351 likes | 413 Views
Zerto Virtual Replication 5.0. Recovering from Ransomware in minutes. Agenda. The Risk Vector Securing & Protecting Best Practices Current Data Protection & Recovery Solutions The Zerto Revolution Recovering from the Infection in Minutes Real-world Customer Story Demo. Agenda.
E N D
Zerto Virtual Replication 5.0 Recovering from Ransomware in minutes
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
A Global Problem - Worldwide infections 50k+ 50k+ 5k+ 5k+ 50k+ 50k+ 5k+ 1k+ 150k+
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
Stopping Infections Web, Email, USB, BYOD Users, IT Dept, External Disks, Network Recommendations • Audit file shares • Audit permissions • Apply read-only • Firewall policies • User VLANs • Honey trap & alerting • Secure entry points • Filter web traffic • Scan email attachments • Block USB devices • Isolated BYOD • No web access on VMs • Train users & IT • Anti-virus/malware • Restrict domain admins • Change control • Isolated external users • Software restriction policies
It Can Still Happen! 0 Day Exploits Restore Respond Protect Recommendations • Data Protection • Secured infrastructure • Isolated test networking • Payment is never advised • Infection response • Communication • Isolate source • Control spread • Test data • Restore • Root cause analysis
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
Typical Data Protection Solutions Backup Snapshot Snapshot Snapshot 4h+ 24h+ 12:00 06:00 09:00 12:00 15:00 18:00 File deletion, Application or Human error Cryptolocker Virus Infection Power Interruption or Hardware Failure = Data Loss & Downtime
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
Zerto Virtual Replication 30 dayJournal 00:00 06:00 09:00 12:00 15:00 18:00 Minimize impact, re-wind and recover from any point in time Sites Apps Files VMs
How Zerto Revolutionized Disaster Recovery Storage Hypervisor The first Enterprise-class, Software-DefinedReplication & Recovery Automation solution Security Servers Replication Networking Zerto Hypervisor Based Replication Replication was in the wrongplace – the physical layer
TM Zerto - Resilience for Evolving IT Change - No lock-in, enable new tech 1 Protect - Automate, test, remove risk 2 Evolve - DRaaS to Azure, AWS, IBM & MSPs Consolidate - Migrations, self-service Simplify - Single future-proof solution 4 3 5
Architecture - How Zerto Works Scale-out architecture, security hardenedVirtual Replication Appliance Compression, throttling, resilience Prod Site DR Site ZVM ZVM vCenter vCenter WAN/VPN VM VM VM VM VM VM VM VM VM VM VM VM VRA VRA VRA VRA vDisk vDisk vDisk VM-Level Replication Management & Orchestration1x Zerto Virtual Manager per vCenter/SCVMMWindows VM, restrict ports VM block-level changesAlways-on Replication, Data loss = SecondsNo snapshots, scheduling, impact, storage Storage-agnostic replication Replica VM & Compressed Journal vDisks Journal 1 hour to 2 weeks max, 7-10% space
ArchitectureContinuous Replication, Journaling, & Failover Testing Prod Site 6. Failover Test creates VM, reads data 7. FoT changes written to scratch 4. Data written to journal 8. FoT auto cleanup 3. Journal checkpoints created 2. ZVR tracks in memory, then replicates blocks 1. VM writes block with no impact to VM performance 5. FIFO Journal data committed DR Site ZVM ZVM vCenter vCenter Journal vDisk WAN/VPN Scratch vDisk VM VM VRA VRA vDisk vDisk VM-Level Replication
Securing Zerto - TCP Communication Ports ZVM to ZVM mgmt traffic Isolate Zerto Traffic from ZVM InfectionVRA to VRA data path use dedicated VLAN DR Site Prod Site vCenter 443 443 vCenter ZVM ZVM 9081 VM VM VM VM VM VM VM VM 400540064009 VRA 400540064009 VRA WAN Link5 Mbps Min 9669 9669 22/43 22/43 4007-4008 Mgmt Mgmt Windows VM - secure with firewallZVM to vCenter, ESXi Hosts & VRAsDual-home ZVM for segregation No file sharesRestrict User Access to ZVMNo client PC access, only IT vDisks on storage vSphere Data Secure from infection Create Isolated testing port groups VM Connectivity:VPNMPLS ESXi Hosts ESXi Hosts
Consistent Protection & Recovery • CRM VPG • SQL VPG • LUN Consistency Group evolved = Virtual Protection Group Production Site • Simple, scalable, protection & recovery of VMs, not LUNs Enterprise Applications • Recover multi-VM application stacks together CRM, ERP, SQL, Oracle, SharePoint, Exchange • Point in time recovery, write ordering & application consistency VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM • Prioritize replication, pre-seeding, reduce initial sync • Support virtualization features vMotion, svMotion, HA etc • RPO 4 seconds • ERP VPG • RPO 6seconds VM VM VM VM VM vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk • RPO 9seconds VM VM VM VM VM
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
Recovering From Cryptolocker In Minutes Disaster Event! Recovery Process: Click Failover Select Apps Verify Start Failover
*Manual V2V export from AWS Disaster Recovery Automation Automated & Orchestrated VM Recovery, RTO = Minutes Boot order, Re-IP, Scripts & Validation Production Site BC/DR Site ZVM ZVM vCenter vCenter WAN VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VRA VRA VRA VRA Failback Recovery Move Failover Test Small to large scale migrations Click to Move in MinutesSeconds of lag, test before move Replicate only changesAutomated Failback Configuration*Previous settings remembered Click to test in isolated network Non-disruptive Failover Testing Not just for DR & Offsite Clone
Recovering Individual Files & Folders in Minutes Restore Request Select Files & Folders Restore Anywhere Select VM Browser download File server data Instant-access on ZVM Select point in time Application files Mount network share Disks mounted SQL databases Data restored from seconds before Oracle databases No agent or impact Exchange databases
Virtual Awareness and Integration Hypervisor integratedReal-time DashboardService level driven Ensure compliance DR Test Reporting Prove recovery capability Role Based Access Control Single Solution for BC/DRREST API automation
Proving Compliance and Removing Risk Testing Regulations • PCI • ISO • SOX • HIPAA • SEC
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo
Real-world Zerto Customer Story Ransomware Infection: • Real screenshot from end user PC • Encrypted files on all user mapped shares with edit permissions Response: • PC was isolated from the network • Used ZVR to recover files from minutes before • No need to re-create files or accept data loss from using backup • No ransom paid • Impact minimized!
Zerto Feature Summary Enterprise-Class DisasterRecovery Software Journal Based ProtectionReduce impact, recover & re-wind Hypervisor-basedVirtual Aware Click to Test, Failover, MigrateRTO = Minutes, Prove Compliance For On-Premise DR & DRaaS Powerful Data Protection & Recovery Storage &Hypervisor Agnostic Install in MinutesSimple Scalable Software No SnapshotsAlways-on, RPO = SecondsConsistency Groupings Strategic BC/DR Platform
Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo