microsoft and acronis webinar: keep it in the …...total his users and near-term intenders (n=498)...

44
PROPRIETARY AND CONFIDENTIAL 1 ACRONIS © 2017 MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE CLOUD, A SECURITY STORY Jonathan Richard McCarrick, Partner Technology Evangelist Acronis

Upload: others

Post on 20-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 1ACRONIS © 2017

MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE CLOUD, A SECURITY STORYJonathan Richard McCarrick, Partner Technology Evangelist

Acronis

Page 2: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 2ACRONIS © 2017

Agenda

• Acronis Company Overview

• Security Threats

• Product description

• Key Security features

• Acronis Active Protection

• Acronis Notary

Page 3: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

AcronisBrief Company Overview

Page 4: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 4ACRONIS © 2017

Acronis: 14 Years Protecting Digital Lives & Businesses Worldwide

500,000+business customers

50,000,000+OEM licenses

5,000,000+consumer customers

5,000+petabytes of data under

Acronis protection

50,000+partners

EUROPE 40% AMERICAS 40% APJ/MEA 20%

+200,000 SMBs +200,000 SMBs +100,000 SMBs

Global Headquarters in Singapore

Page 5: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 5ACRONIS © 2017

Acronis: Deep Expertise in Backup

FAMOUS FOR INNOVATIONS

Full Image Backup on running system

Universal Restore (recover to any hardware or hypervisor)

Active Restore (boot and run while recovery continues)

World-class support of Windows, Linux and other OS/Apps

CONTINUOUS INNOVATIONS

Differential & Reverse Incremental, vmFlashback

Compression & Optimized Deduplication

Extendable Backup Schemes, External Crypto and SSL

Acronis Active Protection™, Acronis Notary™

Acronis Instant Restore™ , Acronis ASign™

STRONG TECHNOLOGY DEVELOPMENT

Acronis Labs

500+ engineers, 20+ PhDs

200+ patents, 17 years of development

AWARD WINNING PRODUCTSAWARD WINNING PRODUCTS:

EASY, FAST and RELIABLE

7

Page 6: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 6ACRONIS © 2017

Acronis Hybrid Cloud Architecture

Acronis Protects Your Entire Business – On-premises, Remote, Private Cloud, Public Cloud, Mobile

Unified Centralized Data ProtectionWeb-based User Interface Deployed On-premises or in the Cloud

Any Recovery Data Recovery

File Recovery

Mailbox & E-mail Recovery

Database Recovery

System Recovery

Bare-Metal Recovery

Active Restore

Instant Restore™

vmFlashBack

Dissimilar Hardware

Recovery & Migration

P2V, V2V, V2P, P2P

P2C, V2C, C2C, C2V, C2P

Physical Data Shipment

Cloud Disaster Recovery

Replication

High Availability

Any StorageCLOUD

ON-PREMISES

FTP/SFTP

DISKS

TAPE

NAS

SAN

Any WorkloadCLOUD

ON-PREMISES

PHYSICAL

VIRTUAL

APPLICATIONS

MOBILE

Any Protection

Archiving

Backup

Cloud Storage

Disaster Recovery

e-Discovery

File Sync and Share

Monitoring

Notary

Any Deployment

UBER

CLOUD

PUBLIC

CLOUD

VENDOR

CLOUD

PARTNER

CLOUD

PRIVATE

CLOUD

Any ManagementManagement software deployed and controlled independently, enabling control of data protection

by customer, service provider, vendor, partner, or 3rd party from public/partner/private cloud or customer premises

Page 7: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

Service Provider Market Opportunity

Page 8: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 8ACRONIS © 2017

IT Infrastructure Hosting is Growing

Question: Which of the following best describes your organization's use of third party-provided IT infrastructure hosting services?

The majority of companies are either using or plan

to use third-party hosted IT services

Source: IDC U.S. Enterprise Communications Survey, January 2016; n=1,204

Currently use28%

Plan to use within 1 year26%

Plan to use in 1-2 years16%

Plan to use in more than 2 years

6%

Do not use / Have no plan to use

24%

Page 9: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 9ACRONIS © 2017

Backup is a Leading Cloud Application

47%

39%

37%

34%

34%

29%

32%

26%

22%

51%

39%

37%

36%

32%

30%

28%

27%

20%

43%

38%

36%

33%

37%

28%

35%

24%

26%

Data storage/backup & recovery

High performance computing

Core business applications software hosting

Scale existing internal IT infrastructureenvironment

Cloud-first deployment for net-new businessinitiatives/workloads

Data analytics/business intelligence

Test/dev for new applications/services

Non-critical business applications hosting

Burst capacity for in-house IT workloads

Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239)

Backup and data storage is the predominant use case

for cloud IaaS among traditional hosting services users

Source: IDC U.S. Enterprise Communications Survey, January 2016; n=1,204

Question: How do you use / plan to use cloud infrastructure / IaaS services?

Page 10: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 10ACRONIS © 2017

HISTORY OF RANSOMWARE

Page 11: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 11ACRONIS © 2017

What is the history of Ransomware?

• The very first ransomware ever documented was the AIDS Trojan in December 1989 It was spread via diskette.

• In 2015, Ransomware as a Service (RaaS) arrived on the malware scene

• Instances of Tescrypt grew significantly between December 2015 and May 2016

• Tox was one of the first RaaS kits available It allows an individual to register for free and build crypto malware in three steps

Page 12: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 12ACRONIS © 2017

How does it work?

The growing list of infiltration methods includes getting users to:

• Open an email attachment that includes a malicious Word macro or self-executing Java applet

• Click on a counterfeit online ad or email link that brings the user to a compromised or counterfeit website that performs a drive-by download of malware

• Plug in an infected USB thumb drive

• Download legitimate software or pirated content that contains ransomware

Page 13: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 13ACRONIS © 2017

Ransomware as a Service

Page 14: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 14ACRONIS © 2017

SIZE AND COST

Page 15: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 15ACRONIS © 2017

How prevalent is the problem?

• There are dozens of exploit types and more each day

• 93% of phishing emails contain ransomware

Page 16: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 16ACRONIS © 2017

Growth of Encryption Ransomware Against All Other Malware Q2 2016

Source: PhishMe Q1_2016 Malware Review

Ransomware is rising as a % of Malware

Page 17: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 17ACRONIS © 2017

What is the cost of Ransomware?

• According to the FBI, cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses and institutions to unlock computer servers

• At that rate, ransomware is on pace to be a$ 1 billion a year crime in 2016

• The FBI told CNN that the number “is quite high” because a few people “reported large losses ”

Page 18: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 18ACRONIS © 2017

Backup is Critical Ransomware Defense

Ransomware infections are growing fast:Cybercriminals will collect $4B in ransoms in 2017

Getting smarter: Software defeats many traditional endpoint security measures

Backups are a criticalline of defense

Source: CIS- Ransomware: facts, threats, and countermeasures, August 2016

Page 19: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 19ACRONIS © 2017

HOW DOES BACKUP HELP

Page 20: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 20ACRONIS © 2017

An Example of how backup helps

Day 1 Time Action/Event Details

10:30am A ransomware attack successfully breaches

one PC and starts spreading throughout the

facility

The company IT team is yet unaware of the strike

10:42am First report reaches the IT team and the Help

Desk responds

IT disconnects the infected PC from the network

10:51am Users report seven more ransomware strikes The IT team realizes the scale of infection, shuts down

the company network, and starts a company-wide

check

12:07pm Company-wide check is complete IT identifies that 23 machines (a combination of PCs

and Macs) are a ected.

12:18pm IT restarts the network IT shuts down all a ected machines and keeps them

disconnected from the LAN

12:27pm IT contacts the service provider support team The customer requests the service provider to send a

Large Scale Recovery hard disk drive (HDD) that

contains the backed up data (stored in the service

provider cloud) for the 23 PCs/ Macs

3:45pm The service provider sends the HDD by

courier to the company

The service provider copies 23 backups to the external

HDD and sends it to the company via an overnight

courier

Page 21: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 21ACRONIS © 2017

An Example of how backup helps

Day 2 Time Action/Event Details

8:33am The HDD arrives at the company

8:51am IT copies the HDD to central storage The IT team copies the backups to higher-

performance central storage to facilitate the

parallel recovery

9:05am The first backup is copied to storage; the first

machine’s recovery can start

The IT team boots the a ected PC from a

bootable media backup copy while still

disconnected from the network

9:07am First boot is complete A backup agent is installed on the PC The IT

team connects the network and launches the

recovery process

9:53am First recovery is complete The machine is restored to its pre-infection state

and rebooted

10:02am The first machine is restored Copying of backups to central storage continues

12:37pm All backups are copied to central storage 15 machines (a combination of PCs and Macs)

are now recovered

Page 22: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

Acronis Backup Cloud Cloud Data-Protection Services for your Customers

Page 23: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 23ACRONIS © 2017

Acronis Backup CloudA powerful hybrid cloud backup solution for service providers that protects

all of their customers’ systems and devices, anytime, anywhere, faster

than anyone else.

AzureWindows

ServerWindows

PCExchange

SQL Server

SharePoint

Active Directory

Hyper-V

Mac iPadiPhoneLinux Server

AndroidAmazon

EC2VMware vSphere

• Market leading Hypervisors

• Market leading Clouds

• Market leading Operating Systems

• Market leading Applications

• Office 365 Mailbox Protection

• Mobile workforce Protection

• Cloud or on-premises console

• Dissimilar hardware recovery

• Any-to-Any migration

• Hybrid cloud and local backup

Office 365

Page 24: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 24ACRONIS © 2017

Acronis Backup Cloud – What’s Cool

Solve Data Protection Challenges

• Back up your customers’ data to

multiple locations

• Use on-premises storage, Acronis

Cloud, or your own private cloud

• Replicate data between locations

to ensure data availability

Reduce Management Overhead

• Accelerate management with an

easy-to-use central console

• Consolidate operations and

administration into single, unified,

multi-tenant solution

• Available anywhere at any time

Expand Total Addressable Market

• Protect your customers’ entire IT

infrastructure on 16 platforms

• Support physical, virtual, cloud, PCs,

Mac® , iPhone ® /iPad ®, Android ®,

Microsoft Exchange ®, SQL Server ®,

SharePoint ®, and Office 365 ®

Build on Your Brand

• White-label or brand your backup

service to promote your company

name and build brand equity

• Develop your own pricing and

packaging to deliver services that

best fit the needs of your

customers.

Reduce Operational Expenses

• Integrate with your billing and

provisioning solutions

• Leverage what your organization

already has in place to automate

your business.

• Simplify backup operations with

plugins for popular RMM platforms.

Exceed Customer SLAs

• Deliver a lightning fast backup

service to your customers

• Back up and recover 2X faster than

the closest competitor’s software

• Recover servers in 15 seconds or

less with Acronis Instant Restore™

Page 25: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 25ACRONIS © 2017

Acronis Backup Cloud – What’s Cool Too

Nurture Customer Trust

• Employ strong encryption in-transit

and at-rest

• Store customer data in certified

Acronis Cloud Data Centers

• Utilize private encryption keys that

only your customer knows

Leverage Existing Investments

• Leverage Acronis data centers or

deploy the solution at your own

data center

• Mix-and-match to deliver a turnkey

or in-house solution

• From pure cloud to private cloud,

the choice is yours

Differentiate Your Backup Service

• Transform backups with over a

decade of innovations

• Protect your customers’ data better

than anyone else

• Disk-imaging technology, bare-metal

recovery, and many other technology

firsts are available to your customers

Open Equitable Sales Channels

• Scale with a unique, flexible go-to-

market strategy that supports both

channel partner and end-user

customer sales

• The Acronis Cloud easily supports

any multi-tier, multi-tenant selling

model

Spearhead New Markets

• Provide feature-rich support for on-

premises VMware®, Hyper-V®, and

Virtuozzo® installations

• Protect Microsoft Azure®, Amazon

EC2® and other hosted workloads

• Migrate workloads between

physical, virtual, and cloud platforms

Start Fast, Finish First

• Zero up-front costs and a pay-per-

use business model

• No architecting, no installation, no

requirements

• Accelerate your business… sign

up and drive away today.

Page 26: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 26ACRONIS © 2017

What’s New in Acronis Backup Cloud

New emphasis on integration

• New settings page highlights integrations

• Integration status in UI where applicable

Integration with ConnectWise Manage

• Billing automation/service ticketing

• Provisioning of service to new and existing

customers

Informative daily backup status reports

• Warnings and alerts for jobs that ran

• Notices for backups that missed schedule

Increased stability and performance

• Most stable Acronis Cloud Platform to date

• Performance improvements to user

interface and client-side backup operations

Spring `17 Release

Page 27: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 27ACRONIS © 2017

Only Acronis Backup Cloud:

Provides a multi-tenant solution that

reduces overhead by consolidating

customer views and administration

into one, easy-to-use, unified

management console, available

anywhere at any time

Offers a true multi-tier, multi-tenant

solution that enables cloud resellers to

provide varying levels of capabilities

to their customers using a single data

protection platform

Provides flexible storage options for

customer backups, including local, on-

premises, service-provider hosted,

Acronis-hosted, and third-party

hosted, including Microsoft Azure,

Amazon S3, and IBM Softlayer

Powerful

Multi-Tenancy

Multi-tier

Service Offering

Flexible Storage

Options

Unique Solution

Simplifies the sale of backup-as-a-

service (BaaS) by combining proven

Acronis Backup technology with a

scalable cloud architecture that

integrates with popular cloud

management tools

Allows service providers to offer a

unique blend of customer self-

service and white glove

management to fit the needs of their

customers

Leverages the power of the Acronis

AnyData Engine to protect any

device, in any location by backing up

to any storage and recovering to any

platform

Powerful Cloud

Automation

Control over

services

Acronis AnyData

Engine

Page 28: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 28ACRONIS © 2017

Safe and Efficient Management

Ensure privacy and data segregation with a true multi-tenant service

Store data securely in Tier-IV designed, SSAE-16 certified data centers provided by Acronis

Deploy to secure, private cloud destinations including optional Acronis storage, your own storage, or third-party cloud storage

Employ secure AES-256 data encryption, in transit and at-rest, and SSL-encrypted channels

Leverage included Acronis Storage software for dependable backup storage

Page 29: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 29ACRONIS © 2017

14 Acronis Cloud

Data Centers now

More coming, it takes only 4

weeks to launch a new one

Strong presence in Asia-Pacific:

Singapore, Japan, Korea, Australia

Acronis Cloud

Page 30: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

Acronis Active Protection™

Page 31: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 31ACRONIS © 2017

• Actively protects local files and backups from

unauthorized modification or encryption

• Actively protects cloud backups from alteration

by safeguarding the Acronis agent from attacks

• Instantly recovers from ransomware attacks:

detecting ransomware based on a behavioral

heuristic, instantly backs up files targeted by

ransomware, blocks the attack and restore files.

Advanced: Acronis Active ProtectionActively protect your data from ransomware and other threats with instant backup and instant restore

The result? Data can never be compromised. If any

files were impacted prior to stopping an attack, they

will be automatically restored for a backup

Page 32: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 32ACRONIS © 2017

Advanced: Acronis Active ProtectionDelivering low RPO and RTO objectives – for fast and complete recovery.

Lose no data:

• With Instant Backup the most recent data is available for recovery.

• In case of a ransomware attack, no recent changes to the data are lost.

Lose no time:

• With Instant Recovery files are restored immediately.

• In case of a ransomware, no time is wasted trying to find, check, and recover the files.

Page 33: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 33ACRONIS © 2017

Advanced: How does Acronis Active Protection™ work?

Ransomware

infects

windows machine

Ransomware

starts

to encrypt files

Several files

are

encrypted

If untrusted, block

and terminate the threat

Get instant restore from

local cache or local backup or cloud

Whitelist/blacklist

check

Here is when

instant backup

happens

Acronis Active

Protection

heuristics reacts

Acronis Active

Protection working in

the background

Page 34: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 34ACRONIS © 2017

Powerful Inoculation Against Future Attacks On Backups and Acronis Backup Software

All traditional backup

solutions will

fail here

User is not paying

ransom but uses

backup instead as

recommended by

AV vendors.

Active Protection

self-defense

feature activated

Attack is stopped by

Acronis Active Protection

Ransomware is tweaked to

attack backup agent in

order to get access to

Cloud and corrupt backup

files

Cybercriminal quickly realize

that backups still can be

restored from Cloud

Acronis Active Protection

doesn’t allow to access

backup files

Ransomware searches

for backup files

to encrypt them

Page 35: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 35ACRONIS © 2017

Advanced: Why is Acronis Active Protection unique?

1. Acronis is a completely unique combination of backup and proactive security technologies, helping each other in one product

2. Acronis provides data recovery in any situation, no limitations on size of the files

3. Acronis Active Protection contains unique self-protection techniques. Backup files and backup process are protected – both local and cloud

4. Acronis Active Protection uses cutting-edge behavior heuristics, AI/deep learning not found in other security solutions – from IoT to Cloud scale

5. Active Protection is not just against cyber criminals, it is another layer of protection from any data damage or destruction.

Page 36: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 36ACRONIS © 2017

Proven self-protection capabilities Independent tests rate Acronis Backup 12.5 Advanced the best malware-resistant backup

Backup solutions self-protection tests

http://anti-malware-test.com, January 2017

Ransomware simulator tests

https://www.knowbe4.com/ransomware-simulator

Page 37: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 37ACRONIS © 2017

Advanced: Acronis Notary and Acronis Asignpowered by Blockchain*

Verify data authenticity:

• Public secure Blockchain ledger allows you to verify authenticity of files, and backup allows you to recover the original document

• Mathematical assurance that the content of a file is the original content that was backed up

“Acronis Notary assures that files are unchanged since they were backed up.”

“Acronis ASign provides a convenient and accepted way to sign documents electronically.”

* coming in Q4 2017

Page 38: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

Acronis Notary™

Page 39: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 39ACRONIS © 2017

Acronis Notary improves backup

• Software vendors certify their applications

• Services providing multimedia have copyright management for original content

• Users have their own content that needs to be certified and verified.

All important documents should be notarized

• Agreements, wills, tax returns, bills, financial statements, medical records, inventions, copyrighted and classified materials.

• If a document is important enough to be securely stored and backed up, it is important enough to be certified to prove authenticity.

Page 40: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 40ACRONIS © 2017

s8duenchdjf…

• hbskfb4n6s9…

• sk7dnd3bkjd…

• fk4bf7jhu5kd…

• her6j34krfud…

A “Fingerprint” hash of

each stored file is

formed and recorded in

a special detachable

Notarization

Certificate

Block N

Block N+1

Block N+2

The Fingerprint

hash of the

Certificate is recorded

into the blockchain with

the corresponding

timestamp

Any record in the

blockchain is immutable and

independently verifiable.

That is why the Notarization

Certificate cannot be

manipulated.

The completeness of all

records and authenticity

of each file can be checked

automatically or manually.

How does Acronis Notary work?

Page 41: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 41ACRONIS © 2017

• Supports 16 unique platforms

• On-premises and in cloud

• Services from one easy console

• White-label and Branding options

• Integration with business automation

• Pay only for the capacity you use

• Multi-tier, multi-tenant cloud application

• Local, hosted, and cloud storage

• Unified, mobile-capable console

• Built from the ground up to be a scalable, customizable, highly-integrated cloud application

• Provides fast time-to-market and control over all aspects of your data protection business

• Completely protects your customers’ data with incredibly powerful backup and recovery

Three Good Reasons to Protect With Acronis

Control Your Data Destiny™

Easy and

Complete

Puts You in

Control

Only

Acronis…

Better for Your Business

Page 42: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 42ACRONIS © 2017

Next Steps

• Register for our next webinar

• Contact Ingram Micro for a personal demo

• Get signed up! Acronis Backup Cloud trial

Questions &

Answers

Page 43: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 43ACRONIS © 2017

Ingram Micro Team:

Jason Bourque- Field Technical Consultant

[email protected]

800-456-8000 x. 66394

Sarah Owens- Acronis Sales Expert

[email protected]

800-456-8000 x.67606

Maureen Starkey- Acronis Sales Expert

[email protected]

800-456-8000 x. 67607

Page 44: MICROSOFT AND ACRONIS WEBINAR: KEEP IT IN THE …...Total HIS users and near-term intenders (n=498) Current HIS users (n=259) HIS intenders/1 year (n=239) Backup and data storage is

PROPRIETARY AND CONFIDENTIAL 44ACRONIS © 2017

www.acronis.com

New Generation Data Protection

twitter.com/acronis blog.acronis.com facebook.com/acronis