Secure Data – a safe place in an unsafe world! Atlanta 2017 Secure Data – a safe place in an unsafe world!
Agenda A company’s most important asset Backup Storage Choices 3-2-1 Backup Rule Traditional Backup Storage Challenges Deduplication – Good or Bad? Backup-to-disk Appliances Ransomware
What is a company’s most important asset? Employees? Patents? Reputation? DATA
What Are Your Choices For Backup Storage Tape Disk Disk Backup with Deduplication Cloud
Tape for Backup Performance – Slow backup and restore Reliability – Less than disk Cost – Low to moderate Where does Tape fit? Long-term “regulatory” retention “Archive”
Disk for Backup Performance - Fast Reliability - High Cost - High Where does Disk fit? Primary storage
Disk Backup with Deduplication Performance – moderate to fast Reliability - high Cost – low to high Where does Disk backup with Deduplication fit? “Operational” retention “Regulatory” retention
Cloud for Backup Performance - slow Reliability - high Cost – moderate to high Where does Cloud fit? DR or “archive” copy of backups
3-2-1 Backup Rule Maintain at least three copies of your backups Store backups on at least two different types of media Keep one of the backups at a different location 3 2 1
Traditional Backup Storage Challenges As data grows: Time to backup grows Time to restore grows Time to offsite grows System breaks – Resulting in disruptive fork lift upgrade 1 2
5 Considerations of Data Deduplication
Disk Backup with Deduplication Architectural Approaches Deduplication in the backup software to straight disk Inline deduplication with scale-up Landing zone with scale-out
Challenges of Software-based Deduplication Deduplication in the media server All data stored deduplicated Deduplication ratios are low Limited scalability
Inline Scale-up Appliances Fall Short Inline deduplication on the way to disk All data is stored in deduplicated form As data grows, only disk is added Restores are slow as data needs rehydration
Fastest Backups and Shortest Backup Window Unique landing zone Write backups direct to disk Adaptive deduplication Benefits Fastest backups Shortest possible backup window Strong offsite RPO
Fast Restores, VM Boots in Seconds to Minutes Unique landing zone Most recent backups are in undeduplicated form Eliminates data rehydration Benefits Restores as fast as disk Tape copies as fast as disk VM boots in seconds to minutes
Infrastructure to a Backup App DR Scenarios 2nd Site Data Center Hosted Co-Location Hybrid Cloud Infrastructure to a Backup App Public Cloud
Insulating your company from Ransomware The true cost of a ransomware goes far beyond the ransom lost productivity loss of data loss of customer confidence Go right out of business Notes: From ExaGrid Reliability and Redundancy Data Sheet; When ransomware strikes, it is critical to have backups insulated from the malicious encryption/damage since they may be your last line of defense. ExaGrid helps insulate backups in the following ways: Comprehensive access security ExaGrid shares can be accessed only from designated backup/media servers. While those severs may also be subject to rampant ransomware, the fewer servers that have access to your backups, the better. SMB signing can be enabled for ExaGrid shares, requiring Windows account credentials to be authenticated and authorized before access is granted to an ExaGrid share, further reducing the chance of malicious access to backups. Veeam Accelerated Data Mover shares require a separate Veeam password and are accessible only via SSH, which also reduces the chance of malicious access to Veeam backups. All accounts used to manage the ExaGrid software are protected using non-default passwords. This includes the backup “admin” account, the special ExaGrid customer support account, and root access.
Protecting your company from Ransomware Backup your data Maintain at least three copies of your backups Store backups on at least two different types of media Keep one of the backups at a different location Encrypt your backups at rest Tape Educate employee to just “ignore” suspicious emails or links Test emails Simulated attacks Patch systems regularly Block appropriately (FW) Antivirus software Notes: From ExaGrid Reliability and Redundancy Data Sheet; When ransomware strikes, it is critical to have backups insulated from the malicious encryption/damage since they may be your last line of defense. ExaGrid helps insulate backups in the following ways: Comprehensive access security ExaGrid shares can be accessed only from designated backup/media servers. While those severs may also be subject to rampant ransomware, the fewer servers that have access to your backups, the better. SMB signing can be enabled for ExaGrid shares, requiring Windows account credentials to be authenticated and authorized before access is granted to an ExaGrid share, further reducing the chance of malicious access to backups. Veeam Accelerated Data Mover shares require a separate Veeam password and are accessible only via SSH, which also reduces the chance of malicious access to Veeam backups. All accounts used to manage the ExaGrid software are protected using non-default passwords. This includes the backup “admin” account, the special ExaGrid customer support account, and root access.
ExaGrid / Stress-Free Backup Storage Thank You! msalmon@exagrid.com