microsoft and acronis webinar: keep it in the …...total his users and near-term intenders (n=498)...
Post on 20-May-2020
1 Views
Preview:
TRANSCRIPT
PROPRIETARY AND CONFIDENTIAL 1ACRONIS © 2017
MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE CLOUD, A SECURITY STORYJonathan Richard McCarrick, Partner Technology Evangelist
Acronis
PROPRIETARY AND CONFIDENTIAL 2ACRONIS © 2017
Agenda
• Acronis Company Overview
• Security Threats
• Product description
• Key Security features
• Acronis Active Protection
• Acronis Notary
AcronisBrief Company Overview
PROPRIETARY AND CONFIDENTIAL 4ACRONIS © 2017
Acronis: 14 Years Protecting Digital Lives & Businesses Worldwide
500,000+business customers
50,000,000+OEM licenses
5,000,000+consumer customers
5,000+petabytes of data under
Acronis protection
50,000+partners
EUROPE 40% AMERICAS 40% APJ/MEA 20%
+200,000 SMBs +200,000 SMBs +100,000 SMBs
Global Headquarters in Singapore
PROPRIETARY AND CONFIDENTIAL 5ACRONIS © 2017
Acronis: Deep Expertise in Backup
FAMOUS FOR INNOVATIONS
Full Image Backup on running system
Universal Restore (recover to any hardware or hypervisor)
Active Restore (boot and run while recovery continues)
World-class support of Windows, Linux and other OS/Apps
CONTINUOUS INNOVATIONS
Differential & Reverse Incremental, vmFlashback
Compression & Optimized Deduplication
Extendable Backup Schemes, External Crypto and SSL
Acronis Active Protection™, Acronis Notary™
Acronis Instant Restore™ , Acronis ASign™
STRONG TECHNOLOGY DEVELOPMENT
Acronis Labs
500+ engineers, 20+ PhDs
200+ patents, 17 years of development
AWARD WINNING PRODUCTSAWARD WINNING PRODUCTS:
EASY, FAST and RELIABLE
7
PROPRIETARY AND CONFIDENTIAL 6ACRONIS © 2017
Acronis Hybrid Cloud Architecture
Acronis Protects Your Entire Business – On-premises, Remote, Private Cloud, Public Cloud, Mobile
Unified Centralized Data ProtectionWeb-based User Interface Deployed On-premises or in the Cloud
Any Recovery Data Recovery
File Recovery
Mailbox & E-mail Recovery
Database Recovery
System Recovery
Bare-Metal Recovery
Active Restore
Instant Restore™
vmFlashBack
Dissimilar Hardware
Recovery & Migration
P2V, V2V, V2P, P2P
P2C, V2C, C2C, C2V, C2P
Physical Data Shipment
Cloud Disaster Recovery
Replication
High Availability
Any StorageCLOUD
ON-PREMISES
FTP/SFTP
DISKS
TAPE
NAS
SAN
Any WorkloadCLOUD
ON-PREMISES
PHYSICAL
VIRTUAL
APPLICATIONS
MOBILE
Any Protection
Archiving
Backup
Cloud Storage
Disaster Recovery
e-Discovery
File Sync and Share
Monitoring
Notary
Any Deployment
UBER
CLOUD
PUBLIC
CLOUD
VENDOR
CLOUD
PARTNER
CLOUD
PRIVATE
CLOUD
Any ManagementManagement software deployed and controlled independently, enabling control of data protection
by customer, service provider, vendor, partner, or 3rd party from public/partner/private cloud or customer premises
Service Provider Market Opportunity
PROPRIETARY AND CONFIDENTIAL 8ACRONIS © 2017
IT Infrastructure Hosting is Growing
Question: Which of the following best describes your organization's use of third party-provided IT infrastructure hosting services?
The majority of companies are either using or plan
to use third-party hosted IT services
Source: IDC U.S. Enterprise Communications Survey, January 2016; n=1,204
Currently use28%
Plan to use within 1 year26%
Plan to use in 1-2 years16%
Plan to use in more than 2 years
6%
Do not use / Have no plan to use
24%
PROPRIETARY AND CONFIDENTIAL 9ACRONIS © 2017
Backup is a Leading Cloud Application
47%
39%
37%
34%
34%
29%
32%
26%
22%
51%
39%
37%
36%
32%
30%
28%
27%
20%
43%
38%
36%
33%
37%
28%
35%
24%
26%
Data storage/backup & recovery
High performance computing
Core business applications software hosting
Scale existing internal IT infrastructureenvironment
Cloud-first deployment for net-new businessinitiatives/workloads
Data analytics/business intelligence
Test/dev for new applications/services
Non-critical business applications hosting
Burst capacity for in-house IT workloads
Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239)
Backup and data storage is the predominant use case
for cloud IaaS among traditional hosting services users
Source: IDC U.S. Enterprise Communications Survey, January 2016; n=1,204
Question: How do you use / plan to use cloud infrastructure / IaaS services?
PROPRIETARY AND CONFIDENTIAL 10ACRONIS © 2017
HISTORY OF RANSOMWARE
PROPRIETARY AND CONFIDENTIAL 11ACRONIS © 2017
What is the history of Ransomware?
• The very first ransomware ever documented was the AIDS Trojan in December 1989 It was spread via diskette.
• In 2015, Ransomware as a Service (RaaS) arrived on the malware scene
• Instances of Tescrypt grew significantly between December 2015 and May 2016
• Tox was one of the first RaaS kits available It allows an individual to register for free and build crypto malware in three steps
PROPRIETARY AND CONFIDENTIAL 12ACRONIS © 2017
How does it work?
The growing list of infiltration methods includes getting users to:
• Open an email attachment that includes a malicious Word macro or self-executing Java applet
• Click on a counterfeit online ad or email link that brings the user to a compromised or counterfeit website that performs a drive-by download of malware
• Plug in an infected USB thumb drive
• Download legitimate software or pirated content that contains ransomware
PROPRIETARY AND CONFIDENTIAL 13ACRONIS © 2017
Ransomware as a Service
PROPRIETARY AND CONFIDENTIAL 14ACRONIS © 2017
SIZE AND COST
PROPRIETARY AND CONFIDENTIAL 15ACRONIS © 2017
How prevalent is the problem?
• There are dozens of exploit types and more each day
• 93% of phishing emails contain ransomware
PROPRIETARY AND CONFIDENTIAL 16ACRONIS © 2017
Growth of Encryption Ransomware Against All Other Malware Q2 2016
Source: PhishMe Q1_2016 Malware Review
Ransomware is rising as a % of Malware
PROPRIETARY AND CONFIDENTIAL 17ACRONIS © 2017
What is the cost of Ransomware?
• According to the FBI, cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses and institutions to unlock computer servers
• At that rate, ransomware is on pace to be a$ 1 billion a year crime in 2016
• The FBI told CNN that the number “is quite high” because a few people “reported large losses ”
PROPRIETARY AND CONFIDENTIAL 18ACRONIS © 2017
Backup is Critical Ransomware Defense
Ransomware infections are growing fast:Cybercriminals will collect $4B in ransoms in 2017
Getting smarter: Software defeats many traditional endpoint security measures
Backups are a criticalline of defense
Source: CIS- Ransomware: facts, threats, and countermeasures, August 2016
PROPRIETARY AND CONFIDENTIAL 19ACRONIS © 2017
HOW DOES BACKUP HELP
PROPRIETARY AND CONFIDENTIAL 20ACRONIS © 2017
An Example of how backup helps
Day 1 Time Action/Event Details
10:30am A ransomware attack successfully breaches
one PC and starts spreading throughout the
facility
The company IT team is yet unaware of the strike
10:42am First report reaches the IT team and the Help
Desk responds
IT disconnects the infected PC from the network
10:51am Users report seven more ransomware strikes The IT team realizes the scale of infection, shuts down
the company network, and starts a company-wide
check
12:07pm Company-wide check is complete IT identifies that 23 machines (a combination of PCs
and Macs) are a ected.
12:18pm IT restarts the network IT shuts down all a ected machines and keeps them
disconnected from the LAN
12:27pm IT contacts the service provider support team The customer requests the service provider to send a
Large Scale Recovery hard disk drive (HDD) that
contains the backed up data (stored in the service
provider cloud) for the 23 PCs/ Macs
3:45pm The service provider sends the HDD by
courier to the company
The service provider copies 23 backups to the external
HDD and sends it to the company via an overnight
courier
PROPRIETARY AND CONFIDENTIAL 21ACRONIS © 2017
An Example of how backup helps
Day 2 Time Action/Event Details
8:33am The HDD arrives at the company
8:51am IT copies the HDD to central storage The IT team copies the backups to higher-
performance central storage to facilitate the
parallel recovery
9:05am The first backup is copied to storage; the first
machine’s recovery can start
The IT team boots the a ected PC from a
bootable media backup copy while still
disconnected from the network
9:07am First boot is complete A backup agent is installed on the PC The IT
team connects the network and launches the
recovery process
9:53am First recovery is complete The machine is restored to its pre-infection state
and rebooted
10:02am The first machine is restored Copying of backups to central storage continues
12:37pm All backups are copied to central storage 15 machines (a combination of PCs and Macs)
are now recovered
Acronis Backup Cloud Cloud Data-Protection Services for your Customers
PROPRIETARY AND CONFIDENTIAL 23ACRONIS © 2017
Acronis Backup CloudA powerful hybrid cloud backup solution for service providers that protects
all of their customers’ systems and devices, anytime, anywhere, faster
than anyone else.
AzureWindows
ServerWindows
PCExchange
SQL Server
SharePoint
Active Directory
Hyper-V
Mac iPadiPhoneLinux Server
AndroidAmazon
EC2VMware vSphere
• Market leading Hypervisors
• Market leading Clouds
• Market leading Operating Systems
• Market leading Applications
• Office 365 Mailbox Protection
• Mobile workforce Protection
• Cloud or on-premises console
• Dissimilar hardware recovery
• Any-to-Any migration
• Hybrid cloud and local backup
Office 365
PROPRIETARY AND CONFIDENTIAL 24ACRONIS © 2017
Acronis Backup Cloud – What’s Cool
Solve Data Protection Challenges
• Back up your customers’ data to
multiple locations
• Use on-premises storage, Acronis
Cloud, or your own private cloud
• Replicate data between locations
to ensure data availability
Reduce Management Overhead
• Accelerate management with an
easy-to-use central console
• Consolidate operations and
administration into single, unified,
multi-tenant solution
• Available anywhere at any time
Expand Total Addressable Market
• Protect your customers’ entire IT
infrastructure on 16 platforms
• Support physical, virtual, cloud, PCs,
Mac® , iPhone ® /iPad ®, Android ®,
Microsoft Exchange ®, SQL Server ®,
SharePoint ®, and Office 365 ®
Build on Your Brand
• White-label or brand your backup
service to promote your company
name and build brand equity
• Develop your own pricing and
packaging to deliver services that
best fit the needs of your
customers.
Reduce Operational Expenses
• Integrate with your billing and
provisioning solutions
• Leverage what your organization
already has in place to automate
your business.
• Simplify backup operations with
plugins for popular RMM platforms.
Exceed Customer SLAs
• Deliver a lightning fast backup
service to your customers
• Back up and recover 2X faster than
the closest competitor’s software
• Recover servers in 15 seconds or
less with Acronis Instant Restore™
PROPRIETARY AND CONFIDENTIAL 25ACRONIS © 2017
Acronis Backup Cloud – What’s Cool Too
Nurture Customer Trust
• Employ strong encryption in-transit
and at-rest
• Store customer data in certified
Acronis Cloud Data Centers
• Utilize private encryption keys that
only your customer knows
Leverage Existing Investments
• Leverage Acronis data centers or
deploy the solution at your own
data center
• Mix-and-match to deliver a turnkey
or in-house solution
• From pure cloud to private cloud,
the choice is yours
Differentiate Your Backup Service
• Transform backups with over a
decade of innovations
• Protect your customers’ data better
than anyone else
• Disk-imaging technology, bare-metal
recovery, and many other technology
firsts are available to your customers
Open Equitable Sales Channels
• Scale with a unique, flexible go-to-
market strategy that supports both
channel partner and end-user
customer sales
• The Acronis Cloud easily supports
any multi-tier, multi-tenant selling
model
Spearhead New Markets
• Provide feature-rich support for on-
premises VMware®, Hyper-V®, and
Virtuozzo® installations
• Protect Microsoft Azure®, Amazon
EC2® and other hosted workloads
• Migrate workloads between
physical, virtual, and cloud platforms
Start Fast, Finish First
• Zero up-front costs and a pay-per-
use business model
• No architecting, no installation, no
requirements
• Accelerate your business… sign
up and drive away today.
PROPRIETARY AND CONFIDENTIAL 26ACRONIS © 2017
What’s New in Acronis Backup Cloud
New emphasis on integration
• New settings page highlights integrations
• Integration status in UI where applicable
Integration with ConnectWise Manage
• Billing automation/service ticketing
• Provisioning of service to new and existing
customers
Informative daily backup status reports
• Warnings and alerts for jobs that ran
• Notices for backups that missed schedule
Increased stability and performance
• Most stable Acronis Cloud Platform to date
• Performance improvements to user
interface and client-side backup operations
Spring `17 Release
PROPRIETARY AND CONFIDENTIAL 27ACRONIS © 2017
Only Acronis Backup Cloud:
Provides a multi-tenant solution that
reduces overhead by consolidating
customer views and administration
into one, easy-to-use, unified
management console, available
anywhere at any time
Offers a true multi-tier, multi-tenant
solution that enables cloud resellers to
provide varying levels of capabilities
to their customers using a single data
protection platform
Provides flexible storage options for
customer backups, including local, on-
premises, service-provider hosted,
Acronis-hosted, and third-party
hosted, including Microsoft Azure,
Amazon S3, and IBM Softlayer
Powerful
Multi-Tenancy
Multi-tier
Service Offering
Flexible Storage
Options
Unique Solution
Simplifies the sale of backup-as-a-
service (BaaS) by combining proven
Acronis Backup technology with a
scalable cloud architecture that
integrates with popular cloud
management tools
Allows service providers to offer a
unique blend of customer self-
service and white glove
management to fit the needs of their
customers
Leverages the power of the Acronis
AnyData Engine to protect any
device, in any location by backing up
to any storage and recovering to any
platform
Powerful Cloud
Automation
Control over
services
Acronis AnyData
Engine
PROPRIETARY AND CONFIDENTIAL 28ACRONIS © 2017
Safe and Efficient Management
Ensure privacy and data segregation with a true multi-tenant service
Store data securely in Tier-IV designed, SSAE-16 certified data centers provided by Acronis
Deploy to secure, private cloud destinations including optional Acronis storage, your own storage, or third-party cloud storage
Employ secure AES-256 data encryption, in transit and at-rest, and SSL-encrypted channels
Leverage included Acronis Storage software for dependable backup storage
PROPRIETARY AND CONFIDENTIAL 29ACRONIS © 2017
14 Acronis Cloud
Data Centers now
More coming, it takes only 4
weeks to launch a new one
Strong presence in Asia-Pacific:
Singapore, Japan, Korea, Australia
Acronis Cloud
Acronis Active Protection™
PROPRIETARY AND CONFIDENTIAL 31ACRONIS © 2017
• Actively protects local files and backups from
unauthorized modification or encryption
• Actively protects cloud backups from alteration
by safeguarding the Acronis agent from attacks
• Instantly recovers from ransomware attacks:
detecting ransomware based on a behavioral
heuristic, instantly backs up files targeted by
ransomware, blocks the attack and restore files.
Advanced: Acronis Active ProtectionActively protect your data from ransomware and other threats with instant backup and instant restore
The result? Data can never be compromised. If any
files were impacted prior to stopping an attack, they
will be automatically restored for a backup
PROPRIETARY AND CONFIDENTIAL 32ACRONIS © 2017
Advanced: Acronis Active ProtectionDelivering low RPO and RTO objectives – for fast and complete recovery.
Lose no data:
• With Instant Backup the most recent data is available for recovery.
• In case of a ransomware attack, no recent changes to the data are lost.
Lose no time:
• With Instant Recovery files are restored immediately.
• In case of a ransomware, no time is wasted trying to find, check, and recover the files.
PROPRIETARY AND CONFIDENTIAL 33ACRONIS © 2017
Advanced: How does Acronis Active Protection™ work?
Ransomware
infects
windows machine
Ransomware
starts
to encrypt files
Several files
are
encrypted
If untrusted, block
and terminate the threat
Get instant restore from
local cache or local backup or cloud
Whitelist/blacklist
check
Here is when
instant backup
happens
Acronis Active
Protection
heuristics reacts
Acronis Active
Protection working in
the background
PROPRIETARY AND CONFIDENTIAL 34ACRONIS © 2017
Powerful Inoculation Against Future Attacks On Backups and Acronis Backup Software
All traditional backup
solutions will
fail here
User is not paying
ransom but uses
backup instead as
recommended by
AV vendors.
Active Protection
self-defense
feature activated
Attack is stopped by
Acronis Active Protection
Ransomware is tweaked to
attack backup agent in
order to get access to
Cloud and corrupt backup
files
Cybercriminal quickly realize
that backups still can be
restored from Cloud
Acronis Active Protection
doesn’t allow to access
backup files
Ransomware searches
for backup files
to encrypt them
PROPRIETARY AND CONFIDENTIAL 35ACRONIS © 2017
Advanced: Why is Acronis Active Protection unique?
1. Acronis is a completely unique combination of backup and proactive security technologies, helping each other in one product
2. Acronis provides data recovery in any situation, no limitations on size of the files
3. Acronis Active Protection contains unique self-protection techniques. Backup files and backup process are protected – both local and cloud
4. Acronis Active Protection uses cutting-edge behavior heuristics, AI/deep learning not found in other security solutions – from IoT to Cloud scale
5. Active Protection is not just against cyber criminals, it is another layer of protection from any data damage or destruction.
PROPRIETARY AND CONFIDENTIAL 36ACRONIS © 2017
Proven self-protection capabilities Independent tests rate Acronis Backup 12.5 Advanced the best malware-resistant backup
Backup solutions self-protection tests
http://anti-malware-test.com, January 2017
Ransomware simulator tests
https://www.knowbe4.com/ransomware-simulator
PROPRIETARY AND CONFIDENTIAL 37ACRONIS © 2017
Advanced: Acronis Notary and Acronis Asignpowered by Blockchain*
Verify data authenticity:
• Public secure Blockchain ledger allows you to verify authenticity of files, and backup allows you to recover the original document
• Mathematical assurance that the content of a file is the original content that was backed up
“Acronis Notary assures that files are unchanged since they were backed up.”
“Acronis ASign provides a convenient and accepted way to sign documents electronically.”
* coming in Q4 2017
Acronis Notary™
PROPRIETARY AND CONFIDENTIAL 39ACRONIS © 2017
Acronis Notary improves backup
• Software vendors certify their applications
• Services providing multimedia have copyright management for original content
• Users have their own content that needs to be certified and verified.
All important documents should be notarized
• Agreements, wills, tax returns, bills, financial statements, medical records, inventions, copyrighted and classified materials.
• If a document is important enough to be securely stored and backed up, it is important enough to be certified to prove authenticity.
PROPRIETARY AND CONFIDENTIAL 40ACRONIS © 2017
s8duenchdjf…
• hbskfb4n6s9…
• sk7dnd3bkjd…
• fk4bf7jhu5kd…
• her6j34krfud…
A “Fingerprint” hash of
each stored file is
formed and recorded in
a special detachable
Notarization
Certificate
Block N
Block N+1
Block N+2
The Fingerprint
hash of the
Certificate is recorded
into the blockchain with
the corresponding
timestamp
Any record in the
blockchain is immutable and
independently verifiable.
That is why the Notarization
Certificate cannot be
manipulated.
The completeness of all
records and authenticity
of each file can be checked
automatically or manually.
How does Acronis Notary work?
PROPRIETARY AND CONFIDENTIAL 41ACRONIS © 2017
• Supports 16 unique platforms
• On-premises and in cloud
• Services from one easy console
• White-label and Branding options
• Integration with business automation
• Pay only for the capacity you use
• Multi-tier, multi-tenant cloud application
• Local, hosted, and cloud storage
• Unified, mobile-capable console
• Built from the ground up to be a scalable, customizable, highly-integrated cloud application
• Provides fast time-to-market and control over all aspects of your data protection business
• Completely protects your customers’ data with incredibly powerful backup and recovery
Three Good Reasons to Protect With Acronis
Control Your Data Destiny™
Easy and
Complete
Puts You in
Control
Only
Acronis…
Better for Your Business
PROPRIETARY AND CONFIDENTIAL 42ACRONIS © 2017
Next Steps
• Register for our next webinar
• Contact Ingram Micro for a personal demo
• Get signed up! Acronis Backup Cloud trial
Questions &
Answers
PROPRIETARY AND CONFIDENTIAL 43ACRONIS © 2017
Ingram Micro Team:
Jason Bourque- Field Technical Consultant
Jason.Bourque@ingrammicro.com
800-456-8000 x. 66394
Sarah Owens- Acronis Sales Expert
Sarah.Owens@ingrammicro.com
800-456-8000 x.67606
Maureen Starkey- Acronis Sales Expert
Maureen.Starkey@ingrammicro.com
800-456-8000 x. 67607
PROPRIETARY AND CONFIDENTIAL 44ACRONIS © 2017
www.acronis.com
New Generation Data Protection
twitter.com/acronis blog.acronis.com facebook.com/acronis
top related