Cyber attack
What after?
Daniel.Olkowski@dell.com
Our environment
Applications,
Databases,
Linux, UNIX, Windows,
Backup
Server
DBs
Mails
Linux, UNIX, Windows,
Site A
Tape
library
Disk
system
SAN
Media
agent
Tape
library
Disk
system
VM
Data Domain
Data Domain
VM
LAN
Site B
Applications,
Databases,
Dell - Internal Use - Confidential
2
of Y
Dell Customer Communication - Confidential
Agenda
© Copyright 2020 Dell Inc.
3
of 20
Internal Use - Confidential
Cyber threats 2021: �the facts
Every 11 seconds�a cyber or ransomware attacks occur.*
39s
© Copyright 2021 Dell Inc.
4
of 16
86%
of breaches �are financially motivated.
71%
48%
of breaches involved�small business.
43%
$6T
Total global impact of cyber crime in 2021.
Cybersecurity �Ventures
$1T
*Sources: Cybersecurity Ventures: � https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021� https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021
$13M
$24.7M
Avg. cost of cybercrime for an organization.
Banking | $18.4M |
Utilities | $17.8M |
Software | $16.0M |
Automotive | $15.8M |
Insurance | $15.8M |
High Tech | $14.7M |
Capital Markets | $13.9M |
Energy | $13.8M |
US Federal | $13.7M |
Consumer Goods | $11.9M |
Health | $11.9M |
Retail | $11.4M |
Life Sciences | $10.9M |
Media | $9.2M |
Travel | $8.2M |
Public Sector | $7.9M |
© Copyright 2021 Dell Inc.
4
of Y
Copyright © Dell Inc. All Rights Reserved.
92%
Organizations cannot detect cyber attack
Average time to detect is 100 days
67%
Organizations had incident within last year within real issues
39%
Yearly detected
ransomware within malware
Dell Customer Communication - Confidential
Broad spectrum of sophisticated cyber threats
Motivations, Techniques and Goals
Terrorism
Sabotage & destruction to instill fear
Hacktivism
Advance�political �or social�causes
Insider
Trusted insiders �steal or extort �for personal, financial, & ideological reasons.
Increasingly targeted because of privileged access to systems
Warfare
Nation-state actors�with destructive cyber weapons�(NotPetya)
Espionage
Corporate or Nation-state actors steal valuable data
Crime
Theft & extortion �for financial�gain
© Copyright 2021 Dell Inc.
6
of Y
Backup environment
Applications,
Databases,
Linux, UNIX, Windows,
Backup
Server
DBs
Mails
Linux, UNIX, Windows,
Site A
Tape
library
Disk
system
SAN
Media
agent
Tape
library
Disk
system
VM
Data Domain
Data Domain
VM
LAN
Site B
Applications,
Databases,
Dell - Internal Use - Confidential
7
of Y
Dell Customer Communication - Confidential
Backup
system
#1
Backup
system
#2
Backup
system
#3
Backup
system
#4
Backup1
Backup3
Backup3
30 days
60 days
90 days
Backup1
Backup3
Backup3
30 days
15 days
15 days
Backup1
Backup3
Backup3
20 days
10 days
20 days
Backup1
Backup3
Backup3
60 days
30 days
30 days
Data Domain can lock (compliance) data.
No one can modify / delete file
Dell - Internal Use - Confidential
8
of Y
Dell Customer Communication - Confidential
Dell - Internal Use - Confidential
9
of Y
Dell Customer Communication - Confidential
DIA – Data Invulnerability Architecture
Data Domain
D
D
D
D
LAN-based Clients
NDMP Storage
SAN-attached Clients
Mainframe Gateways
IP/FC
8KB
12KB
6KB
10KB
8KB
11KB
8KB
8KB
5KB
D
D
D
D
D
D
D
D
A
B
D
C
De-Duplicated Data
4,5MB container
D
D
D
D
D
D
D
D
a
b
d
c
Additional�compression
Dell - Internal Use - Confidential
10
of Y
Dell Customer Communication - Confidential
Who can protect me against Cyber Atack?
Hardware
Software
© Copyright 2020 Dell Inc.
11
of 20
Internal Use - Confidential
Site A
Data Domain
Backup
Restore
Disaster Recovery
Transfer 1%
Recovery 100% of data
Databases
Virtualization
Applications
Servers
Remote offices
Laptops
Site B
Data Domain
Any backup
software
Dell - Internal Use - Confidential
12
of Y
Dell Customer Communication - Confidential
Site A
Data Domain
Disaster Recovery
Transfer 1%
Recovery 100% of data
Site B
Backup
Restore
Databases
Virtualization
Applications
Servers
Remote offices
Laptops
Data Domain
Any backup
software
Dell - Internal Use - Confidential
13
of Y
Dell Customer Communication - Confidential
Site A
Data Domain
Backup
Restore
Disaster Recovery
Transfer 1%
Recovery 100% of data
Databases
Virtualization
Applications
Servers
Remote offices
Laptops
Site B
Backup
Restore
Databases
Virtualization
Applications
Servers
Remote offices
Laptops
Data Domain
Any backup
software
Any backup
software
Dell - Internal Use - Confidential
14
of Y
Dell Customer Communication - Confidential
Our environment
Applications,
Databases,
Linux, UNIX, Windows,
Backup
Server
DBs
Mails
Linux, UNIX, Windows,
Site A
SAN
VM
VM
LAN
Site B
Applications,
Databases,
Dell - Internal Use - Confidential
15
of Y
Dell Customer Communication - Confidential
Castle strategy
© Copyright 2020 Dell Inc.
16
Internal Use - Confidential
Castle strategy
Real time
protection
© Copyright 2020 Dell Inc.
17
Internal Use - Confidential
Ambulance �strategy
© Copyright 2020 Dell Inc.
18
Internal Use - Confidential
Ambulance �strategy
Cyber Bunker
© Copyright 2020 Dell Inc.
19
Internal Use - Confidential
Cyber Recovery Requirements
Isolation
Physical & logical �separation of data
Immutability
Preserve original �integrity of data
Modern threats require modern solutions
Intelligence
ML & analytics �identify threats
© Copyright 2021 Dell Inc.
20
of Y
IT Infrastructure
Any backup�software
Backup
Recovery
SITE A
IT Infrastructure
Any backup�software
SITE B
Disaster Recovery
1% data transfer
100% recovery
Data Domain
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
PLAN B – Secure data & Recovery
Compliance
No possibility to change data
Ransomware
protection
Secure
Historical
backups
Recovery
automation
Data Domain
Separation
from production
Cyber
Sense
Backup
software
Sandbox
Any tests
Ransomware
protection
Management
and automation
Data Domain
Data Domain
Dell - Internal Use - Confidential
21
of Y
Internal Use - Confidential
Dell - Internal Use - Confidential
22
of Y
Internal Use - Confidential
Cyber Bunker gives us answers for the questions
© Copyright 2020 Dell Inc.
23
Internal Use - Confidential
Site A
Data Domain
Backup
Restore
Disaster Recovery
Transfer 1%
Recovery 100% of data
Databases
Virtualization
Applications
Servers
Remote offices
Laptops
Site B
Backup
Restore
Databases
Virtualization
Applications
Servers
Remote offices
Laptops
Data Domain
Any backup
software
Any backup
software
Dell - Internal Use - Confidential
24
of Y
Dell Customer Communication - Confidential
Dell - Internal Use - Confidential
25
of Y
Dell Customer Communication - Confidential
What functions can Cyber Recovery have?
© Copyright 2020 Dell Inc.
26
Internal Use - Confidential
IT Infrastructure
Backup
Recovery
SITE A
Cyber Bunker
Data Domain
Data Domain
Air Gap
Cyber
Recovery
Cyber
Sense
Access
Station
DNS
Backup
software
AD
SQL
Hyp
Oracle
Storage
Recovery / Test Center
Dell - Internal Use - Confidential
27
of Y
Internal Use - Confidential
© Copyright 2020 Dell Inc.
28
Internal Use - Confidential
PowerProtect Cyber Recovery for AWS
Cyber Recovery Vault
Data Vaulting and Recovery Processes
1
Sync
Copy
2
Automated�Operational Air Gap
Lock
3
AWS S3
PowerProtect �DDVE
PowerProtect �Cyber Recovery
VPC
‸
Data Center�(on-premises or Cloud)
Backup
Production
Recover
Monitoring & Reporting
© Copyright 2021 Dell Inc.
29
of Y
Cyber Recovery Vault
VPN Gateway
Private Subnet # 1
Network ACL
Security Group
Network ACL
Security Group
Network ACL
Security Group
Vault Jump Host
Customer’s Workstation,
(Limited IP)
Customer Gateway
AWS VPN
Private Subnet # 2
PowerProtect Cyber Recovery�securely manages and automates�the enabling / disabling of the air gap
Replication data from production PowerProtect DD
‸
Data Center�(on-premises or Cloud)
Production
Backup
PowerProtect �DDVE
PowerProtect �Cyber Recovery
VPC
PowerProtect Cyber Recovery for AWS
Vault Security Detail
© Copyright 2021 Dell Inc.
30
of Y
Air Gap
Cyber Bunker
Cyber
Recovery
Checking
ransomware
Recovery
automation
Management
and automation
Cyber
Sense
Backup
software
Sandbox
Any tests
What is the cost?
Dell - Internal Use - Confidential
31
of Y
Internal Use - Confidential
Check it – worth!
© Copyright 2020 Dell Inc.
32
of 20
Internal Use - Confidential
Materials
© Copyright 2020 Dell Inc.
33
of 20
Internal Use - Confidential
Materiały
© Copyright 2020 Dell Inc.
34
of 20
Internal Use - Confidential
Cyber Bunker
© Copyright 2020 Dell Inc.
35
of 20
Internal Use - Confidential
Daniel.Olkowski@dell.com
Questions
© Copyright 2020 Dell Inc.
36
of 20
Internal Use - Confidential