CYBERATTACKS ARE THE ENEMY OF DATA-DRIVEN BUSINESSES


Data is the currency of the internet economy and a critical asset that must be protected, kept confidential and made available at a moment’s notice. Today’s global marketplace relies on the constant flow of data across interconnected networks, and digital transformation efforts put more sensitive data at risk.

This makes your organization’s data an attractive and lucrative target for cyber criminals. Cybercrime has been called the greatest transfer of wealth in history, and it is all about the data.


CYBER THREATS 2021: the facts

Every 11 seconds

A cyber or ransomware attacks occur

 
$6 Trillion

Total global impact of cyber crime in 2021


 
$13 Million

Average cost of cybercrime for an organization



Having a cyber recovery strategy has become a mandate for business and government leaders, yet many organizations lack confidence in their data protection solutions.

The Global Data Protection Index reported that 67% of IT decision makers are not very confident that all business-critical data can be recovered in the event of a destructive cyberattack.




BROAD SPECTRUM OF SOPHISTICATED CYBER THREATS

Motivations, Techniques and Goals


 
CRIME

Theft & extortion for
financial gain



 
INSIDER

Trusted insiders steal
or extort for personal,
financial, & ideological
reasons. Increasingly
targeted because of
privileged access to
systems


ESPIONAGE

Corporate or Nation state
actors steal valuable data

 
HACKTIVISM

Advance political or
social causes

 
TERRORISM

Sabotage & destruction to instill fear


 

WARFARE

Nation state actors
with destructive
cyber weapons
(Not Petya)


MODERN THREATS REQUIRE MODERN SOLUTIONS

To reduce business risk caused by cyberattacks and to create a more cyber resilient
approach to data protection, you can modernize and automate your recovery and
business continuity strategies and leverage the latest intelligent tools to
detect and defend against cyber threats.

Protect your organization and its valuable data with Dell PowerProtect Cyber Recovery


Isolation

Physical & logical separation of data

PowerProtect Cyber Recovery vault is protected with operational air gap either on-premises or in cloud and multi-cloud offers

+
Immutability

Preserve original integrity of data

Multiple layers of security and controls protect against destruction, deletion and alteration of vaulted data

+
Intelligence

ML & analytics
identify threats

CyberSense enables assured recovery of good data and offers insight into attack vectors from within the Cyber Recovery vault

Dell PowerProtect Cyber Recovery provides proven, modern and intelligent protection to isolate critical data, identify suspicious activity and accelerate data recovery allowing you to quickly resume normal business operations.



2015 First “Isolated” recovery solution with custom deployment
2018 Introduced PowerProtect Cyber Recovery solution
2019 First technology vendor in Sheltered Harbor Alliance Partner Program
2020 First Endorsed Sheltered Harbor Solution – PowerProtect Cyber Recovery
2021 Introduced Cyber Recovery with Multi-Cloud Data Services for Dell EMC PowerProtect
2021 Introduced PowerProtect Cyber Recovery for AWS

jzjzjz

DELL Technologies

Cyber Recovery & data protection leadership

2015 First “Isolated” recovery solution with custom deployment
2018 Introduced PowerProtect Cyber Recovery solution
2019 First technology vendor in Sheltered Harbor Alliance Partner Program
2020 First Endorsed Sheltered Harbor Solution – PowerProtect Cyber Recovery
2021 Introduced Cyber Recovery with Multi-Cloud Data Services for Dell EMC PowerProtect
2021 Introduced PowerProtect Cyber Recovery for AWS

#1
Data Protection Appliances & Software

1100+
Cyber Recovery Customers

7 Exabytes
of data protected in the cloud








Be prepared for a ransomware attack!

Don't miss out our webinars and learn more about our #NoFlashDelays programme!

Tech Data is organizing webinars around IBM Flash storage solutions continuously.

Please register if you are interested in to participate on the upcoming webinars.

Headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.

Headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.

Headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.

A Dell Technologies kibervédelmi megoldásai
Fókuszban a Dell PowerProtect Cyber Recovery


Sok szeretettel meghívjuk a Dell Technologies-szel és a Remedios-szal közösen szervezett, kibertámadásokra, szűkebben az adatvisszaállításra és adatvédelemre fókuszáló eseményünkre!

AGENDA

9:00 Regisztráció és reggeli
10:15 A DELL Technologies Cyber Recovery megoldás bemutatása
Godányi Géza, Dell Technologies

10:35 Dell PowerProtect DD a gyakorlatban
Szabó Attila, Remedios

11:00 Kiber-helyreállítási termékek a DELL portfóliójában – miért nem elég egy freeNAS?
Mag Pál, Dell Presales Engineer, Tech Data
11:25 Kérdések és válaszok

A Bálna parkolójában igyenes parkolást biztosítunk, a parkolójegyedet a helyszínen érvényesítjük.


IDŐPONT
2022. július 28.
9:00 - 12:00


HELYSZÍN
Bálna Bisztró
1093 Budapest, Fővám tér 11-12.

REGISZTRÁCIÓ

HOZZÁADÁS A NAPTÁRHOZ