SlideShare a Scribd company logo
© 2017 Unitrends 1#1 All-in-One Enterprise
Backup and Continuity
Combating the IT
Monsters That
Keep You Up at
Night
Joe Noonan, VP Product Marketing
© 2017 Unitrends 2
What do the IT monsters look
like?
© 2017 Unitrends 3
0
50
100
150
200
250
300
350
400
450
500
What Backup and Recovery Challenges Are You Facing?
They seem to lurk everywhere…
Source: Unitrends 2016 Survey (N=898)
© 2017 Unitrends 4
10xGrowth in
Servers
50xGrowth
in
Data
75xGrowth in
Files
1.5x
Growth in
IT Admins
Source: The IDC Digital Universe Study.
Data is increasing but IT professionals are not.
OVER THE NEXT 10 YRS
© 2017 Unitrends 5
 Office 365 data lives in a Microsoft
Azure Cloud, not on your own server
 Deleted email is gone after 14-30
days—totally unrecoverable
 Deleted SharePoint & OneDrive files
are gone after 186 days
 Most lost data is due to user error
 Users can choose to permanently
delete files & email
The monsters live in the cloud too!
32% of companies have lost data in the cloud1
1January 2013 SaaS report by the Aberdeen Group
Sources of Data Loss
User Error Hackers
Closing an Account Malicious Deletion
Third-Party Software
© 2017 Unitrends 6
Even your
friends can
be IT
monsters
sometimes!
© 2017 Unitrends 7
New threats are prevailing!
http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware
© 2017 Unitrends 8
50% of business attacks paid
more than $10,000
20% paid more than $40,000
© 2017 Unitrends 9
Downtime can be more costly!
$700B lost in 2016
© 2017 Unitrends 10
How can I be safe from them?
© 2017 Unitrends 11
1. Align recovery with the business
2. Focus your strategy
3. Kill complexity
4. Get IT Resilience from analytics and automation
5. Understand your support structure
5 Ways to Combat the IT Monsters (and Be a Hero)
Align Recovery to the Business
© 2017 Unitrends 13
• Is it backed up?
• Was it replicated?
• Is retention set?
• Will it recover?
Data focused
Answering the right questions
© 2017 Unitrends 14
• How much data will I lose?
• How long will I be down?
• Is my data going to the right places?
• Can I go back in time just enough?
• How do I make backup a better ROI?
• How do I control infrastructure costs?
• How do I keep applications performing?
• How do I control access?
Business focused
Answering the right questions
© 2017 Unitrends 15
 Focus on individual backup tasks, not business requirements
 Leave IT blind about recovery compliance
 No confidence in achieving or communicating SLAs
 Act only as a cost (insurance policy) rather than a value driver:
 Increase productivity
 Reduced infrastructure costs
 Proactive analytics
Challenge: Most solutions are not business focused
Focus Your Strategy
© 2017 Unitrends 17
Protect your ideas/business
Align continuity with criticality
Protect Everything You Have
Which workloads matter the most?
© 2017 Unitrends 18
Cold
High Downtime
Low Cost
What meets your budget and business
requirements?
Hot
No Downtime
High Cost
Warm
Little Downtime
Medium Cost
Kill Complexity
© 2017 Unitrends 20
Complexity
More
Vendors
More
Management
Less
Security
Less
Flexibility
© 2017 Unitrends 21
 Vendor Complexity
 Management Complexity
 Backup Server / Media Server
 Backup Proxies
 Backup Repositories
 Dedicated WAN Accelerators
 Dedicated Management Servers
 Dedicated Monitoring & Reporting Servers
Backup Architecture Complexity
© 2017 Unitrends 22
The New World Approach
Hardened, Linux Backup
Appliances
vs.
Windows Backup Software
Get IT Resilience from Analytics and
Automation
© 2017 Unitrends 24
Protect Secure Test Detect Recover
5 Ways The Right Backup Solution Fights
Ransomware
© 2017 Unitrends 25
Protect Secure Test Detect Recover
5 Ways The Right Backup Solution Fights
Ransomware
© 2017 Unitrends 26
Recovery Analytics and Automation
Old World
• Praying that backups recovered successfully
• Scrambling during DR exercises
• Rarely, if ever, testing DR
• Spending hours creating manual DR reports
New World
• Fully automated, application-level testing and failover
• Proactively uncover recovery issues for physical & virtual
• Business-level DR compliance report automation
• Needed for local, DR site, and Cloud
© 2017 Unitrends 27
Data
integrity
checks
Mount a
database
Screenshot
verification
N-Tier
application
analytics
Examples
© 2017 Unitrends 28
Boot order
sequencing for N-tier
applications
What automation technology is
required?
© 2017 Unitrends 29
Application-specific
integrity verification
What automation technology is
required?
*Not a complete list!
© 2017 Unitrends 30
Network automation to isolate from production
 Virtual network assignment
 Network remodeling
 Re-IP
What automation technology is
required?
© 2017 Unitrends 31
Compliance reporting
for business
stakeholders
What automation technology is
required?
© 2017 Unitrends 32
Protect Secure Test Detect Recover
Analytics Built for Threat Detection
© 2017 Unitrends 33
• Uses adaptive &
predictive analytics
against backup data
 Designed to search for
ransomware threat
conditions
 Proactive alerts are
sent when ransomware
conditions are detected
Proactive Ransomware Detection
Understand Your Support Structure
© 2016 Unitrends 35
Unitrends Topic
Presentation Name | Date 2016
You’re not alone!
© 2016 Unitrends 36
Unitrends Topic
Presentation Name | Date 2016
 Bias: Fewer is simpler. Simpler is better.
 Are they proactive or reactive?
 Are they responsive in social media?
Understand Vendor Dependencies
How Can Unitrends Help?
© 2017 Unitrends 38
Unitrends Topic
Presentation Name | Date 2016All-in-One
Enterprise
Backup and
Continuity
Old World
• More vendors; more finger pointing, more management
• More work setting up and constantly tuning
• Limited continuity; little or no recovery assurance
• Windows deployment malware susceptible
• Fragmented & lower customer satisfaction; more worries
New World
• One vendor; one throat to choke
• Less work - rack, connect, and go
• Local & cloud continuity with recovery assurance
• More security; purpose-built hardened Linux
• Unified & higher customer satisfaction; more confidence
© 2017 Unitrends 39
Unitrends Topic
Presentation Name | Date 2016
Have Less:
The
Ruthless
Pursuit of
Simplicity
Old World New World
© 2017 Unitrends 40
Unitrends Topic
Presentation Name | Date 2016
Unitrends
Cloud
Old World
• Third-party cloud vendors
• Limited or no DRaaS
• No recovery assurance
• Limited retention; more worries
• No SLAs, more worries
• Network bottlenecks
New World
• No finger-pointing; less management: single vendor
• Physical & virtual DRaaS
• Industry only physical & virtual recovery assurance
• Infinite retention available; more confidence
• 1 hour recovery SLA available; more confidence
• WAN optimized & Rapid Data Seeding
WAN
OpenVPN
w/Throttling
OR
© 2017 Unitrends 41
Unitrends Topic
Presentation Name | Date 2016
Customer
Obsessed
Support
Old World
• Support only for Windows binary software
• 7x24x52 support optional
• Holistic CSAT low; claimed CSAT high
• Off-shored and outsourced
• Reactive to issues; slow to resolve
New World
• Holistic support for all-in-one backup & continuity
• 7x24x52 support only
• Holistic CSAT > 98%
• 100% US-based; co-located with R&D
• Proactive resolution through predictive analytics
© 2017 Unitrends 42
Unitrends Topic
Presentation Name | Date 2016
Define Analyze Report
June)
Align IT with the Business with End-to-End SLA
Management
© 2017 Unitrends 43
Unitrends Topic
Presentation Name | Date 2016
Defin
e
Your
SLAs
© 2017 Unitrends 44
Unitrends Topic
Presentation Name | Date 2016
Analytics
and
Complianc
e
© 2016 Unitrends 45
Unitrends Topic
Presentation Name | Date 2016
1. Align recovery with the business
2. Focus your strategy
3. Kill complexity
4. Get IT Resilience from analytics and automation
5. Understand your support structure
Summary:
5 Ways to Combat the IT Monsters (and Be a Hero)
© 2016 Unitrends 46
Call to Action– Visit www.Unitrends.com
Try Unitrends - equipped with Ransomware Detection
Download at https://www.unitrends.com/products/enterprise-backup-software
Limited Availability! Get a free T-Shirt designed by Stephen Bliss
Request a Demo of v10 (ANNOUNCED TODAY!)
Register at http://pages.unitrends.com/version-10
Talk With One of Our Continuity Experts
Get immediate assistance: http://www.unitrends.com/company/contact

More Related Content

PPTX
Why Set It and Forget It Backup Sucks
PPTX
Data Is Evolving. Shouldn’t Your Backup Architecture?
PPTX
DR, IT Resilience, & Continuity: What's the Difference?
PPTX
7 Ways Backup Makes IT More Productive
PDF
MT155 Analytics and Cloud Native Apps – Your Business Game Changer
PDF
Extensibility: The Key To Managing Your Entire Cloud Portfolio
PPTX
Haunted by Your Backup Renewal: 4 Questions to Ask First
PPTX
Lack of Automation Ruins Lives
Why Set It and Forget It Backup Sucks
Data Is Evolving. Shouldn’t Your Backup Architecture?
DR, IT Resilience, & Continuity: What's the Difference?
7 Ways Backup Makes IT More Productive
MT155 Analytics and Cloud Native Apps – Your Business Game Changer
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Haunted by Your Backup Renewal: 4 Questions to Ask First
Lack of Automation Ruins Lives

What's hot (20)

PDF
MT50 Data is the new currency: Protect it!
PDF
Channel Partners: Lead with Dell Software Solutions
PDF
MT54 Better security is better business
PDF
MT 117 Key Innovations in Cybersecurity
PDF
Metrics, Risk Management & DLP
PDF
Information Map around the world in 80 clicks
PPTX
Compliance in the Cloud
PDF
Cloud Security - What you Should Be Concerned About
PDF
Cloud Services & the Development of ISO/IEC 27018
PDF
VDI Endpoints: Assets & Liabilities
PPTX
All Workloads Matter! Can You Protect Everything?
PDF
What’s The Big Deal About Hadoop?
PDF
State of the Cloud and Data Centers 2014
PDF
Are you ready for Big Data 2.0? EMA Analyst Research
PPTX
Dell Cloud Solutions
PPTX
What’s the “Secret Sauce” for Protecting SSD Storage?
PDF
SLBdiensten XP sessie: Windows XP End of Support
PPTX
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
PDF
How Cloud Providers are Playing with Traditional Data Center
PDF
MT82 IoT Security Starts at Edge
MT50 Data is the new currency: Protect it!
Channel Partners: Lead with Dell Software Solutions
MT54 Better security is better business
MT 117 Key Innovations in Cybersecurity
Metrics, Risk Management & DLP
Information Map around the world in 80 clicks
Compliance in the Cloud
Cloud Security - What you Should Be Concerned About
Cloud Services & the Development of ISO/IEC 27018
VDI Endpoints: Assets & Liabilities
All Workloads Matter! Can You Protect Everything?
What’s The Big Deal About Hadoop?
State of the Cloud and Data Centers 2014
Are you ready for Big Data 2.0? EMA Analyst Research
Dell Cloud Solutions
What’s the “Secret Sauce” for Protecting SSD Storage?
SLBdiensten XP sessie: Windows XP End of Support
Webinar: 5 Reasons Primary Cloud Storage is Broken and How to Fix them
How Cloud Providers are Playing with Traditional Data Center
MT82 IoT Security Starts at Edge
Ad

Similar to Combating the IT Monsters That Keep You Up at Night (20)

PPTX
3 Ways to Take the Disaster Out of Cloud DR
PPTX
How to Choose the Right Cloud for Continuity
PPTX
Designing a Bad A$$ Backup Target without Breaking the Bank
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
PPTX
Tech Demo: Take the Ransom Out of Ransomware
PPTX
Death, Taxes and Backup Vendor Finger Pointing
PPTX
Is Your Use of Windows Backup Opening the Door to Hackers?
PPTX
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
PDF
Data & Analytic Innovations: 5 lessons from our customers
PPTX
Will Your Recovery SLA Become a Broken Promise?
PPTX
Best Practices for Monitoring Cloud Networks
PPTX
The 7 New Rules of Recovery Webinar
PPTX
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
PDF
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
PDF
Oil & Gas ICT Leader 2017 - Day 2 April 20th
PDF
Implement DevOps Like a Unicorn—Even If You’re Not One
PDF
Windows365 Hybrid Windows for a Hybrid World
PPTX
Getting Demo & POV Ready
PDF
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
PPTX
Your Greatest Threats Come from Within
3 Ways to Take the Disaster Out of Cloud DR
How to Choose the Right Cloud for Continuity
Designing a Bad A$$ Backup Target without Breaking the Bank
Ransomware: Why Are Backup Vendors Trying To Scare You?
Tech Demo: Take the Ransom Out of Ransomware
Death, Taxes and Backup Vendor Finger Pointing
Is Your Use of Windows Backup Opening the Door to Hackers?
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Data & Analytic Innovations: 5 lessons from our customers
Will Your Recovery SLA Become a Broken Promise?
Best Practices for Monitoring Cloud Networks
The 7 New Rules of Recovery Webinar
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
Oil & Gas ICT Leader 2017 - Day 2 April 20th
Implement DevOps Like a Unicorn—Even If You’re Not One
Windows365 Hybrid Windows for a Hybrid World
Getting Demo & POV Ready
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...
Your Greatest Threats Come from Within
Ad

More from marketingunitrends (10)

PPTX
Ransomware Detection: Don’t Pay Up. Backup.
PPTX
8 Things You Need to Know About DRaaS
PPTX
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
PPTX
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
PPTX
5 Must Haves in an Integrated Backup Appliance
PPTX
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
PPTX
How to Take the Ransom Out of Ransomware
PPTX
Flash, Cloud, and Appliances: The Holy Backup Trinity
PPTX
Docker taylor swift and protection v06
PPTX
Boomerang webcast final
Ransomware Detection: Don’t Pay Up. Backup.
8 Things You Need to Know About DRaaS
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
5 Must Haves in an Integrated Backup Appliance
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
How to Take the Ransom Out of Ransomware
Flash, Cloud, and Appliances: The Holy Backup Trinity
Docker taylor swift and protection v06
Boomerang webcast final

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Architecture types and enterprise applications.pdf
PDF
project resource management chapter-09.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Modernising the Digital Integration Hub
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Module 1.ppt Iot fundamentals and Architecture
Programs and apps: productivity, graphics, security and other tools
1 - Historical Antecedents, Social Consideration.pdf
Developing a website for English-speaking practice to English as a foreign la...
Tartificialntelligence_presentation.pptx
TLE Review Electricity (Electricity).pptx
WOOl fibre morphology and structure.pdf for textiles
Architecture types and enterprise applications.pdf
project resource management chapter-09.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
O2C Customer Invoices to Receipt V15A.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
NewMind AI Weekly Chronicles - August'25-Week II
Modernising the Digital Integration Hub
A novel scalable deep ensemble learning framework for big data classification...
Final SEM Unit 1 for mit wpu at pune .pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

Combating the IT Monsters That Keep You Up at Night

  • 1. © 2017 Unitrends 1#1 All-in-One Enterprise Backup and Continuity Combating the IT Monsters That Keep You Up at Night Joe Noonan, VP Product Marketing
  • 2. © 2017 Unitrends 2 What do the IT monsters look like?
  • 3. © 2017 Unitrends 3 0 50 100 150 200 250 300 350 400 450 500 What Backup and Recovery Challenges Are You Facing? They seem to lurk everywhere… Source: Unitrends 2016 Survey (N=898)
  • 4. © 2017 Unitrends 4 10xGrowth in Servers 50xGrowth in Data 75xGrowth in Files 1.5x Growth in IT Admins Source: The IDC Digital Universe Study. Data is increasing but IT professionals are not. OVER THE NEXT 10 YRS
  • 5. © 2017 Unitrends 5  Office 365 data lives in a Microsoft Azure Cloud, not on your own server  Deleted email is gone after 14-30 days—totally unrecoverable  Deleted SharePoint & OneDrive files are gone after 186 days  Most lost data is due to user error  Users can choose to permanently delete files & email The monsters live in the cloud too! 32% of companies have lost data in the cloud1 1January 2013 SaaS report by the Aberdeen Group Sources of Data Loss User Error Hackers Closing an Account Malicious Deletion Third-Party Software
  • 6. © 2017 Unitrends 6 Even your friends can be IT monsters sometimes!
  • 7. © 2017 Unitrends 7 New threats are prevailing! http://www.unitrends.com/docs/papers/beginner-s-guide-to-ransomware
  • 8. © 2017 Unitrends 8 50% of business attacks paid more than $10,000 20% paid more than $40,000
  • 9. © 2017 Unitrends 9 Downtime can be more costly! $700B lost in 2016
  • 10. © 2017 Unitrends 10 How can I be safe from them?
  • 11. © 2017 Unitrends 11 1. Align recovery with the business 2. Focus your strategy 3. Kill complexity 4. Get IT Resilience from analytics and automation 5. Understand your support structure 5 Ways to Combat the IT Monsters (and Be a Hero)
  • 12. Align Recovery to the Business
  • 13. © 2017 Unitrends 13 • Is it backed up? • Was it replicated? • Is retention set? • Will it recover? Data focused Answering the right questions
  • 14. © 2017 Unitrends 14 • How much data will I lose? • How long will I be down? • Is my data going to the right places? • Can I go back in time just enough? • How do I make backup a better ROI? • How do I control infrastructure costs? • How do I keep applications performing? • How do I control access? Business focused Answering the right questions
  • 15. © 2017 Unitrends 15  Focus on individual backup tasks, not business requirements  Leave IT blind about recovery compliance  No confidence in achieving or communicating SLAs  Act only as a cost (insurance policy) rather than a value driver:  Increase productivity  Reduced infrastructure costs  Proactive analytics Challenge: Most solutions are not business focused
  • 17. © 2017 Unitrends 17 Protect your ideas/business Align continuity with criticality Protect Everything You Have Which workloads matter the most?
  • 18. © 2017 Unitrends 18 Cold High Downtime Low Cost What meets your budget and business requirements? Hot No Downtime High Cost Warm Little Downtime Medium Cost
  • 20. © 2017 Unitrends 20 Complexity More Vendors More Management Less Security Less Flexibility
  • 21. © 2017 Unitrends 21  Vendor Complexity  Management Complexity  Backup Server / Media Server  Backup Proxies  Backup Repositories  Dedicated WAN Accelerators  Dedicated Management Servers  Dedicated Monitoring & Reporting Servers Backup Architecture Complexity
  • 22. © 2017 Unitrends 22 The New World Approach Hardened, Linux Backup Appliances vs. Windows Backup Software
  • 23. Get IT Resilience from Analytics and Automation
  • 24. © 2017 Unitrends 24 Protect Secure Test Detect Recover 5 Ways The Right Backup Solution Fights Ransomware
  • 25. © 2017 Unitrends 25 Protect Secure Test Detect Recover 5 Ways The Right Backup Solution Fights Ransomware
  • 26. © 2017 Unitrends 26 Recovery Analytics and Automation Old World • Praying that backups recovered successfully • Scrambling during DR exercises • Rarely, if ever, testing DR • Spending hours creating manual DR reports New World • Fully automated, application-level testing and failover • Proactively uncover recovery issues for physical & virtual • Business-level DR compliance report automation • Needed for local, DR site, and Cloud
  • 27. © 2017 Unitrends 27 Data integrity checks Mount a database Screenshot verification N-Tier application analytics Examples
  • 28. © 2017 Unitrends 28 Boot order sequencing for N-tier applications What automation technology is required?
  • 29. © 2017 Unitrends 29 Application-specific integrity verification What automation technology is required? *Not a complete list!
  • 30. © 2017 Unitrends 30 Network automation to isolate from production  Virtual network assignment  Network remodeling  Re-IP What automation technology is required?
  • 31. © 2017 Unitrends 31 Compliance reporting for business stakeholders What automation technology is required?
  • 32. © 2017 Unitrends 32 Protect Secure Test Detect Recover Analytics Built for Threat Detection
  • 33. © 2017 Unitrends 33 • Uses adaptive & predictive analytics against backup data  Designed to search for ransomware threat conditions  Proactive alerts are sent when ransomware conditions are detected Proactive Ransomware Detection
  • 35. © 2016 Unitrends 35 Unitrends Topic Presentation Name | Date 2016 You’re not alone!
  • 36. © 2016 Unitrends 36 Unitrends Topic Presentation Name | Date 2016  Bias: Fewer is simpler. Simpler is better.  Are they proactive or reactive?  Are they responsive in social media? Understand Vendor Dependencies
  • 38. © 2017 Unitrends 38 Unitrends Topic Presentation Name | Date 2016All-in-One Enterprise Backup and Continuity Old World • More vendors; more finger pointing, more management • More work setting up and constantly tuning • Limited continuity; little or no recovery assurance • Windows deployment malware susceptible • Fragmented & lower customer satisfaction; more worries New World • One vendor; one throat to choke • Less work - rack, connect, and go • Local & cloud continuity with recovery assurance • More security; purpose-built hardened Linux • Unified & higher customer satisfaction; more confidence
  • 39. © 2017 Unitrends 39 Unitrends Topic Presentation Name | Date 2016 Have Less: The Ruthless Pursuit of Simplicity Old World New World
  • 40. © 2017 Unitrends 40 Unitrends Topic Presentation Name | Date 2016 Unitrends Cloud Old World • Third-party cloud vendors • Limited or no DRaaS • No recovery assurance • Limited retention; more worries • No SLAs, more worries • Network bottlenecks New World • No finger-pointing; less management: single vendor • Physical & virtual DRaaS • Industry only physical & virtual recovery assurance • Infinite retention available; more confidence • 1 hour recovery SLA available; more confidence • WAN optimized & Rapid Data Seeding WAN OpenVPN w/Throttling OR
  • 41. © 2017 Unitrends 41 Unitrends Topic Presentation Name | Date 2016 Customer Obsessed Support Old World • Support only for Windows binary software • 7x24x52 support optional • Holistic CSAT low; claimed CSAT high • Off-shored and outsourced • Reactive to issues; slow to resolve New World • Holistic support for all-in-one backup & continuity • 7x24x52 support only • Holistic CSAT > 98% • 100% US-based; co-located with R&D • Proactive resolution through predictive analytics
  • 42. © 2017 Unitrends 42 Unitrends Topic Presentation Name | Date 2016 Define Analyze Report June) Align IT with the Business with End-to-End SLA Management
  • 43. © 2017 Unitrends 43 Unitrends Topic Presentation Name | Date 2016 Defin e Your SLAs
  • 44. © 2017 Unitrends 44 Unitrends Topic Presentation Name | Date 2016 Analytics and Complianc e
  • 45. © 2016 Unitrends 45 Unitrends Topic Presentation Name | Date 2016 1. Align recovery with the business 2. Focus your strategy 3. Kill complexity 4. Get IT Resilience from analytics and automation 5. Understand your support structure Summary: 5 Ways to Combat the IT Monsters (and Be a Hero)
  • 46. © 2016 Unitrends 46 Call to Action– Visit www.Unitrends.com Try Unitrends - equipped with Ransomware Detection Download at https://www.unitrends.com/products/enterprise-backup-software Limited Availability! Get a free T-Shirt designed by Stephen Bliss Request a Demo of v10 (ANNOUNCED TODAY!) Register at http://pages.unitrends.com/version-10 Talk With One of Our Continuity Experts Get immediate assistance: http://www.unitrends.com/company/contact

Editor's Notes

  • #2: Thanks I appreciate you joining today Hope not to take too much of your time And if we’re lucky, I’ll have helped you learned some interesting things for organization’s backup and continuity needs
  • #3: The key question for this webinar topic – how does your choice of backup solution affect your ransomware situation
  • #4: My own bias, but the scariest monster (not the biggest) Has to be when you’re in a panic and recovery doesn’t work! These impact your time professionally, personally
  • #5: Although admittedly, it’s no picnic and getting tougher
  • #6: Let’s revisit the ways data can be lost in Office 365. - Most data is lost due to user error, but malicious deletion, hackers, closing an account without capturing data, and unexpected inference from 3rd party software also causes data loss. As you can see here, a report from the Aberdeen group shows that 32% of companies have lost data in the cloud, and this number as likely only grown since this study concluded since cloud adoption is increasing. - Office 365 permanently deletes data from the Recycle Bin once the retention period is over – 14 to 30 days for exchange, and 186 days for OneDrive and SharePoint.
  • #7: Love them, love their APIs They can be monsters sometimes Hurts us all – we have to break the news, you have bad backups
  • #8: Ransomware is here to stay: $1B Government: 4000 attacks released daily Expected to continue and evolve We even have RaaS Talk about board level conversation and how it is causing CIOs and CSOs to think a lot more about backup Plug the eBook
  • #9: They don’t just ask for tiny amounts of money; it can be impactful
  • #10: The biggest monster of all Not just about ransomware Can put us out of business, or at least out of a job
  • #11: Key messages:
  • #14: Mention ransomware regarding will it recover
  • #19: You have a few different ways of implementing it Ultimately, they trade off cost and downtime
  • #21: Complexity can lead to…
  • #23: Ransomware targets Windows predominantly Many folks that were hit by ransomware had their backups impacted as well This is because many incumbent backup solutions are also Windows based The new approach is a hardened, locked down, purpose-built backup appliance (often one that is a hybrid cloud appliance)
  • #25: Not all doom and gloom Backup solutions can play a bigger part in your anti-ransomware strategy than you might have thought We’ll cover these in detail later
  • #26: Obviously, testing helps But it’s painful and arduous Automation around this is becoming more prevalent There are some nuances to it
  • #28: You’re not resilient unless the complete application works for the end users.
  • #29: Using functionality from Unitrends to display some of this
  • #34: Backup vendors have access to a lot of information that can be put to use
  • #36: Key messages:
  • #39: And that’s where our idea of all-in-one enterprise backup and continuity comes into play. I like to talk about these from an old world / new world perspective because some of the traditional ways of handling things can have a few extra challenges. So we want to highlight how we’re different. For example, most solutions today require you to pull together multiple vendors, which adds finger pointing, more setup and a lot of manual tuning to get things just right. Sometimes that can mean you’re using more products to get the capabilities that you really need. Additionally, with Windows being the OS used for most backup vendors today, the threat of Ransomware impacting all your backups becomes much higher. Backup should be your insurance policy. You don’t want to have to fight the same fires with your backups that you do in production. And ultimately, the old world concept makes it very difficult to support with high customer satisfaction, which hurts confidence. Contrast that with where we think we play in the New World and the all-in-one approach. One vendor Really quick setup and no manual tuning needed because everything is preintegrated. Really broad capabilities cover you locally, at second sites and in the cloud, with some really advanced automation for recovery that we call recovery assurance. We’ll talk about that more in a bit. And our solutions are hardened, locked-down, Linux appliances that aren’t as susceptible to attacks as the Windows vendors And finally….we’ve had a 98% customer satisfaction rating for years. It’s just one support call. [note: you want to read this slide a bit…normally not good practice, but it is key to set the stage about old vs. new world in order to differentiate]
  • #40: When you look at backup and DR on the left side, you might have different vendors and products all the way through the stack. And the stack is more complex now with so many people leveraging cloud-based solutions for offsite backup and failover. We bring it all together in a single vendor and interface. The hardware and software comes fully loaded in our Recovery Series appliances and it can optionally integrate with the Unitrends Cloud for offsite storage, long-term compliance and even full failover. That Recovery Assurance piece at the top is pretty unique too. It means we’ll actually do automated testing of your DR plan every month and send you a report of how we did. You don’t have to lift a finger. Which is a big part of how we prove we can legitimately provide a 1-hour SLA in our cloud. That pretty much how we deliver the benefits on the left side there.
  • #41: We support a number of cloud options, including AWS, Azure and even Google. However, we also have our own purpose-built cloud for long-term retention and full DRaaS Not saying that AWS and Azure are bad, but there can be big limitations with respect to getting any type of SLA for recovery. Getting bulk data in and out can also be a challenge. They have services for this, but you have to hope your vendor supports these properly. So you’re back to the whole finger-pointing situation again. And of course, they aren’t going to act as a partner when it comes to setting up and fulfilling a DR strategy. In the Unitrends Cloud, you’re back to a single vendor, single interface, since support call. We cover both physical Windows and virtual machines running in VMware and Hyper-V We have full recovery assurance, meaning we’ll actually automate testing and prove it all works. And we back that with a real SLA – not a promise. We give you something in writing. Of course, we also have a great service for bulk seeding data in and coming back out from the cloud.
  • #42: Plus our support is 24x7 as a standard offering. We don’t have a lower level of support. And it’s all 100% US based and co-located with our R&D team to give us the best chance of fixing issues fast. That’s very different than what you see in the old world where a lot of vendors still live.
  • #47: Here’s how you learn more with us You can also access the blog