SlideShare a Scribd company logo
1 of 42
Download to read offline
Ransomware Recovery
By Veeam
Any App, Any Data , Across any Cloud
The Hyper-Availability solutions
Tanawit Chansuchai
System Engineer, Thailand
Tanawit.chansuchai@veeam.com
Ransomware – The Big Picture
Agenda
How you Get Attacked
Prevention
3-2-1 Rule
Endpoints Protection
1
2
3
4
5
IT Security
What Do You Think Of?
Malware Disrupts Your Business
• Halts productivity and service
delivery
• Loss of data on customers and
core competencies that is critical
to your competitiveness
• Damage to your brand and
reputation
• Legal and regulatory implications
Closer To You
Coming At You
How You Get Attacked
Ransomware Attack Entry Points
79% tied to email with
malicious
attachment/URLs
20% tied to malicious
websites and/or dropped
by exploit kits
1% are actual
ransomware files
How it Works
Multiple Attack Vectors Data Encrypted
Ransom Note Pay Ransom
Data Decrypted – ??
Restore from Backup
OR
Trend Micro research has
found 99% of ransomware in
email and web traffic
Email Threats
• Attachment
• URL
• Social Engineering
• Phishing
• Business Email Compromise
Web Threats
• Phishing
• Social Engineering
• Exploit
• Malvertisement
Identity Theft
• Stealing Your username/password
• Corporate, Personal, Email, Social Networking
• Personal Information – birthdate, home city, etc…
Preventing Ransomware
What can you do?
Veeam
Gateway
Immunize your backup repository against virus
The best backup is useless if a ransomware can access your backup repository!
22
E:Backup>dir
Volume in drive C is Veeam
Volume Serial Number is 6AE5-29
Directory of E:Backup
2016-07-27 16:04 <DIR> .
2016-07-27 16:04 <DIR> ..
2016-07-27 16:05 <DIR> Job-Oracle
2015-11-18 18:19 <DIR> Job-SQL
2015-11-18 18:19 <DIR> VeeamConfigBackup
0 File(s) 0 bytes
4 Dir(s) 17,381,437,440 bytes free
Backup Repositories
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points are HEALTHY !
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
Production Virtual
Infrastructure
Windows Server
Access denied to Virus. Repository
visible only using 3 Party API
Benefit: Your backup repository is protected against Virus
NAS Share
Local Disk Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points are lost !
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points are lost !
Oracle.VM.vbk
SQL.VM.vbk
DC.VM.vbk
All restore points
are HEALTHY !
VM
Hypervisor
VM VM VM
Veeam
Server
Veeam
Proxy
NASBackup
H/W Duduplication
Immunize your backup repository against virus
The best backup is useless if a ransomware can access your backup repository!
2Different media
3Different copies
of data
1of which is off-site
cloud
0No errors after
backup recoverability
verification
1Is offline
3-2-1 Rule
3 Different copies , 2 Different media , 1 air-gapped from network
3–2–1 Rule with Veeam
Enables complete data Availability
Tape
Device
Storage
To insure data recoverability against ransomware:
Have three copies
of your data
Store on two
different media types
Keep one copy
off site
Veeam Cloud
Connect
Database, Applications,
Files & Data
Backup copy
Production Storage
Data Loss Avoidance
Replication Backup file to offsite
Create
Backup Job
Create
Backup
copy Job
Data Loss Avoidance
Replication VMs to Disaster Recovery Site
Create Replication Job
# From Production VMs
# From Backup File
Data Loss Avoidance
Replication VMs to Disaster Recovery Site
Create Replication Job
# From Production VMs
# From Backup File
Data Loss Avoidance
Replication VMs to Disaster Recovery Site (Fail-Back)
Fail back to Production
# Fail back to production
# Undo Fail over
Automate check backup file with schedule
Sure-Backup – Backup Compliance
Host-based
Replication
Automate check DR Situation with schedule
VM
Verification job
OS
Report
App
Sure-Replica – DR Compliance
Disaster Recovery Plan
Sure Replica report
You can schedule automatic report delivery for result of sure replica, you can to receive
report by email, Note that you can schedule report after sure replica job done.
Have visibility into suspicious behaviour
Agents
NEW Veeam Windows and Linux
agents deliver Availability to public
cloud workloads, as well as physical
endpoints, workstations and servers:
• Enable workload mobility
by allowing workloads
to move from on-premises to the cloud
• Streamline operations with one trusted solution
for virtual,
physical and cloud
EndPoint Protection
Veeam Agent for Windows 2.0
NEW Veeam® Agents for Microsoft Windows and Linux work alongside Veeam Backup & Replication™ to extend Availability to Microsoft
Windows and Linux workloads.
- To avoid downtime and data loss for Windows and Linux-based physical or public cloud-based servers, workstations and endpoints quickly and
easily!
NAT SWITCH
• Test update patch
• Troubleshoot issues
• Train IT Staff
• Provision dev application
Verified Protection & Leverage Data
SureReplica & On Demand Sandbox
Veeam
Hyper-Availability
Platform
Physical
Public Cloud
SaaSManaged
Cloud
Private
Cloud
Edge/
IoT
Any data, any app, across any cloud.
Universal APIs
Veeam Backup & Replication
Veeam ONE
Backup
for Office 365
Availability
for AWS
Agents for
Windows & Linux
Veeam Agent for Unix
NEW Beta Available for Download
Ready to Probe of Concept
…is already in development!
Beta Available : version 2 of Veeam Backup for Microsoft Office 365!
Thank you

More Related Content

What's hot

Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
Diving into Common AWS Misconfigurations
Diving into Common AWS MisconfigurationsDiving into Common AWS Misconfigurations
Diving into Common AWS MisconfigurationsNikhil Sahoo
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edgeitnewsafrica
 
2021 五月 Veeam 多雲解決方案 (完整版本)
2021 五月 Veeam 多雲解決方案 (完整版本)2021 五月 Veeam 多雲解決方案 (完整版本)
2021 五月 Veeam 多雲解決方案 (完整版本)Wales Chen
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protectionDatabarracks
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS Amazon Web Services
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to TenableBharat Jindal
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesVeritas Technologies LLC
 
Business Continuity & Disaster Recovery with Microsoft Azure
Business Continuity & Disaster Recovery with Microsoft AzureBusiness Continuity & Disaster Recovery with Microsoft Azure
Business Continuity & Disaster Recovery with Microsoft AzureAymen Mami
 

What's hot (20)

Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Diving into Common AWS Misconfigurations
Diving into Common AWS MisconfigurationsDiving into Common AWS Misconfigurations
Diving into Common AWS Misconfigurations
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
OpenStack Framework Introduction
OpenStack Framework IntroductionOpenStack Framework Introduction
OpenStack Framework Introduction
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
2021 五月 Veeam 多雲解決方案 (完整版本)
2021 五月 Veeam 多雲解決方案 (完整版本)2021 五月 Veeam 多雲解決方案 (完整版本)
2021 五月 Veeam 多雲解決方案 (完整版本)
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protection
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to Tenable
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
Business Continuity & Disaster Recovery with Microsoft Azure
Business Continuity & Disaster Recovery with Microsoft AzureBusiness Continuity & Disaster Recovery with Microsoft Azure
Business Continuity & Disaster Recovery with Microsoft Azure
 

Similar to Ransomeware Recovery by Veeam

Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Securityguestb09e16
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudOK2OK
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL ServerBob Roudebush
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
DRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareDRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareTanawit Chansuchai
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1Tanawit Chansuchai
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRNetgear Italia
 
VMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability SuiteVMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability SuiteTeck Sze Tay
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
Cloud-Based Disaster Recovery Service Overview
Cloud-Based Disaster Recovery Service OverviewCloud-Based Disaster Recovery Service Overview
Cloud-Based Disaster Recovery Service OverviewPT Datacomm Diangraha
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...OK2OK
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbourIT
 

Similar to Ransomeware Recovery by Veeam (20)

Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS Cloud
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
DRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareDRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam Software
 
London VMUG July 2011
London VMUG July 2011London VMUG July 2011
London VMUG July 2011
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
 
VMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability SuiteVMware TechTues - Veeam Availability Suite
VMware TechTues - Veeam Availability Suite
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Cloud-Based Disaster Recovery Service Overview
Cloud-Based Disaster Recovery Service OverviewCloud-Based Disaster Recovery Service Overview
Cloud-Based Disaster Recovery Service Overview
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
 

More from Tanawit Chansuchai

Google Cloud Anthos on HPE Simplivity
Google Cloud Anthos on HPE SimplivityGoogle Cloud Anthos on HPE Simplivity
Google Cloud Anthos on HPE SimplivityTanawit Chansuchai
 
Netapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability PlatformNetapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability PlatformTanawit Chansuchai
 
SQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLSQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLTanawit Chansuchai
 
NetApp & Veeam - Solution Whiteboard for Hybrid-Cloud Infrastructure
NetApp & Veeam - Solution Whiteboard for Hybrid-Cloud InfrastructureNetApp & Veeam - Solution Whiteboard for Hybrid-Cloud Infrastructure
NetApp & Veeam - Solution Whiteboard for Hybrid-Cloud InfrastructureTanawit Chansuchai
 
Simplify hybrid cloud protection with veeam availability platform
Simplify hybrid cloud protection with veeam availability platformSimplify hybrid cloud protection with veeam availability platform
Simplify hybrid cloud protection with veeam availability platformTanawit Chansuchai
 
Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform Tanawit Chansuchai
 
Enhancing business continuity on hybrid cloud with veeam availability platform
Enhancing business continuity on hybrid cloud with veeam availability platformEnhancing business continuity on hybrid cloud with veeam availability platform
Enhancing business continuity on hybrid cloud with veeam availability platformTanawit Chansuchai
 
Veeam Agent for Linux - Webinar 20171130
Veeam Agent for Linux - Webinar 20171130Veeam Agent for Linux - Webinar 20171130
Veeam Agent for Linux - Webinar 20171130Tanawit Chansuchai
 
Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Tanawit Chansuchai
 
Availability for health care enable the always-on enterprise 24 7-365
Availability for health care   enable the always-on enterprise 24 7-365Availability for health care   enable the always-on enterprise 24 7-365
Availability for health care enable the always-on enterprise 24 7-365Tanawit Chansuchai
 
Veeam Availability Suite version 10
Veeam Availability Suite version 10Veeam Availability Suite version 10
Veeam Availability Suite version 10Tanawit Chansuchai
 
Veeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud Connect
Veeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud ConnectVeeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud Connect
Veeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud ConnectTanawit Chansuchai
 
Veeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysVeeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysTanawit Chansuchai
 
Staying Ahead of New Availability Requirements with the hybrid Cloud.
Staying Ahead of New Availability Requirements with the hybrid Cloud.Staying Ahead of New Availability Requirements with the hybrid Cloud.
Staying Ahead of New Availability Requirements with the hybrid Cloud.Tanawit Chansuchai
 
top 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for Veeamtop 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for VeeamTanawit Chansuchai
 
Veeam Availability Console What's News at Veeam ON Thailand
Veeam Availability Console What's News at Veeam ON ThailandVeeam Availability Console What's News at Veeam ON Thailand
Veeam Availability Console What's News at Veeam ON ThailandTanawit Chansuchai
 
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization1709123_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization170912Tanawit Chansuchai
 

More from Tanawit Chansuchai (18)

Google Cloud Anthos on HPE Simplivity
Google Cloud Anthos on HPE SimplivityGoogle Cloud Anthos on HPE Simplivity
Google Cloud Anthos on HPE Simplivity
 
Azure Backup Simplifies
Azure Backup SimplifiesAzure Backup Simplifies
Azure Backup Simplifies
 
Netapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability PlatformNetapp HCI + Veeam Availability Platform
Netapp HCI + Veeam Availability Platform
 
SQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLSQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQL
 
NetApp & Veeam - Solution Whiteboard for Hybrid-Cloud Infrastructure
NetApp & Veeam - Solution Whiteboard for Hybrid-Cloud InfrastructureNetApp & Veeam - Solution Whiteboard for Hybrid-Cloud Infrastructure
NetApp & Veeam - Solution Whiteboard for Hybrid-Cloud Infrastructure
 
Simplify hybrid cloud protection with veeam availability platform
Simplify hybrid cloud protection with veeam availability platformSimplify hybrid cloud protection with veeam availability platform
Simplify hybrid cloud protection with veeam availability platform
 
Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform
 
Enhancing business continuity on hybrid cloud with veeam availability platform
Enhancing business continuity on hybrid cloud with veeam availability platformEnhancing business continuity on hybrid cloud with veeam availability platform
Enhancing business continuity on hybrid cloud with veeam availability platform
 
Veeam Agent for Linux - Webinar 20171130
Veeam Agent for Linux - Webinar 20171130Veeam Agent for Linux - Webinar 20171130
Veeam Agent for Linux - Webinar 20171130
 
Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS)
 
Availability for health care enable the always-on enterprise 24 7-365
Availability for health care   enable the always-on enterprise 24 7-365Availability for health care   enable the always-on enterprise 24 7-365
Availability for health care enable the always-on enterprise 24 7-365
 
Veeam Availability Suite version 10
Veeam Availability Suite version 10Veeam Availability Suite version 10
Veeam Availability Suite version 10
 
Veeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud Connect
Veeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud ConnectVeeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud Connect
Veeam - Fast Secure Cloud base Disaster Recovery with Veeam Cloud Connect
 
Veeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysVeeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome ways
 
Staying Ahead of New Availability Requirements with the hybrid Cloud.
Staying Ahead of New Availability Requirements with the hybrid Cloud.Staying Ahead of New Availability Requirements with the hybrid Cloud.
Staying Ahead of New Availability Requirements with the hybrid Cloud.
 
top 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for Veeamtop 15 easy performance optimizations for Veeam
top 15 easy performance optimizations for Veeam
 
Veeam Availability Console What's News at Veeam ON Thailand
Veeam Availability Console What's News at Veeam ON ThailandVeeam Availability Console What's News at Veeam ON Thailand
Veeam Availability Console What's News at Veeam ON Thailand
 
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization1709123_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Ransomeware Recovery by Veeam

  • 1. Ransomware Recovery By Veeam Any App, Any Data , Across any Cloud The Hyper-Availability solutions Tanawit Chansuchai System Engineer, Thailand Tanawit.chansuchai@veeam.com
  • 2. Ransomware – The Big Picture Agenda How you Get Attacked Prevention 3-2-1 Rule Endpoints Protection 1 2 3 4 5
  • 3. IT Security What Do You Think Of?
  • 4.
  • 5.
  • 6. Malware Disrupts Your Business • Halts productivity and service delivery • Loss of data on customers and core competencies that is critical to your competitiveness • Damage to your brand and reputation • Legal and regulatory implications
  • 7.
  • 9.
  • 10. How You Get Attacked
  • 11. Ransomware Attack Entry Points 79% tied to email with malicious attachment/URLs 20% tied to malicious websites and/or dropped by exploit kits 1% are actual ransomware files
  • 12. How it Works Multiple Attack Vectors Data Encrypted Ransom Note Pay Ransom Data Decrypted – ?? Restore from Backup OR Trend Micro research has found 99% of ransomware in email and web traffic
  • 13. Email Threats • Attachment • URL • Social Engineering • Phishing • Business Email Compromise
  • 14.
  • 15.
  • 16.
  • 17. Web Threats • Phishing • Social Engineering • Exploit • Malvertisement
  • 18.
  • 19. Identity Theft • Stealing Your username/password • Corporate, Personal, Email, Social Networking • Personal Information – birthdate, home city, etc…
  • 22. Veeam Gateway Immunize your backup repository against virus The best backup is useless if a ransomware can access your backup repository! 22 E:Backup>dir Volume in drive C is Veeam Volume Serial Number is 6AE5-29 Directory of E:Backup 2016-07-27 16:04 <DIR> . 2016-07-27 16:04 <DIR> .. 2016-07-27 16:05 <DIR> Job-Oracle 2015-11-18 18:19 <DIR> Job-SQL 2015-11-18 18:19 <DIR> VeeamConfigBackup 0 File(s) 0 bytes 4 Dir(s) 17,381,437,440 bytes free Backup Repositories Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are HEALTHY ! Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk Production Virtual Infrastructure Windows Server Access denied to Virus. Repository visible only using 3 Party API Benefit: Your backup repository is protected against Virus NAS Share Local Disk Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are lost ! Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are lost ! Oracle.VM.vbk SQL.VM.vbk DC.VM.vbk All restore points are HEALTHY ! VM Hypervisor VM VM VM Veeam Server Veeam Proxy NASBackup H/W Duduplication
  • 23. Immunize your backup repository against virus The best backup is useless if a ransomware can access your backup repository!
  • 24. 2Different media 3Different copies of data 1of which is off-site cloud 0No errors after backup recoverability verification 1Is offline 3-2-1 Rule 3 Different copies , 2 Different media , 1 air-gapped from network
  • 25. 3–2–1 Rule with Veeam Enables complete data Availability Tape Device Storage To insure data recoverability against ransomware: Have three copies of your data Store on two different media types Keep one copy off site Veeam Cloud Connect Database, Applications, Files & Data Backup copy Production Storage
  • 26. Data Loss Avoidance Replication Backup file to offsite Create Backup Job Create Backup copy Job
  • 27. Data Loss Avoidance Replication VMs to Disaster Recovery Site Create Replication Job # From Production VMs # From Backup File
  • 28. Data Loss Avoidance Replication VMs to Disaster Recovery Site Create Replication Job # From Production VMs # From Backup File
  • 29. Data Loss Avoidance Replication VMs to Disaster Recovery Site (Fail-Back) Fail back to Production # Fail back to production # Undo Fail over
  • 30. Automate check backup file with schedule Sure-Backup – Backup Compliance
  • 31. Host-based Replication Automate check DR Situation with schedule VM Verification job OS Report App Sure-Replica – DR Compliance
  • 32. Disaster Recovery Plan Sure Replica report You can schedule automatic report delivery for result of sure replica, you can to receive report by email, Note that you can schedule report after sure replica job done.
  • 33. Have visibility into suspicious behaviour
  • 34.
  • 36. NEW Veeam Windows and Linux agents deliver Availability to public cloud workloads, as well as physical endpoints, workstations and servers: • Enable workload mobility by allowing workloads to move from on-premises to the cloud • Streamline operations with one trusted solution for virtual, physical and cloud EndPoint Protection
  • 37. Veeam Agent for Windows 2.0 NEW Veeam® Agents for Microsoft Windows and Linux work alongside Veeam Backup & Replication™ to extend Availability to Microsoft Windows and Linux workloads. - To avoid downtime and data loss for Windows and Linux-based physical or public cloud-based servers, workstations and endpoints quickly and easily!
  • 38. NAT SWITCH • Test update patch • Troubleshoot issues • Train IT Staff • Provision dev application Verified Protection & Leverage Data SureReplica & On Demand Sandbox
  • 39. Veeam Hyper-Availability Platform Physical Public Cloud SaaSManaged Cloud Private Cloud Edge/ IoT Any data, any app, across any cloud. Universal APIs Veeam Backup & Replication Veeam ONE Backup for Office 365 Availability for AWS Agents for Windows & Linux
  • 40. Veeam Agent for Unix NEW Beta Available for Download
  • 41. Ready to Probe of Concept …is already in development! Beta Available : version 2 of Veeam Backup for Microsoft Office 365!