Ransomware Protection Insights from NetApp
Ransomware Protection Insights from NetApp
2024 Mar
01 Welcome Speech
Company Background
03 Break
WHO WE ARE
Microware (Stock Code: 1985), is a Hong Kong based IT infrastructure
solutions provider with over 35 years of experience in providing IT
solution services for Hong Kong Government, educational institutions,
public bodies and commercial organizations.
MORE
About Microware
38 1985 16 450+
YEARS OF MICROWARE YEARS OF AWARDS &
EXPERIENCES STOCK CODE CARING COMPANY RECOGNITION
On of the largest IT Listed on the Main Board Recognized as a “Caring We ll-r e c o g niz e d b y
Infrastructure solution services Company” for the 16th w o r ld ’s t o p IT p a r t ne r s
o f T he S t o c k Ex c ha ng e o f
providers in Hong Kong consecutive year by the
Ho ng Ko ng Limit e d s inc e a nd a ut ho r it ie s
since 1985 Hong Kong Council of
8 Ma r c h 2017 Social Services
Our Business Partners
Combining the agility and Creating a smooth and A total security solution Ensuring well
economics of public cloud convenient environment that protects company connectivity between
with the security and for accessing data and data in all aspects humanity and technology
performance of application in time
on-premises IT
Our Customers
99% industry in Hong Kong Covered
05
Commercial Company & Public Body
Government
Education Institution
NGO
CONTACT US
www.microware.com.hk
Follow us on
NETAPP’S NEW LEVELS
OF RANSOMWARE
PROTECTION:
GUARANTEED, PROTECT,
DETECT & RECOVER
Steven CHENG
Senior Solutions Engineer
[email protected]
March 2024
• NetApp Overview
• NetApp’s Innovation Priorities
• Ransomware Protection
• Ransomware Recovery Guarantee
• Q&A
Gartner, Critical Capabilities for Primary Storage, Jeff Vogel | Joseph Unsworth | Chandra Mukhyala, September 18, 2023
Gartner, Magic Quadrant for Primary Storage, Jeff Vogel | Joseph Unsworth | Chandra Mukhyala, September 18, 2023
A 5-year Leader in Magic Quadrant for Primary Storage (2019-2023)
A 3-year Leader in Magic Quadrant for Solid-State Arrays (2016-2018)
A 6-year Leader in Magic Quadrant for General-Purpose Disk Arrays (2013-2018)
GARTNER is a registered trademark and service mark, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s
research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
NetApp is the intelligent data infrastructure company
MetroCluster
Optimal DP products to SM-BC
champion SnapMirror Synchronous
SnapMirror asynchronous
Hybrid Capacity flash Performance flash
All-flash benefits: FAS2820 FAS9500 AFF-C250 AFF-C800 AFF-A150 AFF-A900
• Lower energy
consumption
AFF A-Series
• Higher performance active
archives FAS AFF C-Series
• Faster volume recovery ASA
25–30ms latency 2–4ms latency <1ms latency
$ $$ $$$$
User access
control
Secure data
retention and
recovery
A data-centric
Data
Zero Trust model
NetApp® technology secures and protects
your data, where it’s stored.
Storage behavior
analytics and
encryption User behavior analytics
and permission
optimization
FIPS 140-2
NetApp CryptoMod Level 1 See FIPS 140-2 Certificate # 4144
NetApp cryptographic security module (NCSM) Level 1 See FIPS 140-2 Certificate # 4297
NetApp storage encryption (NSE) and SANtricity full disk encryption, Level 2 Used in ONTAP and SANtricity
NetApp SolidFire® full-disk encryption See NetApp disk drive and firmware matrix
DoDIN APL
ONTAP 9.11 N/A See Certification Report
ONTAP 9.8 N/A See Certification Report
ONTAP 9.7 N/A See Certification Report
Automatically block Scan for viruses Prevent data Detect and respond to Restore data in minutes
known malicious file upon file access destruction with file system and user to minimize downtime
types immutable and behavior anomalies
indelible copies
Block rogue admins Secure data access, Increase visibility Automatically create Apply advanced
and malicious users end to end and optimize data recovery points and forensics and analytics
access permissions block compromised user with NetApp or leading
accounts SIEM tools
© 2023 NetApp, Inc. All rights reserved. — NETAPP CONFIDENTIAL —
Easy FPolicy configuration for ransomware defense System Manager
Block common ransomware file types with a simple wizard
BlueXP
▪ Integrated Backup
▪ SnapLock integrates with SnapMirror® technology.
Automatically block Scan for viruses Prevent data Detect and respond to Restore data in minutes
known malicious file upon file access destruction with file system and user to minimize downtime
types immutable and behavior anomalies
indelible copies
Block rogue admins Secure data access, Increase visibility Automatically create Apply advanced
and malicious users end to end and optimize data recovery points and forensics and analytics
access permissions block compromised user with NetApp or leading
accounts SIEM tools
© 2023 NetApp, Inc. All rights reserved. — NETAPP CONFIDENTIAL —
NetApp ONTAP Autonomous
Ransomware Protection (ARP)
NetApp Onbox automatic ransomware detection
Available in NetApp® ONTAP® 9.10.1+ for NAS
Licensed feature
• Detects ransomware
• Now displays alerts for NetApp® ONTAP® ARP
• Provides insights on potential attacks
• Takes automatic actions
• NetApp Snapshot copies
• Blocks the user
Automatically block Scan for viruses Prevent data Detect and respond to Restore data in minutes
known malicious file upon file access destruction with file system and user to minimize downtime
types immutable and behavior anomalies
indelible copies
Block rogue admins Secure data access, Increase visibility Automatically create Apply advanced
and malicious users end to end and optimize data recovery points and forensics and analytics
access permissions block compromised user with NetApp or leading
accounts SIEM tools
© 2023 NetApp, Inc. All rights reserved. — NETAPP CONFIDENTIAL —
Snapshots
• Services requirement:
• Ransomware Recovery Assurance Service or Ransomware Protection
and Recovery Service to configure or validate that NetApp SnapLock®
Compliance is properly configured
1 • NetApp ActiveIQ® remote monitoring
• Compensation:
• If NetApp Snapshot data isn’t recoverable from a SnapLock volume,
Use cases
• Program availability:
• 12 months from the date of notice by NetApp Managed Services and
Professional Services that the configuration is complete OR 15
months after the earliest shipment date of any component of the
eligible array
3
• Yearly guarantee term extensions are available
• Products excluded:
© 2023 NetApp, Inc. All rights reserved.
• NetApp ONTAP Select, NetApp Cloud Volumes ONTAP, NetApp
Keystone®, or first-party cloud storage
Ransomware Protection and Recovery Service
High-touch, white-glove service providing extra help to protect against ransomware
Assesses current environment Implements and configures Delivers high-touch managed Speeds ransomware data recovery
• Reviews NetApp® SnapLock® NetApp ransomware services Maintains business continuity and speeds
Compliance policy definitions tools/automated response system • Administers software tools recovery times:
• Reviews customer recovery time
• NetApp SnapMirror®, NetApp SnapVault® • Creates and manages replication • Recovers data through SnapMirror restore
objective (RTO) and recovery point
• NetApp SnapLock Compliance, WORM policies process or SnapCenter
objective (RPO) requirements
• Ensures that customer recovery goals (write once, ready many) • Modifies FPolicy configurations • Assists in confirming that data is in place to
are aligned with data protection • NetApp SnapCenter® • Performs NetApp ONTAP® upgrades as meet customer recovery needs
policies • NetApp FPolicy allow/deny lists required • Assists with data recovery testing
• Evaluates ability to recover • Sets service-level objectives for • Rolls back NetApp Snapshot copies
• Reports on SnapLock Compliance response where necessary
configuration details
• Consults on isolate/patch/restore process
(customer responsibility)
Subscription-based service
Varonis SaaS
22 March, 2024
Da ta is out of
c ontrol. First, they don’t know what data they
have, where it lives, or where it came
from and so unsurprisingly, they can’t
protect it.
Simplify compliance
Real-time visibility Automated control
Da ta dis c ove ry Se ns itivity Da ta a c tivity Da ta -c e ntric Ins ide r ris k Da ta a c c e s s Le a s t privile ge Com plia nc e
DSPM/ SSPM
& c la s s ific a tion la be ling m onitoring UEBA m a na ge m e nt gove rna nc e a utom a tion m a na ge m e nt
Se ns itivity
Pe rm is s ions
Ac tivity
File systems Blob storage SaaS IaaS Email Identity Network edge
Monitor da ta us a ge As s ign IR te a m
○ Enable activity ○ Introduce dedicated IR analyst
○ Enable meaningful, high- ○ Optimize alerts as-needed
fidelity alerts ○ Notify you of any suspicious
○ Accelerate Investigations activity
Give us two we e ks — we give you the vis ibility!
Ste ve Tyrre ll
Information Governance Officer
Zurich Insurance
Com plia nc e
Ma na ge m e nt
Com plia nc e da s hboa rds
a nd re ports
Varonis gives you the enterprise-wide visibility you
need for effective discovery, auditing, and
compliance reporting across a wide variety of
regulatory standards.
Da ta
a c tivity AI / MACHINE LEARNING
Industry-best SLA
Da ta Da ta 24x7 communication
e xpos ure s e ns itivity
Be ha vior-ba s e d thre a t m ode ls
Proactive hunting
Ne twork
Re a l-tim e a le rts
Incident response
Ide ntity Endpoint
Threat intelligence
Othe r Autom a te d a na lys is & re s pons e
MDR is MDDR is
Ac tor-Ce ntric Da ta -Ce ntric
+ Actor: Fancy Bear (APT 28) + Actor: Fancy Bear (APT 28)
+ Exploited CVE-2023-34362
1
+ Exploited CVE-2023-34362
+ Tools: Mimikatz, CredoMap + Files with PII affected: 183
+ Data impacted: Ask Varonis + Data exfiltrated: No
+ Material breach: Ask Varonis + Material breach: No
How Va ronis MDDR works
A ra ns om wa re a le rt trigge rs .
We immediately address several key elements in the investigation.
Wha t is the time Who is the alerting Whe re has the account Wha t are the
frame of the alert? account? operated from? impacted files?
Qua rte rly Bus ine s s Re vie ws Proa c tive Monitoring Role -ba s e d Tra ining
• Dedicated customer success • Dedicated Varonis expert • Online training for unlimited users
team • Proactive threat monitoring • Varonis Certification courses
• Review your goals
• Proactive remediation of issues • CPE credits
• Quantify value
• Routine system health checks • Community of 40,000+ Varonis users
• Discuss roadmap
MAJOR CLOUD MARKETPLACES
Flexible
purc ha s e
options
○ AWS and Azure marketplace
○ Customers can use credits to GLOBAL CHANNEL PARTNER ECOSYSTEM
purchase Varonis
Re a l-tim e vis ibility Autonom ous re m e dia tion Proa c tive thre a t de te c tion
classification
○ Discovery policy library
We also offer support for Salesforce, GitHub, Box, Google, AWS, Zoom, Slack, Okta, and Jira via our
DatAdvantage Cloud SKU.
a) 30 minutes
b) 2 hours
c) 6 hours
d) 12 hours
Question 3 – What are the NetApp platform(s) supported by Varonis?