SlideShare a Scribd company logo
www.ipserverone.com
IP ServerOne:
Managed
Cloud Service
Provider in
Malaysia
© Copyright IP ServerOne Solutions Sdn Bhd
Strategies for Seamless Recovery
in a Dynamic Data Landscape
Speaker: Simon Ng | Sales Director of IP ServerOne
MYNOG-11 CONFERENCE 2024
1 2 3 4
5 6 7 8
Over 70 employees
and counting
300 racks throughout
South East Asia
Managing over 7000
physical servers
A licensed Cloud Service
Provider under MCMC
Managing more than
5000 customers
Application’s Infrastructure
Data centers in MY, SG
and HK
ISO/IEC 27001
ISO/IEC 27017
SOC 2 Type II
PCI-DSS, CSA STAR-L1,
CSA STAR-L2
About Us
Our Story Our People Our Expansion Our Reliability
Our Credibility Our Customers Our Presence Our Security
Founded in 2003,
Over 2 decades of
success business
story
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
At IPSERVERONE, we're your approachable Managed
Cloud Services Provider that you can easily talk to.
We start by getting a deep understanding of your
business, so we can provide the ideal solution for you.
Who Are We
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Our Story
01
Discover the warmth and personalized care of our managed cloud
services, and let us show you how “We Host Better.”
21 Years Ago
Established Year
Product: Domain
name, Web Hosting
Head Count: Lone-
Ranger
Domain name, Web
Hosting, Dedicated
Server, and Co-location
Head Count: 15
Incubating Cloud
Hosting 2.0
Head Count: 30
The Start of Cloud
Hosting 1.0
Head Count: 30
• ISO27001 certified
• 1st colo provider in
Malaysia offers Cloud
Scrubbing
• Enabled Anti-DDoS to all
services
Head Count: 40
2003 2008 2013 2015 2016
Our Milestones
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
2017 2018 2019/2020 2021 2022
Our Milestones
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
• Setting up CJ1
Data Center
• Incubating Cloud
Hosting 3.0
Head Count: 48
• Start of CJ1 Data
Center operation
• PCI-DSS Certified
• Start of Cloud
Hosting 3.0
Head Count: 55
• Expansion of CJ1
Data Center space
on 3rd Floor
• Launch of VMware
Singapore
Head Count: 60
2019/2020 (Pandemic)
• Demand in Private
Cloud, Public Cloud,
IaaS
• ISO 27017 Certified
• VMware Cloud Verified,
launch of Object Storage
Head Count: 60
• Cloud demand
continues to increase,
#2 in revenue.
• SOC 2 Type II
Certified
• CSA STAR Level 1
Head Count: 60
• Launch of Cloud
Connect service
• Launch of Load
Balancer as a Service
• Stamped MOU with
UTAR
Head Count: 70
2023
The Data Landscape
02
A SIMPLE | FAST I SECURE
Managed Disaster Recovery Solution
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Types of Malware
Ransomware
Adware
Fileless
Malware
Trojan
Horse
Virus
Worms
Bots
Spyware
Rootkit
Keylogger
Spammy ads pop up
continuously
Uses non-file object
such as PowerShell
Attached to a file and executed
once file is launched. Infect other
programs
Spread itself but doesn’t
infect other programs
Pretends to be a
legitimate ones
Perform automated
task without requiring
any interaction
Encrypt data and holding it
until ransom is paid
Monitor user
activities
Gain control over a
target computer
Records of
everything you type
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Impact of Poor Security
Poor information security increases the risk
of data breaches, where unauthorized
individuals gain access to sensitive
information. The impact of data breaches
can be severe, leading to financial losses,
reputational damage, legal liabilities, and
loss of customer trust. Personal and
financial information exposed in data
breaches can also be used for identity theft,
fraud, or other malicious activities.
Inadequate information security can result
in non-compliance with data protection
laws and regulations. Organizations
failing to meet regulatory requirements
may face penalties, fines, legal actions,
and regulatory scrutiny. Compliance
failures can also lead to limitations on
conducting business in certain industries
or geographical regions.
Financial Losses
Inadequate information security measures
can result in financial losses for
organizations. These losses can arise from
direct costs, such as incident response,
forensic investigations, legal actions,
regulatory fines, and customer
compensation. Indirect costs may include
the loss of business opportunities,
customer churn, and damage to the
organization's brand and market value.
Data Breaches Legal and Regulatory Consequences
https://www.thestar.com.my/aseanplus/aseanplus-
news/2024/05/03/s039pore-law-firm-shook-lin--
bok-hit-by-cyber-attack-allegedly-paid-s189mil-in-
bitcoin-as-ransom
s 20(6) of the Cyber Security Bill 2024:"Any national critical
information infrastructure entity which contravenes
subsection (1), (2) or (3) commits an offence and shall, on
conviction, be liable to a fine not exceeding one hundred
thousand ringgit or to imprisonment for a term not
exceeding two years or to both.
https://www.hackread.com/dell-data-breach-hacker-
sells-customer-data/
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Impact of Poor Security
Financial Losses Data Breaches Legal and Regulatory Consequences
https://www.thestar.com.my/aseanplus/aseanplus-
news/2024/05/03/s039pore-law-firm-shook-lin--bok-hit-
by-cyber-attack-allegedly-paid-s189mil-in-bitcoin-as-
ransom
s 20(6) of the Cyber Security Bill 2024:"Any national critical
information infrastructure entity which contravenes
subsection (1), (2) or (3) commits an offence and shall, on
conviction, be liable to a fine not exceeding one hundred
thousand ringgit or to imprisonment for a term not
exceeding two years or to both.
https://www.hackread.com/dell-data-breach-
hacker-sells-customer-data/
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Insider Threat
Insiders with important
access to company
information that have been
compromised from the
outside.
Oblivious
Insider
Insiders that are usually
uneducated on potential
security threats, or simply
bypass protocol to meet
workplace efficiency.
Negligent
Insider
Insiders that steal data
intentionally or destroy
company property – such
as an employee that
deletes company data on
their last day of work.
Malicious
Insider
Insiders making a career of
exploiting company
network vulnerabilities, and
selling that information on
the dark web.
Professional
Insider
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Social Engineering
Phishing scams are email and text message campaigns aimed at
creating a sense of urgency, curiosity or fear in victims. It then
prods victim into revealing sensitive information, clicking on links to
malicious websites, or opening attachments that contain malware.
Phishing
Baiting attacks use a false promise to pique a victim’s greed or
curiosity. Baiting attacks may leverage the offer of free music or
movie downloads to trick users into handing their login credentials.
Baiting
Scareware involves victims being bombarded with false alarms and
fictitious threats. Users are deceived to think their system is
infected with malware, prompting them to install software that has
no benefit or is malware itself.
Scareware
How To Protect Data
At Workplace
qwerty123
!@#$%^&*
XR#LJ5lsf*bi
taylorswift
Strong password recommendation:
• Contain both upper-case and lower-case characters (e.g. a-z, A-Z)
• Contain digits and punctuation characters as well as letters (e.g. 0-9,
!@#$%^&*()
• At least eight alphanumeric characters long
• Not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc
Which of the
following password
safe to use?
1 2
3 4
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
The Trifecta of Data Recovery
People Infrastructure
Technology
People
• In-house/Outsource/Contract
Infrastructure
• Your own Data Center/Server Room/Outsource
Technology
• The Software/Hardware/Appliance you’re using
Our Product & Services
03
Providing a vast array of solutions to support
the demands of our customers.
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Product & Services Overview
IP ServerOne: What We Do
§ NovaCloud
§ Private Cloud
§ Bare-Metal Server
§ E-mail
§ Backup Storage
§ Disaster Recovery
§ DNS Hosting
§ Domain Name
1
CLOUD SERVICES
SUBSCRIPTION
§ Monitoring
§ Server Management
§ Database Management
§ Server Security
Management
§ Performance Optimization
2
MANAGED SERVICES
MAINTENANCE
§ Hardware & Software
§ Storage Solution
§ Virtualization
3
IT SOLUTIONS
DESIGN & DEPLOY
§ IP Transit
§ Anti-DDoS Protection
§ Co-location
§ Floor space
§ MYIX Satellite POP
§ Inter-Data Center
connection (DCI)
4
DATA CENTER
SUPPORT
Design
Uptime Institute Tier
III DC on Design
(TCCD)
Uptime Institute Tier
III DC on Constructed
Facility (TCCF)
ANSI/TIA-942
Rated-3
Green Building Index
(GBI) Certified
Security
PCI-DSS Compliant ISO/IEC 27001
Compliant
Threat, Vulnerability,
Risk Assessment
(TVRA)
Risk Management in
Technology (RMiT)
SOC 2 Type II
ISO/IEC 27017
Compliant
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Our Certifications
Acorn Recovery as a Service
04
A SIMPLE | FAST I SECURE
Managed Disaster Recovery Solution
When your security is B R E A C H E D!
Acorn Recovery is your
LAST LINE OF DEFENSE!
Recovery in minutes…
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Story Time:
Nature’s Inspiration for Acorn Recovery as a Service
SOURCE: https://www.ipserverone.com/the-acorn-story-natures-inspiration-
for-acorn-recovery-as-a-service/
Just like the tough shell of an acorn
protects the seed within, Acorn
Recovery employs robust security
measures and encryption protocols
to safeguard your critical data from
cyber threats. It’s like having a
fortress around your most valuable
assets.
1 Hard Outer Shell
Acorns are known for their nutrient-rich
composition, sustaining life in the natural
world. Similarly, Acorn Recovery offers a
bounty of features—rapid server recovery,
immutable storage, dual disaster recovery
centers, and a top-notch DR team—to keep
your business running continuously, even in
the face of adversity.
2 Nutrient-Rich
Ever tasted the bitterness of an
acorn? That’s thanks to tannins,
natural compounds that act as a
defense mechanism. Similarly,
our security features in Acorn
Recovery deter malicious actors
and safeguard your data from
exploitation. No bitter taste here,
just sweet security.
3 Tannins
Acorns have a nifty trick up their sleeve—a
dormancy mechanism that delays
germination until the time is right for
growth. Similarly, Acorn Recovery keeps
your critical data dormant and readily
available until needed for recovery. It’s like
having an ‘insurance’ policy for your digital
assets.
4 Dormancy Mechanism
Acorns spread their seeds through various dispersal methods, ensuring the survival of
oak trees. Likewise, Acorn Recovery disperses your data across multiple locations—
immutable cloud storage, off-site data centers, and redundant systems—to speed up
recovery, enhance resilience, and minimize the risk of data loss.
5 Dispersal Strategies
Acorn Recovery as a Service is a SIMPLE | FAST | SECURE
managed Disaster Recovery solution that’s designed to help
secure physical and virtual servers, ensuring uninterrupted
operations.
FAST
• Means fast server recovery in minutes
upon DR activation by customer.
• Fast to response with our 24/7 DR
team that follows the industry
standards like ISO, TVRA, BNM RMiT,
and SOC 2 Type II compliance.
SECURE
• Means your data is kept securely in TWO
separate Disaster Recovery Centers
(DRC).
• Added on with immutable storage; your
data stored is not susceptible to change.
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
What is Acorn Recovery
as a Service?
What do we mean by SIMPLE | FAST | SECURE?
SIMPLE
• Means our solution is user friendly
and easy to use.
• We provide simplified ransomware
recovery steps to customer, backed
by our experience DR team.
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Unique Selling Points of Acorn Recovery
as a Service
• Time-lock storage
• Enhanced protection from
ransomware attack
1 Immutable Storage
• Standby Disaster Recovery for
faster Recovery Time Objective
(RTO)
2 Warm DR
• Dual DataCenter design
• DRC1 is in CJ1 | DRC2 in in AIMS
KL | or vice-versa
3 Dual DRC Design
• Our dedicated team will manage
the day-to-day of backup and
DR operations
4 Managed Backup and DR Services
• Veeam's SureBackup
technology offers a robust solution
for backup validation, ensuring that
backups are not only successfully
created but are also reliable for
restoration
5 Backup Verification
• 1x DR Drill included per year
• Inclusive of 10 days DR Activation
for DR Testing / DR Drill / Actual
DR
• DR Plan update based on
executed DR Drill activity
• DR Report inclusive activities,
timelines, actions taken, and
feedback
6 DR Drill
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
The Design of Acorn Recovery as a Service
ABC Company
Windows Server
Linux Server
DRC 1
DRC 2
Windows Server_Replica
Linux Server_Replica
Windows
Server Windows Server
Linux Server
WARM DR SITE
COLD DR SITE
Scope of Acorn Recovery as a Service
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
We provide round-the-clock
monitoring of backup and DR
systems to detect any operational
anomalies or issues.
1 Continuous Monitoring
Our team ensures immediate
response and resolution of any
incidents related to backup or DR,
minimizing downtime and
ensuring business continuity.
2 Incident Response
We maintain regular
communication with clients,
offering transparent status
updates and responsiveness to
any concerns or changes in
requirements.
3 Client Communication
and Reporting
We conduct thorough reviews of
backup and DR systems,
including assessment of hardware
health, software update status,
and configuration settings, to
optimize performance and
reliability.
4 System Review and
Planning
Our process ensures the integrity
and efficiency of backups,
identifying areas for performance
optimization and ensuring data
protection.
5 Backup Verification
We will conduct testing to validate
the effectiveness of DR plans and
ensure readiness for potential
disaster scenarios, minimizing
risks and maximizing recovery
capabilities.
6 DR Testing and
Readiness Evaluation
We apply scheduled
updates to backup and DR
software and hardware to
ensure systems are up-to-
date and continuously
enhance backup and DR
processes.
7 Maintenance and
Improvement
We assist customers
in activating the DR
virtual machine (VM)
to swiftly transition to
their disaster recovery
environment.
8 DR Activation
Assistance
We aid customers in
restoring the VM into
the DR VM or the Mini
Hypervisor we've
prepared for seamless
recovery.
9 DR Restoration
Assistance
We assist customers in
pointing IP addresses and
rerouting traffic to DRC1 or
DRC2 for uninterrupted
service during disaster
recovery.
10 Traffic Rerouting
We guarantee 99.9%
uptime for DR
infrastructure.
11
Service Level
Agreement
I
n
f
r
a
s
t
r
u
c
t
u
r
e
Technology
People
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
In Summary: SIMPLE | FAST | SECURE
1 People
3 Technology
1. Immutable Storage
2. Warm DR
3. Dual DRC Design
4. Managed Backup and DR Services
5. Backup Verification
6. DR Drill
Unique Features
2 Infrastructure
Discover the warmth and personalized care of our
managed cloud services, and let us show you how
“We Host Better.”
IP ServerOne Team
Thanks
WE HOST BETTER
+603-20261688
www.ipserverone.com
IP ServerOne Solutions Sdn. Bhd. (800140-T)
Unit 21-03, Level 21, IMAZIUM, No. 8, Jalan
SS21/37, Damansara Uptown, 47400 Petaling Jaya,
Selangor Darul Ehsan.

More Related Content

Similar to Strategies for Seamless Recovery in a Dynamic Data Landscape

2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
AlgoSec
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
Microsoft
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
NovaQuantum
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
UCloud Asia Pte Ltd
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Pte Ltd
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
Prabir Saha
 
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
1C_-_Treasury_Managemt_in_the_Cloud_.pptx1C_-_Treasury_Managemt_in_the_Cloud_.pptx
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
CodyK1
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
AGC Networks Ltd
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
Joshua Sibaja
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Ulf Mattsson
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
ThousandEyes
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
Seokminyoon4
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
infosec train
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 

Similar to Strategies for Seamless Recovery in a Dynamic Data Landscape (20)

2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
1C_-_Treasury_Managemt_in_the_Cloud_.pptx1C_-_Treasury_Managemt_in_the_Cloud_.pptx
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 

More from MyNOG

MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIAMEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
MyNOG
 
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s HotspotsMalaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
MyNOG
 
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICESHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
MyNOG
 
Building a Connected Future: The Power of Interconnection
Building a Connected Future: The Power of InterconnectionBuilding a Connected Future: The Power of Interconnection
Building a Connected Future: The Power of Interconnection
MyNOG
 
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIESCOHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
MyNOG
 
SRv6: DEPLOYMENT & USECASES by Aditya Kaul
SRv6: DEPLOYMENT & USECASES by Aditya KaulSRv6: DEPLOYMENT & USECASES by Aditya Kaul
SRv6: DEPLOYMENT & USECASES by Aditya Kaul
MyNOG
 
Peering Personal MyNOG-10
Peering Personal MyNOG-10Peering Personal MyNOG-10
Peering Personal MyNOG-10
MyNOG
 
Embedded CDNs in 2023
Embedded CDNs in 2023Embedded CDNs in 2023
Embedded CDNs in 2023
MyNOG
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
MyNOG
 
Equinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersEquinix: New Markets, New Frontiers
Equinix: New Markets, New Frontiers
MyNOG
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
MyNOG
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
MyNOG
 
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformAether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
MyNOG
 
Cleaning up your RPKI invalids
Cleaning up your RPKI invalidsCleaning up your RPKI invalids
Cleaning up your RPKI invalids
MyNOG
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIX
MyNOG
 
Load balancing and Service in Kubernetes
Load balancing and Service in KubernetesLoad balancing and Service in Kubernetes
Load balancing and Service in Kubernetes
MyNOG
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKI
MyNOG
 
SDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmSDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable Paradigm
MyNOG
 
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEAI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
MyNOG
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
MyNOG
 

More from MyNOG (20)

MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIAMEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
 
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s HotspotsMalaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
 
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICESHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
 
Building a Connected Future: The Power of Interconnection
Building a Connected Future: The Power of InterconnectionBuilding a Connected Future: The Power of Interconnection
Building a Connected Future: The Power of Interconnection
 
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIESCOHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
 
SRv6: DEPLOYMENT & USECASES by Aditya Kaul
SRv6: DEPLOYMENT & USECASES by Aditya KaulSRv6: DEPLOYMENT & USECASES by Aditya Kaul
SRv6: DEPLOYMENT & USECASES by Aditya Kaul
 
Peering Personal MyNOG-10
Peering Personal MyNOG-10Peering Personal MyNOG-10
Peering Personal MyNOG-10
 
Embedded CDNs in 2023
Embedded CDNs in 2023Embedded CDNs in 2023
Embedded CDNs in 2023
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Equinix: New Markets, New Frontiers
Equinix: New Markets, New FrontiersEquinix: New Markets, New Frontiers
Equinix: New Markets, New Frontiers
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
 
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud PlatformAether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
 
Cleaning up your RPKI invalids
Cleaning up your RPKI invalidsCleaning up your RPKI invalids
Cleaning up your RPKI invalids
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIX
 
Load balancing and Service in Kubernetes
Load balancing and Service in KubernetesLoad balancing and Service in Kubernetes
Load balancing and Service in Kubernetes
 
Cloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKICloud SDN: BGP Peering and RPKI
Cloud SDN: BGP Peering and RPKI
 
SDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable ParadigmSDM – A New (Subsea) Cable Paradigm
SDM – A New (Subsea) Cable Paradigm
 
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDEAI in Networking: Transforming Network Operations with Juniper Mist AIDE
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
 
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
 

Recently uploaded

Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
Baishakhi Ray
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
shanihomely
 
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
AimanAthambawa1
 
The Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - CoatueThe Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - Coatue
Razin Mustafiz
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 
Improving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning ContentImproving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning Content
Enterprise Knowledge
 
Accelerating Migrations = Recommendations
Accelerating Migrations = RecommendationsAccelerating Migrations = Recommendations
Accelerating Migrations = Recommendations
isBullShit
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
AmandaCheung15
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
alexjohnson7307
 
NVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space ExplorationNVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space Exploration
Alison B. Lowndes
 
Tailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer InsightsTailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer Insights
SynapseIndia
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 
Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
siddu769252
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10
ankush9927
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
bellared2
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
Brian Pichman
 

Recently uploaded (20)

Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
 
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
 
The Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - CoatueThe Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - Coatue
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 
Improving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning ContentImproving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning Content
 
Accelerating Migrations = Recommendations
Accelerating Migrations = RecommendationsAccelerating Migrations = Recommendations
Accelerating Migrations = Recommendations
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
 
NVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space ExplorationNVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space Exploration
 
Tailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer InsightsTailored CRM Software Development for Enhanced Customer Insights
Tailored CRM Software Development for Enhanced Customer Insights
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 
Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
 

Strategies for Seamless Recovery in a Dynamic Data Landscape

  • 1. www.ipserverone.com IP ServerOne: Managed Cloud Service Provider in Malaysia © Copyright IP ServerOne Solutions Sdn Bhd Strategies for Seamless Recovery in a Dynamic Data Landscape Speaker: Simon Ng | Sales Director of IP ServerOne MYNOG-11 CONFERENCE 2024
  • 2. 1 2 3 4 5 6 7 8 Over 70 employees and counting 300 racks throughout South East Asia Managing over 7000 physical servers A licensed Cloud Service Provider under MCMC Managing more than 5000 customers Application’s Infrastructure Data centers in MY, SG and HK ISO/IEC 27001 ISO/IEC 27017 SOC 2 Type II PCI-DSS, CSA STAR-L1, CSA STAR-L2 About Us Our Story Our People Our Expansion Our Reliability Our Credibility Our Customers Our Presence Our Security Founded in 2003, Over 2 decades of success business story © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
  • 3. At IPSERVERONE, we're your approachable Managed Cloud Services Provider that you can easily talk to. We start by getting a deep understanding of your business, so we can provide the ideal solution for you. Who Are We © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
  • 4. Our Story 01 Discover the warmth and personalized care of our managed cloud services, and let us show you how “We Host Better.”
  • 5. 21 Years Ago Established Year Product: Domain name, Web Hosting Head Count: Lone- Ranger Domain name, Web Hosting, Dedicated Server, and Co-location Head Count: 15 Incubating Cloud Hosting 2.0 Head Count: 30 The Start of Cloud Hosting 1.0 Head Count: 30 • ISO27001 certified • 1st colo provider in Malaysia offers Cloud Scrubbing • Enabled Anti-DDoS to all services Head Count: 40 2003 2008 2013 2015 2016 Our Milestones © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
  • 6. 2017 2018 2019/2020 2021 2022 Our Milestones © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential • Setting up CJ1 Data Center • Incubating Cloud Hosting 3.0 Head Count: 48 • Start of CJ1 Data Center operation • PCI-DSS Certified • Start of Cloud Hosting 3.0 Head Count: 55 • Expansion of CJ1 Data Center space on 3rd Floor • Launch of VMware Singapore Head Count: 60 2019/2020 (Pandemic) • Demand in Private Cloud, Public Cloud, IaaS • ISO 27017 Certified • VMware Cloud Verified, launch of Object Storage Head Count: 60 • Cloud demand continues to increase, #2 in revenue. • SOC 2 Type II Certified • CSA STAR Level 1 Head Count: 60 • Launch of Cloud Connect service • Launch of Load Balancer as a Service • Stamped MOU with UTAR Head Count: 70 2023
  • 7. The Data Landscape 02 A SIMPLE | FAST I SECURE Managed Disaster Recovery Solution
  • 8. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Types of Malware Ransomware Adware Fileless Malware Trojan Horse Virus Worms Bots Spyware Rootkit Keylogger Spammy ads pop up continuously Uses non-file object such as PowerShell Attached to a file and executed once file is launched. Infect other programs Spread itself but doesn’t infect other programs Pretends to be a legitimate ones Perform automated task without requiring any interaction Encrypt data and holding it until ransom is paid Monitor user activities Gain control over a target computer Records of everything you type
  • 9. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Impact of Poor Security Poor information security increases the risk of data breaches, where unauthorized individuals gain access to sensitive information. The impact of data breaches can be severe, leading to financial losses, reputational damage, legal liabilities, and loss of customer trust. Personal and financial information exposed in data breaches can also be used for identity theft, fraud, or other malicious activities. Inadequate information security can result in non-compliance with data protection laws and regulations. Organizations failing to meet regulatory requirements may face penalties, fines, legal actions, and regulatory scrutiny. Compliance failures can also lead to limitations on conducting business in certain industries or geographical regions. Financial Losses Inadequate information security measures can result in financial losses for organizations. These losses can arise from direct costs, such as incident response, forensic investigations, legal actions, regulatory fines, and customer compensation. Indirect costs may include the loss of business opportunities, customer churn, and damage to the organization's brand and market value. Data Breaches Legal and Regulatory Consequences https://www.thestar.com.my/aseanplus/aseanplus- news/2024/05/03/s039pore-law-firm-shook-lin-- bok-hit-by-cyber-attack-allegedly-paid-s189mil-in- bitcoin-as-ransom s 20(6) of the Cyber Security Bill 2024:"Any national critical information infrastructure entity which contravenes subsection (1), (2) or (3) commits an offence and shall, on conviction, be liable to a fine not exceeding one hundred thousand ringgit or to imprisonment for a term not exceeding two years or to both. https://www.hackread.com/dell-data-breach-hacker- sells-customer-data/
  • 10. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Impact of Poor Security Financial Losses Data Breaches Legal and Regulatory Consequences https://www.thestar.com.my/aseanplus/aseanplus- news/2024/05/03/s039pore-law-firm-shook-lin--bok-hit- by-cyber-attack-allegedly-paid-s189mil-in-bitcoin-as- ransom s 20(6) of the Cyber Security Bill 2024:"Any national critical information infrastructure entity which contravenes subsection (1), (2) or (3) commits an offence and shall, on conviction, be liable to a fine not exceeding one hundred thousand ringgit or to imprisonment for a term not exceeding two years or to both. https://www.hackread.com/dell-data-breach- hacker-sells-customer-data/
  • 11. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Insider Threat Insiders with important access to company information that have been compromised from the outside. Oblivious Insider Insiders that are usually uneducated on potential security threats, or simply bypass protocol to meet workplace efficiency. Negligent Insider Insiders that steal data intentionally or destroy company property – such as an employee that deletes company data on their last day of work. Malicious Insider Insiders making a career of exploiting company network vulnerabilities, and selling that information on the dark web. Professional Insider
  • 12. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Social Engineering Phishing scams are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then prods victim into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware. Phishing Baiting attacks use a false promise to pique a victim’s greed or curiosity. Baiting attacks may leverage the offer of free music or movie downloads to trick users into handing their login credentials. Baiting Scareware involves victims being bombarded with false alarms and fictitious threats. Users are deceived to think their system is infected with malware, prompting them to install software that has no benefit or is malware itself. Scareware
  • 13. How To Protect Data At Workplace
  • 14. qwerty123 !@#$%^&* XR#LJ5lsf*bi taylorswift Strong password recommendation: • Contain both upper-case and lower-case characters (e.g. a-z, A-Z) • Contain digits and punctuation characters as well as letters (e.g. 0-9, !@#$%^&*() • At least eight alphanumeric characters long • Not a word in any language, slang, dialect, jargon, etc. • Are not based on personal information, names of family, etc Which of the following password safe to use? 1 2 3 4
  • 15. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential The Trifecta of Data Recovery People Infrastructure Technology People • In-house/Outsource/Contract Infrastructure • Your own Data Center/Server Room/Outsource Technology • The Software/Hardware/Appliance you’re using
  • 16. Our Product & Services 03 Providing a vast array of solutions to support the demands of our customers.
  • 17. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Product & Services Overview IP ServerOne: What We Do § NovaCloud § Private Cloud § Bare-Metal Server § E-mail § Backup Storage § Disaster Recovery § DNS Hosting § Domain Name 1 CLOUD SERVICES SUBSCRIPTION § Monitoring § Server Management § Database Management § Server Security Management § Performance Optimization 2 MANAGED SERVICES MAINTENANCE § Hardware & Software § Storage Solution § Virtualization 3 IT SOLUTIONS DESIGN & DEPLOY § IP Transit § Anti-DDoS Protection § Co-location § Floor space § MYIX Satellite POP § Inter-Data Center connection (DCI) 4 DATA CENTER SUPPORT
  • 18. Design Uptime Institute Tier III DC on Design (TCCD) Uptime Institute Tier III DC on Constructed Facility (TCCF) ANSI/TIA-942 Rated-3 Green Building Index (GBI) Certified Security PCI-DSS Compliant ISO/IEC 27001 Compliant Threat, Vulnerability, Risk Assessment (TVRA) Risk Management in Technology (RMiT) SOC 2 Type II ISO/IEC 27017 Compliant © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Our Certifications
  • 19. Acorn Recovery as a Service 04 A SIMPLE | FAST I SECURE Managed Disaster Recovery Solution
  • 20. When your security is B R E A C H E D! Acorn Recovery is your LAST LINE OF DEFENSE! Recovery in minutes…
  • 21. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Story Time: Nature’s Inspiration for Acorn Recovery as a Service SOURCE: https://www.ipserverone.com/the-acorn-story-natures-inspiration- for-acorn-recovery-as-a-service/ Just like the tough shell of an acorn protects the seed within, Acorn Recovery employs robust security measures and encryption protocols to safeguard your critical data from cyber threats. It’s like having a fortress around your most valuable assets. 1 Hard Outer Shell Acorns are known for their nutrient-rich composition, sustaining life in the natural world. Similarly, Acorn Recovery offers a bounty of features—rapid server recovery, immutable storage, dual disaster recovery centers, and a top-notch DR team—to keep your business running continuously, even in the face of adversity. 2 Nutrient-Rich Ever tasted the bitterness of an acorn? That’s thanks to tannins, natural compounds that act as a defense mechanism. Similarly, our security features in Acorn Recovery deter malicious actors and safeguard your data from exploitation. No bitter taste here, just sweet security. 3 Tannins Acorns have a nifty trick up their sleeve—a dormancy mechanism that delays germination until the time is right for growth. Similarly, Acorn Recovery keeps your critical data dormant and readily available until needed for recovery. It’s like having an ‘insurance’ policy for your digital assets. 4 Dormancy Mechanism Acorns spread their seeds through various dispersal methods, ensuring the survival of oak trees. Likewise, Acorn Recovery disperses your data across multiple locations— immutable cloud storage, off-site data centers, and redundant systems—to speed up recovery, enhance resilience, and minimize the risk of data loss. 5 Dispersal Strategies
  • 22. Acorn Recovery as a Service is a SIMPLE | FAST | SECURE managed Disaster Recovery solution that’s designed to help secure physical and virtual servers, ensuring uninterrupted operations. FAST • Means fast server recovery in minutes upon DR activation by customer. • Fast to response with our 24/7 DR team that follows the industry standards like ISO, TVRA, BNM RMiT, and SOC 2 Type II compliance. SECURE • Means your data is kept securely in TWO separate Disaster Recovery Centers (DRC). • Added on with immutable storage; your data stored is not susceptible to change. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential What is Acorn Recovery as a Service? What do we mean by SIMPLE | FAST | SECURE? SIMPLE • Means our solution is user friendly and easy to use. • We provide simplified ransomware recovery steps to customer, backed by our experience DR team.
  • 23. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Unique Selling Points of Acorn Recovery as a Service • Time-lock storage • Enhanced protection from ransomware attack 1 Immutable Storage • Standby Disaster Recovery for faster Recovery Time Objective (RTO) 2 Warm DR • Dual DataCenter design • DRC1 is in CJ1 | DRC2 in in AIMS KL | or vice-versa 3 Dual DRC Design • Our dedicated team will manage the day-to-day of backup and DR operations 4 Managed Backup and DR Services • Veeam's SureBackup technology offers a robust solution for backup validation, ensuring that backups are not only successfully created but are also reliable for restoration 5 Backup Verification • 1x DR Drill included per year • Inclusive of 10 days DR Activation for DR Testing / DR Drill / Actual DR • DR Plan update based on executed DR Drill activity • DR Report inclusive activities, timelines, actions taken, and feedback 6 DR Drill
  • 24. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential The Design of Acorn Recovery as a Service
  • 25. ABC Company Windows Server Linux Server DRC 1 DRC 2 Windows Server_Replica Linux Server_Replica Windows Server Windows Server Linux Server WARM DR SITE COLD DR SITE
  • 26. Scope of Acorn Recovery as a Service © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential We provide round-the-clock monitoring of backup and DR systems to detect any operational anomalies or issues. 1 Continuous Monitoring Our team ensures immediate response and resolution of any incidents related to backup or DR, minimizing downtime and ensuring business continuity. 2 Incident Response We maintain regular communication with clients, offering transparent status updates and responsiveness to any concerns or changes in requirements. 3 Client Communication and Reporting We conduct thorough reviews of backup and DR systems, including assessment of hardware health, software update status, and configuration settings, to optimize performance and reliability. 4 System Review and Planning Our process ensures the integrity and efficiency of backups, identifying areas for performance optimization and ensuring data protection. 5 Backup Verification We will conduct testing to validate the effectiveness of DR plans and ensure readiness for potential disaster scenarios, minimizing risks and maximizing recovery capabilities. 6 DR Testing and Readiness Evaluation We apply scheduled updates to backup and DR software and hardware to ensure systems are up-to- date and continuously enhance backup and DR processes. 7 Maintenance and Improvement We assist customers in activating the DR virtual machine (VM) to swiftly transition to their disaster recovery environment. 8 DR Activation Assistance We aid customers in restoring the VM into the DR VM or the Mini Hypervisor we've prepared for seamless recovery. 9 DR Restoration Assistance We assist customers in pointing IP addresses and rerouting traffic to DRC1 or DRC2 for uninterrupted service during disaster recovery. 10 Traffic Rerouting We guarantee 99.9% uptime for DR infrastructure. 11 Service Level Agreement
  • 27. I n f r a s t r u c t u r e Technology People © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential In Summary: SIMPLE | FAST | SECURE 1 People 3 Technology 1. Immutable Storage 2. Warm DR 3. Dual DRC Design 4. Managed Backup and DR Services 5. Backup Verification 6. DR Drill Unique Features 2 Infrastructure
  • 28. Discover the warmth and personalized care of our managed cloud services, and let us show you how “We Host Better.” IP ServerOne Team Thanks WE HOST BETTER +603-20261688 www.ipserverone.com IP ServerOne Solutions Sdn. Bhd. (800140-T) Unit 21-03, Level 21, IMAZIUM, No. 8, Jalan SS21/37, Damansara Uptown, 47400 Petaling Jaya, Selangor Darul Ehsan.