SlideShare a Scribd company logo
In this webinar you will learn:
● Understand how Ransomware is Getting Worse
● Backups and Snapshots Are No Longer Enough
● 3 Things You Can Do to Protect Yourself
Ransomware
Five Reasons You’re Not As Protected As You Think
On Demand Webinar
For audio playback and Q&A go to:
http://bit.ly/Ransom5
● Analyst firm focused on storage, cloud
and virtualization
● Knowledge of these markets is gained
through product testing and interaction
with end users and suppliers
● The results of this research can be
found in the articles, videos, webinars,
product analysis and case studies on
our web site:
http://storageswiss.com
Who Is Storage Switzerland?
Our Speakers
George Crump is the founder of Storage
Switzerland, the leading storage analyst focused on
the subjects of big data, solid state storage,
virtualization, cloud computing and data protection.
He is widely recognized for his articles, white papers,
and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined
storage, backup appliances, and storage networking.
He has over 25 years of experience designing
storage solutions for data centers across the US.
Our Speakers
Gary Watson co-founded Nexsan in 1999 and served as
Chief Technology Officer until the company was acquired
in 2013. In 2014, Mr. Watson was given the title Imation
Fellow in recognition of his service. Now, he is the Vice
President of Technical Engagement for Nexsan and was
described in a recent interview as “one of those brilliant
technical people who also possesses the gift to
communicate eloquently, enthusiastically and informatively
with any audience.” Prior to Nexsan, Mr. Watson held
engineering and management positions at Trimm
Technologies, Data General and Digital Equipment
Corporation minicomputers. He studied Physics at Harvey
Mudd College in Claremont, California.
4 ©2016 Nexsan. All Rights Reserved.
Imation | Nexsan Company Overview
Imation – Parent Company
• Holding Company
• Divested from legacy businesses
Nexsan - Trading Company
▪ Founded in 1999
▪ Pioneered capacity-optimized storage
▪ A history of technological innovation
▪ Over 40,000 systems installed
▪ Over 20,000 end-users, 60 countries
▪ Six major facilities: Campbell,
Thousand Oaks, Escondido CA;
Montreal Canada; Derby, East Isley
UK
What Is Ransomware?
• Malware that, once
triggered, encrypts data
• For the most part the only
way to un-encrypt is to pay
encryptor
• Key target is unstructured
data and now databases
The State Of Ransomware
• Over 80% of businesses
have been infected at
least once this year
• Over 40% have paid the
ransom
• Typical ransoms range
from $2,000 to $15,000
Why Is Ransomware So
Effective?
• Thrives on
• Weaknesses in organization’s data protection strategies
• Weaknesses in end-user training
• Ransom $ is low
• Cheaper than recovering data
• Because the data protection process is too complex
• Organizations have a False Sense of Security
Reason 1: Backups Aren’t Frequent
Enough
• Ransomware attacks occur during the day
• Hours after backups have been completed
• The most valuable data, the data that is being
created or modified on THAT day, is also the
day you are most likely to pay to encrypt
• Some Ransomware has specifically targeted
backup files first
Reason 2: Backup Devices Aren’t
Safe
• Most Disk Backup Appliances are network
mounts
• Backups are stored as files on the appliance
• Ransomware can encrypt those files just like
any other
• Some Ransomware has specifically targeted
popular disk backup appliances
Reason 3: Snapshots Aren’t Safe
• Snapshots CAN be taken more frequently
• Still may not be frequent enough
• May impact production storage performance
• Require more storage capacity
• Most snapshots are easily mountable
• Some Ransomware specifically targets
snapshots
Reason 4: Users Can Only Be
Trained So Far
• What can be done (what should we
train them on)
• But Ransomware emails are getting
more creative
Reason 5: Ransomware Is Getting
MORE Sophisticated
• Targeting specific devices
• No longer aimlessly walks
the file system
• Encrypts high value data
(database)
The Ransomware Solution
• Real-time data protection
• Protected data stored as “Read-
Only”
• Cost effective storage platform
• multi-purpose, solves more problems
than Ransomware
14 ©2016 Nexsan. All Rights Reserved.
Assureon provides…
▪ Long term archive storage for fixed content files
▪ Guaranteed file availability
▪ Guaranteed file integrity
▪ Assureon doesn’t have a “delete” key – files are
removed only pursuant to defined Retention Rules.
▪ Some or all Rules may be configured such that even
the administrator can’t change them, or can only
change them after a specified period of time.
▪ The inability of even admin-level people or systems to
directly modify or delete a file makes Assureon very
resistant to viruses and ransomware.
15 ©2016 Nexsan. All Rights Reserved.
▪ A unique “fingerprint” representing
the content of each file is generated
upon ingestion
▪ Every 90 days the integrity of every
file is audited against the original
“fingerprint”
▪ Guarantees file level integrity within
the archive
▪ Guarantees that a file has not been
changed (authenticity)
▪ Reports any data corruption
▪ Self healing if corruption is found
▪ Provides an audit of file integrity
Guaranteed File Integrity – Fingerprint Audit
16 ©2016 Nexsan. All Rights Reserved.
▪ Files entering the Assureon Archive are given a
unique sequential serial number – an “asset tag”
▪ Every 90 days every file is checked to make sure
it is in the archive
▶ Performed at both the primary site and the secondary site
▪ Ensures all files are present in the Assureon
archive
▪ Reports any missing data
▪ Automatically heals missing files
▪ Provides an audit of file availability
▪ Unique to Assureon
Guaranteed File Availability - Serialization Audit
1
2
3
4
6
7
Missing
17 ©2016 Nexsan. All Rights Reserved.
Enhanced Data Privacy
▪ Audit Logs stored securely.
▪ Tamper Proof – files and
metadata are
cryptographically chained
together (US Patent
7,801,871 et al)
▪ Encryption at Rest with
unique key per file.
▪ Separation of Data –
physically and or logically.
Encryption + Authentication + Audit
Logging =
Proper Chain of Custody
Thank you!
Storage Switzerland
http://www.storageswiss.com
georgeacrump@storageswiss.com
StorageSwiss on Twitter:
http://twitter.com/storageswiss
StorageSwiss on YouTube:
http://www.youtube.com/user/storageswiss
Nexsan
https://www.nexsan.com
Nexsan on Twitter:
https://twitter.com/Nexsan
Nexsan on LinkedIn:
https://www.linkedin.com/company/nexsan
Nexsan on Facebook:
https://www.facebook.com/Nexsan
Ransomware
Five Reasons You’re Not As Protected As You Think
For Complete Audio and Q&A please register
for the On-Demand Version at
http://bit.ly/Ransom5

More Related Content

Viewers also liked

Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?
Storage Switzerland
 
Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?
Storage Switzerland
 
Webinar: How and Why to Containerize Your Legacy Applications
Webinar: How and Why to Containerize Your Legacy ApplicationsWebinar: How and Why to Containerize Your Legacy Applications
Webinar: How and Why to Containerize Your Legacy Applications
Storage Switzerland
 
Webinar: DR Strategies For Hyperconverged Architectures
Webinar: DR Strategies For Hyperconverged ArchitecturesWebinar: DR Strategies For Hyperconverged Architectures
Webinar: DR Strategies For Hyperconverged Architectures
Storage Switzerland
 
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shahNull 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
nullowaspmumbai
 
Static analysis for security
Static analysis for securityStatic analysis for security
Static analysis for security
Fadi Abdulwahab
 
Introduction to burp suite
Introduction to burp suiteIntroduction to burp suite
Introduction to burp suite
Utkarsh Bhargava
 
OWASP Zed Attack Proxy
OWASP Zed Attack ProxyOWASP Zed Attack Proxy
OWASP Zed Attack Proxy
Fadi Abdulwahab
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
IBM Security
 
Base64 Encoding
Base64 EncodingBase64 Encoding
Base64 Encoding
Jonathan Francis Roscoe
 
Scénarios d'exploitation Metasploit - FR : Scénario 1
Scénarios d'exploitation Metasploit - FR : Scénario 1Scénarios d'exploitation Metasploit - FR : Scénario 1
Scénarios d'exploitation Metasploit - FR : Scénario 1
Eric Romang
 
Hack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhydHack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhyd
n|u - The Open Security Community
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuceDb Cooper
 
The old is new, again. CVE-2011-2461 is back!
The old is new, again. CVE-2011-2461 is back!The old is new, again. CVE-2011-2461 is back!
The old is new, again. CVE-2011-2461 is back!
Luca Carettoni
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
jasonhaddix
 
Attaque metasploite
Attaque metasploiteAttaque metasploite
Attaque metasploite
Majid CHADAD
 
Scénarios d'exploitation Metasploit - FR : Scénario 3
Scénarios d'exploitation Metasploit - FR : Scénario 3Scénarios d'exploitation Metasploit - FR : Scénario 3
Scénarios d'exploitation Metasploit - FR : Scénario 3Eric Romang
 
Fuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 JuneFuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 June
nullowaspmumbai
 
Burp Suite Starter
Burp Suite StarterBurp Suite Starter
Burp Suite Starter
Fadi Abdulwahab
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
Ninad Sarang
 

Viewers also liked (20)

Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?Webinar: Do Hyperconverged Systems Need File Services?
Webinar: Do Hyperconverged Systems Need File Services?
 
Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?
 
Webinar: How and Why to Containerize Your Legacy Applications
Webinar: How and Why to Containerize Your Legacy ApplicationsWebinar: How and Why to Containerize Your Legacy Applications
Webinar: How and Why to Containerize Your Legacy Applications
 
Webinar: DR Strategies For Hyperconverged Architectures
Webinar: DR Strategies For Hyperconverged ArchitecturesWebinar: DR Strategies For Hyperconverged Architectures
Webinar: DR Strategies For Hyperconverged Architectures
 
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shahNull 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
Null 11 june_Malware CNC: Advance Evasion techniques_by Avkash k and dhawal shah
 
Static analysis for security
Static analysis for securityStatic analysis for security
Static analysis for security
 
Introduction to burp suite
Introduction to burp suiteIntroduction to burp suite
Introduction to burp suite
 
OWASP Zed Attack Proxy
OWASP Zed Attack ProxyOWASP Zed Attack Proxy
OWASP Zed Attack Proxy
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
 
Base64 Encoding
Base64 EncodingBase64 Encoding
Base64 Encoding
 
Scénarios d'exploitation Metasploit - FR : Scénario 1
Scénarios d'exploitation Metasploit - FR : Scénario 1Scénarios d'exploitation Metasploit - FR : Scénario 1
Scénarios d'exploitation Metasploit - FR : Scénario 1
 
Hack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhydHack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhyd
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
 
The old is new, again. CVE-2011-2461 is back!
The old is new, again. CVE-2011-2461 is back!The old is new, again. CVE-2011-2461 is back!
The old is new, again. CVE-2011-2461 is back!
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
 
Attaque metasploite
Attaque metasploiteAttaque metasploite
Attaque metasploite
 
Scénarios d'exploitation Metasploit - FR : Scénario 3
Scénarios d'exploitation Metasploit - FR : Scénario 3Scénarios d'exploitation Metasploit - FR : Scénario 3
Scénarios d'exploitation Metasploit - FR : Scénario 3
 
Fuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 JuneFuzzing | Null OWASP Mumbai | 2016 June
Fuzzing | Null OWASP Mumbai | 2016 June
 
Burp Suite Starter
Burp Suite StarterBurp Suite Starter
Burp Suite Starter
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
 

Similar to Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think

Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
Michael Gough
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
Splunk
 
Webinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the CloudWebinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the Cloud
Storage Switzerland
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATAKeith P. Melvey
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
Stephanie Bies
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
Stephanie Bies
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Storage Switzerland
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilities
Major Hayden
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
Karel Kannel
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
Storage Switzerland
 
Webinar: End NAS Sprawl - Gain Control Over Unstructured Data
Webinar: End NAS Sprawl - Gain Control Over Unstructured DataWebinar: End NAS Sprawl - Gain Control Over Unstructured Data
Webinar: End NAS Sprawl - Gain Control Over Unstructured Data
Storage Switzerland
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
IT Security for Nonprofits 101
IT Security for Nonprofits 101IT Security for Nonprofits 101
IT Security for Nonprofits 101
seanericwatson
 
Security For Free
Security For FreeSecurity For Free
Security For Free
gwarden
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
Zscaler
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
Hostway|HOSTING
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
Ernest Staats
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
Bilal Arif
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce on Tour 2015 - How are You Protecting Your Source Code?Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce
 

Similar to Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think (20)

Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
Webinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the CloudWebinar: How To Achieve Total File Security in the Cloud
Webinar: How To Achieve Total File Security in the Cloud
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilities
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
Webinar: End NAS Sprawl - Gain Control Over Unstructured Data
Webinar: End NAS Sprawl - Gain Control Over Unstructured DataWebinar: End NAS Sprawl - Gain Control Over Unstructured Data
Webinar: End NAS Sprawl - Gain Control Over Unstructured Data
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
IT Security for Nonprofits 101
IT Security for Nonprofits 101IT Security for Nonprofits 101
IT Security for Nonprofits 101
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce on Tour 2015 - How are You Protecting Your Source Code?Perforce on Tour 2015 - How are You Protecting Your Source Code?
Perforce on Tour 2015 - How are You Protecting Your Source Code?
 

More from Storage Switzerland

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Storage Switzerland
 
Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
Storage Switzerland
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
Storage Switzerland
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Storage Switzerland
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Storage Switzerland
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Storage Switzerland
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Storage Switzerland
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Storage Switzerland
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Storage Switzerland
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
Storage Switzerland
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Storage Switzerland
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Storage Switzerland
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Storage Switzerland
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
Storage Switzerland
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
Storage Switzerland
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
Storage Switzerland
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
Storage Switzerland
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Storage Switzerland
 

More from Storage Switzerland (20)

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
 
Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think

  • 1. In this webinar you will learn: ● Understand how Ransomware is Getting Worse ● Backups and Snapshots Are No Longer Enough ● 3 Things You Can Do to Protect Yourself Ransomware Five Reasons You’re Not As Protected As You Think On Demand Webinar For audio playback and Q&A go to: http://bit.ly/Ransom5
  • 2. ● Analyst firm focused on storage, cloud and virtualization ● Knowledge of these markets is gained through product testing and interaction with end users and suppliers ● The results of this research can be found in the articles, videos, webinars, product analysis and case studies on our web site: http://storageswiss.com Who Is Storage Switzerland?
  • 3. Our Speakers George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is widely recognized for his articles, white papers, and videos on such current approaches as all-flash arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking. He has over 25 years of experience designing storage solutions for data centers across the US.
  • 4. Our Speakers Gary Watson co-founded Nexsan in 1999 and served as Chief Technology Officer until the company was acquired in 2013. In 2014, Mr. Watson was given the title Imation Fellow in recognition of his service. Now, he is the Vice President of Technical Engagement for Nexsan and was described in a recent interview as “one of those brilliant technical people who also possesses the gift to communicate eloquently, enthusiastically and informatively with any audience.” Prior to Nexsan, Mr. Watson held engineering and management positions at Trimm Technologies, Data General and Digital Equipment Corporation minicomputers. He studied Physics at Harvey Mudd College in Claremont, California.
  • 5. 4 ©2016 Nexsan. All Rights Reserved. Imation | Nexsan Company Overview Imation – Parent Company • Holding Company • Divested from legacy businesses Nexsan - Trading Company ▪ Founded in 1999 ▪ Pioneered capacity-optimized storage ▪ A history of technological innovation ▪ Over 40,000 systems installed ▪ Over 20,000 end-users, 60 countries ▪ Six major facilities: Campbell, Thousand Oaks, Escondido CA; Montreal Canada; Derby, East Isley UK
  • 6. What Is Ransomware? • Malware that, once triggered, encrypts data • For the most part the only way to un-encrypt is to pay encryptor • Key target is unstructured data and now databases
  • 7. The State Of Ransomware • Over 80% of businesses have been infected at least once this year • Over 40% have paid the ransom • Typical ransoms range from $2,000 to $15,000
  • 8. Why Is Ransomware So Effective? • Thrives on • Weaknesses in organization’s data protection strategies • Weaknesses in end-user training • Ransom $ is low • Cheaper than recovering data • Because the data protection process is too complex • Organizations have a False Sense of Security
  • 9. Reason 1: Backups Aren’t Frequent Enough • Ransomware attacks occur during the day • Hours after backups have been completed • The most valuable data, the data that is being created or modified on THAT day, is also the day you are most likely to pay to encrypt • Some Ransomware has specifically targeted backup files first
  • 10. Reason 2: Backup Devices Aren’t Safe • Most Disk Backup Appliances are network mounts • Backups are stored as files on the appliance • Ransomware can encrypt those files just like any other • Some Ransomware has specifically targeted popular disk backup appliances
  • 11. Reason 3: Snapshots Aren’t Safe • Snapshots CAN be taken more frequently • Still may not be frequent enough • May impact production storage performance • Require more storage capacity • Most snapshots are easily mountable • Some Ransomware specifically targets snapshots
  • 12. Reason 4: Users Can Only Be Trained So Far • What can be done (what should we train them on) • But Ransomware emails are getting more creative
  • 13. Reason 5: Ransomware Is Getting MORE Sophisticated • Targeting specific devices • No longer aimlessly walks the file system • Encrypts high value data (database)
  • 14. The Ransomware Solution • Real-time data protection • Protected data stored as “Read- Only” • Cost effective storage platform • multi-purpose, solves more problems than Ransomware
  • 15. 14 ©2016 Nexsan. All Rights Reserved. Assureon provides… ▪ Long term archive storage for fixed content files ▪ Guaranteed file availability ▪ Guaranteed file integrity ▪ Assureon doesn’t have a “delete” key – files are removed only pursuant to defined Retention Rules. ▪ Some or all Rules may be configured such that even the administrator can’t change them, or can only change them after a specified period of time. ▪ The inability of even admin-level people or systems to directly modify or delete a file makes Assureon very resistant to viruses and ransomware.
  • 16. 15 ©2016 Nexsan. All Rights Reserved. ▪ A unique “fingerprint” representing the content of each file is generated upon ingestion ▪ Every 90 days the integrity of every file is audited against the original “fingerprint” ▪ Guarantees file level integrity within the archive ▪ Guarantees that a file has not been changed (authenticity) ▪ Reports any data corruption ▪ Self healing if corruption is found ▪ Provides an audit of file integrity Guaranteed File Integrity – Fingerprint Audit
  • 17. 16 ©2016 Nexsan. All Rights Reserved. ▪ Files entering the Assureon Archive are given a unique sequential serial number – an “asset tag” ▪ Every 90 days every file is checked to make sure it is in the archive ▶ Performed at both the primary site and the secondary site ▪ Ensures all files are present in the Assureon archive ▪ Reports any missing data ▪ Automatically heals missing files ▪ Provides an audit of file availability ▪ Unique to Assureon Guaranteed File Availability - Serialization Audit 1 2 3 4 6 7 Missing
  • 18. 17 ©2016 Nexsan. All Rights Reserved. Enhanced Data Privacy ▪ Audit Logs stored securely. ▪ Tamper Proof – files and metadata are cryptographically chained together (US Patent 7,801,871 et al) ▪ Encryption at Rest with unique key per file. ▪ Separation of Data – physically and or logically. Encryption + Authentication + Audit Logging = Proper Chain of Custody
  • 19. Thank you! Storage Switzerland http://www.storageswiss.com georgeacrump@storageswiss.com StorageSwiss on Twitter: http://twitter.com/storageswiss StorageSwiss on YouTube: http://www.youtube.com/user/storageswiss Nexsan https://www.nexsan.com Nexsan on Twitter: https://twitter.com/Nexsan Nexsan on LinkedIn: https://www.linkedin.com/company/nexsan Nexsan on Facebook: https://www.facebook.com/Nexsan
  • 20. Ransomware Five Reasons You’re Not As Protected As You Think For Complete Audio and Q&A please register for the On-Demand Version at http://bit.ly/Ransom5