webinar netgear - acronis e netgear le best practices per la protezione di sistemi e dati

36
Acronis e Netgear Best Practices per la protezione di Sistemi e Dati Formazione Online Andrea Rossi Senior System Engineer [email protected] Francisco Amadi Senior Sales Engineer [email protected]

Upload: netgear-italia

Post on 14-Jan-2017

264 views

Category:

Technology


1 download

TRANSCRIPT

Acronis e Netgear Best Practices per la protezione di Sistemi e Dati

Formazione Online

Andrea Rossi

Senior System Engineer

[email protected]

Francisco Amadi

Senior Sales Engineer

[email protected]

2

Acronis Industry Proven Leader• Hundreds of millions of USD in license revenue

• 700 employees worldwide, 300 top-notch engineers

• 30,000 strong partner ecosystem in 90 countries

• 400K+ businesses, 5M+ consumers, Over 160 OEMs

• 6+ Million VMs under Acronis protection

• Products in 14 languages, customers in 130 countries

Market Leading Solutions & Technology• Disaster Recovery• Full Image Backup• Endpoint Backup• System Deployment• Mobile Content Management• Enterprise File Syncing and Sharing

Market Leader in• German-speaking Europe

• Japan

3

Where Does our Technology Fit

1

10

500

50

1000s

# o

f E

mplo

yees

Simple backup/recovery of a PC

Simple backup/recovery of a server

and PCs

Unified solution for disaster recovery and

data protection for mixed physical/virtual

environment

Point solution for:

- Disaster Recovery (addition to existing backup)

- Disaster Recover for process control systems

- VMs backup

- Migration & offsite DR

- Desktops and laptops protection

- Systems deployment

4

Introducing…

New Generation Data Protection

Protects…

• Any Data

• Any Environment

• Any Location

Optimized for…

• Virtual

• Physical

• Cloud

Backup, Disaster Recovery, Secure Access

Easy Complete Safe

Powered by The Acronis AnyData Engine

5

How It Works

Acronis AnyData Engine

Unified Control Unified

Interface

Unified

Policies

CentralizedManagement &

Reporting

Physical,

Virtual

& Cloud

Capabilities

Capture

• Disk/VM Image

• Single Pass

• Fast Incremental

Store

• Unified BU Format

• Disk, Tape & Cloud

• Encryption

Recover

• Universal Restore

• Active Restore

• File & Application

Access

•Policy Engine

•Active Dir Integration

•Secure Mobile Editing

Any Workload

6

How The Acronis AnyData Engine Is Different

Competitor 1PLATFORM

Acronis

Competitor 3

Competitor 2Platform? Platform?Platform?

Enterprise Platform• Robust

• Complex

Lean Architecture• Easy

• Flexible

• Complete

Incomplete• No physical server support

• No “any to any” recovery

• Separate products

Incomplete• Complex

• Separate platforms

7

Acronis New Generation Data Protection

Business

• Backup and system deployment solutions for business

Mobility

• Secure File Access, Syncing and Sharing

Cloud

• Backup & Storage Solutions for MSP, Telco and Hoster

Personal

• Backup &

Storage

solutions for

consumers

Powered by The Acronis AnyData Engine

8

Backup and System Deployment for Business

Business

• Streamlined for Smaller Business Environments• VMware, Windows & Linux

• Windows Server Essentials

• Server & PC

Acronis Backup

• Unified Protection for Multiple Systems• All Hypervisors, Windows & Linux

• Exchange, SQL, SharePoint, AD

• Server & PC

Acronis Backup Advanced

• Large-Scale System Deployment• Complete System Image

• Automated Deployment

• Machine-specific Configuration

Acronis Snap Deploy

• Resizing Partitions• Resizing virtual disks within a VM

• Resize partitions with data resident

• No need to clear data before resizing

Acronis Disk Director

Complete modular solutions for virtual, physical and cloud

Reduces downtime, data loss, and IT management time.

Easy,

Complete,

Safe

Entry-level NAS-Solutions

(EXT3/4-based)

Traditional Enterprise-

Solutions for SMB

ReadyDATA – Enterprise-Class

features at SMB prices w/ block-

based replication, deduplication and

data integrity

(ZFS-based)

NETGEAR Storage PositioningUnderstanding the business storage landscape

ReadyNAS SMB Storage with

advanced data protection

(BTRFS-based)

NETGEAR is innovating the

SMB NAS space with the

adaption of advanced file

systems

Home Office

Consumer

ROBO /

Small Business

Mid-Range

ReadyNAS OS 6.x

BTRFS-Based

NETGEAR Unified Storage for SMBBroad portfolio for every storage need!

ReadyDATA OS 1.x

ZFS-Based

ReadyDATA + Backup

SW Backup Appliance

Home User Small Business (5-75 users) SMB (75-200 users) ME (100+ users)`

3 yrs warranty

5 yrs warranty

Home Office

Consumer

ROBO /

Small Business

Mid-Range

ReadyNAS OS 6.x

BTRFS-Based

NETGEAR Unified Storage for SMBBroad portfolio for every storage need!

ReadyDATA OS 1.x

ZFS-Based

ReadyDATA + Backup

SW Backup Appliance

Home User Small Business (5-75 users) SMB (75-200 users) ME (100+ users)`

SOHO

BUSINESS

Target Customers

Customer Solutions Value PropositionReadyNAS

Products

Small Business

SOHO, 1-5

employees,

freelancers,

No rackspace

• Backup & DR

• File serving

• Remote access w/o VPN

• media (blend / privat/business)

• Ease of use

• Best data protection

• No-VPN remote access

• Warranty

• 200, 210

• 300, 500

Mid Size Customers

(>5 employees)

• Backup & DR

• File serving

• Small virtualization

• Best data protection

• Virtual support

• Ease of use

• Warranty

• Low Total Cost of

Ownership

• 300/500

• 2120/3138

Larger Customers

Departmental storage,

large capacity storage

• Backup & DR

• File serving

• Small/mid virtualization

• Large capacity storage

(media, archiving)

• Best data protection

• Virtual support

• Ease of use

• Warranty

• Low Total Cost of

Ownership

• 300/500

• 3138

• 3220

• 4220

Larger Customers

Branch Offices

• Branch office backup & data

recovery

• Local file serving

• Best & most easy branch

office data protection

• Warranty

• 300/500

ReadyNAS Desktop

RN 102 RN 104 RN 202 RN 204 RN212 RN214 RN 312 RN 314 RN 316 RN 516 RN 716X EDA

500

CPU Marvell Armada 370

1.2GHz

Annapurna AL212 Cortex

A15 Dual Core 1.4GHz

Quad core 1.4GHz High

Performance ARM Cortex

A15

Intel Atom Dual Core

2.1GHZ

Intel i3 Dual

Core 3.3GHz

Intel Xeon

Quad Core

2.5GHz

(3.5GHz

Turbo)

Expansi

on Unit

Memory 512MB 512MB 2GB 2GB 2GB 2GB 2GB 2GB 2GB 4GB ECC 16GB ECC

Recommend

ed #

concurrent

users

1-4 1-4 1-8 1-8 1-8 1-8 1-16 1-16 1-16 1-50 1-200

GE Ports 1 2 2 2 2 2 2 2 2 2 2 + 2

10GBase-T

USB Ports

(3/2)

2 / 1 2 / 1 2/1 2/1 2/1 2/1 2 / 1 2 / 1 2 / 1 2 / 1 2 / 1

eSATA ports 1 1 1 1 1 1 2 2 2 3 3

Total Solution

Capacity

12TB 24TB 12TB 24TB 12TB 24TB 32TB 64TB 76TB 96TB 96TB 20TB

HDD Types 2.5” SSD/SATA or 3.5” SSD/SATA

13

Desktop at-a-Glance

NETGEAR Storage | Josua Braun14

ReadyNAS Rackmount

15

ReadyNAS 2120 ReadyNAS 3138 ReadyNAS 3220 ReadyNAS 4220S ReadyNAS 4220X

CPUMarvell Armada XP

Dual Core 1.2GHz

Intel Atom C2558

2.4GHz Quad Core

Intel Ivy Bridge

i3-3220v2 Dual Core

3.3GHz

Intel Ivy Bridge Xeon

E3-1225v2 Quad

Core 3.2GHz

Intel Ivy Bridge Xeon

E3-1225v2 Quad

Core 3.2GHz

Memory 2GB 4GB ECC UDIMM 4GB ECC 8GB ECC 8GB ECC

Bays 4 4 12 12 12

Recommended #

concurrent users1-25 1-75 1-200 1-500 1-500

Power Single Internal Power Single Internal PowerDual Redundant Hot-

Swappable

Dual Redundant Hot-

Swappable

Dual Redundant Hot-

Swappable

GE Ports 2 4 4 4 4

10G Ethernet Ports None None None 2 x SFP+ 2 x 10GBase-T

USB Ports (3/2) 2 / 1 2/1 2 / 1 2 / 1 2 / 1

eSATA ports 2 2 2 2 2

Max Capacity 24TB 24TB 72TB 72TB 72TB

HDD Types 2.5” SSD/SATA or 3.5” SSD/SATA

Why NETGEAR Storage

+ Best data protection for SMB: • Snapshot technology with hourly protection – restore data from every point in time without impacting performance.

• Most easy to use replication technology for disaster recovery

• Data Integrity due to advanced Filesystems

+ Most flexible and secure solution for personal cloud –remote access with local hardware (privacy, performance), utmost security (no portforwarding), ease of use

+ Unique warranty and support offering• 5 years warranty and NBD for almost all storage products

+ All the latest and unique technology (ReadyNAS)• Continuous data protection (hourly protection only with NETGEAR, Bitrot protection, AV, etc.)

• Storage efficiency (instant expansion)

• Easy off-site (cloud-managed replication)

• Easy access & D (ReadyCLOUD)

+ Less expensive to buy and manage• Lower upfront cost and all inclusive feature set

• Lower long-term cost of management

+ Less complex to buy, deploy and manage• All inclusive and 5 yr warranty means no surprises

• Easy management means no additional staff/consultants

ReadyNAS is “Storage Made Easy”Understanding the NETGEAR difference

ReadyDATA for High-PerformanceSolving SMB Issues w/ Enterprise Tools

+ Unified (NAS/SAN) storage w/ all protocols (iSCSI/NFS/SMB/AFP/FTP)

+ Performance boost w/ SSD-caching

+ Instant expansion and continuous data protection with unlimited snapshots and clones

+ Cloud-managed block-level replication for disaster recovery

+ Advanced storage efficiency (dedupe, compression, thin provisioning)

What the best strategy?

What the best strategy?

o Data protection and backup needs

o Current and anticipated storage requirements

Data protection and backup needs

o Find the backup technologies that best align with your

business

o Understand your data environment

o Decide what you need to back up

o Craft the processes and procedures

o Ensure that backup copies are valid

o Ensure that backup copies are safe.

o Maintain backup logs

Current and anticipated storage requirements

o Upgrading the storage built into your existing servers?

o Buy the kind of data storage devices best suited to the services they

support

o To add storage, consider NAS devices

o Using removable disks as storage?

o To add high-capacity, scalable and resilient storage, consider blockbased

NAS/SAN

Scenario 1: Small Office

Data protection and backup needs

o Find the backup technologies that

best align with your business

o Understand your data environment

o Decide what you need to back up

o Craft the processes and procedures

o Ensure that backup copies are valid

o Ensure that backup copies are safe.

o Maintain backup logs

Couple servers, a few PC

Server: image, PC: file/folder

Acronis Backup for PC/Server

Simple! Test the 1° backup

Validate images (manually)

Current and anticipated storage requirements

o Upgrading the storage built into your

existing servers?

o Buy the kind of data storage devices best

suited to the services they support

o To add storage, consider NAS devices

o Using removable disks as storage?

o To add high-capacity, scalable and resilient

storage, consider blockbased NAS/SAN

Maybe, not as main storage

If the server fails?

ReadyNAS family

Model 300/2120

Oversized, with ReadyNAS

5 data protection level available

Scenario 2: Small-Medium Business

Data protection and backup needs

o Find the backup technologies that

best align with your business

o Understand your data environment

o Decide what you need to back up

o Craft the processes and procedures

o Ensure that backup copies are valid

o Ensure that backup copies are safe.

o Maintain backup logs

Ph.Servers, Applications, many

PCs = Many Data

Server Images, files/folders, PC

Template

Acronis Backup ADVANCED w/

centralized components

DRP!

Scheduled Validation

1 place is not enough! ( double

destination, staging )

Current and anticipated storage requirements

o Upgrading the storage built into your

existing servers?

o Buy the kind of data storage devices best

suited to the services they support

o To add storage, consider NAS devices

o Using removable disks as storage?

o To add high-capacity, scalable and resilient

storage, consider blockbased NAS/SAN

NOT, as main storage

Wich server? If the server fails?

ReadyNAS family

Model 500/700/3130/3220/4220File-level Replica

ReadyDATA family

Model 5200 / 516Block-level Replica

Scenario 3: Virtualization

Data protection and backup needs

o Find the backup technologies that

best align with your business

o Understand your data environment

o Decide what you need to back up

o Craft the processes and procedures

o Ensure that backup copies are valid

o Ensure that backup copies are safe.

o Maintain backup logs

Not only VMware

Not only VMs! (applications)

Only VMs?

Acronis Backup or

Advanced???

DRP! Test environment

Scheduled Validation, «Run

From Backup»

1 place is not enough!

( double destination, staging )

Current and anticipated storage requirements

o Upgrading the storage built into your

existing servers?

o Buy the kind of data storage devices best

suited to the services they support

o To add storage, consider NAS devices

o Using removable disks as storage?

o To add high-capacity, scalable and resilient

storage, consider blockbased NAS/SAN

ABSOLUTELY NOT

VM, Multi-tennant

ReadyNAS family

Model 3220/4220File-level Replica

SATA HDD

ReadyDATA family

Model 5200Block-level Replica

SATA, SAS, SSD caching

Ransomware ?

Some recommendations

Footer use for Presentation Title or footnotes32

Ransomware … what is it?

“Ransomware is a type of malware that prevents or

limits users from accessing their systems and data.

This type of malware forces its victims to pay the

ransom through certain online payment methods in

order to grant access to their systems, or to get their

data back.”

P.S. tipically the system/data becomes not accessible but data are not stolen.

Ransomware prevention

Recommendations for Users

1.Regularly backup your data

2.Keep UAC enabled. UAC notifies you when changes are going to be made.

3.Use an anti-malware solution with anti-exploit, anti-malware and anti-spam modules.

4.Good internet practices; avoid questionable websites, link or attachments in emails from

uncertain sources.

5.Enable ad-blocking tools to reduce malicious ads.

6.Use filters to reduce infected spam emails.

7.Adjust your web browser security settings.

8.Keep Windows OS and vulnerable software- ex. the browser and its plug-ins – up to date.

Ransomware prevention

Recommendations for Companies

1.Educate employees in good computer practices, in identifying social engineering attempts

and spear-phishing emails.

2.Install, configure and maintain an advanced endpoint security solution.

3.Enable software restriction policies to block programs from executing from specific

locations.

4.Use a firewall to block all incoming connections from the Internet to services that should

not be publicly available.

5.Make sure programs and users have the lowest level of privileges necessary to complete

a task.

6.Enable Backup & System Restore to restore previous versions of the encrypted files once

the virus has been removed

Last but not least…

Regularly revisit and test your backup/ restore

risks, procedures, and technologies