why do we still care? · • veritas backup exec • veritas enterprise vault • veritas netbackup...

25
Presenters [email protected] [email protected] April 27 th , 2017 A last line of defense against ransomware, why?

Upload: others

Post on 19-May-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Presenters [email protected] [email protected] 27th, 2017

A last line of defense against ransomware, why?

Page 2: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Why do we still care?

Page 3: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience. 3

The Third Annual Scalar Security Study

§ How prepared are Canadian organizations to deal with cyber attacks?

§ How have cyber attacks changed over the past year?

§ What is the cost of cyber attacks to Canadian organizations?

§ What are the most effective ways to reduce cyber security risk?

Page 4: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience. 4

Only 34%of organizations believe they are winning the cyber security war

§ Attacker sophistication on the rise§ Greater losses of data§ Traditional defenses ineffective§ Lack of advanced technology§ Skill gap persists

Confidence Continues to Erode as Cyber Threats Evolve

Page 5: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience. 5

Building an Effective Information Security Program

Deploy the Most Effective Technologies

Align Strategies to Enterprise Business Risk

Rapid Remediation of Security Incidents

DEFENDPREPARE RESPOND

Advanced Analytics

Business Context

Continuous Validation

Design Solutions

Assess Risk

Security Framework

Implement Controls

Protect critical assets

Manage Project Risk

Page 6: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Changes in theThreat Landscape

Page 7: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience.

Interesting Data on Advanced Threats

80%

65%

49%

48%

46%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

Web-borne malware attacks

Rootkits

Advanced persistent threats (APTs)/targeted attacks

Spear phishing

Clickjacking

§ Most threats are considered ”advanced”

§ Targeted attacks to gain access to data (loss of IP)

§ Users as targets§ High number exploits > 3

months old§ Only 41% of Companies

have invested in mitigating technologies

Page 8: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience.

Top Threat Sources

1. Criminal Syndicates

2. Insider Threats

3. Third Party Negligence

Page 9: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience. 9

A “Less-Sophisticated” Phishing Email Targeting Scalar

----Original Message-----From: Paul Kerr [mailto:[email protected]]Sent: May-07-16 9:12 AMTo: [email protected]: Bank Transfer

Rob,

Kindly contact the bank today and transfer an amount of $ 100,000 per the instructions below.

HNS Contracting33 Swinimer RdNova Scotia, Canada.

CIBC Bank18 Parkland, Halifax, NovaScotia, Canada.

Transit # 00503Institution # 010Account # 9943218Swift code: CIBCCATT

Please come back to me once this transfer has been sent.

Thanks,

Paul KerrPresident and Chief Executive Officer+1.416.202.0020 [email protected] Decisions Inc.

Page 10: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

© 2017 Scalar Decisions Inc. Not for distribution outside of intended audience. 10

Looks Legit…….

Return-Path: <[email protected]>Received: from host.homearab.net (host.homearab.net. [108.163.190.98])From: Paul Kerr <[email protected]>

To: [email protected]: [email protected]: Bank Transfer

Page 11: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Why do we still care?

Page 12: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

http://scalar.ca

Page 13: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Keith AasenSolution Architect

Storage Security – Last Line of Defense

© 2016 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 13

Page 14: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

What are you trying to Protect?

§ Data is the crown jewel of a customer environment§ Preventing loss of or theft of data is primary concern§ Network design and attack surface design is important§ Difficult to control human behaviors§ Must have multiple layers of defense

© 2016 NetApp, Inc. All rights reserved. --- NETAPP CONFIDENTIAL ---14

Page 15: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Customer Case Study

§ 8:45 AM –Client Reports discovery of Ransomware dialog box§ Ransomware has encrypted all file shares that the client had access to§ Ransom for the encryption key is approximately $350,000

§ 9:00 AM – IT cuts access to main file shares and begins sweep of clients§ 9:45 AM – Client environment is determined “clean”

§ Encrypted shares are identified (approximately 65% of files in share)§ “Clean” snapshot is identified

§ 10:15 –Primary share is “SnapRestored” from 7:00 AM SnapShot§ 9:00AM Snapshot is mounted from DR site and unaffected files are copied back to

primary§ 11:15 – File shares are returned online

Major city in BC

© 2016 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 15

Page 16: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Customer Case Study

§ Customer was taking hourly snapshots, will move to 15 min snaps to reduce data loss and improve restore granularity

§ Minimize failure domains

Lessons Learned

© 2016 NetApp, Inc. All rights reserved. --- NETAPP CONFIDENTIAL ---16

BA2

A3A1

B1B2

A

R

C A4

Single NFS mount/CIFS share

A B

A1A2 A3

B1 B2

R

C

A4

Page 17: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Security for Data Backup and Archive

Page 18: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Data integrityData security

Security of Backup Data

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 18

§ What is the state of the data over time

§ “Silent rot” of tape

§ Impact of competitor or public gaining access to the backup media

§ “Tape off the back of the truck”

Page 19: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Object Storage Platforms

© 2015 NetApp, Inc. All rights reserved.

Management of unstructured data across geographically distributed locations

Single view, single policy enforcement across all sites

Bring data closer to applications, wherever they may be

Page 20: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Object Storage Platforms

© 2015 NetApp, Inc. All rights reserved.

Data management over timeDetermined by cost, security, performance, durability, availability

Across on-premises and public cloud infrastructures

Secured with encryption and multi-site dispersion

Page 21: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Data integrityData security

Security of Backup Data – With Object Repository

© 2015 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 21

§ End-to-end per-object encryption from ingest through transport and at rest

§ Encrypted, geo-distributed erasure coding offers additional security with multi-site data dispersion

§ Access security via S3 and Swift authentication and security mechanisms

§ StorageGRID® Webscale will create a digital fingerprint as data is ingested

§ Multiple, interlocking layers of integrity protection including hashes, checksums, and authentications

§ Data object integrity verification on ingest, retrieval, replication, migration, and at rest

§ Suspect objects are automatically regenerated

§ Geo-distributed erasure coding for cost-effective data integrity protection across sites

Page 22: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Integrating Object Storage with Backup using AltaVault

22

• Amanda Network Backup• Arcserve• CA Cloud Storage for System z• Commvault (formerly Simpana)• Commvault IntelliSnap for NetApp• Dell NetVault• Dell vRanger• EMC NetWorker• HP Data Protector• IBM Spectrum Protect• Microsoft SQL Server• NEC NIAS• OpenStack Cinder NFS Backup Driver• Oracle RMAN• Veeam• Veritas Backup Exec• Veritas Enterprise Vault• Veritas NetBackup

PrimaryStorage

Seamlessly integrates into

existing infrastructure

Deduplicates, compresses, and

encrypts

Caches recent backups locally, vaults everything

to the cloud

Stores data in the public or private cloud of choice

NetApp® AltaVault™ Cloud-Integrated Storage

Public Cloud• Amazon Glacier, S3, S3-SIA & GovCloud• AT&T Synaptic Storageas a Service• Dunkel Cloud Storage• Google Cloud StorageStandard & Nearline• IBM SoftLayer Object Storage• Internet Initiative Japan• Microsoft Azure, Cool Blob & GovCloud• Oracle Storage Cloud Service• Orange Cloud for Business• Outscale• Rackspace• Swisscom• Telefonica• TELUS• Verizon

Private Cloud• NetApp StorageGRID®Webscale• Cloudian HyperStore• EMC Atmos• IBM Cleversafe• OpenStack Swift• Scality RING

© 2016 NetApp, Inc. All rights reserved.

Page 23: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Webscale storage for on-premises archives

23

• Amanda Network Backup• Arcserve• CA Cloud Storage for System z• Commvault (formerly Simpana)• Commvault IntelliSnap for NetApp• Dell NetVault• Dell vRanger• EMC NetWorker• HP Data Protector• IBM Spectrum Protect• Microsoft SQL Server• NEC NIAS• OpenStack Cinder NFS Backup Driver• Oracle RMAN• Veeam• Veritas Backup Exec• Veritas Enterprise Vault• Veritas NetBackup

PrimaryStorage

Seamlessly integrates into

existing infrastructure

Deduplicates, compresses, and

encrypts

Caches recent backups locally, vaults everything

to the cloud

Stores data in the public or private cloud of choice

NetApp StorageGRID®

Webscale NetApp® AltaVault™ Cloud-Integrated Storage

© 2016 NetApp, Inc. All rights reserved.

Page 24: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Thank you

© 2016 NetApp, Inc. All rights reserved. NetApp Confidential – Limited Use 24

Page 25: Why do we still care? · • Veritas Backup Exec • Veritas Enterprise Vault • Veritas NetBackup Primary Storage Seamlessly integrates into existing infrastructure Deduplicates,

Thank [email protected]@netapp.ca