BlueXP is now NetApp Console
Monitor and run hybrid cloud data services
Phil face palm fulcowski and Sally super seccure Swanson are IT managers at two very similar companies. Phil starts his Tuesday with the standard checklist. Coffee check, donut check. Network connected and bandwidth utilized check and check. But little does Phil know that a jetlagged sales rep in Barcelona just opened an email attachment [music] that will ruin his whole week. First, Phil notices his primary storage is running a little slow. Upon investigation, he sees folders and volumes of user data being encrypted right before his eyes. [music] He tries to revert to his backups, but finds they've been deleted from the secondary disc. Then he sees the ransomware email notification, a malware attack originating from a company laptop in Spain. [music] Spain. [music] Spain. [music] The anti virus software didn't catch it, and it's quickly spreading to all file shares on the network. Thankfully, Phil also creates a daily backup to tape, but it'll take hours, if not days, to restore the corrupted data, which means extended downtime and lost productivity. He may avoid paying a ransom, but he'll pay either way. Bill's face palm is official. Tuesday morning finds Sally feeling super and quite secure because she uses NetApp. So, when a sleepy sales rep in Shanghai opens the wrong email attachment, NetApp is already protecting her data. NetApp Ontap F policy delivers a data protection layer that blocks known malicious file extensions which can stop common malware in its tracks. So the first attack is thwarted before Sally even logs onto the network. But the threat is far from over. Frustrated, the hacker triggers more advanced ransomware techniques. Leveraging a compromised user account, he uses a zeroday malware exploit to begin infecting files. Simultaneously, he launches malware that utilizes many compromised user accounts, encrypting user data across the network slowly in an attempt to stay undetected. To get a quick view of her overall infrastructure, Sally opens NetApp Cloud Insights, which lets her easily monitor network file shares for user behavior anomalies. [music] A ransomware attack has been detected, automatically triggering a snapshot. It takes only seconds to spot the source of the attack, a zero-day exploit, and block the compromised user account. Sally also gets an alert that slowly encryptting malware is moving through her file storage courtesy of NetApp on Tap's Onbox autonomous ransomware detection engine, which monitors workload activity. The storage system also triggers an automatic snapshot, giving Sally additional data recovery points. She restores the encrypted data nearly instantaneously. In fact, with NetApp, terabytes of data can be restored [music] in minutes. And her data was never really at risk because NetApp Snaplock provides a logical air gap to prevent data deletion. So, even though this attack made it through, Sally's data is back up and running before her coffee gets cold. Stop ransomware in its tracks with data protection and security solutions from NetApp, the cloud storage specialists.
It's no longer if you will suffer from a ransomware attack, its when. Not only do you need to be able to protect your hybrid cloud environment from an attack, but you also need to detect it quickly and recover. Are you prepared?