronis Snap Deploy Server IT Administrator Master Image 2 PXE 3 Image Deployed Adaptation to the Target Hardware using Acronis Universal Deploy 4 5 Master Machine Upload Agent to PXE/Burn CD Boot new Machines from CD/PXE 1
  • 14. 14Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Application-aware SAP HANA backup To protect the database data from disk storage failures and logical errors, you can create consistent disk-level backups of servers running SAP HANA in a simple, straightforward manner that does not require any SAP HANA knowledge or expertise. You can then reliably recover SAP HANA servers to bare metal, same or different hardware, migrate them from a physical machine to a virtual machine and vice versa – the SAP HANA data inside the backup will be consistent. Enable quick, reliable recovery of SAP HANA database servers Snapshots via SAP HANA Snapshots via Acronis SnapAPI Image backups with consistent database volumes Physical server or VM SAP HANA database Data volume Log volume System volumes Acronis Agent for Linux Local and/or cloud storage Snapshot
  • 15. 15Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore KEY FEATURES OF EFFICIENT SAP HANA BACKUP
  • 16. 16Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore KEY FEATURES OF EFFICIENT SAP HANA BACKUP
  • 17. 17Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Data Cloud at a Glance RMM & PSA TOOLS Acronis Backup Cloud Acronis Disaster Recovery Cloud Accounts Management Branding Audit Integrations Identity Management Features Management Usage Reporting Reseller Management RESTful API Acronis Files Cloud Acronis Notary Cloud PLATFORM COMPONENTS ManagementConsole DATA PROTECTION SERVICES CUSTOMER OFFERINGS  Backup  Disaster Recovery  Anti-Ransomware Protection  File Sync & Share  Files Notarization  E-Signature  StaaS Acronis Software- Defined Infrastructure Future Services
  • 18. 18Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis’ Innovations What makes Acronis unique
  • 19. 19Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Active Protection • Actively protects files (including local backups) from unauthorized modification and/or encryption • Actively protects cloud backups from alteration by hardening the Acronis agent application from attacks • Based on a behavioral heuristic approach and whitelisting, active data protection is future-proofed. • The result? Data can never be compromised. If any files were impacted prior to the deflection of an attack, they can be easily and automatically restored. Proactively prevents downtime Ransomware Active Protection detection and restore Physical data loss due to various reasons Acronis Cloud copy Data restored from Acronis Cloud in case of attack Cloud backups secured by Acronis Active Protection See Acronis Active Protection Demo 
  • 20. 20Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Active Protection No magic, just computer science Clean processes Infected processes ntkrnlpa.exe,ntdll.dll,KernelBase.dll,mscorlib.ni.dll, …, clean KernelBase.dll,kernel32.dll,kernel32.dll,ntdll.dll, …, clean NetSetupSvc.dll,ELSCore.dll,ELSCore.dll, ,…,clean com.docker.9pdb.exe, n/a,cryptsp.dll, …, infected ntkrnlpa.exe,ntdll.dll,KernelBase.dll,mscorlib.ni.dll, clean … … … ntkrnlpa.exe,ntdll.dll,KernelBase.dll,mscorlib.ni.dll, clean n/a,clr.dll,clr.dll,clr.dll, combase.dll,rpcrt4.dll, …, clean Training dataset Data transformation Data transformation Model: Decision Tree 1 Stack-traces collected from hundreds of clean and infected systems 2 More than 100M events related to data modification combined into a training dataset 3 Random tree model is trained. Resulting model size is 15 MB, compressed 1 MB 4 Decision made by average voting of random trees analyzing the sequence of stack frames and modules. Average accuracy is 99.95%, execution time 1-2 mins. 1 2 3 4
  • 21. 21Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Leadership “Among all the products we tested, only Acronis True Image 2017 Next Generation was able to protect the backups from every Ransomware family. The other solutions have basically zero backup protection when it comes to Ransomware… Acronis won most performance tests, and when it did not win, it finished second.” Zoltan Balazs, CTO at MRG Effitas “Acronis provided excellent performance, is easy to use and has a rich feature set. On top of that it is the only solution in the test to provide dedicated protection from ransomware attacks. This earned Acronis the first ever APPROVED BACKUP & DATA SECURITY certificate of AV-TEST.” David Walkiewicz, Director Test Research, av-test.org “Our test of the personal backup software showed that their self- defense is far from ideal. Only one of the seven products tested by us, namely Acronis True Image, was able to demonstrate a good result.” Ilya Shabanov, Managing Partner at Anti-Malware Test Lab Proven by 3rd party tests
  • 22. 22Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore Acronis Notary with Blockchain  Acronis Notary protects data from tampering using blockchain  Highly scalable micro-service architecture  API interface (REST), queue interface (AMPQ) for integration  High throughput (хx10,000 objects per blockchain transaction)  Notarization certificates with built- in verification
  • 23. 23Proprietary and Confidential © 2019Dual headquarters in Switzerland and Singapore www.acronis.org CREATE, SPREAD AND PROTECT KNOWLEDGE WITH US! Building new schools • Publishing books • Providing educational programs

Editor's Notes

  1. Acronis Data Cloud is a platform that delivers data protection services with an unprecedented level of ease. With one installation, you and your customers gain access to backup, disaster recovery, file sync and share, notarization and e-signature services, all managed from a single console. These in-demand, add-on services help you to sell more and increase your customer retention.