1 of 36

Cyber attack

What after?

Daniel.Olkowski@dell.com

2 of 36

Our environment

Applications,

Databases,

Mail

Linux, UNIX, Windows,

Backup

Server

DBs

Mails

Linux, UNIX, Windows,

Site A

Tape

library

Disk

system

SAN

Media

agent

Tape

library

Disk

system

VM

Data Domain

Data Domain

VM

LAN

Site B

Applications,

Databases,

Mail

Dell - Internal Use - Confidential

2

of Y

Dell Customer Communication - Confidential

3 of 36

Agenda

  • Threats
  • Compliance
  • DIA
  • Replication
  • And more!

© Copyright 2020 Dell Inc.

3

of 20

Internal Use - Confidential

4 of 36

Cyber threats 2021: �the facts

Every 11 seconds�a cyber or ransomware attacks occur.*

39s

© Copyright 2021 Dell Inc.

4

of 16

86%

of breaches �are financially motivated.

71%

48%

of breaches involved�small business.

43%

$6T

Total global impact of cyber crime in 2021.

Cybersecurity �Ventures

$1T

$13M

$24.7M

Avg. cost of cybercrime for an organization.

Banking

$18.4M

Utilities

$17.8M

Software

$16.0M

Automotive

$15.8M

Insurance

$15.8M

High Tech

$14.7M

Capital Markets

$13.9M

Energy

$13.8M

US Federal

$13.7M

Consumer Goods

$11.9M

Health

$11.9M

Retail

$11.4M

Life Sciences

$10.9M

Media

$9.2M

Travel

$8.2M

Public Sector

$7.9M

© Copyright 2021 Dell Inc.

4

of Y

5 of 36

Copyright © Dell Inc. All Rights Reserved.

92%

Organizations cannot detect cyber attack

Average time to detect is 100 days

67%

Organizations had incident within last year within real issues

39%

Yearly detected

ransomware within malware

Dell Customer Communication - Confidential

6 of 36

Broad spectrum of sophisticated cyber threats

Motivations, Techniques and Goals

Terrorism

Sabotage & destruction to instill fear

Hacktivism

Advance�political �or social�causes

Insider

Trusted insiders �steal or extort �for personal, financial, & ideological reasons.

Increasingly targeted because of privileged access to systems

Warfare

Nation-state actors�with destructive cyber weapons�(NotPetya)

Espionage

Corporate or Nation-state actors steal valuable data

Crime

Theft & extortion �for financial�gain

© Copyright 2021 Dell Inc.

6

of Y

7 of 36

Backup environment

Applications,

Databases,

Mail

Linux, UNIX, Windows,

Backup

Server

DBs

Mails

Linux, UNIX, Windows,

Site A

Tape

library

Disk

system

SAN

Media

agent

Tape

library

Disk

system

VM

Data Domain

Data Domain

VM

LAN

Site B

Applications,

Databases,

Mail

Dell - Internal Use - Confidential

7

of Y

Dell Customer Communication - Confidential

8 of 36

Backup

system

#1

Backup

system

#2

Backup

system

#3

Backup

system

#4

Backup1

Backup3

Backup3

30 days

60 days

90 days

Backup1

Backup3

Backup3

30 days

15 days

15 days

Backup1

Backup3

Backup3

20 days

10 days

20 days

Backup1

Backup3

Backup3

60 days

30 days

30 days

Data Domain can lock (compliance) data.

No one can modify / delete file

Dell - Internal Use - Confidential

8

of Y

Dell Customer Communication - Confidential

9 of 36

Dell - Internal Use - Confidential

9

of Y

Dell Customer Communication - Confidential

10 of 36

DIA – Data Invulnerability Architecture

Data Domain

D

D

D

D

LAN-based Clients

NDMP Storage

SAN-attached Clients

Mainframe Gateways

IP/FC

8KB

12KB

6KB

10KB

8KB

11KB

8KB

8KB

5KB

D

D

D

D

D

D

D

D

A

B

D

C

De-Duplicated Data

4,5MB container

D

D

D

D

D

D

D

D

a

b

d

c

Additional�compression

Dell - Internal Use - Confidential

10

of Y

Dell Customer Communication - Confidential

11 of 36

Who can protect me against Cyber Atack?

Hardware

Software

© Copyright 2020 Dell Inc.

11

of 20

Internal Use - Confidential

12 of 36

Site A

Data Domain

Backup

Restore

Disaster Recovery

Transfer 1%

Recovery 100% of data

Databases

Virtualization

Applications

Servers

Remote offices

Laptops

Site B

Data Domain

Any backup

software

Dell - Internal Use - Confidential

12

of Y

Dell Customer Communication - Confidential

13 of 36

Site A

Data Domain

Disaster Recovery

Transfer 1%

Recovery 100% of data

Site B

Backup

Restore

Databases

Virtualization

Applications

Servers

Remote offices

Laptops

Data Domain

Any backup

software

Dell - Internal Use - Confidential

13

of Y

Dell Customer Communication - Confidential

14 of 36

Site A

Data Domain

Backup

Restore

Disaster Recovery

Transfer 1%

Recovery 100% of data

Databases

Virtualization

Applications

Servers

Remote offices

Laptops

Site B

Backup

Restore

Databases

Virtualization

Applications

Servers

Remote offices

Laptops

Data Domain

Any backup

software

Any backup

software

Dell - Internal Use - Confidential

14

of Y

Dell Customer Communication - Confidential

15 of 36

Our environment

Applications,

Databases,

Mail

Linux, UNIX, Windows,

Backup

Server

DBs

Mails

Linux, UNIX, Windows,

Site A

SAN

VM

VM

LAN

Site B

Applications,

Databases,

Mail

Dell - Internal Use - Confidential

15

of Y

Dell Customer Communication - Confidential

16 of 36

Castle strategy

© Copyright 2020 Dell Inc.

16

Internal Use - Confidential

17 of 36

Castle strategy

Real time

protection

© Copyright 2020 Dell Inc.

17

Internal Use - Confidential

18 of 36

Ambulance �strategy

© Copyright 2020 Dell Inc.

18

Internal Use - Confidential

19 of 36

Ambulance �strategy

Cyber Bunker

© Copyright 2020 Dell Inc.

19

Internal Use - Confidential

20 of 36

Cyber Recovery Requirements

Isolation

Physical & logical �separation of data

Immutability

Preserve original �integrity of data

Modern threats require modern solutions

Intelligence 

ML & analytics �identify threats

© Copyright 2021 Dell Inc.

20

of Y

21 of 36

IT Infrastructure

Any backup�software

Backup

Recovery

SITE A

IT Infrastructure

Any backup�software

SITE B

Disaster Recovery

1% data transfer

100% recovery

Data Domain

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

PLAN B – Secure data & Recovery

Compliance

No possibility to change data

Ransomware

protection

Secure

Historical

backups

Recovery

automation

Data Domain

Separation

from production

Cyber

Sense

Backup

software

Sandbox

Any tests

Ransomware

protection

Management

and automation

Data Domain

Data Domain

Dell - Internal Use - Confidential

21

of Y

Internal Use - Confidential

22 of 36

Dell - Internal Use - Confidential

22

of Y

Internal Use - Confidential

23 of 36

Cyber Bunker gives us answers for the questions

  • What if I am encrypted?
  • Am I being encrypted?
  • Who encrypts me?
  • How to stop being encrypted?
  • Which copy to use to recover?
  • How to recover?

© Copyright 2020 Dell Inc.

23

Internal Use - Confidential

24 of 36

Site A

Data Domain

Backup

Restore

Disaster Recovery

Transfer 1%

Recovery 100% of data

Databases

Virtualization

Applications

Servers

Remote offices

Laptops

Site B

Backup

Restore

Databases

Virtualization

Applications

Servers

Remote offices

Laptops

Data Domain

Any backup

software

Any backup

software

Dell - Internal Use - Confidential

24

of Y

Dell Customer Communication - Confidential

25 of 36

Dell - Internal Use - Confidential

25

of Y

Dell Customer Communication - Confidential

26 of 36

What functions can Cyber Recovery have?

  • Simple: Golden, guaranted, remote copy
    • Not possible to destroy by insider -> physically, logically
    • Super cheap approach
  • Veryfication of production
  • Test center

© Copyright 2020 Dell Inc.

26

Internal Use - Confidential

27 of 36

IT Infrastructure

Backup

Recovery

SITE A

Cyber Bunker

Data Domain

Data Domain

Air Gap

Cyber

Recovery

Cyber

Sense

Access

Station

DNS

Backup

software

AD

SQL

Hyp

Oracle

Storage

Recovery / Test Center

Dell - Internal Use - Confidential

27

of Y

Internal Use - Confidential

28 of 36

© Copyright 2020 Dell Inc.

28

Internal Use - Confidential

29 of 36

PowerProtect Cyber Recovery for AWS

Cyber Recovery Vault

Data Vaulting and Recovery Processes

1

Sync

Copy

2

AutomatedOperational Air Gap

Lock

3

AWS S3

PowerProtect �DDVE

PowerProtect �Cyber Recovery

VPC

Data Center�(on-premises or Cloud)

Backup

Production

Recover

Monitoring & Reporting

© Copyright 2021 Dell Inc.

29

of Y

30 of 36

Cyber Recovery Vault

VPN Gateway

Private Subnet # 1

Network ACL

Security Group

Network ACL

Security Group

Network ACL

Security Group

Vault Jump Host

Customer’s Workstation,

(Limited IP)

Customer Gateway

AWS VPN

Private Subnet # 2

PowerProtect Cyber Recovery�securely manages and automates�the enabling / disabling of the air gap

Replication data from production PowerProtect DD

Data Center�(on-premises or Cloud)

Production

Backup

PowerProtect �DDVE

PowerProtect �Cyber Recovery

VPC

PowerProtect Cyber Recovery for AWS

Vault Security Detail

© Copyright 2021 Dell Inc.

30

of Y

31 of 36

Air Gap

Cyber Bunker

Cyber

Recovery

Checking

ransomware

Recovery

automation

Management

and automation

Cyber

Sense

Backup

software

Sandbox

Any tests

What is the cost?

Dell - Internal Use - Confidential

31

of Y

Internal Use - Confidential

32 of 36

Check it – worth!

  • Discussion
  • Qualification - Infrastructure / Security departments
  • Solution

© Copyright 2020 Dell Inc.

32

of 20

Internal Use - Confidential

33 of 36

Materials

© Copyright 2020 Dell Inc.

33

of 20

Internal Use - Confidential

34 of 36

Materiały

© Copyright 2020 Dell Inc.

34

of 20

Internal Use - Confidential

35 of 36

Cyber Bunker

  • Continue business regardless of criminals
  • Detect attack
  • Help to remove effect of attack

© Copyright 2020 Dell Inc.

35

of 20

Internal Use - Confidential

36 of 36

Daniel.Olkowski@dell.com

Questions

© Copyright 2020 Dell Inc.

36

of 20

Internal Use - Confidential