SlideShare a Scribd company logo
Data Protection from
RANSOMWARE
with StoneFly DR365™
© 2023 StoneFly, Inc. | All rights reserved.
Overview
StoneFly DR365™ is a feature-rich backup and disaster recovery site
in a box. It is a hybrid solution that enables users to setup backup in
Microsoft Azure cloud using cloud connect services and it is optimized
to deliver Recovery Time Objectives (RTOs) and Recovery Point
Objectives (RPOs) of less than 15 minutes. DR365™ is equipped with
a number of data services that ensure high availability for enterprise
workloads. One of its noticeable features is the ability to protect
enterprises from cyber-threats like Ransomware.
Ransomware disrupts organizations and businesses by encrypting
systems or data. After a successful ransomware attack, the
unprepared victim has only two choices: either pay the ransom and
hope their data will be recovered OR they can choose not to pay the
ransom and attempt to recover their data from other means. Both
options lead to large financial repercussions; depending on the size
and nature of the organization/business/firm.
Ransomware developers prefer targets like Health industry, Finance
industry and the Legal industry. That’s because these industries
process data of greater value like Personally Identifiable Information
(PII), Transactional Records, Patient Data etc. However, the favorite
targets of ransomware developers are unprepared organizations/
businesses/firms, regardless of the industry.
By leveraging StoneFly DR365™ backup and disaster recovery (DR)
appliance, enterprises can prepare for ransomware. Our snapshot and
replication technology enables enterprise IT environments to easily
recover from a successful ransomware attack; turning the disaster of
ransomware into a mere inconvenience.
Ransomware
What is Ransomware?
Ransomware is a form of malicious software (malware)
that, after infecting your system denies access to data
and threatens to delete it if a ransom is not paid.
Ransomware promises - often not truthfully - to provide its
users with a decryption key that can restore the access to
the data after the ransom has been paid.
Ransomware, like WannaCry, provided detailed
instructions for the victim about how to pay the ransom.
The text encouraged the victim to pay the ransom and
attempted to assure them that they will regain access to
their data as long as they did as they were told.
The demanded ransomware varies on a per case basis, it
ranges from hundreds of dollars to thousands payable in
cryptocurrency.
How Ransomware
works?
There are a number of ways for ransomware to infect a
system. One of the most common delivery systems for
ransomware is phishing scams. These are emails with
links or attachments that only need a single click.
After the click, Worm-like ransomware enter the system
and replicates to all connected computers, servers, and
infrastructure. Such scams have built-in social
engineering tools that trick users into making that one
click that can lead to a successful ransomware infection.
Other aggressive forms of ransomware, like NotPetya,
exploit security holes to infect systems without needing to
trick users.
1
On May 12, 2017 the
WannaCry Ransomware
outbreak affected 400, 000
machines and 150 countries.
Two of the first prominent
victims were the UK’s National
Health Service (NHS) and
Telefonica, the largest telecom
company in Spain.
By late evening the same day, it
had taken root in companies
like FedEx and countries like
United States and China.
On April 2018, SamSam
ransomware successfully
attacked the city of Atlanta,
Georgia, USA. The attack took
down 424 essential
applications including 30
percent of those supporting
vital municipal functions like
the court system and police
department.
Reports suggest that the
Attorney’s Office lost 10 years
worth of documents while the
police department lost all of its
stored dash cam recordings.
400, 000 machines and
150 countries infected
Ransomware costs Atlanta
over $10M
© 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
With cloud technology, IT environments can keep their data off-site. However, storing or backing
up data off-site does not guarantee a complete ransomware-free experience. Ransomware
strains have evolved and cloud backup services aren’t completely immune to them. For
instance, ransomware strains like Virlock use desktop sync clients of popular cloud services to
access and encrypt files stored in the cloud.
Without a complete data protection solution that combines the 3-2-1 rule with purpose-built
ransomware protection, organizations and businesses are always at risk of data loss and
disruption/discontinuity.
Data protection
How can you protect
your data from
Ransomware?
The role of Cloud Technology
In order to ensure continuity, high availability and data
recoverability; Security experts encourage the
implementation of the 3-2-1 rule. An enteprise backing up
their data in accordance to this rule will have multiple
copies at multiple locations, therefore it’ll be almost
impossible for any malware, cyber-attack or ransomware
to completely disrupt them. Even when a site or server or
infrastructure succumbs to a cyber-attack, ransomware,
malware or a natural disaster; the organization can
recover using one of the copies of their data.
Although cyber-defense solutions are being implemented
as means to protect from ransomware; the continuously
evolving and adapting cyber-crime world makes it difficult
to solely rely on them. Which is why it is important to have
backup and disaster recovery solutions that enable IT
environments to recover with minimum downtime.
2
The 3-2-1 rule states that when
backing up important data, IT
infrastructures should have
three copies of their data,
stored in two different storage
types with one copy of the data
kept off-site.
What is the 3-2-1 rule?
A complete data protection
solution combines the 3-2-1
rule with purpose-built
ransomware protection and
delivers reduced Recovery
Time and Point Objectives
(RTPOs).
Complete Data Protection
Solution
© 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
DR365™
StoneFly DR365™ -
The complete Backup
and DR Solution
StoneFly DR365™ appliance is equipped with
enterprise-level data services that enable IT environments
to brush-off ransomware and setup backup and disaster
recovery with Recovery Time Objectives (RTOs) and
Recovery Point Objectives (RPOs) of less than 15 minutes.
Apart from delivering an enhanced backup and recovery
experience, DR365™ also provides purpose-built data
protection from ransomware/malware and other
cyber-attacks.
DR365™ provides services that enable IT environments to
easily setup the 3-2-1 rule for their enterprise backups.
DR365™ comes with cloud connect services that facilitate
cloud backups to Microsoft Azure or Amazon Web
Services (AWS) cloud or to StoneFly private cloud.
3
StoneFly’s parternship with
Microsoft enables our
customers to setup their
backups in Microsoft Azure
data centers around the globe.
For data redundancy and
reduced latency, our customers
can choose to keep their back-
ups closer or for disaster
recovery purposes, they can
choose to set it up at a
regionally different data center.
Backup to Azure Data
Centers around the globe
StoneFly DR365™ is
available in:
2U rackmount - maximum of
12 disk drives (SAS/SSD)
2U rackmount - maximum of
24 disk drives (SAS/SSD)
3U rackmount - maximum of
16 disk drives (SAS/SSD)
4U rackmount - maximum of
24 disk drives (SAS/SSD)
Existing
Infrastructure
StoneFly DR365™
Microsoft Azure
Cloud
Backup
Restore
Backup
Copy
Impelementation of the 3-2-1 rule with DR365™
StoneFly DR365™ -
Backup and DR Appliance
© 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
1st copy of data
2nd copy of data and
different storage
media
3rd copy of data and the
off-site copy
About StoneFly
StoneFly pioneered the creation, development, and deploy-
ment of the iSCSI storage protocol and products. Beginning
with its registration of the iSCSI.com Internet domain name
in March 1996, StoneFly shipped its first iSCSI storage appli-
ance in 2002 and subsequently made iSCSI into the estab-
lished storage standard which today is used by IT
professionals around the world.
DR365™
Enterprise-level Data Features of
DR365™
The All-in-One data center in the box is ideal for all kinds of organizations and businesses
(SMBs/SMEs/Large Enterprises). The feature-rich hybrid backup and disaster recovery solution
is equipped with a number of enterprise-level features, here are some of them:
4
Scalable Capacity & Performance
Flexible Licensing Options Virtualization Environments Enhanced Utilization rates Ransomware Protection
Advanced Data Security Reduced RTPOs Spin VMs directly on DR365™
Scale-out from a few TeraBytes to
2.5 PetaBytes of backup capacity.
The addition of nodes enhances
appliance performance by
aggregating overall workload
volumes on all the nodes in the
system.
licensing options, our clients can
choose to buy licenses from us or
they can bring their own license
to be integrated with DR365™.
Employ AES 256-bit encryption
technology to secure data before
and after transit. Data during
transit is secured by SSL/TLS
tunneling technology.
DR365™ supports VMware ESXi
Essential, Essential Plus and Enterprise
to as much as 512 nodes. DR365™ also
supports Vsphere, Vcenter and
Hyper-V with integrated support for
System Center.
The combination of SSDs and
enterprise-level software delivers
1-click instant recovery within
seconds.
DR365™ employs thin provisioning
for space reclamation of iSCSI
volumes. It also incorporates
deduplication to enhance
utilization rates and reduce the
overall cost of the backup solution.
IT environments can backup,
replicate, migrate and create VMs
on DR365™ to be spun up directly
whenever necessary.
DR365™ delivers advanced
ransomware detection and
prevents ransomware from
gaining access to the backed up
data.
VM
Microsoft Hyper-V
Get financing
To facilitate businesses with
budget restrictions, we also
offer a financing option.
Businesses can direct their
resources to the core
operations while leveraging the
IT infrastructure they need.
Explore - Lease Option
Learn more about StoneFly
© 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
www.stonefly.com
2865, 2869 and 2879 Grove Way,
Castro Valley, CA 94546 USA.
+1 (510) 265-1616

More Related Content

PDF
Ransomware Unveiled: Understanding, Preventing, and Recovering
PDF
How to Stop Ransomware Attacks from Deleting Backup Data?
PPTX
Webinar: DRaaS - It’s Not Just For Disasters Anymore
PPTX
How to Ransomware-Proof your AWS Cloud
PDF
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
PDF
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
PPTX
Make the Upgrade: Data protection in the cloud
PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
Ransomware Unveiled: Understanding, Preventing, and Recovering
How to Stop Ransomware Attacks from Deleting Backup Data?
Webinar: DRaaS - It’s Not Just For Disasters Anymore
How to Ransomware-Proof your AWS Cloud
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
Make the Upgrade: Data protection in the cloud
Triangulum - Ransomware Evolved - Why your backups arent good enough

Similar to Guarding Against Ransomware: Strategies for Robust Data Protection (20)

PDF
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
PDF
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
PDF
What Ransomware Taught us in 2021?
PDF
12 facts about backups
PDF
Whitepaper dave kostas v0 7pdf
PPTX
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
PPTX
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
PPTX
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
PDF
Protect Your Data and Apps from Zombies and Other Disasters
PPTX
Your Greatest Threats Come from Within
PPTX
Ransomware Detection: Don’t Pay Up. Backup.
DOCX
Disaster recovery in the Cloud - whitepaper
PPTX
CTERA Minimizing the threat of Ransomware with enterprise file services
PPTX
Minimizing the threat of Ransomware with enterprise file services
PPTX
Tech Demo: Take the Ransom Out of Ransomware
PDF
The 7 Rules of IT Disaster Recovery by Acronis
PPTX
Ransomware and Backups
PDF
Safeguard Your Business
PPTX
Immutable Backups Slides.pptx
PDF
Take the Ransom Out of Ransomware
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
What Ransomware Taught us in 2021?
12 facts about backups
Whitepaper dave kostas v0 7pdf
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
Protect Your Data and Apps from Zombies and Other Disasters
Your Greatest Threats Come from Within
Ransomware Detection: Don’t Pay Up. Backup.
Disaster recovery in the Cloud - whitepaper
CTERA Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
Tech Demo: Take the Ransom Out of Ransomware
The 7 Rules of IT Disaster Recovery by Acronis
Ransomware and Backups
Safeguard Your Business
Immutable Backups Slides.pptx
Take the Ransom Out of Ransomware
Ad

More from MaryJWilliams2 (20)

PDF
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
PDF
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
PDF
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
PDF
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
PDF
Securing Your Future: Cloud-Based Data Protection Solutions
PDF
Securing the Future: A Guide to Cloud-Based Data Protection
PDF
Exploring Veeam Backup & Replication for Seamless Business Continuity
PDF
Integrating OMS and Azure Security Center for Enhanced Cloud Security
PDF
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
PDF
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
PDF
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
PDF
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
PDF
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
PDF
Streamlining Backup: Enhancing Data Protection with Backup Appliances
PDF
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
PDF
Exploring Software-Defined Storage in Digital Transformation
PDF
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
PDF
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
PDF
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
PDF
SAN vs NAS vs DAS: Decoding Data Storage Solutions
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
Securing Your Future: Cloud-Based Data Protection Solutions
Securing the Future: A Guide to Cloud-Based Data Protection
Exploring Veeam Backup & Replication for Seamless Business Continuity
Integrating OMS and Azure Security Center for Enhanced Cloud Security
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azur...
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
Exploring Software-Defined Storage in Digital Transformation
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Ensuring Resilience: Robust Backup Strategies for the Oil and Gas Secto
SAN vs NAS vs DAS: Decoding Data Storage Solutions
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Cloud computing and distributed systems.
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Monthly Chronicles - July 2025
Cloud computing and distributed systems.
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf

Guarding Against Ransomware: Strategies for Robust Data Protection

  • 1. Data Protection from RANSOMWARE with StoneFly DR365™ © 2023 StoneFly, Inc. | All rights reserved.
  • 2. Overview StoneFly DR365™ is a feature-rich backup and disaster recovery site in a box. It is a hybrid solution that enables users to setup backup in Microsoft Azure cloud using cloud connect services and it is optimized to deliver Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) of less than 15 minutes. DR365™ is equipped with a number of data services that ensure high availability for enterprise workloads. One of its noticeable features is the ability to protect enterprises from cyber-threats like Ransomware. Ransomware disrupts organizations and businesses by encrypting systems or data. After a successful ransomware attack, the unprepared victim has only two choices: either pay the ransom and hope their data will be recovered OR they can choose not to pay the ransom and attempt to recover their data from other means. Both options lead to large financial repercussions; depending on the size and nature of the organization/business/firm. Ransomware developers prefer targets like Health industry, Finance industry and the Legal industry. That’s because these industries process data of greater value like Personally Identifiable Information (PII), Transactional Records, Patient Data etc. However, the favorite targets of ransomware developers are unprepared organizations/ businesses/firms, regardless of the industry. By leveraging StoneFly DR365™ backup and disaster recovery (DR) appliance, enterprises can prepare for ransomware. Our snapshot and replication technology enables enterprise IT environments to easily recover from a successful ransomware attack; turning the disaster of ransomware into a mere inconvenience.
  • 3. Ransomware What is Ransomware? Ransomware is a form of malicious software (malware) that, after infecting your system denies access to data and threatens to delete it if a ransom is not paid. Ransomware promises - often not truthfully - to provide its users with a decryption key that can restore the access to the data after the ransom has been paid. Ransomware, like WannaCry, provided detailed instructions for the victim about how to pay the ransom. The text encouraged the victim to pay the ransom and attempted to assure them that they will regain access to their data as long as they did as they were told. The demanded ransomware varies on a per case basis, it ranges from hundreds of dollars to thousands payable in cryptocurrency. How Ransomware works? There are a number of ways for ransomware to infect a system. One of the most common delivery systems for ransomware is phishing scams. These are emails with links or attachments that only need a single click. After the click, Worm-like ransomware enter the system and replicates to all connected computers, servers, and infrastructure. Such scams have built-in social engineering tools that trick users into making that one click that can lead to a successful ransomware infection. Other aggressive forms of ransomware, like NotPetya, exploit security holes to infect systems without needing to trick users. 1 On May 12, 2017 the WannaCry Ransomware outbreak affected 400, 000 machines and 150 countries. Two of the first prominent victims were the UK’s National Health Service (NHS) and Telefonica, the largest telecom company in Spain. By late evening the same day, it had taken root in companies like FedEx and countries like United States and China. On April 2018, SamSam ransomware successfully attacked the city of Atlanta, Georgia, USA. The attack took down 424 essential applications including 30 percent of those supporting vital municipal functions like the court system and police department. Reports suggest that the Attorney’s Office lost 10 years worth of documents while the police department lost all of its stored dash cam recordings. 400, 000 machines and 150 countries infected Ransomware costs Atlanta over $10M © 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
  • 4. With cloud technology, IT environments can keep their data off-site. However, storing or backing up data off-site does not guarantee a complete ransomware-free experience. Ransomware strains have evolved and cloud backup services aren’t completely immune to them. For instance, ransomware strains like Virlock use desktop sync clients of popular cloud services to access and encrypt files stored in the cloud. Without a complete data protection solution that combines the 3-2-1 rule with purpose-built ransomware protection, organizations and businesses are always at risk of data loss and disruption/discontinuity. Data protection How can you protect your data from Ransomware? The role of Cloud Technology In order to ensure continuity, high availability and data recoverability; Security experts encourage the implementation of the 3-2-1 rule. An enteprise backing up their data in accordance to this rule will have multiple copies at multiple locations, therefore it’ll be almost impossible for any malware, cyber-attack or ransomware to completely disrupt them. Even when a site or server or infrastructure succumbs to a cyber-attack, ransomware, malware or a natural disaster; the organization can recover using one of the copies of their data. Although cyber-defense solutions are being implemented as means to protect from ransomware; the continuously evolving and adapting cyber-crime world makes it difficult to solely rely on them. Which is why it is important to have backup and disaster recovery solutions that enable IT environments to recover with minimum downtime. 2 The 3-2-1 rule states that when backing up important data, IT infrastructures should have three copies of their data, stored in two different storage types with one copy of the data kept off-site. What is the 3-2-1 rule? A complete data protection solution combines the 3-2-1 rule with purpose-built ransomware protection and delivers reduced Recovery Time and Point Objectives (RTPOs). Complete Data Protection Solution © 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
  • 5. DR365™ StoneFly DR365™ - The complete Backup and DR Solution StoneFly DR365™ appliance is equipped with enterprise-level data services that enable IT environments to brush-off ransomware and setup backup and disaster recovery with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) of less than 15 minutes. Apart from delivering an enhanced backup and recovery experience, DR365™ also provides purpose-built data protection from ransomware/malware and other cyber-attacks. DR365™ provides services that enable IT environments to easily setup the 3-2-1 rule for their enterprise backups. DR365™ comes with cloud connect services that facilitate cloud backups to Microsoft Azure or Amazon Web Services (AWS) cloud or to StoneFly private cloud. 3 StoneFly’s parternship with Microsoft enables our customers to setup their backups in Microsoft Azure data centers around the globe. For data redundancy and reduced latency, our customers can choose to keep their back- ups closer or for disaster recovery purposes, they can choose to set it up at a regionally different data center. Backup to Azure Data Centers around the globe StoneFly DR365™ is available in: 2U rackmount - maximum of 12 disk drives (SAS/SSD) 2U rackmount - maximum of 24 disk drives (SAS/SSD) 3U rackmount - maximum of 16 disk drives (SAS/SSD) 4U rackmount - maximum of 24 disk drives (SAS/SSD) Existing Infrastructure StoneFly DR365™ Microsoft Azure Cloud Backup Restore Backup Copy Impelementation of the 3-2-1 rule with DR365™ StoneFly DR365™ - Backup and DR Appliance © 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners. 1st copy of data 2nd copy of data and different storage media 3rd copy of data and the off-site copy
  • 6. About StoneFly StoneFly pioneered the creation, development, and deploy- ment of the iSCSI storage protocol and products. Beginning with its registration of the iSCSI.com Internet domain name in March 1996, StoneFly shipped its first iSCSI storage appli- ance in 2002 and subsequently made iSCSI into the estab- lished storage standard which today is used by IT professionals around the world. DR365™ Enterprise-level Data Features of DR365™ The All-in-One data center in the box is ideal for all kinds of organizations and businesses (SMBs/SMEs/Large Enterprises). The feature-rich hybrid backup and disaster recovery solution is equipped with a number of enterprise-level features, here are some of them: 4 Scalable Capacity & Performance Flexible Licensing Options Virtualization Environments Enhanced Utilization rates Ransomware Protection Advanced Data Security Reduced RTPOs Spin VMs directly on DR365™ Scale-out from a few TeraBytes to 2.5 PetaBytes of backup capacity. The addition of nodes enhances appliance performance by aggregating overall workload volumes on all the nodes in the system. licensing options, our clients can choose to buy licenses from us or they can bring their own license to be integrated with DR365™. Employ AES 256-bit encryption technology to secure data before and after transit. Data during transit is secured by SSL/TLS tunneling technology. DR365™ supports VMware ESXi Essential, Essential Plus and Enterprise to as much as 512 nodes. DR365™ also supports Vsphere, Vcenter and Hyper-V with integrated support for System Center. The combination of SSDs and enterprise-level software delivers 1-click instant recovery within seconds. DR365™ employs thin provisioning for space reclamation of iSCSI volumes. It also incorporates deduplication to enhance utilization rates and reduce the overall cost of the backup solution. IT environments can backup, replicate, migrate and create VMs on DR365™ to be spun up directly whenever necessary. DR365™ delivers advanced ransomware detection and prevents ransomware from gaining access to the backed up data. VM Microsoft Hyper-V Get financing To facilitate businesses with budget restrictions, we also offer a financing option. Businesses can direct their resources to the core operations while leveraging the IT infrastructure they need. Explore - Lease Option Learn more about StoneFly © 2023 StoneFly Inc. | All rights reserved. All trademarks used are the property of their respective owners.
  • 7. www.stonefly.com 2865, 2869 and 2879 Grove Way, Castro Valley, CA 94546 USA. +1 (510) 265-1616