SlideShare a Scribd company logo
The cost of doing nothing
Confidential2
The cost of
doing nothing
Confidential3
The Cost / Benefit analysis
Some IT investments are obvious, others are not
Servers
Automation Tech
Cloud
Backup and Recovery?
Confidential4
Each IT investment creates exponential risk
I N V E S T M E N T S
R I S K S
As a firms dependence on IT systems grow, so does their exposure
Servers &
Virtualization
expansion
Automation &
monitoring software
Use of cloud
technology
Virtual machine
sprawl & shorter
SLAs
System interdependence
assures more apps deemed
business or mission critical
Data moved off-site
increases exposure
Few privileged users
Used en mass and
on the go
Confidential5
Ransomware on the rise and costing millions
$488
per hour per physician when healthcare
data encryption impacts operations
(AC Group)
10x
Increase in number of attacks in the first 3
months of 2016 over total previous year
(NBCNews.)
84K
Amount a cybercriminal can earn per
month on a $6K investment in an exploit
kit (TrustWave Holdings)
$200M
Cost to victims in first 3 months of 2016
(NBCNews)
$18M
Amount paid to undo CryptoLock
encryption from April 2014 to June 2015
(FBI)
$325M
Amount Cryptowall 3.0 made from US
victims in 2015 alone (DarkReading)
8 of top 10
vulnerabilities used by exploit kits in
2015 were Flash related (DarkReading)
66%
of recipients open phishing messages
used to transmit ransomware and other
malware (LavaSoft)
30%
of ransomware victims pay to regain their
data (Trend Micro, Inc.)
Confidential6
C o n f i d e n t
23%
77%
Worried
Less than one quarter of IT groups feel very
confident they can meet business
expectations with current strategies.
V3 Research, 2016
Confidential7
Planning and funding backup and recovery
52%
19%
15%
8%
2%
Funding
Strategic plan & budget for entire company
Planned for/purchased by country/line-of-business
Planned for/purchased at a project level
Rely on recovery products bundled with the platforms
Other
Confidential8
New technology adds pressure
Mobile Apps Cloud Services Web Services Virtualization Sensors and
cameras
Robotics
Business- growth projects – local and company wide - increasingly falling to IT to implement
Confidential9
Putting more pressure on recovery SLAs
Server downtime SLAs - 66% of servers recover in 2hrs or less*
8x faster than just 5 years ago
*ESG data center modernization survey 2015
Confidential10
How quickly can you recover from a disaster?
5%
9%
35%
44%
7%
0%
Time
Within the day
Within the hour
Within 15 minutes
Within 5 minutes
Within the week
More than one week
Firms surveyed reported non-critical apps and files take longer
Confidential11
What issues have actually effected you recently
75%pointed to hardware failure as
something that had caused them
business harm
Loss of Internet
Loss of WAN connectivity
Accidental deletion of important data
Virus, Trojan or other malware
66%
58%
54%
53%
The need to recover previous document versions53%
Software bug/hang46%
The need to roll-back software updates, fix compatibility issues37%
Confidential12
identify the risks then quantify the cost of
doing nothing to mitigate against them
Turn the traditional
cost / benefit
approach on its head;
V3 Research, 2016
Confidential13
The cost of doing nothing justifies investment
A simple equation to start the discussion
+
Determine an event
you will simulate
Determine the
number of users
effected
Time it will take to
recover fully
=
The potential loss to
the firm for failure
Confidential14
How much have
you budgeted for
data loss in 2016
Confidential16
Quest Data Protection Portfolio
Everything faster — from client to cloud
17
Result: Everything Faster. Client to Cloud.
Quest Data Protection: Our approach vs. theirs
Their solution
- Leaves you with legacy code and bolt-on
modules or point solutions that add
complexity and expense.
It’s time to:
Optimize your application experience
• Get your data back in < 15 minutes
Automate processes
• Make your staff more productive
Modernize for the cloud
• Take backup to the cloud
Enable a data-driven business
• Always on and utilizing your data to meet
business needs
Our approach
+ Be more productive while working the
same (or fewer) hours.
+ Increase time spent on innovation
and win.
+ Prepares you for the digital initiative.
vs.
18
Our approach
• Leverage the proven features of AppAssure and
other leading Dell IP to eliminate downtime.
• Optimized user application experience
• Simplified backup & recovery
• Ability to meet multiple and aggressive SLAs
• Reduced complexity in a hybrid world
• Reduced CAPEX and OPEX by off-siting DR
Quest Data Protection | Rapid Recovery
ZeroIMPACT recovery – anything to anywhere
Protect
Recover entire systems, apps, and data
in < 15 minutes
Users
Ensure zero impact on users by
presenting them with the data they
request instantly, during restores, as if
the outage never happened
Applications
Assure system, application and data
availability everywhere: physical, virtual,
and cloud. Result: Instant recovery for the cloud era
19
Use case | Rapid Recovery
Restore data to virtually any protected platform
Identical
hardware
Cloud
Bare Metal
Restore
Dissimilar
hardware
Virtual
Server
AppAssure
Core
Transform data protection with Universal
Recovery
Restore data flexibly to virtually any platform
regardless of original configuration
For example, administrators can restore protected
physical servers to virtual machines & vice-versa
20
Quest Data Protection | DL Appliance
The power of Rapid Recovery in an easy-to-use appliance.
Integrated
Delivered as integrated appliance
optimized for SMBs and MSPs
Optimized
20 minutes from box to backup,
manage, restore, replicate & archive
from one device
Cloud-Ready
Native cloud support for Microsoft Azure,
Amazon S3, Rackspace, or any
OpenStack provider
Result: Safeguard and quickly recover your data
and applications from unexpected failures.
Our approach
Agentless protection for demanding and dynamic
VMware or Hyper-V environments.
• Remove sizing guesswork with all-inclusive
capacity-based licensing for agents and options.
• In-box upgrades to add capacity in easy, cost-
effective way
• Turn-key with wizard-driven configuration
21
Use case | DL Appliance
Full image in the cloud. Restore servers and users fast
Bring up infrastructure-mission critical servers and
applications - in a virtual cloud environment on an
emergency or as needed basis
1. Full recovery of server and workstation images to physical or
virtual environments including dissimilar hardware
2. Optimized for Windows VMs that manage large quantities of
data
3. Automated systems for provisioning, monitoring, data lifecycle
management, data integrity assurance, software
maintenance,
Full Image replicated to cloud
Users
Effective and Affordable DRaaS
Manage Services Provider
Restore servers or users anywhere including
dissimilar hardware
Dissimilar
hardware
22
Management is more than just Monitoring
Availability is more than just Backup
Foglight & Rapid Recovery – The winning combination
Re-calibrate under and over
allocated virtual resources –
automatically.
TuneInvestigate
Pinpoint performance or
capacity problems in seconds
whether you have 100 or
100,000 virtual machines
See how many resources you
have left and forecast the
impact of future workloads.
Plan
Visualize your enterprise with
a single-pane-of-glass view
into your virtual, physical and
application layers.
Monitor
Recover systems, apps and data in under
15 minutes
Ensure zero impact on users
Assure system, application&
data availability everywhere
Protect
Everything
faster — from
client to cloud
Data Protection
23
vManagement: for virtual environments
Management is more than just Monitoring
Availability is more than just Backup
INVESTIGATE
PLAN
TUNE
PROTECT
PROTECT
PROTECT
PROTECT
MONITOR
Watch the On Demand Webcast
here: http://ow.ly/bMLJ30fMtNQ
Thank You

More Related Content

The Cost of Doing Nothing: A Ransomware Backup Story

  • 1. The cost of doing nothing
  • 3. Confidential3 The Cost / Benefit analysis Some IT investments are obvious, others are not Servers Automation Tech Cloud Backup and Recovery?
  • 4. Confidential4 Each IT investment creates exponential risk I N V E S T M E N T S R I S K S As a firms dependence on IT systems grow, so does their exposure Servers & Virtualization expansion Automation & monitoring software Use of cloud technology Virtual machine sprawl & shorter SLAs System interdependence assures more apps deemed business or mission critical Data moved off-site increases exposure Few privileged users Used en mass and on the go
  • 5. Confidential5 Ransomware on the rise and costing millions $488 per hour per physician when healthcare data encryption impacts operations (AC Group) 10x Increase in number of attacks in the first 3 months of 2016 over total previous year (NBCNews.) 84K Amount a cybercriminal can earn per month on a $6K investment in an exploit kit (TrustWave Holdings) $200M Cost to victims in first 3 months of 2016 (NBCNews) $18M Amount paid to undo CryptoLock encryption from April 2014 to June 2015 (FBI) $325M Amount Cryptowall 3.0 made from US victims in 2015 alone (DarkReading) 8 of top 10 vulnerabilities used by exploit kits in 2015 were Flash related (DarkReading) 66% of recipients open phishing messages used to transmit ransomware and other malware (LavaSoft) 30% of ransomware victims pay to regain their data (Trend Micro, Inc.)
  • 6. Confidential6 C o n f i d e n t 23% 77% Worried Less than one quarter of IT groups feel very confident they can meet business expectations with current strategies. V3 Research, 2016
  • 7. Confidential7 Planning and funding backup and recovery 52% 19% 15% 8% 2% Funding Strategic plan & budget for entire company Planned for/purchased by country/line-of-business Planned for/purchased at a project level Rely on recovery products bundled with the platforms Other
  • 8. Confidential8 New technology adds pressure Mobile Apps Cloud Services Web Services Virtualization Sensors and cameras Robotics Business- growth projects – local and company wide - increasingly falling to IT to implement
  • 9. Confidential9 Putting more pressure on recovery SLAs Server downtime SLAs - 66% of servers recover in 2hrs or less* 8x faster than just 5 years ago *ESG data center modernization survey 2015
  • 10. Confidential10 How quickly can you recover from a disaster? 5% 9% 35% 44% 7% 0% Time Within the day Within the hour Within 15 minutes Within 5 minutes Within the week More than one week Firms surveyed reported non-critical apps and files take longer
  • 11. Confidential11 What issues have actually effected you recently 75%pointed to hardware failure as something that had caused them business harm Loss of Internet Loss of WAN connectivity Accidental deletion of important data Virus, Trojan or other malware 66% 58% 54% 53% The need to recover previous document versions53% Software bug/hang46% The need to roll-back software updates, fix compatibility issues37%
  • 12. Confidential12 identify the risks then quantify the cost of doing nothing to mitigate against them Turn the traditional cost / benefit approach on its head; V3 Research, 2016
  • 13. Confidential13 The cost of doing nothing justifies investment A simple equation to start the discussion + Determine an event you will simulate Determine the number of users effected Time it will take to recover fully = The potential loss to the firm for failure
  • 14. Confidential14 How much have you budgeted for data loss in 2016
  • 15. Confidential16 Quest Data Protection Portfolio Everything faster — from client to cloud
  • 16. 17 Result: Everything Faster. Client to Cloud. Quest Data Protection: Our approach vs. theirs Their solution - Leaves you with legacy code and bolt-on modules or point solutions that add complexity and expense. It’s time to: Optimize your application experience • Get your data back in < 15 minutes Automate processes • Make your staff more productive Modernize for the cloud • Take backup to the cloud Enable a data-driven business • Always on and utilizing your data to meet business needs Our approach + Be more productive while working the same (or fewer) hours. + Increase time spent on innovation and win. + Prepares you for the digital initiative. vs.
  • 17. 18 Our approach • Leverage the proven features of AppAssure and other leading Dell IP to eliminate downtime. • Optimized user application experience • Simplified backup & recovery • Ability to meet multiple and aggressive SLAs • Reduced complexity in a hybrid world • Reduced CAPEX and OPEX by off-siting DR Quest Data Protection | Rapid Recovery ZeroIMPACT recovery – anything to anywhere Protect Recover entire systems, apps, and data in < 15 minutes Users Ensure zero impact on users by presenting them with the data they request instantly, during restores, as if the outage never happened Applications Assure system, application and data availability everywhere: physical, virtual, and cloud. Result: Instant recovery for the cloud era
  • 18. 19 Use case | Rapid Recovery Restore data to virtually any protected platform Identical hardware Cloud Bare Metal Restore Dissimilar hardware Virtual Server AppAssure Core Transform data protection with Universal Recovery Restore data flexibly to virtually any platform regardless of original configuration For example, administrators can restore protected physical servers to virtual machines & vice-versa
  • 19. 20 Quest Data Protection | DL Appliance The power of Rapid Recovery in an easy-to-use appliance. Integrated Delivered as integrated appliance optimized for SMBs and MSPs Optimized 20 minutes from box to backup, manage, restore, replicate & archive from one device Cloud-Ready Native cloud support for Microsoft Azure, Amazon S3, Rackspace, or any OpenStack provider Result: Safeguard and quickly recover your data and applications from unexpected failures. Our approach Agentless protection for demanding and dynamic VMware or Hyper-V environments. • Remove sizing guesswork with all-inclusive capacity-based licensing for agents and options. • In-box upgrades to add capacity in easy, cost- effective way • Turn-key with wizard-driven configuration
  • 20. 21 Use case | DL Appliance Full image in the cloud. Restore servers and users fast Bring up infrastructure-mission critical servers and applications - in a virtual cloud environment on an emergency or as needed basis 1. Full recovery of server and workstation images to physical or virtual environments including dissimilar hardware 2. Optimized for Windows VMs that manage large quantities of data 3. Automated systems for provisioning, monitoring, data lifecycle management, data integrity assurance, software maintenance, Full Image replicated to cloud Users Effective and Affordable DRaaS Manage Services Provider Restore servers or users anywhere including dissimilar hardware Dissimilar hardware
  • 21. 22 Management is more than just Monitoring Availability is more than just Backup Foglight & Rapid Recovery – The winning combination Re-calibrate under and over allocated virtual resources – automatically. TuneInvestigate Pinpoint performance or capacity problems in seconds whether you have 100 or 100,000 virtual machines See how many resources you have left and forecast the impact of future workloads. Plan Visualize your enterprise with a single-pane-of-glass view into your virtual, physical and application layers. Monitor Recover systems, apps and data in under 15 minutes Ensure zero impact on users Assure system, application& data availability everywhere Protect Everything faster — from client to cloud Data Protection
  • 22. 23 vManagement: for virtual environments Management is more than just Monitoring Availability is more than just Backup INVESTIGATE PLAN TUNE PROTECT PROTECT PROTECT PROTECT MONITOR
  • 23. Watch the On Demand Webcast here: http://ow.ly/bMLJ30fMtNQ