SlideShare a Scribd company logo
1 of 6
Download to read offline
© 2022 StoneFly, Inc. | All Rights Reserved
Ransomware
FAQs
Q & A about ransomware and how to protect
critical data from them.
Inside this document:
What is ransomware?
How to prevent ransomware?
What is the 3-2-1 backup rule?
How to add air-gapping and immutability?
And more!
© 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners.
How to Prevent
Ransomware?
What is Ransomware? Ransomware is a malware that encrypts sensitive files, such as Personally
Identifiable Information (PII), Protected Health Information (PHI), financial
information, etc. and connected storage devices by infiltrating an organization’s
network using entry points such as phishing emails, operating system or
software vulnerabilities, etc. Once the data is
successfully encrypted, the cyber criminals demand ransom in return for a
decryption key.
Most ransomware attacks today target production and backup files, encrypting
them, leaving no choice for the organization but to pay the ransom.
What is the 3-2-1
Backup Rule?
The best way to prevent ransomware is by being prepared before-hand. Having
a solid defense helps with ransomware prevention. This includes having an
automated air-gapped and immutable backup and disaster recovery (DR)
strategy.
Data protection features such as immutable backups, air-gapped backups,
delta-based snapshots, S3 object lockdown, file lockdown, and
anti-ransomware ensure your backups are protected even if your production
and network are compromised.
With StoneFly’s Veeam-ready backup and DR solutions, you can get all of these
features and instant recovery at-scale with features such as direct VM spin up
and granular file-level recovery for any workload - which provides the
much-needed diversity to the business in terms of ransomware protection and
recovery from ransomware.
The 3-2-1 backup rule recommends that there should be at least 3 copies of
data, stored on 2 different types of storage media with 1 copy stored offsite.
While the 3-2-1 backup rule is an old one, it still works as long as it’s
implemented properly. To add more reliability to it, you can improve it to the
3-2-1-1-0 rule which adds an air-gapped and immutable backup copy, and
requires administrators to ensure that there are zero errors with the backup
data.
For more information on the 3-2-1 backup rule, read StoneFly blog:
https://stonefly.com/blog/maximize-data-protection-3-2-1-rule
How Does StoneFly
Help You Protect
Your Data and
Backups from
Ransomware
Attacks?
StoneFly provides complete turnkey Veeam-ready backup and DR with
automated air-gapping and immutable backups with integrated data services.
The backup and DR solution allows you to automate ransomware protection for
your physical/virtual servers and cloud workloads, and store backups,
snapshots, and replicas on-prem, in a cluster, and/or in the cloud.
StoneFly DR365V allows users to host Veeam software on the same appliance
enabling them to run agentless backups for virtual workloads reducing
bottlenecks, ensuring security for backup jobs, and facilitating faster backups,
replication, and snapshots.
The ability to automate backups, quickly recover data using these backups, and
protect said backups from ransomware using air-gapping and immutability
makes StoneFly backup and DR solutions the go-to choice for government
departments such as US Navy, US department of homeland security, US
department of defense, and market leaders such as Wells Fargo, Disney, and
more.
© 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners.
How Exactly Does
StoneFly Help You
Recover from any
Cyberattack in
Minutes?
To ensure effective and seamless ransomware recovery,
StoneFly provides:
Automated air-gapped and immutable backups, with S3 object lockdown
and file lockdown, on-premises and/or in the cloud protecting your critical
backups, snapshots, and replicas from ransomware infection even if your
production and backup server(s) are compromised.
Built-in backup data integrity checks make sure that your backups and
snapshots are not corrupted and can be used at any time to recover your
critical workloads.
Shorter recovery time objectives (RTOs) and recovery point objectives
(RPOs) with data recovery features such as direct VM spin up, granular
file-level recovery, and direct restore to cloud.
Isolated virtual sandbox environment to restore backup data and scan for
dormant malware (sleeper ransomware) without impacting production or
backup server(s).
Backup and DR orchestration to test and execute DR plans for physical/
virtual servers, applications, and databases with a single click.
Air-gapped backups: Isolated and detachable target storage volumes that
are on a separate and secure network, inaccessible via the primary
production network.
Immutable storage: Target storage volumes that leverage the Write-Once
Read-Many (WORM) model to prevent overwriting, editing, and deletion for
a user-defined period of time. Immutable storage features include S3
object lockdown and file lockdown.
Delta-based immutable snapshots: Scheduled change-based
volume-level snapshots that are stored in air-gapped and immutable
volumes so that they cannot be maliciously encrypted and can be used to
recover operations when/if all else fails. Delta-based snapshots are faster
as they create incremental snapshots of the changes rather than the
complete volume.
Anti-ransomware: Automated AI-based detection and removal of dormant
malware (sleeper ransomware).
Backup Data Integrity Checks: Regular automated backup data integrity
checks that orchestrate backup and DR to ensure backups are not
corrupted/encrypted and can be used at any time to recover your critical
workloads.
Best practices to prevent ransomware infection and downtime:
Multi-Factor authentication (MFA): Protect your admin access from
brute-force attacks by leveraging MFA.
Backup Strategy: To effectively utilize your backup and DR solution(s) make
sure that they follow a backup strategy such as 3-2-1, 3-2-1-1-0, or 4-3-2.
To differentiate between 3-2-1, 3-2-1-1-0, and 4-3-2 backup strategies read
StoneFly blog:
https://stonefly.com/blog/3-2-1-vs-3-2-1-1-0-vs-4-3-2-backup-strategies
What Specific
Ransomware
Protection Features
are a Must-Have?
Cyber criminals are continuously finding new ways to infiltrate corporate
networks and maliciously encrypting important data. As a result, there’s no
“cure-all” for ransomware attacks. However, there are a number of features and
best practices that can ensure effective ransomware protection and facilitate
quick recovery from ransomware.
Must-have ransomware protection features:
Data recovery: Instant VM recovery, granular file-level recovery, and direct
restore to cloud.
DR testing: Orchestrate and test DR plans to ensure faster recovery in the
event of a (real) disaster.
Clustering: Leverage dual-node clustering with automated failover and
failback for high availability and near-zero downtime.
DR365 Veeam-Immutable Veeam-Air-Gapped (VIVA) Nodes: Physical
air-gapped and immutable nodes with automated network and power
management purpose-built for Veeam with optional support for popular
backup software such as Commvault, Rubrik, Zerto, Quest, and more.
StoneFly SCVM™: Our 8th gen patented storage controller enables you to
reclaim and repurpose unused storage resources and provision virtual
air-gapped and immutable storage volumes on-prem. StoneFly SCVM is
compatible with VMware, Hyper-V, KVM, Citrix (formerly XenServer), and
Nutanix AHV.
© 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners.
Is a Ransomware
Attack as Disastrous
as a Flood or Fire?
Are There Any
Additional Protective
Measures that Could
Help Protect Business/
Employee/Customer
Data?
Do I Need to Protect
Microsoft Office 365
Environments from
Ransomware?
Is Cloud Technology
Safe from
Ransomware? If Not,
How to Keep it Safe?
How to Add
Air-Gapping and
Immutability to
Existing
Environment(s)?
Natural disasters, such as floods, earthquakes, hurricanes, etc. are capable of
taking out your production, on-prem backup server(s), and connected/shared
storage devices. While ransomware does not affect the hardware directly, it has
the ability to cause similarly devastating disruption and downtime.
StoneFly, together with Veeam, provide you an array of disaster recovery
capabilities that enable you to reduce downtime to near-zero and minimize
data loss. The built-in DR features include:
Microsoft makes sure that your office 365 data is highly available. However,
protecting your data from ransomware, data corruption, virus, and human error
is your responsibility. This is what Microsoft calls the “shared responsibility”
model.
High availability means that regardless of what “state” your office 365 data is in,
Microsoft will make sure that you can access it anytime and from anywhere. In
order to do so, they use geo-replication across servers and regions.
To make sure that you do not lose your important emails, files, and documents,
it’s necessary to set up backup and DR for office 365 which follows a backup
strategy such as 3-2-1, 3-2-1-1-0, or 4-3-2.
Just because it’s in a highly available cloud storage, does not mean your data is
safe from ransomware. Cyber criminals attempt to steal admin credentials to
your cloud accounts with brute force attacks and ransomware are
programmed to infect not just your production but also connected storage
repositories; which includes integrated cloud storage.
With StoneFly’s solutions, you can choose to set up backups for your cloud
storage volumes and store backups, snapshots, and replicas on-prem and/or in
the cloud in a hybrid or multi-cloud environment. StoneFly solutions are vendor
agnostic and work with Windows/Linux servers, SAN, NAS appliances, VMware,
Hyper-V, KVM, and Citrix (formerly XenServer) virtual environments, and Azure
and AWS public clouds.
StoneFly offers vendor-agnostic physical, virtual, and cloud-based air-gapped
and immutable storage solutions that provide a “plug and play” experience. In
addition to easy integration, our customers can choose to set up double or
triple layered immutability which helps with data security, compliance, and
cyber insurance requirements.
Air-gapped and immutable storage solutions by StoneFly:
Cloud storage in Azure: Integrate air-gapped and immutable cloud
storage in Azure with your backup software, applications, databases,
servers, SAN and NAS appliances. Protect your critical data with automated
policy-based air-gapping and immutable storage features such as S3
object lockdown and file lockdown, on-prem and/or in the cloud.
Veeam-Ready repository: All Veeam backup, replication, & restore features
supported. (Listed on Veeam ready database:
https://www.veeam.com/kb3241)
Veeam-Ready object: S3-object compatible target storage for Veeam
backups. (Listed on Veeam ready database:
https://www.veeam.com/kb4052)
Veeam-Ready Object with Immutability: Object storage immutability for
critical Veeam backups. (Listed on Veeam ready database:
https://www.veeam.com/sys321)
© 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners.
What does
Veeam Ready Mean?
Which Veeam Ready
Qualifications do
StoneFly Solutions
Have?
Which StoneFly
Product(s) Should I
Explore to Protect
my Data from
Ransomware?
The Veeam Ready Program provides a solution qualification process to help
Veeam Alliance Program partners meet Veeam functional and performance
standards.
By attaining Veeam Ready status, customers are assured that storage solutions
are compatible with Veeam Backup & Replication features.
Regardless of which solution you choose, StoneFly experts work with you to
customize it for your environment so that you can get the best ransomware
protection, high availability, scalability, ease-of-use, and affordability.
StoneFly backup and DR solutions have been tested by Veeam and validated
as:
StoneFly offers a diverse portfolio of affordable, secure, highly available, and
scalable backup and DR solutions including physical, virtual, and in the
public/private cloud.
Our pre-sales engineers work with you to custom-build a solution that works for
your requirements and is within your budget.
Physical ransomware protection solutions include:
StoneFly DR365V: 4 to 60-bay Fully automated Veeam-ready backup and
DR physical appliance with air-gapping, immutable backups, S3 object
lockdown, file lockdown, integrated data services and SAN, NAS,
cloud-native S3 object storage.
StoneFly DR365VIVA: 4 to 60-bay Purpose-built fully automated immutable
and air-gapped backup and disaster recovery node for Veeam backup
environments with integrated policy-based network and power
management.
StoneFly miniBackup: Affordable plug and play backup and DR appliance
with terabytes of storage on-prem with RAID, optional cloud support, and
optional round robin backups for air-gapping and ransomware protection.
Best fit for small businesses with 10-20 VMs and/or desktops, remote
branches, and employees working from home.
StoneFly SCVM ™: Reclaim and repurpose unused storage resources to
air-gapped and immutable storage using our patented 8th gen storage
controller compatible with VMware, Hyper-V, KVM, Citrix (formerly XenServer)
and with optional cloud support for Azure, AWS, StoneFly private cloud, and
other S3-compatible public cloud(s).
About StoneFly, Inc.
Veeam cloud connect backup to Azure: Leverage automated backups with
Veeam and store backup data in StoneFly’s air-gapped and immutable
storage in Azure using built-in management server and secure encrypted
tunnel. In the event of a disaster, restore directly to the cloud for shorter
RTOs and RPOs.
Veeam cloud connect backup and replication to StoneFly cloud:
Automate backup and replication to air-gapped and immutable
repositories in StoneFly private cloud using built-in management server and
secure encrypted tunnel. Directly spin up VMs in StoneFly private cloud for
cloud disaster recovery and/or directly restore to StoneFly cloud in the
event of primary hardware failure.
StoneFly CDR365: Automated cloud backup and restore with centralized
browser-based management for virtually unlimited remote users. Store
backups on-prem and/or in the cloud and restore remotely to similar/
dissimilar hardware. Best fit for managed service providers (MSPs), small
businesses, and remote teams.
© 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners.
Cloud-based ransomware protection solutions include:
To choose which one is right for your business, contact StoneFly pre-sales
engineers at sales@stonefly.com.
Disclaimer: StoneFly, Inc. shall not be liable for errors contained herein and consequential damages in connection with the use of this material.
Virtual ransomware protection solution:
StoneFly, Inc was founded to deliver upon the vision of simple and affordable storage optimization and disaster
recovery protection through IP SAN solutions. StoneFly is a leading manufacturer of high-performance
network-attached storage (NAS), storage area networks (SAN) – iSCSI systems, hyperconverged systems,
backup and disaster recovery solutions and RAID systems. StoneFly’s range of enterprise products also includes
cloud storage solutions, cloud storage gateway solutions, and data migration services for enterprise workloads.

More Related Content

Similar to Ransomware Unveiled: Understanding, Preventing, and Recovering

the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.SoulStoneBR
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfVarinder K
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Studyjoepanora
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesKeith P. Melvey
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 

Similar to Ransomware Unveiled: Understanding, Preventing, and Recovering (20)

the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Data Security
Data SecurityData Security
Data Security
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 

More from MaryJWilliams2

Integrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud SecurityIntegrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud SecurityMaryJWilliams2
 
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage EfficiencyErasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage EfficiencyMaryJWilliams2
 
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...MaryJWilliams2
 
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...MaryJWilliams2
 
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data ManagementUnlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data ManagementMaryJWilliams2
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMaryJWilliams2
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesMaryJWilliams2
 
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud SolutionsNavigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud SolutionsMaryJWilliams2
 
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...MaryJWilliams2
 
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...MaryJWilliams2
 
Exploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationExploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationMaryJWilliams2
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...MaryJWilliams2
 
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...MaryJWilliams2
 
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas SectoEnsuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas SectoMaryJWilliams2
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsMaryJWilliams2
 
FC SAN vs iSCSI SAN: Which One is Right for Your Business? .pdf
FC SAN vs iSCSI SAN: Which One is Right for Your Business?
.pdfFC SAN vs iSCSI SAN: Which One is Right for Your Business?
.pdf
FC SAN vs iSCSI SAN: Which One is Right for Your Business? .pdfMaryJWilliams2
 
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?MaryJWilliams2
 
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of CybersecurityRemote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of CybersecurityMaryJWilliams2
 
Safeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud StorageSafeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud StorageMaryJWilliams2
 
From Backup to Video Editing: 5 Use-Cases for NAS Storage
From Backup to Video Editing: 5 Use-Cases for NAS StorageFrom Backup to Video Editing: 5 Use-Cases for NAS Storage
From Backup to Video Editing: 5 Use-Cases for NAS StorageMaryJWilliams2
 

More from MaryJWilliams2 (20)

Integrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud SecurityIntegrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud Security
 
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage EfficiencyErasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
 
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
 
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
 
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data ManagementUnlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
 
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud SolutionsNavigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
 
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
 
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
 
Exploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationExploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital Transformation
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
 
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
 
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas SectoEnsuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage Solutions
 
FC SAN vs iSCSI SAN: Which One is Right for Your Business? .pdf
FC SAN vs iSCSI SAN: Which One is Right for Your Business?
.pdfFC SAN vs iSCSI SAN: Which One is Right for Your Business?
.pdf
FC SAN vs iSCSI SAN: Which One is Right for Your Business? .pdf
 
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
 
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of CybersecurityRemote Access Trojans (RATs): The Silent Invaders of Cybersecurity
Remote Access Trojans (RATs): The Silent Invaders of Cybersecurity
 
Safeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud StorageSafeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud Storage
 
From Backup to Video Editing: 5 Use-Cases for NAS Storage
From Backup to Video Editing: 5 Use-Cases for NAS StorageFrom Backup to Video Editing: 5 Use-Cases for NAS Storage
From Backup to Video Editing: 5 Use-Cases for NAS Storage
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Ransomware Unveiled: Understanding, Preventing, and Recovering

  • 1. © 2022 StoneFly, Inc. | All Rights Reserved Ransomware FAQs Q & A about ransomware and how to protect critical data from them. Inside this document: What is ransomware? How to prevent ransomware? What is the 3-2-1 backup rule? How to add air-gapping and immutability? And more!
  • 2. © 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners. How to Prevent Ransomware? What is Ransomware? Ransomware is a malware that encrypts sensitive files, such as Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, etc. and connected storage devices by infiltrating an organization’s network using entry points such as phishing emails, operating system or software vulnerabilities, etc. Once the data is successfully encrypted, the cyber criminals demand ransom in return for a decryption key. Most ransomware attacks today target production and backup files, encrypting them, leaving no choice for the organization but to pay the ransom. What is the 3-2-1 Backup Rule? The best way to prevent ransomware is by being prepared before-hand. Having a solid defense helps with ransomware prevention. This includes having an automated air-gapped and immutable backup and disaster recovery (DR) strategy. Data protection features such as immutable backups, air-gapped backups, delta-based snapshots, S3 object lockdown, file lockdown, and anti-ransomware ensure your backups are protected even if your production and network are compromised. With StoneFly’s Veeam-ready backup and DR solutions, you can get all of these features and instant recovery at-scale with features such as direct VM spin up and granular file-level recovery for any workload - which provides the much-needed diversity to the business in terms of ransomware protection and recovery from ransomware. The 3-2-1 backup rule recommends that there should be at least 3 copies of data, stored on 2 different types of storage media with 1 copy stored offsite. While the 3-2-1 backup rule is an old one, it still works as long as it’s implemented properly. To add more reliability to it, you can improve it to the 3-2-1-1-0 rule which adds an air-gapped and immutable backup copy, and requires administrators to ensure that there are zero errors with the backup data. For more information on the 3-2-1 backup rule, read StoneFly blog: https://stonefly.com/blog/maximize-data-protection-3-2-1-rule How Does StoneFly Help You Protect Your Data and Backups from Ransomware Attacks? StoneFly provides complete turnkey Veeam-ready backup and DR with automated air-gapping and immutable backups with integrated data services. The backup and DR solution allows you to automate ransomware protection for your physical/virtual servers and cloud workloads, and store backups, snapshots, and replicas on-prem, in a cluster, and/or in the cloud. StoneFly DR365V allows users to host Veeam software on the same appliance enabling them to run agentless backups for virtual workloads reducing bottlenecks, ensuring security for backup jobs, and facilitating faster backups, replication, and snapshots. The ability to automate backups, quickly recover data using these backups, and protect said backups from ransomware using air-gapping and immutability makes StoneFly backup and DR solutions the go-to choice for government departments such as US Navy, US department of homeland security, US department of defense, and market leaders such as Wells Fargo, Disney, and more.
  • 3. © 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners. How Exactly Does StoneFly Help You Recover from any Cyberattack in Minutes? To ensure effective and seamless ransomware recovery, StoneFly provides: Automated air-gapped and immutable backups, with S3 object lockdown and file lockdown, on-premises and/or in the cloud protecting your critical backups, snapshots, and replicas from ransomware infection even if your production and backup server(s) are compromised. Built-in backup data integrity checks make sure that your backups and snapshots are not corrupted and can be used at any time to recover your critical workloads. Shorter recovery time objectives (RTOs) and recovery point objectives (RPOs) with data recovery features such as direct VM spin up, granular file-level recovery, and direct restore to cloud. Isolated virtual sandbox environment to restore backup data and scan for dormant malware (sleeper ransomware) without impacting production or backup server(s). Backup and DR orchestration to test and execute DR plans for physical/ virtual servers, applications, and databases with a single click. Air-gapped backups: Isolated and detachable target storage volumes that are on a separate and secure network, inaccessible via the primary production network. Immutable storage: Target storage volumes that leverage the Write-Once Read-Many (WORM) model to prevent overwriting, editing, and deletion for a user-defined period of time. Immutable storage features include S3 object lockdown and file lockdown. Delta-based immutable snapshots: Scheduled change-based volume-level snapshots that are stored in air-gapped and immutable volumes so that they cannot be maliciously encrypted and can be used to recover operations when/if all else fails. Delta-based snapshots are faster as they create incremental snapshots of the changes rather than the complete volume. Anti-ransomware: Automated AI-based detection and removal of dormant malware (sleeper ransomware). Backup Data Integrity Checks: Regular automated backup data integrity checks that orchestrate backup and DR to ensure backups are not corrupted/encrypted and can be used at any time to recover your critical workloads. Best practices to prevent ransomware infection and downtime: Multi-Factor authentication (MFA): Protect your admin access from brute-force attacks by leveraging MFA. Backup Strategy: To effectively utilize your backup and DR solution(s) make sure that they follow a backup strategy such as 3-2-1, 3-2-1-1-0, or 4-3-2. To differentiate between 3-2-1, 3-2-1-1-0, and 4-3-2 backup strategies read StoneFly blog: https://stonefly.com/blog/3-2-1-vs-3-2-1-1-0-vs-4-3-2-backup-strategies What Specific Ransomware Protection Features are a Must-Have? Cyber criminals are continuously finding new ways to infiltrate corporate networks and maliciously encrypting important data. As a result, there’s no “cure-all” for ransomware attacks. However, there are a number of features and best practices that can ensure effective ransomware protection and facilitate quick recovery from ransomware. Must-have ransomware protection features:
  • 4. Data recovery: Instant VM recovery, granular file-level recovery, and direct restore to cloud. DR testing: Orchestrate and test DR plans to ensure faster recovery in the event of a (real) disaster. Clustering: Leverage dual-node clustering with automated failover and failback for high availability and near-zero downtime. DR365 Veeam-Immutable Veeam-Air-Gapped (VIVA) Nodes: Physical air-gapped and immutable nodes with automated network and power management purpose-built for Veeam with optional support for popular backup software such as Commvault, Rubrik, Zerto, Quest, and more. StoneFly SCVM™: Our 8th gen patented storage controller enables you to reclaim and repurpose unused storage resources and provision virtual air-gapped and immutable storage volumes on-prem. StoneFly SCVM is compatible with VMware, Hyper-V, KVM, Citrix (formerly XenServer), and Nutanix AHV. © 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners. Is a Ransomware Attack as Disastrous as a Flood or Fire? Are There Any Additional Protective Measures that Could Help Protect Business/ Employee/Customer Data? Do I Need to Protect Microsoft Office 365 Environments from Ransomware? Is Cloud Technology Safe from Ransomware? If Not, How to Keep it Safe? How to Add Air-Gapping and Immutability to Existing Environment(s)? Natural disasters, such as floods, earthquakes, hurricanes, etc. are capable of taking out your production, on-prem backup server(s), and connected/shared storage devices. While ransomware does not affect the hardware directly, it has the ability to cause similarly devastating disruption and downtime. StoneFly, together with Veeam, provide you an array of disaster recovery capabilities that enable you to reduce downtime to near-zero and minimize data loss. The built-in DR features include: Microsoft makes sure that your office 365 data is highly available. However, protecting your data from ransomware, data corruption, virus, and human error is your responsibility. This is what Microsoft calls the “shared responsibility” model. High availability means that regardless of what “state” your office 365 data is in, Microsoft will make sure that you can access it anytime and from anywhere. In order to do so, they use geo-replication across servers and regions. To make sure that you do not lose your important emails, files, and documents, it’s necessary to set up backup and DR for office 365 which follows a backup strategy such as 3-2-1, 3-2-1-1-0, or 4-3-2. Just because it’s in a highly available cloud storage, does not mean your data is safe from ransomware. Cyber criminals attempt to steal admin credentials to your cloud accounts with brute force attacks and ransomware are programmed to infect not just your production but also connected storage repositories; which includes integrated cloud storage. With StoneFly’s solutions, you can choose to set up backups for your cloud storage volumes and store backups, snapshots, and replicas on-prem and/or in the cloud in a hybrid or multi-cloud environment. StoneFly solutions are vendor agnostic and work with Windows/Linux servers, SAN, NAS appliances, VMware, Hyper-V, KVM, and Citrix (formerly XenServer) virtual environments, and Azure and AWS public clouds. StoneFly offers vendor-agnostic physical, virtual, and cloud-based air-gapped and immutable storage solutions that provide a “plug and play” experience. In addition to easy integration, our customers can choose to set up double or triple layered immutability which helps with data security, compliance, and cyber insurance requirements. Air-gapped and immutable storage solutions by StoneFly:
  • 5. Cloud storage in Azure: Integrate air-gapped and immutable cloud storage in Azure with your backup software, applications, databases, servers, SAN and NAS appliances. Protect your critical data with automated policy-based air-gapping and immutable storage features such as S3 object lockdown and file lockdown, on-prem and/or in the cloud. Veeam-Ready repository: All Veeam backup, replication, & restore features supported. (Listed on Veeam ready database: https://www.veeam.com/kb3241) Veeam-Ready object: S3-object compatible target storage for Veeam backups. (Listed on Veeam ready database: https://www.veeam.com/kb4052) Veeam-Ready Object with Immutability: Object storage immutability for critical Veeam backups. (Listed on Veeam ready database: https://www.veeam.com/sys321) © 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners. What does Veeam Ready Mean? Which Veeam Ready Qualifications do StoneFly Solutions Have? Which StoneFly Product(s) Should I Explore to Protect my Data from Ransomware? The Veeam Ready Program provides a solution qualification process to help Veeam Alliance Program partners meet Veeam functional and performance standards. By attaining Veeam Ready status, customers are assured that storage solutions are compatible with Veeam Backup & Replication features. Regardless of which solution you choose, StoneFly experts work with you to customize it for your environment so that you can get the best ransomware protection, high availability, scalability, ease-of-use, and affordability. StoneFly backup and DR solutions have been tested by Veeam and validated as: StoneFly offers a diverse portfolio of affordable, secure, highly available, and scalable backup and DR solutions including physical, virtual, and in the public/private cloud. Our pre-sales engineers work with you to custom-build a solution that works for your requirements and is within your budget. Physical ransomware protection solutions include: StoneFly DR365V: 4 to 60-bay Fully automated Veeam-ready backup and DR physical appliance with air-gapping, immutable backups, S3 object lockdown, file lockdown, integrated data services and SAN, NAS, cloud-native S3 object storage. StoneFly DR365VIVA: 4 to 60-bay Purpose-built fully automated immutable and air-gapped backup and disaster recovery node for Veeam backup environments with integrated policy-based network and power management. StoneFly miniBackup: Affordable plug and play backup and DR appliance with terabytes of storage on-prem with RAID, optional cloud support, and optional round robin backups for air-gapping and ransomware protection. Best fit for small businesses with 10-20 VMs and/or desktops, remote branches, and employees working from home.
  • 6. StoneFly SCVM ™: Reclaim and repurpose unused storage resources to air-gapped and immutable storage using our patented 8th gen storage controller compatible with VMware, Hyper-V, KVM, Citrix (formerly XenServer) and with optional cloud support for Azure, AWS, StoneFly private cloud, and other S3-compatible public cloud(s). About StoneFly, Inc. Veeam cloud connect backup to Azure: Leverage automated backups with Veeam and store backup data in StoneFly’s air-gapped and immutable storage in Azure using built-in management server and secure encrypted tunnel. In the event of a disaster, restore directly to the cloud for shorter RTOs and RPOs. Veeam cloud connect backup and replication to StoneFly cloud: Automate backup and replication to air-gapped and immutable repositories in StoneFly private cloud using built-in management server and secure encrypted tunnel. Directly spin up VMs in StoneFly private cloud for cloud disaster recovery and/or directly restore to StoneFly cloud in the event of primary hardware failure. StoneFly CDR365: Automated cloud backup and restore with centralized browser-based management for virtually unlimited remote users. Store backups on-prem and/or in the cloud and restore remotely to similar/ dissimilar hardware. Best fit for managed service providers (MSPs), small businesses, and remote teams. © 2022 StoneFly, Inc. | All Rights Reserved. All trademarks are property of their respective owners. Cloud-based ransomware protection solutions include: To choose which one is right for your business, contact StoneFly pre-sales engineers at sales@stonefly.com. Disclaimer: StoneFly, Inc. shall not be liable for errors contained herein and consequential damages in connection with the use of this material. Virtual ransomware protection solution: StoneFly, Inc was founded to deliver upon the vision of simple and affordable storage optimization and disaster recovery protection through IP SAN solutions. StoneFly is a leading manufacturer of high-performance network-attached storage (NAS), storage area networks (SAN) – iSCSI systems, hyperconverged systems, backup and disaster recovery solutions and RAID systems. StoneFly’s range of enterprise products also includes cloud storage solutions, cloud storage gateway solutions, and data migration services for enterprise workloads.