1 / 31

Zerto Virtual Replication 5.0

Zerto Virtual Replication 5.0. Recovering from Ransomware in minutes. Agenda. The Risk Vector Securing & Protecting Best Practices   Current Data Protection & Recovery Solutions  The Zerto Revolution Recovering from the Infection in Minutes  Real-world Customer Story Demo. Agenda.

yow
Download Presentation

Zerto Virtual Replication 5.0

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Zerto Virtual Replication 5.0 Recovering from Ransomware in minutes

  2. Agenda • The Risk Vector • Securing & Protecting Best Practices   • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  3. Agenda • The Risk Vector • Securing & Protecting Best Practices   • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  4. Ransomware Infections

  5. Big In The News

  6. A Global Problem - Worldwide infections 50k+ 50k+ 5k+ 5k+ 50k+ 50k+ 5k+ 1k+ 150k+

  7. Agenda • The Risk Vector • Securing & Protecting Best Practices   • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  8. Stopping Infections Web, Email, USB, BYOD Users, IT Dept, External Disks, Network Recommendations • Audit file shares • Audit permissions • Apply read-only • Firewall policies • User VLANs • Honey trap & alerting • Secure entry points • Filter web traffic • Scan email attachments • Block USB devices • Isolated BYOD • No web access on VMs • Train users & IT • Anti-virus/malware • Restrict domain admins • Change control • Isolated external users • Software restriction policies

  9. It Can Still Happen! 0 Day Exploits Restore Respond Protect Recommendations • Data Protection • Secured infrastructure • Isolated test networking • Payment is never advised • Infection response • Communication • Isolate source • Control spread • Test data • Restore • Root cause analysis

  10. Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  11. Typical Data Protection Solutions Backup Snapshot Snapshot Snapshot 4h+ 24h+ 12:00 06:00 09:00 12:00 15:00 18:00 File deletion, Application or Human error Cryptolocker Virus Infection Power Interruption or Hardware Failure = Data Loss & Downtime

  12. Agenda • The Risk Vector • Securing & Protecting Best Practices • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  13. Zerto Virtual Replication 30 dayJournal 00:00 06:00 09:00 12:00 15:00 18:00 Minimize impact, re-wind and recover from any point in time Sites Apps Files VMs

  14. How Zerto Revolutionized Disaster Recovery Storage Hypervisor The first Enterprise-class, Software-DefinedReplication & Recovery Automation solution Security Servers Replication Networking Zerto Hypervisor Based Replication Replication was in the wrongplace – the physical layer

  15. TM Zerto - Resilience for Evolving IT Change - No lock-in, enable new tech 1 Protect - Automate, test, remove risk 2 Evolve - DRaaS to Azure, AWS, IBM & MSPs Consolidate - Migrations, self-service Simplify - Single future-proof solution 4 3 5

  16. Architecture - How Zerto Works Scale-out architecture, security hardenedVirtual Replication Appliance Compression, throttling, resilience Prod Site DR Site ZVM ZVM vCenter vCenter WAN/VPN VM VM VM VM VM VM VM VM VM VM VM VM VRA VRA VRA VRA vDisk vDisk vDisk VM-Level Replication Management & Orchestration1x Zerto Virtual Manager per vCenter/SCVMMWindows VM, restrict ports VM block-level changesAlways-on Replication, Data loss = SecondsNo snapshots, scheduling, impact, storage Storage-agnostic replication Replica VM & Compressed Journal vDisks Journal 1 hour to 2 weeks max, 7-10% space

  17. ArchitectureContinuous Replication, Journaling, & Failover Testing Prod Site 6. Failover Test creates VM, reads data 7. FoT changes written to scratch 4. Data written to journal 8. FoT auto cleanup 3. Journal checkpoints created 2. ZVR tracks in memory, then replicates blocks 1. VM writes block with no impact to VM performance 5. FIFO Journal data committed DR Site ZVM ZVM vCenter vCenter Journal vDisk WAN/VPN Scratch vDisk VM VM VRA VRA vDisk vDisk VM-Level Replication

  18. Securing Zerto - TCP Communication Ports ZVM to ZVM mgmt traffic Isolate Zerto Traffic from ZVM InfectionVRA to VRA data path use dedicated VLAN DR Site Prod Site vCenter 443 443 vCenter ZVM ZVM 9081 VM VM VM VM VM VM VM VM 400540064009 VRA 400540064009 VRA WAN Link5 Mbps Min 9669 9669 22/43 22/43 4007-4008 Mgmt Mgmt Windows VM - secure with firewallZVM to vCenter, ESXi Hosts & VRAsDual-home ZVM for segregation No file sharesRestrict User Access to ZVMNo client PC access, only IT vDisks on storage vSphere Data Secure from infection Create Isolated testing port groups VM Connectivity:VPNMPLS ESXi Hosts ESXi Hosts

  19. Consistent Protection & Recovery • CRM VPG • SQL VPG • LUN Consistency Group evolved = Virtual Protection Group Production Site • Simple, scalable, protection & recovery of VMs, not LUNs Enterprise Applications • Recover multi-VM application stacks together CRM, ERP, SQL, Oracle, SharePoint, Exchange • Point in time recovery, write ordering & application consistency VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM • Prioritize replication, pre-seeding, reduce initial sync • Support virtualization features vMotion, svMotion, HA etc • RPO 4 seconds • ERP VPG • RPO 6seconds VM VM VM VM VM vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk vDisk • RPO 9seconds VM VM VM VM VM

  20. Agenda • The Risk Vector • Securing & Protecting Best Practices   • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes • Real-world Customer Story • Demo

  21. Recovering From Cryptolocker In Minutes Disaster Event! Recovery Process: Click Failover Select Apps Verify Start Failover

  22. *Manual V2V export from AWS Disaster Recovery Automation Automated & Orchestrated VM Recovery, RTO = Minutes Boot order, Re-IP, Scripts & Validation Production Site BC/DR Site ZVM ZVM vCenter vCenter WAN VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VRA VRA VRA VRA Failback Recovery Move Failover Test Small to large scale migrations Click to Move in MinutesSeconds of lag, test before move Replicate only changesAutomated Failback Configuration*Previous settings remembered Click to test in isolated network Non-disruptive Failover Testing Not just for DR & Offsite Clone

  23. Recovering Individual Files & Folders in Minutes Restore Request Select Files & Folders Restore Anywhere Select VM Browser download File server data Instant-access on ZVM Select point in time Application files Mount network share Disks mounted SQL databases Data restored from seconds before Oracle databases No agent or impact Exchange databases

  24. Virtual Awareness and Integration Hypervisor integratedReal-time DashboardService level driven Ensure compliance DR Test Reporting Prove recovery capability Role Based Access Control Single Solution for BC/DRREST API automation

  25. Proving Compliance and Removing Risk Testing Regulations • PCI • ISO • SOX • HIPAA • SEC

  26. Agenda • The Risk Vector • Securing & Protecting Best Practices   • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  27. Real-world Zerto Customer Story Ransomware Infection: • Real screenshot from end user PC • Encrypted files on all user mapped shares with edit permissions Response: • PC was isolated from the network • Used ZVR to recover files from minutes before • No need to re-create files or accept data loss from using backup • No ransom paid • Impact minimized!

  28. Zerto Feature Summary Enterprise-Class DisasterRecovery Software Journal Based ProtectionReduce impact, recover & re-wind Hypervisor-basedVirtual Aware Click to Test, Failover, MigrateRTO = Minutes, Prove Compliance For On-Premise DR & DRaaS Powerful Data Protection & Recovery Storage &Hypervisor Agnostic Install in MinutesSimple Scalable Software No SnapshotsAlways-on, RPO = SecondsConsistency Groupings Strategic BC/DR Platform

  29. Agenda • The Risk Vector • Securing & Protecting Best Practices   • Current Data Protection & Recovery Solutions  • The Zerto Revolution • Recovering from the Infection in Minutes  • Real-world Customer Story • Demo

  30. Demo

  31. Q&A

More Related