The Leader in Cloud Data Protection and Information Management

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Microsoft Ignite /17/2017 2:11 PM
Agenda Symantec Enterprise Vault 1 Today’s Management Challenges 1 Why Management? 2 The Solution: Symantec Enterprise Vault 3 Benefits & Closing.
Dell Connected Security Solutions Simplify & unify.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Changing World of Endpoint Protection
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1 Calgary SharePoint Users Group The Challenges of Office 365.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Data Protection and Governance at the Edge September 2014.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
OFFICE 365 APP BUILDER PROFILE: Druva
10/16/2017 7:22 AM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
Veeam software Risk Mitigation and Protection
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Leverage the Cloud to Minimize the Impact of Ransomware
Hybrid Management and Security
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Chapter 6: Securing the Cloud
Unifying data protection, leveraging the power of the cloud
SkyKick Cloud Backup Battlecard
Meemim's Microsoft Azure-Hosted Knowledge Management Platform Simplifies the Sharing of Information with Colleagues, Clients or the Public MICROSOFT AZURE.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Unifying data protection, leveraging the power of the cloud
Reducing Cost and Risk During an Investigation
Unifying data protection, leveraging the power of the cloud
Microsoft SharePoint Server 2016
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Virtualization & Security real solutions
Prevent Costly Data Leaks from Microsoft Office 365
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Reclaim control of mobile and distributed data
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.

Data Protection Suite Family Overview
Protect | Transform | Innovate
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Unifying data protection, leveraging the power of the cloud
Unifying data protection, leveraging the power of the cloud
Unifying data protection, leveraging the power of the cloud
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Long-Term Storage Service for Memory Institutions and Research Centers
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Securing the Threats of Tomorrow, Today.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Andy Puckett – Sales Engineer
The Backup Limitations of Microsoft Office 365
Move your data to the cloud with Azure and {Partner Company Name}
School Districts Can Analyze and Report on Data Across Multiple Systems with EdWire, a Powerful Integration Solution that Utilizes Microsoft Azure MICROSOFT.
Zendos Tecnologia Utilizes the Powerful, Scalable
Microsoft Data Insights Summit
Partner Facing Demo.
Presentation transcript:

The Leader in Cloud Data Protection and Information Management Druva Briefing For Cbus Data Connectors Conference L.J. Manning - Bob Pawloski

Increasing Data & Business Risks 40 Exabyte Corruption & Loss Ransomware & Malware Insider Threat & IP Theft 50% Enterprise data will be exclusively on endpoints & cloud by 2020 Legal Exposure & Sanctions Compliance Infractions Today’s data landscape has become increasingly complex, not by the shear volume of data growth, but also by the # of places it’s being stored to keep the business agile Server environments have become more distributed across sites with cloud increasingly becoming a migration target, and end-users are using more devices and cloud application services With this increase of dispersion and fragmentation organizations are under greater pressure to ensure proper protection and visibility to the data as the responsibilities and liabilities haven’t changed Organizations must not only protect the data, but also understand what it is, where it is, and who has it to align to company data policies and industry regulations

Enterprise Customers 4,000+ Data Under Management 25PB+ We now efficiently manage the full lifecycle of data across time, device and geography. Druva makes this possible. “ ” Amazon Storage Partner Top 5 In Cloud Data Protection Gartner #1 Shah Nawaz, Director of IT, Shire * This is where Druva comes in, a unified cloud platform that enables organizations to not only protect their fragmented data for recoverability, but also to gain better understanding of their information to address the bigger challenges facing business today – be that compliance, data loss, data theft, privacy or legal requests. * Today Druva has over 4,000 customers utilizing our solution to address their data challenges, many of these companies are large, well known enterprises often dealing with data into the 100s of Terabytes. * We've also been acknowledged by Gartner three years in a row as the leading vendor in cloud data protection.

Druva: A Unified Cloud Platform Secure and Scalable Cloud Platform Multiple Data Protection Services Efficient Cloud Backup Make this a build slide: Left section, connectors and cloud section, workloads section This will tie in well to slide #3 – could even do a transition graphic from legacy to modern/cloud

Why Protect Cloud Data? 44% of cloud malware contained ransomware Malware in email 44% of cloud malware contained ransomware 56% of malware-infected files are easily shared Malware spreads User puts file in cloud app Data Corruption Malicious Activity User Actions 3rd Party SW errors Sync errors Migration errors Upset employee Insider threats / Hacks Virus attacks / Ransomware Accidental deletion Document overwrite Departing employee

Cloud Provider Doesn’t Cover All Forms of Data Loss High Availability ≠ Backup Cloud is a Shared Responsibility “Some IT organizations wrongly assume that high-availability and disaster recovery capabilities offered by SaaS providers can recover data loss by users errors or malicious attacks” You are responsible for protecting your data from user errors or malicious behavior Microsoft is responsible for the cloud infrastructure, network controls, application, etc. Source: Gartner Research: Data Backup/ Recovery Factors to Consider When Adopting SaaS

Cloud Application Data Protection Cloud-to-cloud backup (API Connectors) No impact to network bandwidth Easy access and quick recovery of data Accidental deletion or malware attacks Data archival for along as it is needed Compliance or litigation Exiting employees

Traditional vs Cloud eDiscovery Weeks Reactive Collection Multi-Tool Interim Storage Export & Ship Ingest / Process Analyze / Review Proactive Collection Processing EDA Cloud to Cloud Ingest / Review Hours

eDiscovery and Legal Hold (Data Preservation) Easily manage and place legal holds Litigation support dashboard Select custodians, create legal holds Capture forensic metadata Extended set of EDRM defined attributes Ensure legal admissibility File signatures Chain of custody reporting Auditing of users & admins Data ingestion to eDiscovery platforms Secure WebDAV data access Download utility

Proactive Compliance Management Automates compliance monitoring and reporting for sensitive and regulated information Full-text indexing across endpoints and cloud Built-in support for common regulatory policies (HIPAA, GLBA, FCRA / FACTA, PCI-DSS, SSN, …) Customizable templates to search using keywords and regular expressions

Fail Proof Ransomware Protection Detect Ransomware via unusual data activity Get notified for impacted snapshots Know last best known snapshot for recovery Protection against ransomware Regular time-indexed snapshot backups Flexibility in backup frequency Incorporate endpoint and cloud app data Offsite data storage (AWS/Microsoft Azure) Recovering from ransomware intrusion 24/7 data access User/admin restore Locate suspicious files quickly on endpoints and cloud apps Ransomware: Detect, Protect and Recover Backup Trend Last 100 snapshot trend You Can’t Prevent Ransomware Attacks, But You Can Protect Against It

Improve Business Agility, Reduce Risk & Cost Single Pane of Glass Global Deployment, Consistent SLAs Reduced Infrastructure Dependency Lower Overall TCO

Druva: Under the Hood Savings Performance Scale Auto Storage Tiering Longer Retention, lower cost Patented Global Dedupe 80% storage & bandwidth Saving Savings WAN Optimized High Speed Data Transfers 600Mbps Performance Intelligent Caching Accelerated Storage & Retrieval Time Indexed Metadata High Elasticity Indexing & Database Storage: 31+ Global Regions Durability, reach and regional Compliance Scale * Swap S3/S3IA w/ Hot, Warm, * Speed / Cost / Flexibility / Security

L.J. Manning - Druva - lj.manning@druva.com Thank You L.J. Manning - Druva - lj.manning@druva.com

Architecture: Public Cloud Native 30+ Selectable Storage Regions Architecture: Public Cloud Native ITAR FIPS 140-2 MPAA ISO 27001 SOC 1,2,3 ISAE 3402 PCI DSS HIPAA FISMA Moderate Elastic Scale, Global Reach SLA Guarantees, High Performance Single Data Store, Multiple Workloads Advanced Cloud Security & Privacy Remove Cloud tech Native vs. Managed/IaaS– Co. Lo. he key to Druva’s difference is the ability to store and index extremely large amounts of data. The design takes advantage of the full the elasticity of the cloud for scale, access and infinite storage. We deploy our cloud solution on AWS because it’s the most secure and highest rated cloud infrastructure in the world with 11 availability zones containing multiple data center. <<BUILD>> Distributed Cloud File System Object storage for scale, durability and performance Metadata separation for multi-purpose workloads Global Dedupe on the Cloud Intelligent, source-side global de-duplication results in 5x faster backups WAN-optimized data transfers for efficiency on any network Enterprise SLAs 99.5% uptime and 99.999999999% data durability

Fail Proof Ransomware Protection Detect Ransomware via unusual data activity Get notified for impacted snapshots Know last best known snapshot for recovery Protection against ransomware Regular time-indexed snapshot backups Flexibility in backup frequency Incorporate endpoint and cloud app data Offsite data storage (AWS/Microsoft Azure) Recovering from ransomware intrusion 24/7 data access User/admin restore Locate suspicious files quickly on endpoints and cloud apps Ransomware: Detect, Protect and Recover Backup Trend Last 100 snapshot trend You Can’t Prevent Ransomware Attacks, But You Can Protect Against It

Unusual Data Activity – Abnormal Snapshot

Challenges Of O365 - Data Retention Cloud Solutions Not Natively Designed for Data Restoration Limited or no time indexed snapshots or backups performed (outside recycle Bin that is purged after fix period of time). Once Data is Deleted, Altered or Corrupted weather Accidental or Intentional - little recourse to recover it. Ransomware or Malware recovery is a challenge without Time Indexed Snap Shots. If Cloud provider provides capabilities = Expensive

Challenges of O365 - Data Retention (continued) Data Governance Limitations: Cumbersome and complex to identify, isolate, and search data relevant for litigation. Information should be collected, indexed & have capability to be ‘searched’. Summary Gaps Include: Backup, Business Continuity, Ransomeware Recovery, Advanced Detection, and Legal Hold/e-Discovery Gartner “strongly” recommends organizations with O365 consider third party offering to address the Gaps.

End User Data Protection & Management Backup & Recovery Enables legal teams to manage holds for eDiscovery Legal Hold / eDiscovery Compliance Monitoring Ensures sensitive data (PHI, PII) is properly identified and managed Ensures business continuity for 20,000 global employee and consultants Infrastructure Data Protection & Workload Mobility ROBO Business Continuity Ensures business continuity for over 100 remote sites Consolidate small DC backups across Asia, & migration to cloud Cloud - Workload Mobility Securely manage and backup AWS EC2 data to other region Backup AWS Data

Druva inSync Data Governance Enablement Unique end-user data reach via integrated platform Endpoints Cloud Applications Automated data collection Frequent Meets legal forensic requirements Preservation in place Store, protect and maintain chain of custody Ensure immutability ✔ Collect ✔ Preserve Druva reduces the cost in collection and preservation of data while minimizing data spoliation

The eDiscovery Process Data ingestion into 3rd Party eDiscovery Tool REVIEW ANALYSIS PRODUCTION PRESENTATION PROCESSING PRESERVATION PRESERVATION INFORMATION GOVERNANCE IDENTIFICATION COLLECTION