BACKUP IS DEAD! Restore iS born in the cloud!

Slides:



Advertisements
Similar presentations
Microsoft Ignite /16/2017 1:31 PM
Advertisements

Microsoft hybrid cloud backup: … differentiated … cost effective … for private/public cloud deployments 123.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
David N. Wozei Systems Administrator, IT Auditor.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
The Best DR and “Undo” Virus Attacks!! What can Zerto do for you?
Craig Pringle & Derek Moir
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Veeam software Risk Mitigation and Protection
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Azure Site Recovery For Hyper-V, VMware, and Physical Environments
Planning for Application Recovery
3 Do you monitor for unauthorized intrusion activity?
Cloud Computing Q&A Presented by:
100% Exam Passing Guarantee & Money Back Assurance
Protect your data with Microsoft Azure Backup
Business Continuity Robert Hedblom | sumNERV John Joyner | ClearPointe
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Shielded VM and Guarded Fabric
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Disaster Recovery and SQL for new and non-DBAs
ModernBiz Windows Server 2012 R2 Grow your business by helping customers modernize theirs Millions of customers, high-margin opportunities With millions.
Exam in just 24 hours!!! Pass your exam in first attempt by the help of our latest braindumps
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
MCSA VCE
Bare Metal Server Backup Solution
Veeam Backup Repository
Vembu Universal Explorer - An Introduction
Infrastructure, Data Center & Managed Services
Vembu SaaSBackup - An Introduction
Vembu SaaSBackup for Office 365
Capitalize on modern technology
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Disaster happens; don’t be held hostage
Microsoft Azure P wer Lunch
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Microsoft Virtual Academy
Data Security for Microsoft Azure
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
HC Hyper-V Module GUI Portal VPS Templates Web Console
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Microsoft Virtual Academy
MICROSOFT AZURE ISV PROFILE: ONEBE
Vembu ImageBackup - Free edition
FileFacets Information Governance Solution Performs High-Quality Automated Enterprise Content Management Migration, Built on Azure MICROSOFT AZURE APP.
Microsoft Virtual Academy
Disaster Recovery is everyone’s job!
Nero Blanco Service Offering – Disaster Recovery as a Service
VMware Backup - Free edition
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Andy Puckett – Sales Engineer
Business Continuity and the Microsoft Cloud
Move your data to the cloud with Azure and {Partner Company Name}
Zendos Tecnologia Utilizes the Powerful, Scalable
3 Do you monitor for unauthorized intrusion activity?
Day 2, Session 2 Connecting System Center to the Public Cloud
Veeam Backup & Replication
Demystifying the Cloud
Productive + Hybrid + Intelligent + Trusted
3 Do you monitor for unauthorized intrusion activity?
Hyper-V backup -Free Edition
06 | SQL Server and the Cloud
Presentation transcript:

BACKUP IS DEAD! Restore iS born in the cloud! Robert Hedblom | sumNERV Cloud and Solution Principal Architect robertanddpm.blogspot.com robert.hedblom@sumnerv.se Steve Buchanan | Concurrency Regional Solutions Director http://www.buchatech.com/ sbuchanan@buchatech.com

Robert Hedblom Steve Buchanan @RobertandDPM @buchatech 8 Year CDM MVP 20+ years in IT, 15+ years Business Continuity 15+ years in IT Meat Dinner with Robert

Getting started The longest journey always start with the first step…

Why do you back up your data

The key starting points Why should you back up What data is important When should you back it up Who is responsible Where is the data stored Which data relates to another or other Business Services

Is all data equally important? Define your Business Services and Infrastructure Services Create different tiers Threat and risk analysis (TRA) Business Impact Analysis (BIA) Business Continuity Plan (BCP)

Teir 1 Brings great value to your company Revenue Timesaver Customer Facing Applications If this services goes down the impact will be significant for the company Customer facing applications Accounting applications ERP Any application tied to generating revenue

TIER 2 Business Services that have high use in the business High and wide use across the entire organization Impacts at an enterprise level Email (Exchange) S4B HRMS SharePoint CRM Any application the business needs day to day but is NOT tied to revenue

Research and development application Marketing application TEIR3 Business Services on a departmental level No impact on revenue or at an enterprise level Research and development application Printing application Marketing application Department specific. Not tied to revenue or does not have enterprise wide impact.

Why 2 off-site copies? April 11th 2016: An administrator wiped his entire company servers, 1500+ customers data, and all their backups. https://serverfault.com/questions/769357/recovering-from-a-rm-rf

Planning RTO and RPO Robert H

Defining downtime & data loss How could you define “Downtime”, “Data loss” and “Level of recovery”? Recovery Time Objectives (RTO) Recovery Point Objectives (RPO) Recovery Level Objectives (RLO)

Service Level Agreement “A service-level agreement (SLA) is a part of a standardized service contract where a service is formally defined. Particular aspects of the service – scope, quality, responsibilities – are agreed between the service provider and the service user. ”

Recovery means Recovery Plan Build a Business Continuity plan Sort out the Business Services and their dependencies Define and monitor your Service Level Agreements Perform continually restore-test for tier 1 Automation

DEMO Robert H

Being Ready for Cloud Steve B

Moving to Cloud Services Roadmap for adapting the cloud Spend time understand HOW and WHEN Adopt your Business Continuity Plan to your cloud roadmap Steve B

Cloud ready Business Continuity Tools Data Protection Manager Can send backup data to cloud Azure Backup Backup for on-prem directly to cloud and or IaaS protection Azure Backup Server DPM for free with Azure Backup account! Azure Site Recovery DR as a Service Hyper-V Replica On-prem to On-prem VM protection Steve B

Backup Security Steve B

Does backup security really matter? Steve B Absolutely. Yes.

Security’s role in backup When planning for protection of applications and data in your environment security should right up there in the forefront. “Backup Security” should be a key part of the plan. #1 as securing the backups #2 backups being used as an added measure for security breach mitigation Security in the context of backup can be thought of as: Steve B In regards to securing backups you want to do things like encrypt backup data as it travels offsite, encrypting backup data at rest, being able to protect encrypted data, requiring security pins or further authentication of admins and more. In regards to backup as an added measure for security backup becomes a direct part of Security planning in organizations. Sometimes when security measures fail backups are the only thing that can save you as a last resort. Backups are commonly becoming a way to recover from ransomware attacks as an alternative to paying the hackers.

How does Microsoft business continuity help Prevent Alert Recover Prevent the security risk in the first place. If an attack occurs notify right away. The ability to recover means everything. Steve B

Product Breakdown Data Protection Manager Azure Backup Encrypted backup data at rest MFA Security PIN Ransomware attacks Encrypted backup data at rest Backup data encrypted during offsite transfer Protection and recovery of shielded (Bitlocker) Hyper-V Virtual Machines Ransomware attacks Steve B Encrypted backup data at rest Once backup data is on Azure it is encrypted at rest. Microsoft does not decrypt the backup data at any point. The customer is the only one with the encryption key that can decrypt the backup data. If this key is lost not even Microsoft can decrypt your backup data. This is very secure. Security PIN With Azure Backup you can require a security pin for sensitive operations such as removing protection, deleting data, or changing other settings in Azure Backup itself such as changing a Passphrase. Azure Backup also has some other security measures in place like a minimum retention range to ensure a certain amount of backup data is always available and notifications upon critical operations to subscription admins or others as specified. MFA MFA is Multi-Factor Authentication. Microsoft has MFA available as a part of Azure Active Directory. Within Azure Backup you can configure it to require MFA of admins when performing critical operations. By enabling MFA you would then ensure via authentication from a second device usually physical to the user that they are who they say they are. Protection and recovery of encrypted computers The release of Hyper-V on Windows Server 2016 included a new feature known as Shielded virtual machines (VM’s). This feature essentially utilizes Virtual Trusted Platform Module (vTPM) technology and BitLocker to encrypt a VM to encrypt virtual machines at the virtual layer. This means if a VM is physically copied off a Hyper-V host whoever has the VM will not be able to get to the data on the virtual hard drive. With the release of DPM 2016 it supports protecting Shielded VM’s. DPM can protect Shielded VM’s regardless if they are VHD or VHDX. This is great news because as a secure organization you should want to encrypt your virtual machines and DPM can protect them. This gives you an added layer of security on top of having backups. Ransomware attacks In today’s world ransomware attacks are a common thing. These type of attacks are targeted at small, medium, and large enterprise businesses. No company is too small or too big to be put in the crosshairs of ransomware attacks. A well-known attack is Cryptolocker. As mentioned before in this blog post backups are an alternative to paying the ransom of a ransomware attack. They key here is to ensure you have a solid offsite backup in place such as Azure Backup. Having that offsite backup will ensure you can get your data back even if the ransomware attack get ahold of your onsite backup data.

DEMO Security in Azure Backup Steve B

The finish line Robert H

Sweet success… Build a Business Continuity Plan Test and validate your recovery plans Proactive monitoring, not reactive Validate your strategies Rehearse and practice Robert H

Need answers? Don’t be afraid to ask me in person! Contacts: Robert Hedblom Robert.hedblom@sumNERV.se www.sumNERV.se