SlideShare a Scribd company logo
18
Services
Ransomware:
The Defendable Epidemic
8
Full Cyber & Business
Continuity Protection
Proactive Reactive
Proactive solutions are not enough
Vendor neutrality, transparency, and integration is required
Working together, true per application & automated Recovery-as-a-Service can emerge
What does a real BCDR strategy look like?
Threat monitoring &
mitigation
Disaster Recovery & IT
Resiliency Orchestration
3
Production environments are complex. DR Strategy must match.
Disaster Recovery is strategy. Consider:
➢ Production workloads
➢ Security
➢ 3rd party services
➢ Hybrid & Multi-cloud
➢ Accountability, ownership, appetite, and recourse for failure
➢ Possibly “All or Nothing”
Disaster Recovery is not:
➢ Replication software that you purchase
➢ “Set it and forget it”
➢ Static
➢ About replicating data…
4
Disaster Recovery Ownership Models
➢Customer to Customer (Secondary NOC)
➢Customer to Managed Cloud Provider
➢Customer to IaaS public clouds
➢Managed Cloud Provider with DRaaS
➢IaaS public to IaaS public
➢Hybrid: Colocation + Managed Cloud + Network + More..
17
Business Considerations
Ownership & Accountability:
➢ Buy vs Build
➢ Recourse should the solution not work?
➢ Recourse should a data breach occur?
➢ SLAs for RTO/RPO?
➢Provider: Contract/SLA/BAA
➢ Monitoring / Alerting integrations
➢ Who owns failback?
➢ HW/SW - Capex/Opex
Testing considerations
➢ “Application Centric”
➢ Runbook per application
➢ Shift testing to application owners, not IT
➢ “Real test”
➢ Preparation time
17
Fully Inclusive Disaster Recovery Considerations
HV Replication
Data Copy
Storage Native Replication
Physical Servers
non-x86 platforms (IBM i, P, Z)
Application based replication
Always-on Infrastructure (Authentication & Applications)
Network Integration & Consumption - VPN, MPLS, 3rd party, DNS
IT Resiliency Orchestration - Data Loss Prevention - Ransomware Recovery
17
➢ Recovery site integration:
➢ Site-to-Site, Site-to-Client VPN
➢ MPLS / VPLS integration
➢ Point-to-Point, L2 stretch (e-line), L3, possible encryption
➢ SD-WAN
➢ Interconnection Fabric
➢ Internal traffic shift
➢ iBGP/eBGP swing
➢ Internal route injection
➢ DNS
➢ Subnet alignment
➢ Network Overlay via SDP / NAC software
➢ External traffic shift
➢ DNS
➢ Proxy services
➢ BGP swing
Full DR - (The Weeds)
➢Cybersecurity considerations
➢ Security at recovery site “as-good” as production?
➢ If not, new attack vector(s) at recovery
➢ Is existing security monitoring inclusive of recovery site?
➢ Is MSSP fully accountable for recovery site?
➢ Any network exposure when failed over?
➢Storage
➢Vendor native replication
➢ NFS/CIFS replication
➢ RDMs / non-VM
25
DRaaS: More than just VM Replication
“Bring me your legacy, your insecure, your flat network design…”
17
Match Application Criticality to Solution
Tier 0 Applications
Tier 1 Applications
Tier 2 Applications
Tier 3 Applications
48 Hours+ $
24 Hours $$
1 Hour $$$
Synchronous $$$$
Common Components (Network, Runbook, Integrations, Accountability, Contract)
Recovery Point & Recovery Time Objectives Application Criticality
17
Tier 0 Applications
Tier 1 Applications
Tier 2 Applications
Tier 3 Applications
Backups-as-a-Service
Disaster-Recovery Lite
Disaster-Recovery
Ransomware-Recovery
Service <-> Criticality
Match Application Criticality to Solution
Common Components (Network, Runbook, Integrations, Accountability, Contract)
27
Webair BCDR Offerings
• Backups-as-a-Service
• Backups-as-a-Service to Azure
• Disaster-Recovery-as-a-Service
• Disaster-Recovery-as-a-Service to Azure
• Ransomware-Recovery-as-a-Service
• IBM DRaaS Services
27
BCDR Services
➢Backups-as-a-Service
➢ Offsite data / backup requirement
➢ Long term retention requirements, or:
➢ Single copy offsite (in the cloud)
➢ Insurance policy to “spin up” via DR-Lite service
➢ Disaster-as-a-Service
➢ Ability to instantly recovery from Ransomware and issues related to Humans, Applications, Infrastructure
➢ Fully managed failover AND fallback (confidence)
➢ Per Application functionality
➢ Max 30 days of “instant-on” capability
➢ Ransomware-Recovery-as-a-Service
➢ Integration with existing cybersecurity initiatives, software, services
➢ Automated failover based upon intrusion detection
➢ Utilize Replica to improve production environment’s security
17
Offsite Backups Considerations
➢ Local Backups Platform & Support - Vmware, HyperV, Physical Servers, NFS/CIFS
➢Costs
Software
Storage Frontend/Backend
Restores & Data transfer
Operations
Infrastructure (Always on)
➢ Connectivity
Latency - Duration of Backup & Restores
Capacity - Acceleration & Synthetics
➢ DIY Infrastructure or Managed Service - Accountability
➢ Number of copies
➢Security
Encryption + Dedup,
Contracts, BAAs & SLAs
Private Connectivity, Air Gapped - “Data center within a data center”
17
Backups-as-a-Service is not Disaster Recovery!
➢ Webair DR-Lite Add-on for BaaS
➢ Ability to spin up backed up VMs on-demand
➢ 15 Minute RPO / 24 hour RTO
➢ Yearly testing
➢ Self Service Portal:
Spin up / Shutdown VMs
Console VMs & manage networks
Download / Restore backups for failback
➢Always-on Networking:
Reduces RTO to minutes to on-demand (minutes)
Network pre-planning and pre-configuration
➢Cost Metric: Storage only
17
True Disaster-Recovery Considerations
➢ Application consumption (Network)
➢ Failback
➢ Application Consistency
➢ “Managed”assistance?
➢ Multiple Platforms on same LAN
➢ “Managed Testing” ?
➢ Journal and Change Data
➢ On-Demand testing & access
➢ Infrastructure Performance
➢ Utilization of Replica
➢ Security - SLA / BAA / MSA / Encryption
➢ Cost Metrics - Per server, storage, data transfer, operations, infrastructure, declaration of DR, failback, network..
17
➢ True DRaaS gets us:
➢ Per Application Failover/Failback
➢ Network Consumption Automation
➢ “Rewind” Ability via journal
➢ Use of replica environment
➢ Confidence to use it
➢ API & Automation
➢Still needed..
➢Security at Recovery site must be as good as production:
➢ Ownership from 1 security firm
➢ Same SIEM, firewalls, tools, procedures
➢ DDoS Monitoring & Mitigation
➢ Reduce security event exposure
➢ Non-intrusive to production
DRaaS for Automated Ransomware-Recovery
17
Ransomware Recovery Considerations
Webair Ransomware Recovery-as-a-Service
25
Hybrid Configurations
➢ Utilize existing hardware, licenses
➢ Shift legal/security ownership where needed
➢ Reduce demands on internal teams
➢ Take advantage of partner experience
➢ Shared runbook responsibilities
➢ “Future-proof” investment - mix/match later as needed
➢ “Hardware appliance and management as a service”
17
DRaaS: It’s really about the network..
17
➢Network topology a blocker to DR strategy?
➢ Leapfrog the network and overlay..
➢ Utilize NAC (Network Access Control) or SDP tools to shift traffic per endpoint
➢ SDP: Software Defined Permiter
➢ “Zero Trust” model - endpoint software locks down all traffic
➢ All traffic is routed through Gateway
➢ Gateway enforces network security
➢“Tag” users, applications, device types, locations
➢ Build global security policies via single pane of glass for entire organization
➢ Think of a specific tunnel being built to per use-case / flow
➢ Global visibility into user & application consumption
➢ API / Automation available
Shifting traffic: A better way
17
➢ Cool. What’s that have to do with DR?
➢ “Shift” application traffic from location A —> B via software defined policies
➢ Physical network agnostic
➢ Future proof - Network, locations, clouds can all change
➢ Part of automated runbook, APIs
➢ Alignment issues, network topology issues go away
➢ Security solution - May be part of larger organization security
➢Requirements
➢ Organization must adopt the solution
➢ DR Solution or DRaaS provider must support it (Webair does!! :) )
➢ Internal traffic only - Doesn’t help with internet facing applications
Shifting Traffic: A better way
2
Enterprise Private Cloud Enterprise Public Cloud Disaster Recovery-as-a-Service
Hybrid Colocation Backups-as-a-Service
Full Stack Management
Cloud Storage Hyperscale Network Connectivity
25
Fully managed web apps
& cloud infrastructure
Business Continuity & Disaster Recovery
Our History: Down the Stack
Webair maintains a global network of state-of-the-art data center facilities that offer top-tier Colocation
solutions featuring modular power options, superior architecture and access to DDoS-protected
bandwidth, as well as superior connectivity to a multitude of leading carriers.
Hong Kong
9
Hong Kong
Data Center Locations
Tier 3 rated, SOC1, SOC2, CJIS, HIPAA, PCI-DSS, NYS DFS 500, Open-IX Compliance
400 Cabinet / 8MW Capacity
3 Generators / 7+ days fuel runtime
AWS, Azure, Google on-premises
DDoS monitoring and mitigation on-premises
Eco-system of managed services on-premises
Tax-Exempt and Hydro-Electric “green” power allocation from NYPA
Outside 25 mile NYC “blast zone” with Manhattan Bypass fiber routes
BCDR seats on-premises
LIRR train station on-premises
10
Webair NY1
Hybrid Colocation
10
➢Coloation is not about space and power
➢ Ecosystem of managed services behind the firewall
➢ Mix & match based on risk, capex/opex, platform changes
➢ Revenue Portability - Phased approach to cloud & future proof
20
Dedicated Private Cloud
➢Completely dedicated and physically segmented hypervisors and networking
➢Direct vCenter access to manage cloud environment
➢VMware Orchestrator configured to allow for API-based automation and control
➢Connect cluster to on-premises vCenter, allowing for seamless workload moves
➢Options for physically dedicated SAN storage
➢Connect to customer networks via MPLS, direct connectivity & cross-connects, bypassing the internet
➢Customize hardware on request
➢Higher levels of encryption available
➢Ability to customize hypervisors and versions
Enterprise Virtual Private Cloud (E-VPC)
➢Dedicated resource pool with ability to burst
➢Compliance reporting of compute configuration
➢Historical and real-time resource utilization
➢Console access
➢Ability to create custom templates
Public & Private Compliance Cloud & Storage
13
On premise vs Public cloud: A better way
Webair Direct Access Cloud Erate Eligible

More Related Content

What's hot

F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
F5 Networks
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
F5 Networks
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
Maichino Sepede
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
Information Technology
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
patmisasi
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
solarisyourep
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
OVHcloud
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld
 
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User GroupInfoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
NetCraftsmen
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IP
F5NetworksAPJ
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
PCCW GLOBAL
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Rohith Shankar
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Marta Pacyga
 
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS ServicesPLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PROIDEA
 
Optimizing Speed & Security of Oracle Commerce Sites Using Cloudflare
Optimizing Speed & Security  of Oracle Commerce Sites Using CloudflareOptimizing Speed & Security  of Oracle Commerce Sites Using Cloudflare
Optimizing Speed & Security of Oracle Commerce Sites Using Cloudflare
Meghan Weinreich
 
VMworld 2013: SDDC is Here and Now: A Success Story
VMworld 2013: SDDC is Here and Now: A Success Story VMworld 2013: SDDC is Here and Now: A Success Story
VMworld 2013: SDDC is Here and Now: A Success Story
VMworld
 
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud ServicesZoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Winston Morton
 
F5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSF5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKS
Marco Essomba
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
islamet
 

What's hot (20)

F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User GroupInfoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IP
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS ServicesPLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
 
Optimizing Speed & Security of Oracle Commerce Sites Using Cloudflare
Optimizing Speed & Security  of Oracle Commerce Sites Using CloudflareOptimizing Speed & Security  of Oracle Commerce Sites Using Cloudflare
Optimizing Speed & Security of Oracle Commerce Sites Using Cloudflare
 
VMworld 2013: SDDC is Here and Now: A Success Story
VMworld 2013: SDDC is Here and Now: A Success Story VMworld 2013: SDDC is Here and Now: A Success Story
VMworld 2013: SDDC is Here and Now: A Success Story
 
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud ServicesZoura Subscribed 2013 LinkBermuda Metered Cloud Services
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
 
F5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSF5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKS
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
 

Similar to Ransomware: The Defendable Epidemic

An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
PT Datacomm Diangraha
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
cloud computng
cloud computng cloud computng
cloud computng
Krishna Gali
 
cloud computing
cloud computingcloud computing
cloud computing
Shubham Tiwari
 
Secure SDN
Secure SDNSecure SDN
Secure SDN
APNIC
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Paul Huertas Apaza
 
Cloud
CloudCloud
Cloud
shan miao
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
A
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Ryan Jay Cabe
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Revathi Ram
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
poojagupta020
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
A
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Jegadeesh Sam
 
Cloud
CloudCloud
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Van Pham
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
sree raj
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Avi Networks
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
MarketingArrowECS_CZ
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
Dr.Neeraj Kumar Pandey
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 

Similar to Ransomware: The Defendable Epidemic (20)

An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
cloud computng
cloud computng cloud computng
cloud computng
 
cloud computing
cloud computingcloud computing
cloud computing
 
Secure SDN
Secure SDNSecure SDN
Secure SDN
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud
CloudCloud
Cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 

More from Sagi Brody

Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
Sagi Brody
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
Sagi Brody
 
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Sagi Brody
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud Curtain
Sagi Brody
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
Sagi Brody
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
Sagi Brody
 
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineTroubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Sagi Brody
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation Teams
Sagi Brody
 
TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a Service
Sagi Brody
 

More from Sagi Brody (9)

Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
Enabling Limitless Connectivity, Opportunity and Growth with Interconnection ...
 
Pulling Back the Cloud Curtain
Pulling Back the Cloud CurtainPulling Back the Cloud Curtain
Pulling Back the Cloud Curtain
 
Why Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container TechnologyWhy Managed Service Providers Should Embrace Container Technology
Why Managed Service Providers Should Embrace Container Technology
 
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation StrategiesMulti-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
 
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineTroubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation Teams
 
TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a Service
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Ransomware: The Defendable Epidemic

  • 2. 8 Full Cyber & Business Continuity Protection Proactive Reactive Proactive solutions are not enough Vendor neutrality, transparency, and integration is required Working together, true per application & automated Recovery-as-a-Service can emerge What does a real BCDR strategy look like? Threat monitoring & mitigation Disaster Recovery & IT Resiliency Orchestration
  • 3. 3 Production environments are complex. DR Strategy must match. Disaster Recovery is strategy. Consider: ➢ Production workloads ➢ Security ➢ 3rd party services ➢ Hybrid & Multi-cloud ➢ Accountability, ownership, appetite, and recourse for failure ➢ Possibly “All or Nothing” Disaster Recovery is not: ➢ Replication software that you purchase ➢ “Set it and forget it” ➢ Static ➢ About replicating data…
  • 4. 4 Disaster Recovery Ownership Models ➢Customer to Customer (Secondary NOC) ➢Customer to Managed Cloud Provider ➢Customer to IaaS public clouds ➢Managed Cloud Provider with DRaaS ➢IaaS public to IaaS public ➢Hybrid: Colocation + Managed Cloud + Network + More..
  • 5. 17 Business Considerations Ownership & Accountability: ➢ Buy vs Build ➢ Recourse should the solution not work? ➢ Recourse should a data breach occur? ➢ SLAs for RTO/RPO? ➢Provider: Contract/SLA/BAA ➢ Monitoring / Alerting integrations ➢ Who owns failback? ➢ HW/SW - Capex/Opex Testing considerations ➢ “Application Centric” ➢ Runbook per application ➢ Shift testing to application owners, not IT ➢ “Real test” ➢ Preparation time
  • 6. 17 Fully Inclusive Disaster Recovery Considerations HV Replication Data Copy Storage Native Replication Physical Servers non-x86 platforms (IBM i, P, Z) Application based replication Always-on Infrastructure (Authentication & Applications) Network Integration & Consumption - VPN, MPLS, 3rd party, DNS IT Resiliency Orchestration - Data Loss Prevention - Ransomware Recovery
  • 7. 17 ➢ Recovery site integration: ➢ Site-to-Site, Site-to-Client VPN ➢ MPLS / VPLS integration ➢ Point-to-Point, L2 stretch (e-line), L3, possible encryption ➢ SD-WAN ➢ Interconnection Fabric ➢ Internal traffic shift ➢ iBGP/eBGP swing ➢ Internal route injection ➢ DNS ➢ Subnet alignment ➢ Network Overlay via SDP / NAC software ➢ External traffic shift ➢ DNS ➢ Proxy services ➢ BGP swing Full DR - (The Weeds) ➢Cybersecurity considerations ➢ Security at recovery site “as-good” as production? ➢ If not, new attack vector(s) at recovery ➢ Is existing security monitoring inclusive of recovery site? ➢ Is MSSP fully accountable for recovery site? ➢ Any network exposure when failed over? ➢Storage ➢Vendor native replication ➢ NFS/CIFS replication ➢ RDMs / non-VM
  • 8. 25 DRaaS: More than just VM Replication “Bring me your legacy, your insecure, your flat network design…”
  • 9. 17 Match Application Criticality to Solution Tier 0 Applications Tier 1 Applications Tier 2 Applications Tier 3 Applications 48 Hours+ $ 24 Hours $$ 1 Hour $$$ Synchronous $$$$ Common Components (Network, Runbook, Integrations, Accountability, Contract) Recovery Point & Recovery Time Objectives Application Criticality
  • 10. 17 Tier 0 Applications Tier 1 Applications Tier 2 Applications Tier 3 Applications Backups-as-a-Service Disaster-Recovery Lite Disaster-Recovery Ransomware-Recovery Service <-> Criticality Match Application Criticality to Solution Common Components (Network, Runbook, Integrations, Accountability, Contract)
  • 11. 27 Webair BCDR Offerings • Backups-as-a-Service • Backups-as-a-Service to Azure • Disaster-Recovery-as-a-Service • Disaster-Recovery-as-a-Service to Azure • Ransomware-Recovery-as-a-Service • IBM DRaaS Services
  • 12. 27 BCDR Services ➢Backups-as-a-Service ➢ Offsite data / backup requirement ➢ Long term retention requirements, or: ➢ Single copy offsite (in the cloud) ➢ Insurance policy to “spin up” via DR-Lite service ➢ Disaster-as-a-Service ➢ Ability to instantly recovery from Ransomware and issues related to Humans, Applications, Infrastructure ➢ Fully managed failover AND fallback (confidence) ➢ Per Application functionality ➢ Max 30 days of “instant-on” capability ➢ Ransomware-Recovery-as-a-Service ➢ Integration with existing cybersecurity initiatives, software, services ➢ Automated failover based upon intrusion detection ➢ Utilize Replica to improve production environment’s security
  • 13. 17 Offsite Backups Considerations ➢ Local Backups Platform & Support - Vmware, HyperV, Physical Servers, NFS/CIFS ➢Costs Software Storage Frontend/Backend Restores & Data transfer Operations Infrastructure (Always on) ➢ Connectivity Latency - Duration of Backup & Restores Capacity - Acceleration & Synthetics ➢ DIY Infrastructure or Managed Service - Accountability ➢ Number of copies ➢Security Encryption + Dedup, Contracts, BAAs & SLAs Private Connectivity, Air Gapped - “Data center within a data center”
  • 14. 17 Backups-as-a-Service is not Disaster Recovery! ➢ Webair DR-Lite Add-on for BaaS ➢ Ability to spin up backed up VMs on-demand ➢ 15 Minute RPO / 24 hour RTO ➢ Yearly testing ➢ Self Service Portal: Spin up / Shutdown VMs Console VMs & manage networks Download / Restore backups for failback ➢Always-on Networking: Reduces RTO to minutes to on-demand (minutes) Network pre-planning and pre-configuration ➢Cost Metric: Storage only
  • 15. 17 True Disaster-Recovery Considerations ➢ Application consumption (Network) ➢ Failback ➢ Application Consistency ➢ “Managed”assistance? ➢ Multiple Platforms on same LAN ➢ “Managed Testing” ? ➢ Journal and Change Data ➢ On-Demand testing & access ➢ Infrastructure Performance ➢ Utilization of Replica ➢ Security - SLA / BAA / MSA / Encryption ➢ Cost Metrics - Per server, storage, data transfer, operations, infrastructure, declaration of DR, failback, network..
  • 16. 17 ➢ True DRaaS gets us: ➢ Per Application Failover/Failback ➢ Network Consumption Automation ➢ “Rewind” Ability via journal ➢ Use of replica environment ➢ Confidence to use it ➢ API & Automation ➢Still needed.. ➢Security at Recovery site must be as good as production: ➢ Ownership from 1 security firm ➢ Same SIEM, firewalls, tools, procedures ➢ DDoS Monitoring & Mitigation ➢ Reduce security event exposure ➢ Non-intrusive to production DRaaS for Automated Ransomware-Recovery
  • 17. 17 Ransomware Recovery Considerations Webair Ransomware Recovery-as-a-Service
  • 18. 25 Hybrid Configurations ➢ Utilize existing hardware, licenses ➢ Shift legal/security ownership where needed ➢ Reduce demands on internal teams ➢ Take advantage of partner experience ➢ Shared runbook responsibilities ➢ “Future-proof” investment - mix/match later as needed ➢ “Hardware appliance and management as a service”
  • 19. 17 DRaaS: It’s really about the network..
  • 20. 17 ➢Network topology a blocker to DR strategy? ➢ Leapfrog the network and overlay.. ➢ Utilize NAC (Network Access Control) or SDP tools to shift traffic per endpoint ➢ SDP: Software Defined Permiter ➢ “Zero Trust” model - endpoint software locks down all traffic ➢ All traffic is routed through Gateway ➢ Gateway enforces network security ➢“Tag” users, applications, device types, locations ➢ Build global security policies via single pane of glass for entire organization ➢ Think of a specific tunnel being built to per use-case / flow ➢ Global visibility into user & application consumption ➢ API / Automation available Shifting traffic: A better way
  • 21. 17 ➢ Cool. What’s that have to do with DR? ➢ “Shift” application traffic from location A —> B via software defined policies ➢ Physical network agnostic ➢ Future proof - Network, locations, clouds can all change ➢ Part of automated runbook, APIs ➢ Alignment issues, network topology issues go away ➢ Security solution - May be part of larger organization security ➢Requirements ➢ Organization must adopt the solution ➢ DR Solution or DRaaS provider must support it (Webair does!! :) ) ➢ Internal traffic only - Doesn’t help with internet facing applications Shifting Traffic: A better way
  • 22. 2 Enterprise Private Cloud Enterprise Public Cloud Disaster Recovery-as-a-Service Hybrid Colocation Backups-as-a-Service Full Stack Management Cloud Storage Hyperscale Network Connectivity
  • 23. 25 Fully managed web apps & cloud infrastructure Business Continuity & Disaster Recovery Our History: Down the Stack
  • 24. Webair maintains a global network of state-of-the-art data center facilities that offer top-tier Colocation solutions featuring modular power options, superior architecture and access to DDoS-protected bandwidth, as well as superior connectivity to a multitude of leading carriers. Hong Kong 9 Hong Kong Data Center Locations
  • 25. Tier 3 rated, SOC1, SOC2, CJIS, HIPAA, PCI-DSS, NYS DFS 500, Open-IX Compliance 400 Cabinet / 8MW Capacity 3 Generators / 7+ days fuel runtime AWS, Azure, Google on-premises DDoS monitoring and mitigation on-premises Eco-system of managed services on-premises Tax-Exempt and Hydro-Electric “green” power allocation from NYPA Outside 25 mile NYC “blast zone” with Manhattan Bypass fiber routes BCDR seats on-premises LIRR train station on-premises 10 Webair NY1
  • 26. Hybrid Colocation 10 ➢Coloation is not about space and power ➢ Ecosystem of managed services behind the firewall ➢ Mix & match based on risk, capex/opex, platform changes ➢ Revenue Portability - Phased approach to cloud & future proof
  • 27. 20 Dedicated Private Cloud ➢Completely dedicated and physically segmented hypervisors and networking ➢Direct vCenter access to manage cloud environment ➢VMware Orchestrator configured to allow for API-based automation and control ➢Connect cluster to on-premises vCenter, allowing for seamless workload moves ➢Options for physically dedicated SAN storage ➢Connect to customer networks via MPLS, direct connectivity & cross-connects, bypassing the internet ➢Customize hardware on request ➢Higher levels of encryption available ➢Ability to customize hypervisors and versions Enterprise Virtual Private Cloud (E-VPC) ➢Dedicated resource pool with ability to burst ➢Compliance reporting of compute configuration ➢Historical and real-time resource utilization ➢Console access ➢Ability to create custom templates Public & Private Compliance Cloud & Storage
  • 28. 13 On premise vs Public cloud: A better way Webair Direct Access Cloud Erate Eligible