Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think

download Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think

If you can't read please download the document

  • date post

    08-Jan-2017
  • Category

    Technology

  • view

    49
  • download

    0

Embed Size (px)

Transcript of Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think

Ransomware Five Reasons Youre Not As Protected As You Think

In this webinar you will learn:Understand how Ransomware is Getting Worse

Backups and Snapshots Are No Longer Enough

3 Things You Can Do to Protect Yourself RansomwareFive Reasons Youre Not As Protected As You Think

On Demand Webinar

For audio playback and Q&A go to:http://bit.ly/Ransom5

Analyst firm focused on storage, cloud and virtualization

Knowledge of these markets is gained through product testing and interaction with end users and suppliers

The results of this research can be found in the articles, videos, webinars, product analysis and case studies on our web site:http://storageswiss.comWho Is Storage Switzerland?

Our Speakers

George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the subjects of big data, solid state storage, virtualization, cloud computing and data protection.

He is widely recognized for his articles, white papers, and videos on such current approaches as all-flash arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking. He has over 25 years of experience designing storage solutions for data centers across the US.

Our SpeakersGary Watson co-founded Nexsan in 1999 and served as Chief Technology Officer until the company was acquired in 2013. In 2014, Mr. Watson was given the title Imation Fellow in recognition of his service. Now, he is the Vice President of Technical Engagement for Nexsan and was described in a recent interview as one of those brilliant technical people who also possesses the gift to communicate eloquently, enthusiastically and informatively with any audience. Prior to Nexsan, Mr. Watson held engineering and management positions at Trimm Technologies, Data General and Digital Equipment Corporation minicomputers. He studied Physics at Harvey Mudd College in Claremont, California.

Imation | Nexsan Company Overview

Imation Parent CompanyHolding Company Divested from legacy businessesNexsan - Trading CompanyFounded in 1999Pioneered capacity-optimized storageA history of technological innovationOver 40,000 systems installedOver 20,000 end-users, 60 countriesSix major facilities: Campbell, Thousand Oaks, Escondido CA; Montreal Canada; Derby, East Isley UK

#2016 Nexsan. All Rights Reserved.

What Is Ransomware?Malware that, once triggered, encrypts dataFor the most part the only way to un-encrypt is to pay encryptorKey target is unstructured data and now databases

The State Of RansomwareOver 80% of businesses have been infected at least once this yearOver 40% have paid the ransomTypical ransoms range from $2,000 to $15,000

Why Is Ransomware So Effective?Thrives on Weaknesses in organizations data protection strategiesWeaknesses in end-user trainingRansom $ is low Cheaper than recovering dataBecause the data protection process is too complexOrganizations have a False Sense of Security

Reason 1: Backups Arent Frequent EnoughRansomware attacks occur during the dayHours after backups have been completedThe most valuable data, the data that is being created or modified on THAT day, is also the day you are most likely to pay to encryptSome Ransomware has specifically targeted backup files first

Reason 2: Backup Devices Arent SafeMost Disk Backup Appliances are network mountsBackups are stored as files on the applianceRansomware can encrypt those files just like any otherSome Ransomware has specifically targeted popular disk backup appliances

Reason 3: Snapshots Arent SafeSnapshots CAN be taken more frequentlyStill may not be frequent enoughMay impact production storage performanceRequire more storage capacityMost snapshots are easily mountableSome Ransomware specifically targets snapshots

Reason 4: Users Can Only Be Trained So FarWhat can be done (what should we train them on)But Ransomware emails are getting more creative

Reason 5: Ransomware Is Getting MORE SophisticatedTargeting specific devicesNo longer aimlessly walks the file systemEncrypts high value data (database)

The Ransomware SolutionReal-time data protectionProtected data stored as Read-OnlyCost effective storage platformmulti-purpose, solves more problems than Ransomware

Assureon providesLong term archive storage for fixed content filesGuaranteed file availabilityGuaranteed file integrity

Assureon doesnt have a delete key files are removed only pursuant to defined Retention Rules. Some or all Rules may be configured such that even the administrator cant change them, or can only change them after a specified period of time.The inability of even admin-level people or systems to directly modify or delete a file makes Assureon very resistant to viruses and ransomware.

#2016 Nexsan. All Rights Reserved.

A unique fingerprint representing the content of each file is generated upon ingestionEvery 90 days the integrity of every file is audited against the original fingerprintGuarantees file level integrity within the archiveGuarantees that a file has not been changed (authenticity)Reports any data corruptionSelf healing if corruption is foundProvides an audit of file integrity

Guaranteed File Integrity Fingerprint Audit

#2016 Nexsan. All Rights Reserved.

Files entering the Assureon Archive are given a unique sequential serial number an asset tagEvery 90 days every file is checked to make sure it is in the archivePerformed at both the primary site and the secondary siteEnsures all files are present in the Assureon archiveReports any missing dataAutomatically heals missing filesProvides an audit of file availabilityUnique to AssureonGuaranteed File Availability - Serialization Audit1234

67Missing

#2016 Nexsan. All Rights Reserved.

Enhanced Data Privacy Audit Logs stored securely.Tamper Proof files and metadata are cryptographically chained together (US Patent 7,801,871 et al)Encryption at Rest with unique key per file.Separation of Data physically and or logically.

Encryption + Authentication + Audit Logging = Proper Chain of Custody

#2016 Nexsan. All Rights Reserved.Access Audit TrailUnalterable audit trail for each files lifeLogs every file access (who and when)Also logs unauthorized, denied attemptsPermanent WORM write once read many

Tamper Proof changes of any files are found by audits and corrected by the second copy

Encryption of Files at RestEach file individually encrypted with AES256 (same as top secret classified information)Annual key management subscription

Separation of Data - Virtualized Multi-TenancyVirtual archives per company division Enables cloud service providers to share a common infrastructure across multiple companies with no co-mingling of filesEach companys files are virtually and physically separated into their own safe deposit box within the Assureon vaultSeparate encryption systems per entityAuthenticationLock & Key is a combination of our IronKey product with the Assureon to offer 2 factor authentication at the Administration level for additional login securityActive Directory (most common, but there are other ways to authenticate)

17

Thank you!Storage Switzerlandhttp://www.storageswiss.comgeorgeacrump@storageswiss.com

StorageSwiss on Twitter:http://twitter.com/storageswiss

StorageSwiss on YouTube:http://www.youtube.com/user/storageswiss

Nexsanhttps://www.nexsan.com

Nexsan on Twitter:https://twitter.com/Nexsan

Nexsan on LinkedIn:https://www.linkedin.com/company/nexsan

Nexsan on Facebook:https://www.facebook.com/Nexsan

RansomwareFive Reasons Youre Not As Protected As You Think

For Complete Audio and Q&A please register for the On-Demand Version at http://bit.ly/Ransom5