© 2017 Unitrends 1#1 All-in-One Enterprise
Backup and Continuity
Is Your Use of
Windows-based
Backup Opening
the Door to
Hackers?
Joe Noonan, VP Product Marketing
© 2017 Unitrends 2
New threats are prevailing!
http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware
© 2017 Unitrends 3
50% of business attacks paid
more than $10,000
20% paid more than $40,000
© 2017 Unitrends 4
Downtime can be more costly!
$700B lost in 2016
© 2017 Unitrends 5
"To be honest, we often advise people just to pay the ransom
[if they don’t have backups]."
Joseph Bonavolonta, Asst. Special Agent, FBI Cybercrime Boston
Division
© 2017 Unitrends 6
Protect Secure Test Detect Recover
5 Ways The Right Backup Solution Fights
Ransomware
New!
Often
ignored
!
Over-
looked!
© 2017 Unitrends 7
Can a backup solution be a
gateway for Ransomware and
other forms of malware?
© 2017 Unitrends 8
Protect Secure Test Detect Recover
Yes, certain backup architectures can lead to backup
systems being infected at a much higher probability.
Over-
looked!
© 2017 Unitrends 9
 Highly targeted Windows-based software
 Management complexity
 Backup Server / Media Server
 Backup Proxies
 Backup Repositories
 Dedicated WAN Accelerators
 Dedicated Management Servers
 Dedicated Monitoring & Reporting Servers
What Makes a Backup Architecture Less Secure?
© 2017 Unitrends 10
Secure: The New World Approach
Hardened, Linux Backup
Appliances
vs.
Targeted, Susceptible Windows
Software
© 2017 Unitrends 11
 Less targeted by Ransomware hackers
 Hardened: Only turn on what’s need for backup
and continuity
 All-in-One Simplicity; Integrated Security
 Backup Server / Media Server
 Backup Proxies
 Backup Repositories
 Dedicated WAN Accelerators
 Dedicated Management Servers
 Dedicated Monitoring & Reporting Servers
What Makes a Linux Backup Appliance More Secure?
© 2017 Unitrends 12
What else is important to beat a
Ransomware attack?
© 2017 Unitrends 13
A Known Good Backup!
© 2017 Unitrends 14
Protect Secure Test Detect Recover
5 Ways The Right Backup Solution Fights
Ransomware
Often
ignored
!
© 2017 Unitrends 15
The need for confidence is pushing a
new trend: IT Resilience
© 2017 Unitrends 16
Improved IT serviceability, recovery and integrity
Application focused: Virtual, physical and cloud
workloads
What is “IT Resilience?”
© 2017 Unitrends 17
GitLab: Failure to assure recovery leads to more
downtime
© 2017 Unitrends 18
Another example…
© 2017 Unitrends 19
How do I achieve IT Resilience?
© 2017 Unitrends 20
Advanced Testing and Reporting
Automation
Old World
• Praying that backups recovered successfully
• Scrambling during DR exercises
• Rarely, if ever, testing DR
• Spending hours creating manual DR reports
New World
• Fully automated, application-level testing and failover
• Proactively uncover recovery issues for physical & virtual
• Business-level DR compliance report automation
• Available for local, DR site, and Unitrends Cloud
© 2017 Unitrends 21
Boot order
sequencing for N-tier
applications
What automation technology is
required?
© 2017 Unitrends 22
Application-specific
integrity verification
What automation technology is
required?
*Not a complete list!
© 2017 Unitrends 23
Network automation to isolate from production
 Virtual network assignment
 Network remodeling
 Re-IP
What automation technology is
required?
© 2017 Unitrends 24
Compliance reporting
for business
stakeholders
What automation technology is
required?
© 2017 Unitrends 25
Protect Secure Test Detect Recover
Even More Advanced Solutions Are Available!
New!
© 2017 Unitrends 26
• Uses adaptive &
predictive analytics
against backup data
 Designed to search for
ransomware threat
conditions
 Proactive alerts are
sent when ransomware
conditions are detected
Proactive Ransomware Detection
© 2017 Unitrends 27
“The appliances and services are stable
and reliable. Our Unitrends appliance
literally paid for itself after being able to
restore the 2 million+ files affected by
ransomware earlier this year. “– Exco
Engineering
What Customers Are Saying…
© 2016 Unitrends 28
Unitrends Topic
Presentation Name | Date 2016
Thanks…can you repeat all
that?
© 2017 Unitrends 29
 Windows is highly targeted
 Vendors using complex architectures make it even
more difficult for you to manage risk
 Hardened, Linux appliances with advanced automation
and detection are proving more successful at beating
Ransomware
Summary: Does Windows Backup Open the Door?
© 2016 Unitrends 30
Call to Action– Visit www.Unitrends.com
Try Unitrends – with our v9.2 with Ransomware Detection
Download at http://www.unitrends.com/landing/unitrends-backup-9-2
Limited Availability! Get a free T-Shirt designed by Stephen Bliss
Watch a Live Demo
Register at http://www.unitrends.com/company/events/live-
demos
Talk With One of Our Continuity Experts
Get immediate assistance: http://www.unitrends.com/company/contact

More Related Content

PPTX
Navigating the Web Security Landscape
PDF
Acronis Active Protection: A Way To Combat Ransomware Attack
PDF
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
PDF
Container Security: What Enterprises Need to Know
PDF
Outpost24 webinar - Improve your organizations security with red teaming
PDF
Outpost24 webinar - A day in the life of an information security professional
PDF
NTXISSACSC3 - Removing the Snake Oil from Your Security Program by Jim Broome
Navigating the Web Security Landscape
Acronis Active Protection: A Way To Combat Ransomware Attack
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Ransomware: Why Are Backup Vendors Trying To Scare You?
Container Security: What Enterprises Need to Know
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - A day in the life of an information security professional
NTXISSACSC3 - Removing the Snake Oil from Your Security Program by Jim Broome

What's hot (20)

PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
PPTX
Infosec Europe 2017 Highlights | Lastline, Inc.
PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
PDF
2010 State Of Enterprise Security
PDF
Outpost24 webinar - Mastering the art of multicloud security
PPTX
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
PPTX
Outpost24 webinar: Risk-based approach to security assessments
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
PDF
ISTR XV
PPTX
DDoS Mitigator. Personal control panel for each hosting clients.
PPTX
How to Take the Ransom Out of Ransomware
PPTX
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
PDF
IT for Property Management
PPTX
Cloud Security - Idealware
PDF
The Cloud Beckons, But is it Safe?
PPTX
Backups and Disaster Recovery for Nonprofits
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Infosec Europe 2017 Highlights | Lastline, Inc.
Outpost24 Webinar - Common wireless security threats and how to avoid them
2010 State Of Enterprise Security
Outpost24 webinar - Mastering the art of multicloud security
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Security Analytics: what's in a risk score
Infographic: 5 Tips for Approaching Customers About Cloud Security
ISTR XV
DDoS Mitigator. Personal control panel for each hosting clients.
How to Take the Ransom Out of Ransomware
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
IT for Property Management
Cloud Security - Idealware
The Cloud Beckons, But is it Safe?
Backups and Disaster Recovery for Nonprofits
Outpost24 webinar - Implications when migrating to a Zero Trust model

Similar to Is Your Use of Windows Backup Opening the Door to Hackers? (20)

PPTX
Tech Demo: Take the Ransom Out of Ransomware
PDF
Take the Ransom Out of Ransomware
PPTX
Combating the IT Monsters That Keep You Up at Night
PPTX
Ransomware Detection: Don’t Pay Up. Backup.
PPTX
DR, IT Resilience, & Continuity: What's the Difference?
PPTX
Data Is Evolving. Shouldn’t Your Backup Architecture?
PPTX
Your Greatest Threats Come from Within
PPTX
Designing a Bad A$$ Backup Target without Breaking the Bank
PPTX
Why Set It and Forget It Backup Sucks
PPTX
Death, Taxes and Backup Vendor Finger Pointing
PPTX
Haunted by Your Backup Renewal: 4 Questions to Ask First
PPTX
The 7 New Rules of Recovery Webinar
PPTX
All Workloads Matter! Can You Protect Everything?
PPTX
7 Ways Backup Makes IT More Productive
PDF
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
PPTX
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
PPTX
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
PPTX
Flash, Cloud, and Appliances: The Holy Backup Trinity
PPTX
HCI ECOCAST
PDF
Best Practice for Backup Security for IT with Acronis -v1.pdf
Tech Demo: Take the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
Combating the IT Monsters That Keep You Up at Night
Ransomware Detection: Don’t Pay Up. Backup.
DR, IT Resilience, & Continuity: What's the Difference?
Data Is Evolving. Shouldn’t Your Backup Architecture?
Your Greatest Threats Come from Within
Designing a Bad A$$ Backup Target without Breaking the Bank
Why Set It and Forget It Backup Sucks
Death, Taxes and Backup Vendor Finger Pointing
Haunted by Your Backup Renewal: 4 Questions to Ask First
The 7 New Rules of Recovery Webinar
All Workloads Matter! Can You Protect Everything?
7 Ways Backup Makes IT More Productive
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Flash, Cloud, and Appliances: The Holy Backup Trinity
HCI ECOCAST
Best Practice for Backup Security for IT with Acronis -v1.pdf

More from marketingunitrends (11)

PPTX
8 Things You Need to Know About DRaaS
PPTX
3 Ways to Take the Disaster Out of Cloud DR
PPTX
Will Your Recovery SLA Become a Broken Promise?
PPTX
How to Choose the Right Cloud for Continuity
PPTX
What’s the “Secret Sauce” for Protecting SSD Storage?
PPTX
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
PPTX
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
PPTX
5 Must Haves in an Integrated Backup Appliance
PPTX
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
PPTX
Docker taylor swift and protection v06
PPTX
Boomerang webcast final
8 Things You Need to Know About DRaaS
3 Ways to Take the Disaster Out of Cloud DR
Will Your Recovery SLA Become a Broken Promise?
How to Choose the Right Cloud for Continuity
What’s the “Secret Sauce” for Protecting SSD Storage?
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
5 Must Haves in an Integrated Backup Appliance
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Docker taylor swift and protection v06
Boomerang webcast final

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid model detection and classification of lung cancer
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Unlock new opportunities with location data.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
DOCX
search engine optimization ppt fir known well about this
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Five Habits of High-Impact Board Members
PPT
What is a Computer? Input Devices /output devices
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
CloudStack 4.21: First Look Webinar slides
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Developing a website for English-speaking practice to English as a foreign la...
Hybrid model detection and classification of lung cancer
DP Operators-handbook-extract for the Mautical Institute
observCloud-Native Containerability and monitoring.pptx
Tartificialntelligence_presentation.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Assigned Numbers - 2025 - Bluetooth® Document
Unlock new opportunities with location data.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A review of recent deep learning applications in wood surface defect identifi...
search engine optimization ppt fir known well about this
Hindi spoken digit analysis for native and non-native speakers
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
Five Habits of High-Impact Board Members
What is a Computer? Input Devices /output devices
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
CloudStack 4.21: First Look Webinar slides

Is Your Use of Windows Backup Opening the Door to Hackers?

  • 1. © 2017 Unitrends 1#1 All-in-One Enterprise Backup and Continuity Is Your Use of Windows-based Backup Opening the Door to Hackers? Joe Noonan, VP Product Marketing
  • 2. © 2017 Unitrends 2 New threats are prevailing! http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware
  • 3. © 2017 Unitrends 3 50% of business attacks paid more than $10,000 20% paid more than $40,000
  • 4. © 2017 Unitrends 4 Downtime can be more costly! $700B lost in 2016
  • 5. © 2017 Unitrends 5 "To be honest, we often advise people just to pay the ransom [if they don’t have backups]." Joseph Bonavolonta, Asst. Special Agent, FBI Cybercrime Boston Division
  • 6. © 2017 Unitrends 6 Protect Secure Test Detect Recover 5 Ways The Right Backup Solution Fights Ransomware New! Often ignored ! Over- looked!
  • 7. © 2017 Unitrends 7 Can a backup solution be a gateway for Ransomware and other forms of malware?
  • 8. © 2017 Unitrends 8 Protect Secure Test Detect Recover Yes, certain backup architectures can lead to backup systems being infected at a much higher probability. Over- looked!
  • 9. © 2017 Unitrends 9  Highly targeted Windows-based software  Management complexity  Backup Server / Media Server  Backup Proxies  Backup Repositories  Dedicated WAN Accelerators  Dedicated Management Servers  Dedicated Monitoring & Reporting Servers What Makes a Backup Architecture Less Secure?
  • 10. © 2017 Unitrends 10 Secure: The New World Approach Hardened, Linux Backup Appliances vs. Targeted, Susceptible Windows Software
  • 11. © 2017 Unitrends 11  Less targeted by Ransomware hackers  Hardened: Only turn on what’s need for backup and continuity  All-in-One Simplicity; Integrated Security  Backup Server / Media Server  Backup Proxies  Backup Repositories  Dedicated WAN Accelerators  Dedicated Management Servers  Dedicated Monitoring & Reporting Servers What Makes a Linux Backup Appliance More Secure?
  • 12. © 2017 Unitrends 12 What else is important to beat a Ransomware attack?
  • 13. © 2017 Unitrends 13 A Known Good Backup!
  • 14. © 2017 Unitrends 14 Protect Secure Test Detect Recover 5 Ways The Right Backup Solution Fights Ransomware Often ignored !
  • 15. © 2017 Unitrends 15 The need for confidence is pushing a new trend: IT Resilience
  • 16. © 2017 Unitrends 16 Improved IT serviceability, recovery and integrity Application focused: Virtual, physical and cloud workloads What is “IT Resilience?”
  • 17. © 2017 Unitrends 17 GitLab: Failure to assure recovery leads to more downtime
  • 18. © 2017 Unitrends 18 Another example…
  • 19. © 2017 Unitrends 19 How do I achieve IT Resilience?
  • 20. © 2017 Unitrends 20 Advanced Testing and Reporting Automation Old World • Praying that backups recovered successfully • Scrambling during DR exercises • Rarely, if ever, testing DR • Spending hours creating manual DR reports New World • Fully automated, application-level testing and failover • Proactively uncover recovery issues for physical & virtual • Business-level DR compliance report automation • Available for local, DR site, and Unitrends Cloud
  • 21. © 2017 Unitrends 21 Boot order sequencing for N-tier applications What automation technology is required?
  • 22. © 2017 Unitrends 22 Application-specific integrity verification What automation technology is required? *Not a complete list!
  • 23. © 2017 Unitrends 23 Network automation to isolate from production  Virtual network assignment  Network remodeling  Re-IP What automation technology is required?
  • 24. © 2017 Unitrends 24 Compliance reporting for business stakeholders What automation technology is required?
  • 25. © 2017 Unitrends 25 Protect Secure Test Detect Recover Even More Advanced Solutions Are Available! New!
  • 26. © 2017 Unitrends 26 • Uses adaptive & predictive analytics against backup data  Designed to search for ransomware threat conditions  Proactive alerts are sent when ransomware conditions are detected Proactive Ransomware Detection
  • 27. © 2017 Unitrends 27 “The appliances and services are stable and reliable. Our Unitrends appliance literally paid for itself after being able to restore the 2 million+ files affected by ransomware earlier this year. “– Exco Engineering What Customers Are Saying…
  • 28. © 2016 Unitrends 28 Unitrends Topic Presentation Name | Date 2016 Thanks…can you repeat all that?
  • 29. © 2017 Unitrends 29  Windows is highly targeted  Vendors using complex architectures make it even more difficult for you to manage risk  Hardened, Linux appliances with advanced automation and detection are proving more successful at beating Ransomware Summary: Does Windows Backup Open the Door?
  • 30. © 2016 Unitrends 30 Call to Action– Visit www.Unitrends.com Try Unitrends – with our v9.2 with Ransomware Detection Download at http://www.unitrends.com/landing/unitrends-backup-9-2 Limited Availability! Get a free T-Shirt designed by Stephen Bliss Watch a Live Demo Register at http://www.unitrends.com/company/events/live- demos Talk With One of Our Continuity Experts Get immediate assistance: http://www.unitrends.com/company/contact

Editor's Notes

  • #2: Thanks I appreciate you joining today Hope not to take too much of your time And if we’re lucky, I’ll have helped you learned some interesting things for organization’s backup and continuity needs
  • #3: Ransomware is here to stay: $1B Government: 4000 attacks released daily Expected to continue and evolve We even have RaaS Talk about board level conversation and how it is causing CIOs and CSOs to think a lot more about backup Plug the eBook
  • #4: They don’t just ask for tiny amounts of money; it can be impactful
  • #5: Key messages:
  • #6: It would seem like it should be easy to prevent, but it’s clearly not 4000 attacks per day Stealth services springing up everywhere
  • #7: Not all doom and gloom Backup solutions can play a bigger part in your anti-ransomware strategy than you might have thought We’ll cover these in detail later
  • #8: The key question for this webinar topic – how does your choice of backup solution affect your ransomware situation
  • #9: Yes, your choice has an impact It’s time to start considering ransomware as part of the evaluation criteria
  • #10: From what we’ve seen in OUR time spent with customers… This is what they’ve reported when they failed to be able to recover from a ransomware attack You can see public information on some of these incidents Don’t like to pick, but this was just admitted by one of our competitors, Veeam, in a public forum post Windows is a stronger market so it’s highly targeted Some new variants like LataRebo Locker specifically exploit Windows registry to show the ransom note and disable task manager so you can’t kill their process
  • #11: Ransomware targets Windows predominantly Many folks that were hit by ransomware had their backups impacted as well This is because many incumbent backup solutions are also Windows based The new approach is a hardened, locked down, purpose-built backup appliance (often one that is a hybrid cloud appliance)
  • #12: From what we’ve seen in OUR time spent with customers… This is what they’ve reported when they failed to be able to recover from a ransomware attack You can see public information on some of these incidents Don’t like to pick, but this was just admitted by one of our competitors, Veeam, in a public forum post
  • #14: Tell stories here about people in support Don’t talk in detail about testing yet
  • #15: Obviously, testing helps But it’s painful and arduous Automation around this is becoming more prevalent There are some nuances to it
  • #18: Don’t like picking on GitLab because they did awesome in how they handled the situation But they definitely put themselves in a situation where IT resilience was not implemented THIS HAS NOTHING TO DO WITH RANSOMWARE It’s about risk of your backups being bad
  • #19: And this one is a peeve of mine, having been in the backup space for so long I love great virtualization features But they can hurt us sometimes That said, they are ways to mitigate the impact
  • #22: Using functionality from Unitrends to display some of this
  • #26: Not all doom and gloom Backup solutions can play a bigger part in your anti-ransomware strategy than you might have thought We’ll cover these in detail later
  • #27: Unitrends can identify abnormal behavior – on a system level – and warn when malicious attacks may have occurred or are under way
  • #29: Key messages:
  • #31: Here’s how you learn more with us You can also access the blog