In this webinar, Storage Switzerland and Cloudian discuss the three key reasons why object storage is a perfect defense against ransomware:
* Immutability is built in - Data can’t be encrypted
* Replication is built in - Data can be automatically sent off-site
* Data Management is built in - Data can be archived from primary storage, limiting exposure
Driving Behavioral Change for Information Management through Data-Driven Gree...
Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks
1. Three Reasons Why Object Storage is the Best Defense
Against Ransomware Attacks
Learn the 3 best defenses:
1. Immutability is built in:
Data can’t be encrypted
2. Replication is built in:
Data can be automatically sent off-site
3. Data Management is built in:
Data can be archived from primary
storage, limiting exposure
For audio playback and Q&A go to: http://bit.ly/ObjectRansom
2. Our Speakers
Jon Toor is CMO of Cloudian. Prior to Cloudian, Toor served as vice president of marketing at
Brocade. He also served as the vice president of marketing at Xsigo Systems where he led the
outbound marketing team from company launch until the company acquisition by Oracle. Prior to
Xsigo, he served at ONStor as vice president of marketing. Toor holds an MBA, BS in mechanical
engineering, and a BA in economics all from Stanford University.
George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the
subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is
widely recognized for his articles, white papers, and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking.
He has over 25 years of experience designing storage solutions for data centers across the US.
3. State of
Ransomware ● Malware that once inside the
organization encrypts data by mounting
file-systems and walking through the
directory structure
● Used to be a brute force encrypt as many
files as possible
● Now more nuanced will encrypt a few
files, wait, encrypt a few more, wait...
4. ● Number of Attacks increased 90%
from 2016 to 2017
● Financial Impact in 2017
estimated to be over $5 Billion
● A Public Sector Disaster
○ 184 Attacks against public
agencies in the last 24 months
○ 911 Systems a prime target
Ransomware Attacks
5. ● City of Atlanta
● Baltimore Computer Aided Dispatch
System
○ A compromised firewall only four hours
old when attack occurred
● Boeing
○ Not a lot of details but 777 production
was at least threatened
● Colorado Department of Transportation
○ Six weeks to bring just 80% of systems
back online
Recent (2018) Examples
8. ● Backups
○ Frequent
○ Pay careful attention to
unstructured data
○ But protect everything
Protecting Against
Ransomware
9. Backup to a Secure
Device
● Data needs to be read-only
and encrypted
● Data Protection storage
needs to be “hard” to get to
○ i.e. NOT an SMB Mount
Point
● Data needs to be replicated
10. Limit the
Exposure
● Stop storing everything on primary
storage (please)
● Use data management software to
archive data
● Again, archive store must be secure
● Data Management also helps with
restores
○ Data can be restored as it is
accessed
11. Detect
● Invest in software that
can detect an attack
quickly
● Looking for unusual
number of reads and
writes
12. Object Storage Ideal for
Ransomware Safe
Storage
● Read-only by default
● Applicable for both backup and
archive use cases
● Rapid restore capabilities
13. Meet Cloudian
• On-premises unstructured data storage
• Simple, modular, cost effective
• Start small, scale to hundreds of petabytes
14. 80%
Fast Data Capacity Data
Data
Capacity
20%
Where Cloudian Fits
Ideal for:
Data protection
Media active archive
NAS offload
Video surveillance
Bioinformatics
Collaboration
AI/Machine learning
Storage services
File and Object Consolidation for Capacity-Intensive Applications
15. Cloudian Product Family
Scale-out object storage
• Limitless capacity
• Start small and grow
• 100% native S3-API
840TB
in 4U
File services for HyperStore
• SMB (CIFS), NFS
• High Availability (Active/Passive)
• Snapshot, WORM
HyperStore Object Storage HyperFile NAS Controller
16. How Cloudian is Deployed
File
Data
Object
Data
2.5PB
in 12UHyperStore Object Storage
HyperFile NAS Controller
Scale by adding
nodes
17. Use Case: Backup
Fast, scalable, disk-based backup target at 70% less cost.
• Cloudian as backup target
• 70% less cost than backup appliance
• 100X faster data access than tape
Backup
Servers
Backup TargetApplication
Servers
WORM
or
Data
versioning
S3
Protocol
18. WORM vs Versioning
WORM
(Write Once Read Many)
Write
Read
V1
V2
V3
Write
Read
Versioning
• One version of data
• Cannot be re-written or deleted*
• Data is not overwritten
• New versions created on write
• Versions could be deleted*until timer expires
Both provide protection. Cloudian offers both.
19. Data Durability
Configurable robustness
Fine-grained configuration:
• Configure at bucket level
• Set policies for each data
type
Choose from:
•Erasure coding
•Replication
Up to 14 nines data durability
D
Bucket 1
RF2
Bucket 2
EC 4+2 D D D CC
D D D C CC
Bucket 1: Replication
Bucket 2: Erasure Coding
Six Node Cluster
- Single site, or multi-site
20. Why Customers Choose Cloudian
100% Native S3 API
Highest compatibility
Data protection
built-in, replication,
striping
Enterprise NAS
features
Cloud
interoperability
Granular
management,
bucket level
Up to 14 nines
data durability
_
2
1
Cloud-
like cost
GB/
mo.
Start small and
grow
25. Three Reasons Why Object Storage is the Best Defense
Against Ransomware Attacks
For complete Audio and Q&A please register for the On Demand Version at:
http://bit.ly/ObjectRansom