Dell Technologies - Powerprotect-Cyber-Recovery IDC

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

It’s not IF, but When

Internal Use - Confidential 1 Copyright © Dell Inc. All Rights Reserved.


Dell PowerProtect Cyber Recovery

Recovering Your Business from a


Sophisticated Ransomware or Cyberattack

Hugo Gonzalez
DPS Presales Director Andean, Mexico and NOLA
hugo.gonzalezsilva@dell.com
+52 55 4185 55 66
Cyber attacks are daily headlines in every market

Revil, Conti CaaS

Internal Use - Confidential 3 Copyright © Dell Inc. All Rights Reserved.


Cyber Resilience

The ability to anticipate, withstand, recover from, and


adapt to adverse conditions, stresses, attacks, or
compromises on systems that use or are enabled by
cyber resources.

Can your business withstand a cyber attack?

NIST: https://csrc.nist.gov/glossary/term/cyber_resiliency
Internal Use - Confidential 4 Copyright © Dell Inc. All Rights Reserved.
Business Continuity
Backup:
• 100% of the environment Cyber Resilience:
• Local → Offsite → Archive • 15-30% of the Environment
• Higher Recovery Points • “Crown Jewels” + Critical Rebuild Materials
• Longer Recovery Times • Physically Separate Environment
• Target for “Bad Actors” • Physically Secure Environment
• Validation • Logical Air-Gap
• Immutable Copy
Disaster Recovery: • Retention Lock
• 60-90% of the environment • Shorter Retention
• Application Dependencies • 14-35 Days

• Application Tiering • Proactive Analytics & Reporting


• Cybersense: Detect Compromise & Provide Forensics
• Replication • Disaster Recovery Level Response
• Lower recovery point objective (RPO)
• Testing • Validation + Testing
• Lower recovery time objective (RTO)

Internal Use - Confidential 5 Copyright © Dell Inc. All Rights Reserved.


Cyber resilience
is a strategy.

A high-level holistic strategy that includes


cyber security standards, guidelines, Framework
people, business processes and
technology solutions.

Example: NIST Cybersecurity Framework

Internal Use - Confidential 6 Copyright © Dell Inc. All Rights Reserved.


Cyber Recovery
is a solution.
A data protection solution that isolates
Framework business-critical data away from attack
surfaces.

Critical data is stored immutably in


a hardened vault enabling recovery
with assured data availability, integrity
and confidentiality.

Internal Use - Confidential 7 Copyright © Dell Inc. All Rights Reserved.


Ransomware and the Impact to Business
BUSINESS IMPACTS BUSINESS IMPACT

37% 35%
Reported their organization Reported C-level resignations
was forced to lay off following a ransomware attack1
employees following a
ransomware attack1

DETECTION PREVALANCE

63% 73%
Reported that the Targeted by at least one
attackers were in their ransomware attack in the
networks for up to six past 24 months
months before being
detected1

Internal Use - Confidential 8 Copyright © Dell Inc. All Rights Reserved.


Cyber resilience: Best Practices and Regulatory Considerations

“An air-gapped data backup architecture…” – Federal


Financial Institutions Examination Council

“The ability to ensure the ongoing confidentiality, integrity,


availability and resilience of processing systems …” – General Data
Protection Regulation

"It is critical to maintain offline, encrypted backups of data”


– Cybersecurity & Infrastructure Security Agency
"Ransomware payments may risk violating OFAC regulations”
– The Department of the Treasury

“Ensure backups are not connected permanently to the networks


they back up.” – Department of Justice
Internal Use - Confidential 9 Copyright © Dell Inc. All Rights Reserved.
Cyber Recovery Requirements
Modern threats require innovative solutions

Immutability Isolation Intelligence

Preserve original Physical & logical ML & analytics


integrity of data separation of data identify threats

Internal Use - Confidential 10 Copyright © Dell Inc. All Rights Reserved.


Cyber Recovery Vault Vault
Production Site

Production Apps
Isolation
VM

Corporate
Network
Secure data recovery
DR / BU
Air Gap
Inmutability
No possibility
to change
data
Checking
DRP Site ransomware
Stronger Resilience. Better Outcomes.
Reduce Risk, Speed Recovery, and Lower Costs

Basic Data Protection


Risk

Production
Immutability

Production Immutability &


Critical Rebuild Vault

Fully Mature Vault

Hours to days Days to weeks Weeks to months Up to Months

Full Time to Recover


12 Copyright © Dell Inc. All Rights Reserved.

You might also like