Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure Data – a safe place in an unsafe world!

Similar presentations


Presentation on theme: "Secure Data – a safe place in an unsafe world!"— Presentation transcript:

1 Secure Data – a safe place in an unsafe world!
Atlanta 2017 Secure Data – a safe place in an unsafe world!

2 Agenda A company’s most important asset Backup Storage Choices
3-2-1 Backup Rule Traditional Backup Storage Challenges Deduplication – Good or Bad? Backup-to-disk Appliances Ransomware

3 What is a company’s most important asset?
Employees? Patents? Reputation? DATA

4 What Are Your Choices For Backup Storage
Tape Disk Disk Backup with Deduplication Cloud

5 Tape for Backup Performance – Slow backup and restore
Reliability – Less than disk Cost – Low to moderate Where does Tape fit? Long-term “regulatory” retention “Archive”

6 Disk for Backup Performance - Fast Reliability - High Cost - High
Where does Disk fit? Primary storage

7 Disk Backup with Deduplication
Performance – moderate to fast Reliability - high Cost – low to high Where does Disk backup with Deduplication fit? “Operational” retention “Regulatory” retention

8 Cloud for Backup Performance - slow Reliability - high
Cost – moderate to high Where does Cloud fit? DR or “archive” copy of backups

9 3-2-1 Backup Rule Maintain at least three copies of your backups Store backups on at least two different types of media Keep one of the backups at a different location 3 2 1

10 Traditional Backup Storage Challenges
As data grows: Time to backup grows Time to restore grows Time to offsite grows System breaks – Resulting in disruptive fork lift upgrade 1 2

11 5 Considerations of Data Deduplication

12 Disk Backup with Deduplication
Architectural Approaches Deduplication in the backup software to straight disk Inline deduplication with scale-up Landing zone with scale-out

13 Challenges of Software-based Deduplication
Deduplication in the media server All data stored deduplicated Deduplication ratios are low Limited scalability

14 Inline Scale-up Appliances Fall Short
Inline deduplication on the way to disk All data is stored in deduplicated form As data grows, only disk is added Restores are slow as data needs rehydration

15 Fastest Backups and Shortest Backup Window
Unique landing zone Write backups direct to disk Adaptive deduplication Benefits Fastest backups Shortest possible backup window Strong offsite RPO

16 Fast Restores, VM Boots in Seconds to Minutes
Unique landing zone Most recent backups are in undeduplicated form Eliminates data rehydration Benefits Restores as fast as disk Tape copies as fast as disk VM boots in seconds to minutes

17 Infrastructure to a Backup App
DR Scenarios 2nd Site Data Center Hosted Co-Location Hybrid Cloud Infrastructure to a Backup App Public Cloud

18 Insulating your company from Ransomware
The true cost of a ransomware goes far beyond the ransom lost productivity loss of data loss of customer confidence Go right out of business Notes: From ExaGrid Reliability and Redundancy Data Sheet; When ransomware strikes, it is critical to have backups insulated from the malicious encryption/damage since they may be your last line of defense. ExaGrid helps insulate backups in the following ways: Comprehensive access security ExaGrid shares can be accessed only from designated backup/media servers. While those severs may also be subject to rampant ransomware, the fewer servers that have access to your backups, the better. SMB signing can be enabled for ExaGrid shares, requiring Windows account credentials to be authenticated and authorized before access is granted to an ExaGrid share, further reducing the chance of malicious access to backups. Veeam Accelerated Data Mover shares require a separate Veeam password and are accessible only via SSH, which also reduces the chance of malicious access to Veeam backups. All accounts used to manage the ExaGrid software are protected using non-default passwords. This includes the backup “admin” account, the special ExaGrid customer support account, and root access.

19 Protecting your company from Ransomware
Backup your data Maintain at least three copies of your backups Store backups on at least two different types of media Keep one of the backups at a different location Encrypt your backups at rest Tape Educate employee to just “ignore” suspicious s or links Test s Simulated attacks Patch systems regularly Block appropriately (FW) Antivirus software Notes: From ExaGrid Reliability and Redundancy Data Sheet; When ransomware strikes, it is critical to have backups insulated from the malicious encryption/damage since they may be your last line of defense. ExaGrid helps insulate backups in the following ways: Comprehensive access security ExaGrid shares can be accessed only from designated backup/media servers. While those severs may also be subject to rampant ransomware, the fewer servers that have access to your backups, the better. SMB signing can be enabled for ExaGrid shares, requiring Windows account credentials to be authenticated and authorized before access is granted to an ExaGrid share, further reducing the chance of malicious access to backups. Veeam Accelerated Data Mover shares require a separate Veeam password and are accessible only via SSH, which also reduces the chance of malicious access to Veeam backups. All accounts used to manage the ExaGrid software are protected using non-default passwords. This includes the backup “admin” account, the special ExaGrid customer support account, and root access.

20 ExaGrid / Stress-Free Backup Storage
Thank You!


Download ppt "Secure Data – a safe place in an unsafe world!"

Similar presentations


Ads by Google