Back-ups:
Hoe ze je kunnen redden
van een cyberaanval
Combell webinar
Pieter Vereecken
Sr. Cloud Systems Engineer
pieter.vereecken@veeam.com
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
You were automatically muted on entry
If you have a question, use the Q&A
or chat functions
We will post the recording and the presentation
This webinar
is being recorded
About this webinar
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
In this session…
Why you can never be protected 100% against hackers
and why you need (off-site) backups.
 Data protection strategy
 Security
 On-site & Off-site backups
 Demo
 Monitoring & Reporting
 Q & A
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
The most trusted
provider of Backup
solutions that deliver
Cloud Data Management
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
A Single Platform for Cloud, Virtual and Physical
Backup & Replication
Backup and replication
Monitoring and analytics
DataLabs
Orchestration
Universal Storage APIs
CloudSaaSPhysicalVirtual
Object Storage
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Why Veeam?
“It Just Works”
Portable data format
Instant recovery
Strong support
Reliable
Built-in intelligence
Actionable insights
100% verified recovery
Scalable architecture
Simple
Software defined
Hardware agnostic
Copy data management
Cloud ready
Flexible
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Ransomware protection
best practices
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Starts with mitigating security risks
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Security is inconvenient!
Let’s meet Dave >
Domain admin
Controls the whole domain for the
organization!
Backup administrator
Can perform all administrative
backup activities!
Storage administrator
Manages the production storage
and the backup storage!
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Production Domain
Dave’s IT operation
DMZ
Offline Domain
Secondary storagePrimary storage
vCenter
server
VM’s
vApp
VM
snapshots
Storage
Clients
Users
Applications
Servers
Production
AD
Separation
By IAM and Firewall
Random Backup
infrastructure
Tape backup policy, weekly full backup to tape (keep 5
weeks) and also a monthly full to tape (keep for 12 months)
Backup policy, daily backup to disk of all
servers and workstations
1. No protection against cyber-attacks
2. Big risk! Everything is running in the
same security domain
3. Only week backups are stored offline
Human Error
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Think about security aspects
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Production Domain Resource domain
Identity and Access Separation
DMZ
Public Cloud IAM
One-Way Trust
Complete
Separation
Complete Separation
Object
Storage
BLOB API
S3 API
Service ProviderOffline Domain
Secret Key + Shared Key + Veeam Encryption
Secret Key + Shared Key + IAM Access Role + Veeam Encryption + Immutability
Backup server
S3 API
Object
Storage
AD Auth (sep.acc)
Windows
Repository
Service Provider
Access Keys
Local Linux Cred.
Linux
Repository
COS APISecret Key + Shared Key + Veeam Encryption
Secondary storagePrimary storage
Backup
Proxies
Restricted Zone
Vendor Spec. Prot
Dedup
Appliances
vCenter
server
VM’s
vApp
VM snapshots
Storage
Clients
Users
Applications
Files
Service
Provider
Recycle Bin
Feature
Production
AD Resource
AD
Human Error
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Design for ‘cyber’-recovery
Infection ExploitDetection Recovery
• 3-2-1 Backup
• SureBackup
• Veeam ONE
• Data Integration API
• Staged Restore
• DataLabs Forensics
• Enhanced NAS Recovery
• Secure Restore
• Cloud Tier with
Immutability
• Cloud Connect
Detection features Recovery features
• Tape backup
• Restore to Azure
• Restore to AWS
• Physical to Virtual
recovery
Cyber Attack
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Avoiding recovery failure
3-2-1-0 Rule
2Different media
3Different copies
of data
1of which is off
site or offline
0No errors
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Offline or air-gapped storage
Likely the single most effective resiliency technique is to have some form of offline
storage: tape, removable disk, etc.
Completely offline when not being written to or read from
Replicated VMs Powered off and, in most situations, can be a different authentication
framework (ex: vSphere and Hyper-V hosts are on a different domain)
Primary storage
snapshots
Can be used as recovery techniques and usually have a different authentication framework
Veeam Cloud Connect
backups
Not connected directly to the backup infrastructure and uses a different authentication mechanism along
with different API and Serviceprovider based Recycle-Bin
Rotating hard drives
(rotating media)
Offline when not being written to or read from (similar to tape)
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
3-2-1-0 in place, recovery covered?
What are you achieving with 3-2-1-0?
Does it have anything to do with recovery?
Does it say anything about how long restore will take?
Does it say anything about where to restore to?
Does it say anything about the order in which to restore?
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Business Continuity is Key
How much time it takes to recover your data and how recent
the backup to restore is are defined in RTO and RPO.
Last backup
Recovery point
Recovery data
Recovery TimeOutage
How far How long
Recovery Time Objective (RTO)
The amount within which a system must be recovered
after an outage
Recovery Point Objective (RPO)
Point in time to which system's data must
be recovered after an outage
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam
Backup & Replication
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam
Backup Server
Source hosts Loadbalancing
Backup
central management of
local and remote
components
Production
Tape Server
Backup
Proxies
Veeam High Level Architecture
Off-site Storage
Secondary copy
and long-term
retention
Scale-out
Repository
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Backup & Replication
Storage Snapshots
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Use of Storage Snapshots for better RTO and RPO
During backup, data transport and consistency processing reduce performance
of applications.
Leverage storage snapshots between the backup for even better Recovery Time
and Recovery Point Objectives.
3 PM
Snap
Backup
+ snap
Snap Snap Snap Snap Snap Snap Snap Snap Snap
Backup
+ snap
8 PM 9 PM 10 PM 11 PM 12 PM 1 AM 4 PM 5 PM
…
6 PM 7 PM 8 PM
…
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Explorer for Storage Snapshots
Instant VM
Recovery
Linux Files
Windows Files
Active
Directory
Exchange
SharePoint
MS SQL
Oracle
Veeam backup and replication
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Backup & Replication
Backups
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Backup of Virtual Machines
Inline data reduction
Change block tracking aware
Agentless backup
256-bit encryption
Policy driven backup automation
Build-in application aware processing of:
• Microsoft Active Directory
• Microsoft Exchange
• Microsoft SQL
• Microsoft SharePoint
• Oracle Databases
Image-level backup with granular restore options
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Policy driven Backup
SLA based policies
Based on tags
Automated through
VMware vCenter
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Backup & Replication
Backup Copies
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Backup Copy
Comply with the 3-2-1-0 rule
Production storage Primary backup storage
WAN acceleration
Secondary backup storage
Secondary backup storage
(offsite)
Backup
Backup copy
Backup copy
Combell
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Build-in WAN Acceleration
Built-in WAN Acceleration with global caching, variable block length data fingerprinting and
traffic compression
Source Backup
Repository
Target Backup
Repository
Data Mover
Service
Target
WAN Accelerator
WAN
Backup Copy
and/or Replica job
Source
WAN Accelerator
Data Mover
Service
Reduce bandwidth needed to copy
your backups to a secondary location
Save on bandwidth costs by efficiently
sent only the missing blocks
Intelligently save time on backup copy
and replica jobs
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Veeam Cloud Connect Backup
Client
 Customer has no cloud resources to manage
 Offsite backups can be protected against ransomware
Combell data center
Veeam
Service
Provider
WAN
Cloud
gateway
Backup
repository
Cloud repositories
Production Veeam Environment
Veeam Cloud
Connect SSL tunnel
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Insider Protection
Deleted Backups Protection
 Per tenant setting
 For the tenant, backup files moved to
the "recycle bin" appear as actually
deleted.
 To restore from “recycle bin”, tenant
must contact service provider.
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Recover Full VMs, Files and Folders
Restore functionalities
include:
 Full VM restore
 VM files restore
 VM guest OS files
restore
 Application items
restore
 Disk export
 Backup export
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Demo
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Data Protection
Monitoring & Reporting
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Why do we need analytics?
In order to maintain Availability organizations require analytics into:
 Storage capacity and performance
 Failed VM backups
 Failed compliance
 Data management resources and associated costs
 Tracking configurations
 And more!
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Identify EVERY Unprotected VM
Veeam ONE helps users easily determine which VMs are protected and which are
not by categorizing VMs based on restore points to:
 Provide users valuable time to ensure protection of each VM
 Dramatically reduce the risk of downtime
Are you completely protected?
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Backup Reporting
Including:
 Backup Infrastructure assessment
 Performance and bandwidth savings from built-in WAN acceleration
 Audit operator restore activity
 Status of backup and replication jobs
 Unprotected VMs that are not covered by any backup jobs
 Change tracking for backup job configuration
 GFS Backup files
 VM and computer protection history
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Track backup object changes
Report on who changed what settings and
when.
Governance & Compliance
Audit backup infrastructure changes and
report on user account and modifications.
Object Change Tracking
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Recovery Verification Recovery Verification
Recovery Verification
Overview
Validates the completion status of
SureBackup jobs and displays the results of
recovery verification tests
Governance & Compliance
The report helps you reveal the list of
operational VMs that can be restored
from the produced backup or replicas
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Key takeaways
Design with security in mind
Use multiple backup locations (3-2-1 rule)
Use multiple security domains
Offline and offsite backups can be lifesavers
Document everything (reporting)
Use multiple authentication accounts and roles
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
Questions?
© 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners.
THANK YOU!

More Related Content

PDF
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
PDF
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
PDF
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
PPTX
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
PDF
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
PPT
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
PPTX
Cloud Networking Presentation - WAN Summit - Ciaran Roche
PPT
Why Security Teams should care about VMware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Why Security Teams should care about VMware

What's hot (20)

PDF
Infinidat InfiniGuard
PPTX
Crm implementation (oracle)
PPTX
ROI for IP Address Management (IPAM) Solutions
PPTX
Cloud video surveillance
PPTX
HCI ECOCAST
PPTX
Backup2013 - Barracuda Networks
PPTX
Increasing Business Value Through High-Availability Technology
PDF
Vsicm51 m02 virtualization_intro_
PPT
Barracuda company and product presentation
PPTX
Disaster Recovery Cook Book
PDF
ANS Solution Portfolio
PPT
SolarWinds IPAM vs MS Win Server 2012
PPT
Barracuda Networks Overview
PDF
2019 Pure Storage Top Ten Benefits
PDF
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
PPTX
Designing your xen desktop 7.5 environment with training guide
PPT
Prueba de Presentacion
PPT
Private cloud with vmware
PPTX
Cisco prime network 4.1 technical overview
PPTX
Breaking the Disaster Recovery Mold
Infinidat InfiniGuard
Crm implementation (oracle)
ROI for IP Address Management (IPAM) Solutions
Cloud video surveillance
HCI ECOCAST
Backup2013 - Barracuda Networks
Increasing Business Value Through High-Availability Technology
Vsicm51 m02 virtualization_intro_
Barracuda company and product presentation
Disaster Recovery Cook Book
ANS Solution Portfolio
SolarWinds IPAM vs MS Win Server 2012
Barracuda Networks Overview
2019 Pure Storage Top Ten Benefits
SCUGBE_Lowlands_Unite_2017_Achieving productivity without an on premises infr...
Designing your xen desktop 7.5 environment with training guide
Prueba de Presentacion
Private cloud with vmware
Cisco prime network 4.1 technical overview
Breaking the Disaster Recovery Mold
Ad

Similar to Back-ups: Hoe ze je kunnen redden van een cyberaanval (20)

PDF
VMware TechTues - Veeam Availability Suite
PPTX
Veeam Solutions for SMB_2022.pptx
PDF
Veeam-backup-storage-best-practices-v12.1.pdf
PPTX
Veeam Availability Suite by Veeam- 2018.pptx
PDF
Veeam Availability top 10 reasons to choose veeam - long
PPTX
2021 二月份 Veeam 與解決方案概觀
PDF
Mc git ops_incorpbackups_kanister
PPTX
L2 Veeam Overview Pitch Deck Español.pptx
PPTX
Migration Cloud de messagerie hybride SMTP
PPTX
Flash Card- Architect Migration, Business Continuity and DR in Azure
PPTX
VeeamBackup-Replication-12-0-Sample-ppt.pptx
PPTX
Zerto Virtual Replication 4.5
PPTX
Technical track 2: arcserve UDP for virtualization & cloud
PPTX
Databarracks zerto - webinar - sept2015-slideshare
PPTX
Technical track 2_Virtualization & Cloud
PPT
Dr Training V1 07 17 09 Rev Four 4
PDF
VMware
PDF
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
PDF
Ransomeware Recovery by Veeam
PPTX
The Best Storage For V Mware Environments Customer Presentation Jul201
VMware TechTues - Veeam Availability Suite
Veeam Solutions for SMB_2022.pptx
Veeam-backup-storage-best-practices-v12.1.pdf
Veeam Availability Suite by Veeam- 2018.pptx
Veeam Availability top 10 reasons to choose veeam - long
2021 二月份 Veeam 與解決方案概觀
Mc git ops_incorpbackups_kanister
L2 Veeam Overview Pitch Deck Español.pptx
Migration Cloud de messagerie hybride SMTP
Flash Card- Architect Migration, Business Continuity and DR in Azure
VeeamBackup-Replication-12-0-Sample-ppt.pptx
Zerto Virtual Replication 4.5
Technical track 2: arcserve UDP for virtualization & cloud
Databarracks zerto - webinar - sept2015-slideshare
Technical track 2_Virtualization & Cloud
Dr Training V1 07 17 09 Rev Four 4
VMware
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Ransomeware Recovery by Veeam
The Best Storage For V Mware Environments Customer Presentation Jul201
Ad

More from Combell NV (20)

PPTX
Play it extra safe! Kies een goede cyberverzekering
PPTX
Hoe gebruik je het resellerplatform als partner van Combell
PPTX
Managed WordPress bij Combell – wat doet dat precies?
PPTX
Cyberaanvallen: Overzicht, gevolgen en beveiligingstips
PDF
Hoe gebruik je het resellerplatform als partner van Combell
PPTX
Hoe laat je jouw website scoren in zoekmachines zoals Google
PPTX
Een webshop bouwen in WooCommerce – advanced sessie
PPTX
Hoe start je een webshop met WordPress / WooCommerce
PDF
Keeping the cloud in check cvodmd
PDF
Hybrid cloud wiskyweb2012
PPTX
2012 03-27 developers e-commercedag presentatie5 ssl
PPTX
2012 03-27 developers e-commercedag presentatie2 drupal
PPTX
2012 03-27 developers e-commercedag presentatie1 magento
PPTX
2012 03-27 developers e-commercedag presentatie4 ogone
PDF
10 doe-het-zelf tips om aan e-commerce te doen
PDF
Develop and deploy using Hybrid Cloud Strategies confoo2012
PDF
Php through the eyes of a hoster confoo
PDF
Hybrid Cloud PHPUK2012
PPTX
2012 02-07 sql denali presentatie microsoft
PDF
11 tips om in de Cloud te raken en er niet uit te vallen
Play it extra safe! Kies een goede cyberverzekering
Hoe gebruik je het resellerplatform als partner van Combell
Managed WordPress bij Combell – wat doet dat precies?
Cyberaanvallen: Overzicht, gevolgen en beveiligingstips
Hoe gebruik je het resellerplatform als partner van Combell
Hoe laat je jouw website scoren in zoekmachines zoals Google
Een webshop bouwen in WooCommerce – advanced sessie
Hoe start je een webshop met WordPress / WooCommerce
Keeping the cloud in check cvodmd
Hybrid cloud wiskyweb2012
2012 03-27 developers e-commercedag presentatie5 ssl
2012 03-27 developers e-commercedag presentatie2 drupal
2012 03-27 developers e-commercedag presentatie1 magento
2012 03-27 developers e-commercedag presentatie4 ogone
10 doe-het-zelf tips om aan e-commerce te doen
Develop and deploy using Hybrid Cloud Strategies confoo2012
Php through the eyes of a hoster confoo
Hybrid Cloud PHPUK2012
2012 02-07 sql denali presentatie microsoft
11 tips om in de Cloud te raken en er niet uit te vallen

Recently uploaded (20)

PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Altius execution marketplace concept.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Decision Optimization - From Theory to Practice
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Examining Bias in AI Generated News Content.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
4 layer Arch & Reference Arch of IoT.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Altius execution marketplace concept.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Connector Corner: Transform Unstructured Documents with Agentic Automation
Build automations faster and more reliably with UiPath ScreenPlay
Auditboard EB SOX Playbook 2023 edition.
Rapid Prototyping: A lecture on prototyping techniques for interface design
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Advancing precision in air quality forecasting through machine learning integ...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Build Real-Time ML Apps with Python, Feast & NoSQL
Decision Optimization - From Theory to Practice
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Examining Bias in AI Generated News Content.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
4 layer Arch & Reference Arch of IoT.pdf

Back-ups: Hoe ze je kunnen redden van een cyberaanval

  • 1. Back-ups: Hoe ze je kunnen redden van een cyberaanval Combell webinar Pieter Vereecken Sr. Cloud Systems Engineer [email protected]
  • 2. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. You were automatically muted on entry If you have a question, use the Q&A or chat functions We will post the recording and the presentation This webinar is being recorded About this webinar
  • 3. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. In this session… Why you can never be protected 100% against hackers and why you need (off-site) backups.  Data protection strategy  Security  On-site & Off-site backups  Demo  Monitoring & Reporting  Q & A
  • 4. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. The most trusted provider of Backup solutions that deliver Cloud Data Management
  • 5. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. A Single Platform for Cloud, Virtual and Physical Backup & Replication Backup and replication Monitoring and analytics DataLabs Orchestration Universal Storage APIs CloudSaaSPhysicalVirtual Object Storage
  • 6. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Why Veeam? “It Just Works” Portable data format Instant recovery Strong support Reliable Built-in intelligence Actionable insights 100% verified recovery Scalable architecture Simple Software defined Hardware agnostic Copy data management Cloud ready Flexible
  • 7. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Ransomware protection best practices
  • 8. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Starts with mitigating security risks
  • 9. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Security is inconvenient! Let’s meet Dave > Domain admin Controls the whole domain for the organization! Backup administrator Can perform all administrative backup activities! Storage administrator Manages the production storage and the backup storage!
  • 10. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Production Domain Dave’s IT operation DMZ Offline Domain Secondary storagePrimary storage vCenter server VM’s vApp VM snapshots Storage Clients Users Applications Servers Production AD Separation By IAM and Firewall Random Backup infrastructure Tape backup policy, weekly full backup to tape (keep 5 weeks) and also a monthly full to tape (keep for 12 months) Backup policy, daily backup to disk of all servers and workstations 1. No protection against cyber-attacks 2. Big risk! Everything is running in the same security domain 3. Only week backups are stored offline Human Error
  • 11. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Think about security aspects
  • 12. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Production Domain Resource domain Identity and Access Separation DMZ Public Cloud IAM One-Way Trust Complete Separation Complete Separation Object Storage BLOB API S3 API Service ProviderOffline Domain Secret Key + Shared Key + Veeam Encryption Secret Key + Shared Key + IAM Access Role + Veeam Encryption + Immutability Backup server S3 API Object Storage AD Auth (sep.acc) Windows Repository Service Provider Access Keys Local Linux Cred. Linux Repository COS APISecret Key + Shared Key + Veeam Encryption Secondary storagePrimary storage Backup Proxies Restricted Zone Vendor Spec. Prot Dedup Appliances vCenter server VM’s vApp VM snapshots Storage Clients Users Applications Files Service Provider Recycle Bin Feature Production AD Resource AD Human Error
  • 13. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Design for ‘cyber’-recovery Infection ExploitDetection Recovery • 3-2-1 Backup • SureBackup • Veeam ONE • Data Integration API • Staged Restore • DataLabs Forensics • Enhanced NAS Recovery • Secure Restore • Cloud Tier with Immutability • Cloud Connect Detection features Recovery features • Tape backup • Restore to Azure • Restore to AWS • Physical to Virtual recovery Cyber Attack
  • 14. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Avoiding recovery failure 3-2-1-0 Rule 2Different media 3Different copies of data 1of which is off site or offline 0No errors
  • 15. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Offline or air-gapped storage Likely the single most effective resiliency technique is to have some form of offline storage: tape, removable disk, etc. Completely offline when not being written to or read from Replicated VMs Powered off and, in most situations, can be a different authentication framework (ex: vSphere and Hyper-V hosts are on a different domain) Primary storage snapshots Can be used as recovery techniques and usually have a different authentication framework Veeam Cloud Connect backups Not connected directly to the backup infrastructure and uses a different authentication mechanism along with different API and Serviceprovider based Recycle-Bin Rotating hard drives (rotating media) Offline when not being written to or read from (similar to tape)
  • 16. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 3-2-1-0 in place, recovery covered? What are you achieving with 3-2-1-0? Does it have anything to do with recovery? Does it say anything about how long restore will take? Does it say anything about where to restore to? Does it say anything about the order in which to restore?
  • 17. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Business Continuity is Key How much time it takes to recover your data and how recent the backup to restore is are defined in RTO and RPO. Last backup Recovery point Recovery data Recovery TimeOutage How far How long Recovery Time Objective (RTO) The amount within which a system must be recovered after an outage Recovery Point Objective (RPO) Point in time to which system's data must be recovered after an outage
  • 18. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication
  • 19. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup Server Source hosts Loadbalancing Backup central management of local and remote components Production Tape Server Backup Proxies Veeam High Level Architecture Off-site Storage Secondary copy and long-term retention Scale-out Repository
  • 20. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication Storage Snapshots
  • 21. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Use of Storage Snapshots for better RTO and RPO During backup, data transport and consistency processing reduce performance of applications. Leverage storage snapshots between the backup for even better Recovery Time and Recovery Point Objectives. 3 PM Snap Backup + snap Snap Snap Snap Snap Snap Snap Snap Snap Snap Backup + snap 8 PM 9 PM 10 PM 11 PM 12 PM 1 AM 4 PM 5 PM … 6 PM 7 PM 8 PM …
  • 22. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Explorer for Storage Snapshots Instant VM Recovery Linux Files Windows Files Active Directory Exchange SharePoint MS SQL Oracle Veeam backup and replication
  • 23. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication Backups
  • 24. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Backup of Virtual Machines Inline data reduction Change block tracking aware Agentless backup 256-bit encryption Policy driven backup automation Build-in application aware processing of: • Microsoft Active Directory • Microsoft Exchange • Microsoft SQL • Microsoft SharePoint • Oracle Databases Image-level backup with granular restore options
  • 25. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Policy driven Backup SLA based policies Based on tags Automated through VMware vCenter
  • 26. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Backup & Replication Backup Copies
  • 27. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Backup Copy Comply with the 3-2-1-0 rule Production storage Primary backup storage WAN acceleration Secondary backup storage Secondary backup storage (offsite) Backup Backup copy Backup copy Combell
  • 28. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Build-in WAN Acceleration Built-in WAN Acceleration with global caching, variable block length data fingerprinting and traffic compression Source Backup Repository Target Backup Repository Data Mover Service Target WAN Accelerator WAN Backup Copy and/or Replica job Source WAN Accelerator Data Mover Service Reduce bandwidth needed to copy your backups to a secondary location Save on bandwidth costs by efficiently sent only the missing blocks Intelligently save time on backup copy and replica jobs
  • 29. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Veeam Cloud Connect Backup Client  Customer has no cloud resources to manage  Offsite backups can be protected against ransomware Combell data center Veeam Service Provider WAN Cloud gateway Backup repository Cloud repositories Production Veeam Environment Veeam Cloud Connect SSL tunnel
  • 30. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Insider Protection Deleted Backups Protection  Per tenant setting  For the tenant, backup files moved to the "recycle bin" appear as actually deleted.  To restore from “recycle bin”, tenant must contact service provider.
  • 31. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Recover Full VMs, Files and Folders Restore functionalities include:  Full VM restore  VM files restore  VM guest OS files restore  Application items restore  Disk export  Backup export
  • 32. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Demo
  • 33. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Data Protection Monitoring & Reporting
  • 34. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Why do we need analytics? In order to maintain Availability organizations require analytics into:  Storage capacity and performance  Failed VM backups  Failed compliance  Data management resources and associated costs  Tracking configurations  And more!
  • 35. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Identify EVERY Unprotected VM Veeam ONE helps users easily determine which VMs are protected and which are not by categorizing VMs based on restore points to:  Provide users valuable time to ensure protection of each VM  Dramatically reduce the risk of downtime Are you completely protected?
  • 36. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Backup Reporting Including:  Backup Infrastructure assessment  Performance and bandwidth savings from built-in WAN acceleration  Audit operator restore activity  Status of backup and replication jobs  Unprotected VMs that are not covered by any backup jobs  Change tracking for backup job configuration  GFS Backup files  VM and computer protection history
  • 37. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Track backup object changes Report on who changed what settings and when. Governance & Compliance Audit backup infrastructure changes and report on user account and modifications. Object Change Tracking
  • 38. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Recovery Verification Recovery Verification Recovery Verification Overview Validates the completion status of SureBackup jobs and displays the results of recovery verification tests Governance & Compliance The report helps you reveal the list of operational VMs that can be restored from the produced backup or replicas
  • 39. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Key takeaways Design with security in mind Use multiple backup locations (3-2-1 rule) Use multiple security domains Offline and offsite backups can be lifesavers Document everything (reporting) Use multiple authentication accounts and roles
  • 40. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Questions?
  • 41. © 2020 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. THANK YOU!