Movatterモバイル変換


[0]ホーム

URL:


Uploaded byNestorNavarro20
29 views

Introducing Cohesity NetBackup (2).pdf

presentacion de la nueva solucion de Cohesity NetBackup

Embed presentation

Download to read offline
IntroducingNetBackup
Challenges:• Multiple attack surfaces• Point solutions• Risk of downtime“I need to protectagainst ransomware.”Challenges:• Inconsistent protection• Limited multi-cloud visibility• Lack of scalability“I need to protecteverything.”Challenges:• Operational complexity• Increasing costs• Inefficient usage“I need to orchestrateand automate.”Today’s Data Protection Challenges© 2025 Cohesity Inc. All rights reserved.
© 2024 Cohesity Inc. All rights reserved. 3Downtime38% of Sr. IT Execs reporteddowntime for 5 days orlonger following an attack.Data LossAccording to research, upto 20% of data may beunrecoverable.
Introducing Cohesity NetBackupAdvanced data protection with integrated cyber resilience, automation, andsupport for over 1,000 workloads and 1,000 storage targets.
The NetBackup Data Protection FamilyManage secondarystorage, or primarystorage for DataProtection as aService.Cohesity AltaRecovery VaultQuickly deploy andeasily manageransomware resilientNetBackup dataprotection in a turnkeypackage.CohesityAppliancesCohesity Alta ViewCentralize management and gain visibility acrossyour entire NetBackup data protection estate.Cohesity IT AnalyticsGain actionable backup and storage insights forheterogeneous, multi-vendor IT environments.Intelligent data protectionwith integrated cyberresilience, automation,and support for over1,000 workloads and1,000 storage targets.CohesityNetBackupManage your SaaSapplication workloadsincluding M365, EntraID, Slack, GoogleWorkspace, andSalesforce.Cohesity AltaSaaS Protection
Cyber Resilient• Comprehensive protection• Active cyber defenses• Zero-ransom recovery• Any RPO or RTONetBackupAdvanced data protection with integrated cyber resilience.Automated Operations• Event-driven automation• Elastic resource utilization• Reduced cost• Reduced carbon footprintCloud Optimized• Any cloud• Any workload• Any deployment model• Multi-cloud visibility
Cyber Resilient7
RecoverableStrengthenedAwareResponsiveOptimizing© 2025 Cohesity Inc. All rights reserved. 8The 5 Steps toCyber ResilienceOperational Maturity LevelProtect all datawith globalgovernance1Ensure yourbackups arealwaysrecoverable​2Detect andinvestigatethreats3Prepare,practice andrecoverfrom incidents4Reduceyour riskfrom data theft5
9PROTECT ALL DATA with global governanceIdentify unprotected data – your biggest security risk1On-PremisesCloudCertifications• DISA STIG• NIST SP 800-53, NIST SP800-37RMF, ICD 503, NIST 800-171• FIPS 140-2• TLS 1.3• IPv6/USGv6• ISO Common Criteria• SOC2: Alta Archiving, SaaSProtection• Sheltered Harbor• FedRAMP: Alta SaaS ProtectionCyber ReadinessDesignations• Sole data protection provider forCISA JCDC• CMMC readiness• EO-compliant with “critical SW”designation: EO 14028, M22-18KEY OUTCOMESEnhanced securityRisk reductionImproved compliance& governanceLower costs & improved ROIIncreased IT efficiencyOver 1,000 data sourcesUnified UI + APIs | Common SLAs | Compliance | Reporting |Policies | AI-Powered Operations
© 2025 Cohesity Inc. All rights reserved.ABOUT THE FEATUREBENEFITS• GenAI automatically detects, audits,and protects unprotected assetsacross the environment.• Automatically suggests and appliestailored protection policies.• Comprehensive Coverage• Operational EfficiencyAI-Powered Asset ProtectionProtect All Data1Only from Cohesity
21,000+ data sourcesOn-Premises | Cloud | SaaS | EdgeENSURE YOUR BACKUPS are always recoverableHarden your platform + add a cyber vaultCohesity AltaRecovery VaultCloud-basedcyber vaultImmutability | MFA | Pull-based replication |RBAC | 3-2-1-1 | Quantum-proof encryptionFaster & moresecure recoveryStronger protectionagainst attacksAudit readinessZero trust alignmentKEY OUTCOMESPublic CloudStorageOn-PremisesStorageAppliancesTurnkey dataprotection
NetBackup• Highly efficient cloud store with global deduplication• Backup + Disaster Recovery, Migration, Portability• Automated intelligent cloud protection• Recover anywhere – on-premises or cloudIaaS PaaS SaaSAlta Recovery Vault• Virtual air-gapped ransomware protection• Immutable cloud storage / unlimited scale• Predictable costs• Powered by and AzureBETB 1 or 3yearsIncludesdata transferChoice ofprovidersStandard orArchive tierAlta Recovery VaultA seamless, integrated cloud-based cyber vaultAltaRecovery VaultAlways Recoverable2
3 DETECT AND INVESTIGATE threatsRegularly conduct threat scanning & threat huntingAI-Powered Anomaly Detection | Automated Malware Scanning |User Behavior Analytics | Hash-based Threat Hunting | ForensicsEarly threat detection &mitigationBackup integrityassuranceFaster incident recoveryand reduced downtimeShared context for IT &InfoSec teamsKEY OUTCOMESIntegration with SIEM/SOAR/XDR SystemsScan Backupsfor Malware ThreatsBackups of internet-facingWindows clientsBackup StorageNetBackupMalware ScannerReal-time AI-poweredAnomaly DetectionClient SourceData (Objects)NetBackupMark asignoreConfirm asanomalyReport as falsepositive
© 2025 Cohesity Inc. All rights reserved. 14OperationsBackupAdminAdmin BehaviorAnomaly Detection• Threat Actors steal admincredentials and attempt tocompromise backup data• AI-powered Self-Defensedetects anomalous behavior,steps in• Automatically adjusts MFA /MPA• If operation abnormal, operationis declined, and data secured• If operation normal, operation isapprovedIncreasedMFA / MPAAI-Powered Self-DefenseDetect and Investigate Threats3Only from Cohesity
4Secure File Storage | Recovery Orchestration | Isolated Recovery Area |Zero-Ransom RecoveriesFaster &safer recoveryImproved RTOLower riskof re-infectionReduced disruption& financial riskPREPARE, PRACTICE, AND RECOVER from incidentsAutomate cyber recovery: initiate, investigate, mitigateKEY OUTCOMESRecover to AnywhereSnapshotsIdentify Last Known Good +Recovery Orchestration at ScaleRecoveryIsolated Recovery Area• Granular File Recovery• Bare Metal Recovery• Bulk/Instant RecoveryInstantAccessMalwarescan• Cloud Recovery• Instant RollbackMultiple Recovery Options
© 2025 Cohesity Inc. All rights reserved.Up ToABOUT THE FEATUREBENEFITS• Threat hunting 105*faster vs. malware scanning.• Supports two threat hunting scenarios of file level data**:1. Entire backup searched automatically:• Daily, with updated threat intelligence• When malware detected.2. On-demand for forensics and investigations.• Automated threat hunting without disrupting productionsystems.• Rapid identification of malware blast radius whenmalware is detected.• Accelerated forensics to significantly reduce cyber recoverytime.a.Malware Scan Performance: ~15M file/hr; 16KB file; 4 scan hosts, each with 16 CPUs and 64GBb.Hash Search Performance: ~500M file hashes/sec; 1K hashes with 0.1% hits; 1 CPU 100%, 512MB, 10TB DBAutomatedThreat HuntingNo Impact toProduction Systems*Supports Windows, Standard and DNAS workloads**Prepare, Practice, and Recover4Ultra-Fast Threat HuntingOnly from Cohesity
5Cybersecurity Ecosystem | SIEM/SOAR | DSPM Integration |Forensics | In-house Ransomware Readiness ServicesEnhanceddata visibilityProactive riskidentification &mitigationREDUCE YOUR RISK from data theftOptimize your data security postureKEY OUTCOMESSIEM / SOAR / UEBAPrivileged Access / Active DirectoryData Security / Data Loss Prevention Security Operations / ITSMSecurity Posture ManagementIdentity ManagementKey Management Malware DetectionIdentify Protect Respond RecoverDetect
IT Analytics: Risk Mitigation at Your FingertipsOut-of-the-Box Reports RapidlyIdentify Risks• Baseline of known successfulbackups• Analytics software automaticallyspots false positives• Displays anomalies in high-levelsummary graphics to help youassess risksRapid detection of ransomware anomalies with simplified visibility and actionable insightsReduce Your Risk5
Ironclad protection with guaranteed recoveryAnomaly Detection& Malware ScanAuthentication& AuthorizationZero TrustArchitectureConsistentRecoveryNetwork AccessControlsReducing monthsof effort to hoursHardware PlatformOS & ApplicationsNetwork SecurityUser SecurityAppliances: Cyber Resilience Done for YouImmutability& Indelibility
Cloud Optimized20
Data is Always Your ResponsibilityResponsibilityvaries by typeResponsibilitytransfers tocloud providerResponsibilityalways retainedby the customerCSP Customer SharedResponsibility SaaS PaaS IaaS On-premInformation and dataDevices (mobile and PCs)Accounts and identitiesIdentity and directory infrastructureApplicationsNetwork controlsOperating systemPhysical hostPhysical networkPhysical data centerSharedResponsibilityModel
The Limitations of Cloud Provider ToolsUnexpectedcostsNo deduplicationLack of scalabilityAdded feesOverprovisioned resourcesCostly replicationVM sprawl…all leading to ahigher TCO.IncreasedcomplexityMinimal on-premises supportNo multi-cloud coverageLimited application coverageManual scriptingLack of DR optionsAdditional staff training…all resulting inlost productivity.No anomaly detectionNo malware scanningNo clean restoresNo IRE / air gap…creating a larger attack surfaceand increasing therisk of data loss.Ransomwarevulnerability
Advancedrecoverycapabilitiesimprovingrecovery pointand timeobjectivesFlexibleprocurementanddeploymentmodelsOne solutionacross hybridmulti cloudRansomwareProtectionHighly costeffectivededuplicatedstorageAutomatedcross cloudmobility andrecoverywithout lock inpenalty costsElasticplatform andresourcemanagementIntelligentdiscovery andprotection forcloudapplicationsMoreworkloadsacrosstraditional,IaaS, PaaSand SaaSClose the Gap with NetBackupAWS BackupAzure BackupGoogle Cloud Backup (Actifio)Cohesity NetBackup
Market-Leading Cloud SupportIaaSVM Backup from snapshot for:• Azure (Azure <-> AWS <->VMware recovery)• AWS (AWS <-> Azure <-> VMware recovery)• GCP• OCI4Kubernetes(Cloud Native)3+• Azure Kubernetes• Amazon Elastic KubernetesService• Google Kubernetes Engine• Plus, many more (list)10 Public Cloud ObjectStorage Protection• AWS stand/IA• AWS Glacier• AWS GovCloud• Azure• Azure Archive• Azure Data Lake G2• Azure Gov• GCP• IBM• AliCloudPaaS Workloads (Incremental support in bold)29• Amazon Redshift• Amazon RDS Custom SQL• Amazon RDS Custom Oracle• Google Cloud SQL• Google PostgreSQL• Google MySQL• Google BigQuery• Yugabyte Anywhere• Azure SQL Database• Azure SQL Managed Instance• Azure Database for MySQL• Azure Database for MariaDB• Azure PostgreSQL• Azure Github• Azure Devops• Azure CosmosDB: MongoDB• Azure CosmosDB: SQL API• Azure CosmosDB: Cassandra• Azure CosmosDB: Table API• Amazon DynamoDB• Amazon RDS SQL• Amazon RDS PostgreSQL• Amazon RDS MySQL• Amazon RDS MariaDB• Amazon RDS Oracle• Amazon Aurora PostgreSQL• Amazon Aurora MySQL• Amazon DocumentDB• Amazon NeptuneDBPrivate Cloud Object StorageProtection Validated14• Nutanix Objects• Cloudian Hyperstore• Hitachi Vantara• Scality RING• StorageGrid Webscale• Quantum ActiveScale• IBM COS• Pure FlashBlade S3• DataCore Swarm• IBM (RHEL) CEPH• Dell ECS &PowerScale• STACKIT• NetApp OnTap S3Cloud NAS(Cloud Native)4• Azure Cloud Volume OnTap• AWS FSx for NetApp• AWS EFS (filesystem)• Azure Files (filesystem)
Cloud Scale TechnologyPowering NetBackup in the cloudCloud Scale Technology is a new generation of the proven NetBackup architecture, modernized to leveragecontainerization, microservices, and elasticity to operate efficiently and cloud-natively and at scale within anycloud, while providing a foundation for our vision to deliver autonomous data protection.Up to90%Storage Savings40%Cloud SavingsEnabledCapabilities• Cloud-NativeImmutable Storage• Cloud-Native Snapshots• Integrated SaaS Protection• Elastic Snapshotsand Backups• Automated Snapshot Mgmt.• Automated Malware ScanningCloud ScaleTechnologyTechnologies• Containerization• Artificial Intelligence• Kubernetes• Ansible PlaybooksTechniques• Elastic• Subscription-Based• Hyper-Automation• Multi-Tenant
Optimized for the Multicloud• Customer managed cloudworkload protection• Automating elasticity andplatform resiliency with use ofCloud Scale Technology• Multi-tier replication copiesbackups to any target• Optimizes storage and datafootprint to minimize costsAutomated and AI-powered intelligent data storageWorkloads in AWS, Azure, or GCPIntelligent Cloud Policy Engine performs automated discoveryNew instanceprovisionedCohesity AltaRecovery VaultCloud NativeSnapshotsCohesity AltaRecovery VaultCloud NativeSnapshotsRegion A Region BElastic Cloud Autoscalingdynamically adjusts cloudresources as requiredContainerized dedupe enginesimplifies deployment andoptimizes data footprintMulti-tier replication copiesbackups to any targetNetBackupCloud ScaleTechnology
Cross-Cloud / Cross-Platform RecoveryABOUT THE FEATUREBENEFITS• Capturing, storing, securing, andrecovering raw, cloud hypervisor-independent images of virtualized data• AWS to Azure• Azure to AWS• Recover data to alternate cloud whencurrent Cloud domain unavailable• Move data to different domains andClouds NetBackupCross-cloud Recovery
Up to 90%cost savingsDIY Cloud StorageStorage Egress Data Operations Support ManagementRecovery Vault Recovery VaultArchive TierTCO advantage plus additional benefits • Provides a low-cost long-termdata retention option forNetBackup environments• Choice of back-end providers• Azure Archive• Glacier Deep Archive• Choice of a recovery time andcost structure that meets yourneeds• Mix and match storage tiers asrequiredAdditional TCO Savings with Recovery VaultAlta Recovery Vault delivers up to 90% savings vs. DIY cloud storage
Kubernetes Supportin NetBackupGranularrecoverabilitySingleinterfaceOn-premises tocloud K8s backupPublic cloudHybrid cloudPrivate cloudDisaster recoveryProtectionat scaleAny workloadPLATFORM INDEPENDENCEDISTRIBUTION MOBILITYCentralizedManagementLeading the Industry• Automated deployment with Helm• Application consistent backups• Portability across distributions• Cross-platform restores includingInstant and Granular Recovery• Dedicated backup network support• Optimized footprint with deduplicationfrom cluster to target storage• Elastic data movement for optimizedperformance• RBAC enabled for self-service• Incremental and Accelerator backups• OpenShift/Kubevirt virtualization
Integrated SaaS ProtectionAlta SaaS Protection is a complete SaaS backup solution. Integrated into NetBackup.Full SaaS Data ProtectionMicrosoft 365: Exchange Online, SharePoint Online,OneDrive for Business, Teams, and Entra ID supportGoogle Workspace: Gmail, Google Drive, Docs, Sheets,Slides, and moreSalesforce, Slack, Box, and moreEnterprise-readyPerformance and scalabilitySecurity hardeningEnd-user self-service restoreSingle-tenant architectureComprehensive eDiscovery searchesEnterprise-gradeSecurityGlobal datacentersfor data sovereigntyeDiscoverysearchEnd-user self-servicerestoresHigh performanceand scalability
Automated Operations31
32© 2024 Cohesity Inc. All rights reserved.Heightened Expectations vs. Practical ApplicationGartner found that while 86% of CIOs plan to adopt AI, only 40% have done so*86%Intention40%AdoptionThe AI Promise• $15.7 trillion boost by 2030• Economic growth• Business transformationThe AI Reality• Intention vs. adoption• Implementation hurdles• Real-world challenges* Gartner CIO and Technology Executive Survey 2024
33Centralized Management withAlta ViewSimplified Interface withAI-Driven Reporting• Dashboard View• Fully Integrated Hybrid Experience• AI-Driven Insights• Simplified Navigation• Workflow Oriented
ABOUT THE FEATUREBENEFITS• Identify ideal recovery points for complexcyber recoveries• Quicker recovery from cyber breaches• Increased confidence in recovered dataDETERMINING FACTORS• Job Risk Score• Estimated Data Loss• Media Type• HASH / Malware Scan Status• Time Since Backup‘Thumbs up”recommendedrecovery pointNow in Alta View:Automated Intelligent Recovery Point Recommendations
© 2025 Cohesity Inc. All rights reserved. 35ABOUT THE FEATUREBENEFITS• User-defined process for automateddisaster and cyber recovery• Easily customizable and granularcontrols to meet complex hybrid, PaaS,containerized, and multi-cloudrequirements• Quick and confident recoveries• Easily test recovery scenarios• Meet emerging regulatoryrequirements for recoveryNow in Alta View:Recovery Blueprints for Orchestrated Recovery
36ABOUT THE FEATUREBENEFITS• GenAI used to:• Analyze assets, workloads, andenvironmental conditions• Generate optimized policyrecommendations• One-button implementation• Streamlined Operations• Enhanced Security• Continuous OptimizationNow in Alta View:Automated Protection Policy Creation
© 2025 Cohesity Inc. All rights reserved. 37ABOUT THE FEATUREBENEFITS• Alta Copilot IDs and analyzes failedbackup jobs• Uses AI to recommend correctiveactions• Comprehensive Coverage• Operational EfficiencyNow in Alta View:Intelligent Job Failure Analysis
Why NetBackup?38
NBU 10.5The Evolution ContinuesNBU 10.2 NBU 10.3 NBU 10.4Single file restore fromsnapshot backupMalware scanning supportfor DNAS workloadsConcurrent MalwareScanningIncremental backup supportfor PaaS workloadsAutomated Recovery ofPostgreSQL and MySQLNAS Parallel Recovery fromDNAS BackupIntegration with Cloud-based SIEM/SOARReplication OrchestrationEnhancementsNBU 11.0Blast Radius AnalysisSecurity Risk MeterExpanded MalwareScanningSplunk IntegrationMulti-stream Cloud ObjectStorage ProtectionEnhanced Cloud ElasticityCross-Cloud RecoveryMSDP Volume GroupsCloud & KubernetesPolicy ManagementGranular RBAC forVMware vSphereMulti-Factor authentication(MFA) EverywhereMulti-Person Authorizationfor Critical OperationsAnomaly Detection userbehavior enhancementsInline Malware ScanningDuring RecoveryEnhanced Media ServerElasticity and IntelligenceExpanded S3 ImmutabilitySupportExtend CSI-based snapshotsupportFIPS Compliance for K8WorkloadsAdaptive Risk EngineAnomaly Detection:Entropy AnalysisAdaptive Multi-FactorAuthentication (MFA)Expanded Multi-PersonAuthorization (MPA)Intelligent Groups forPaaS WorkloadsUniversal SharesIntegration forOpenStackRecommendedRecovery PointsAlta Copilot AIQuantum-ProofEncryptionAdaptive Risk Engine 2.0Security Risk Meter 2.0Sheltered HarborSolution EndorsementEnhanced MSDPVolume GroupsExpanded Cloud SupportNew and ImprovedWeb UIEnhanced NutanixIntegrationKubernetes DedicatedNetwork Support
What Sets Us Apart?100% RansomwareRecovery Success RateFour years running, a levelof resiliency unmatched byany competitorRegulatory andIndependent IndustryCertificationsCohasset Associates,Sheltered Harbor,FedRAMP authorizedCross-CloudAnomaly Detection& VisibilityUnparalleledImmutabilityCloud RecoveryOn-DemandAutomated andOrchestratedRecoveryDeduplicated, CostOptimized DataCross-CloudMobilityAll of our cloud and cyber resilience features included inNetBackup’s modern, subscription-based licensing
Gartner is a registered trademark and service mark of Gartner, Inc. and/orits affiliates in the U.S. and internationally and is used herein withpermission. All rights reserved.Magic QuadrantLeader inEnterprise Backupand RecoverySoftware Solutions19xA LEADER2,000+DevelopersWorldwide2,200+GlobalPatents100+ EBData UnderManagement1,000+SupportedWorkloads1,000+StorageTargets19x a Leader
© 2024 Cohesity, Inc. All rights reserved.Cohesity, the Cohesity logo, SnapTree, SpanFS, DataPlatform, DataProtect, Helios, the Helios logo, DataGovern, SiteContinuity, DataHawk, and other Cohesity marks are trademarks or registered trademarks ofCohesity, Inc. in the US and/or internationally. Other company and product names may be trademarks of the respective companies with which they are associated. This material (a) is intended to provide you informationabout Cohesity and our business and products; (b) was believed to be true and accurate at the time it was written, but is subject to change without notice; and (c) is provided on an “AS IS” basis. Cohesity disclaims allexpress or implied conditions, representations, warranties of any kind.Thank You
• NetBackup Data Sheet• NetBackup Product Web Page• NetBackup Appliances Web Page• Alta Recovery Vault Product Web Page• Alta SaaS Protection Product Web Page• Alta View Product Web Page• IT Analytics Product Web Page43Additional Resources

Recommended

PPTX
NetBackup Story Customer Presentation.pptx
PPTX
Feb 2021 Cohesity first pitch presentation.pptx
PDF
Solution-Brief-Backup-and-Recovery (1)
PDF
Solution Brief - Backup and Recovery
PPTX
Feb 2021 Ransomware Recovery presentation.pptx
PPTX
Dalle soluzioni di BackUp & Recovery al Data management a 360°
PDF
IT Managed Services Florida | MSP Solutions Provider Orlando
PDF
Tổng quan công nghệ Net backup - Phần 1
PDF
Commvault Cloud POWERED BY METALLIC IA.pdf
PDF
Rapid_Recovery-T75-v2204j.pdf
PDF
VSD Istanbul 2018
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
 
PPTX
Professional Services for Cyber Recovery .pptx
PDF
NetForChoice: Redefining Cybersecurity Intelligence
PPTX
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
PDF
What Role Does SOC Play in Preventing Data Breaches.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
Delivering Modern Data Protection for VMware Environments
PDF
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
PPTX
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
PPTX
Identity privacy and data protection in the cloud – what is being done is it ...
PPTX
Q4-2024_Can Your HA Solution Help You Recover from a Ransomware Attack_E_FINA...
PDF
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
PPT
Earth linkit servicesoverview
PPT
EarthLink IT Services Overview
PDF
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
PPTX
NBU_IT_Analytics_11_2_Whats_New_featured.pptx
PPTX
[DSC Europe 25] Ivan Peric - Intelligence Swarm Logic and Techno-Functional M...
PPTX
[DSC Europe 25] Jovan Bogicevic - Legacy to AI-Driven Defense: Transforming D...

More Related Content

PPTX
NetBackup Story Customer Presentation.pptx
PPTX
Feb 2021 Cohesity first pitch presentation.pptx
PDF
Solution-Brief-Backup-and-Recovery (1)
PDF
Solution Brief - Backup and Recovery
PPTX
Feb 2021 Ransomware Recovery presentation.pptx
PPTX
Dalle soluzioni di BackUp & Recovery al Data management a 360°
PDF
IT Managed Services Florida | MSP Solutions Provider Orlando
PDF
Tổng quan công nghệ Net backup - Phần 1
NetBackup Story Customer Presentation.pptx
Feb 2021 Cohesity first pitch presentation.pptx
Solution-Brief-Backup-and-Recovery (1)
Solution Brief - Backup and Recovery
Feb 2021 Ransomware Recovery presentation.pptx
Dalle soluzioni di BackUp & Recovery al Data management a 360°
IT Managed Services Florida | MSP Solutions Provider Orlando
Tổng quan công nghệ Net backup - Phần 1

Similar to Introducing Cohesity NetBackup (2).pdf

PDF
Commvault Cloud POWERED BY METALLIC IA.pdf
PDF
Rapid_Recovery-T75-v2204j.pdf
PDF
VSD Istanbul 2018
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
 
PPTX
Professional Services for Cyber Recovery .pptx
PDF
NetForChoice: Redefining Cybersecurity Intelligence
PPTX
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
PDF
What Role Does SOC Play in Preventing Data Breaches.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
Delivering Modern Data Protection for VMware Environments
PDF
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
PPTX
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
PPTX
Identity privacy and data protection in the cloud – what is being done is it ...
PPTX
Q4-2024_Can Your HA Solution Help You Recover from a Ransomware Attack_E_FINA...
PDF
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
PPT
Earth linkit servicesoverview
PPT
EarthLink IT Services Overview
PDF
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
PPTX
NBU_IT_Analytics_11_2_Whats_New_featured.pptx
Commvault Cloud POWERED BY METALLIC IA.pdf
Rapid_Recovery-T75-v2204j.pdf
VSD Istanbul 2018
The Cost of Doing Nothing: A Ransomware Backup Story
 
Professional Services for Cyber Recovery .pptx
NetForChoice: Redefining Cybersecurity Intelligence
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
What Role Does SOC Play in Preventing Data Breaches.pdf
What Role Does SOC Play in Preventing Data Breaches
What Role Does SOC Play in Preventing Data Breaches
Delivering Modern Data Protection for VMware Environments
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Identity privacy and data protection in the cloud – what is being done is it ...
Q4-2024_Can Your HA Solution Help You Recover from a Ransomware Attack_E_FINA...
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Earth linkit servicesoverview
EarthLink IT Services Overview
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
NBU_IT_Analytics_11_2_Whats_New_featured.pptx

Recently uploaded

PPTX
[DSC Europe 25] Ivan Peric - Intelligence Swarm Logic and Techno-Functional M...
PPTX
[DSC Europe 25] Jovan Bogicevic - Legacy to AI-Driven Defense: Transforming D...
PDF
[DSC Europe 25] Marija Vlajkovic & Andrea Radonjanin - Integration of AI tool...
PPTX
1. Prepare for the application of health survey.pptx
PPTX
Talk on Artificial Intelligence_AI Usap Tayo.pptx
PPTX
[DSC Europe 25] Behzad Hosseini - AI Agents in the Wild: Deploying Models tha...
PPTX
Orientation-on-ARAL-Check-in-Assessment.pptx
PPTX
[DSC Europe 25] Marko Krstic - Understanding the AI Threat Landscape - Risks,...
PPTX
[DSC Europe 25] Miodrag Pesovic & Vladislav Radonjic - Federated Data Archite...
PDF
Data+Security+Masterclass Presentation.pdf
PPTX
[DSC Europe 25] Debmalya Biswas - Agentification: the art of transforming man...
PPTX
[DSC Europe 25] Bassam Maharmeh - Artificial Intelligence: Opportunities and ...
PPTX
[DSC Europe 25] Kaja Kandare - LLM as a judge.pptx
PPTX
[DSC Europe 25] Jon Dajci - Bridging TradFi and DeFi: Building the Future of ...
PPTX
software define network authentication .pptx
PDF
[DSC Europe 25] Imai Jen-La Plante - The New Generation: AI and the Future of...
PDF
The Future of Data Governance Presentation
PPTX
Deep Learning The Next Frontier (AI).pptx
PPTX
[DSC Europe 25] Nikolay Burlutskiy - Best Practices for Building Enterprise M...
PPTX
FDS_Deliverable_Data_Scientist_and_Managers_Count.pptx
[DSC Europe 25] Ivan Peric - Intelligence Swarm Logic and Techno-Functional M...
[DSC Europe 25] Jovan Bogicevic - Legacy to AI-Driven Defense: Transforming D...
[DSC Europe 25] Marija Vlajkovic & Andrea Radonjanin - Integration of AI tool...
1. Prepare for the application of health survey.pptx
Talk on Artificial Intelligence_AI Usap Tayo.pptx
[DSC Europe 25] Behzad Hosseini - AI Agents in the Wild: Deploying Models tha...
Orientation-on-ARAL-Check-in-Assessment.pptx
[DSC Europe 25] Marko Krstic - Understanding the AI Threat Landscape - Risks,...
[DSC Europe 25] Miodrag Pesovic & Vladislav Radonjic - Federated Data Archite...
Data+Security+Masterclass Presentation.pdf
[DSC Europe 25] Debmalya Biswas - Agentification: the art of transforming man...
[DSC Europe 25] Bassam Maharmeh - Artificial Intelligence: Opportunities and ...
[DSC Europe 25] Kaja Kandare - LLM as a judge.pptx
[DSC Europe 25] Jon Dajci - Bridging TradFi and DeFi: Building the Future of ...
software define network authentication .pptx
[DSC Europe 25] Imai Jen-La Plante - The New Generation: AI and the Future of...
The Future of Data Governance Presentation
Deep Learning The Next Frontier (AI).pptx
[DSC Europe 25] Nikolay Burlutskiy - Best Practices for Building Enterprise M...
FDS_Deliverable_Data_Scientist_and_Managers_Count.pptx

Introducing Cohesity NetBackup (2).pdf

  • 1.
  • 2.
    Challenges:• Multiple attacksurfaces• Point solutions• Risk of downtime“I need to protectagainst ransomware.”Challenges:• Inconsistent protection• Limited multi-cloud visibility• Lack of scalability“I need to protecteverything.”Challenges:• Operational complexity• Increasing costs• Inefficient usage“I need to orchestrateand automate.”Today’s Data Protection Challenges© 2025 Cohesity Inc. All rights reserved.
  • 3.
    © 2024 CohesityInc. All rights reserved. 3Downtime38% of Sr. IT Execs reporteddowntime for 5 days orlonger following an attack.Data LossAccording to research, upto 20% of data may beunrecoverable.
  • 4.
    Introducing Cohesity NetBackupAdvanceddata protection with integrated cyber resilience, automation, andsupport for over 1,000 workloads and 1,000 storage targets.
  • 5.
    The NetBackup DataProtection FamilyManage secondarystorage, or primarystorage for DataProtection as aService.Cohesity AltaRecovery VaultQuickly deploy andeasily manageransomware resilientNetBackup dataprotection in a turnkeypackage.CohesityAppliancesCohesity Alta ViewCentralize management and gain visibility acrossyour entire NetBackup data protection estate.Cohesity IT AnalyticsGain actionable backup and storage insights forheterogeneous, multi-vendor IT environments.Intelligent data protectionwith integrated cyberresilience, automation,and support for over1,000 workloads and1,000 storage targets.CohesityNetBackupManage your SaaSapplication workloadsincluding M365, EntraID, Slack, GoogleWorkspace, andSalesforce.Cohesity AltaSaaS Protection
  • 6.
    Cyber Resilient• Comprehensiveprotection• Active cyber defenses• Zero-ransom recovery• Any RPO or RTONetBackupAdvanced data protection with integrated cyber resilience.Automated Operations• Event-driven automation• Elastic resource utilization• Reduced cost• Reduced carbon footprintCloud Optimized• Any cloud• Any workload• Any deployment model• Multi-cloud visibility
  • 7.
  • 8.
    RecoverableStrengthenedAwareResponsiveOptimizing© 2025 CohesityInc. All rights reserved. 8The 5 Steps toCyber ResilienceOperational Maturity LevelProtect all datawith globalgovernance1Ensure yourbackups arealwaysrecoverable​2Detect andinvestigatethreats3Prepare,practice andrecoverfrom incidents4Reduceyour riskfrom data theft5
  • 9.
    9PROTECT ALL DATAwith global governanceIdentify unprotected data – your biggest security risk1On-PremisesCloudCertifications• DISA STIG• NIST SP 800-53, NIST SP800-37RMF, ICD 503, NIST 800-171• FIPS 140-2• TLS 1.3• IPv6/USGv6• ISO Common Criteria• SOC2: Alta Archiving, SaaSProtection• Sheltered Harbor• FedRAMP: Alta SaaS ProtectionCyber ReadinessDesignations• Sole data protection provider forCISA JCDC• CMMC readiness• EO-compliant with “critical SW”designation: EO 14028, M22-18KEY OUTCOMESEnhanced securityRisk reductionImproved compliance& governanceLower costs & improved ROIIncreased IT efficiencyOver 1,000 data sourcesUnified UI + APIs | Common SLAs | Compliance | Reporting |Policies | AI-Powered Operations
  • 10.
    © 2025 CohesityInc. All rights reserved.ABOUT THE FEATUREBENEFITS• GenAI automatically detects, audits,and protects unprotected assetsacross the environment.• Automatically suggests and appliestailored protection policies.• Comprehensive Coverage• Operational EfficiencyAI-Powered Asset ProtectionProtect All Data1Only from Cohesity
  • 11.
    21,000+ data sourcesOn-Premises| Cloud | SaaS | EdgeENSURE YOUR BACKUPS are always recoverableHarden your platform + add a cyber vaultCohesity AltaRecovery VaultCloud-basedcyber vaultImmutability | MFA | Pull-based replication |RBAC | 3-2-1-1 | Quantum-proof encryptionFaster & moresecure recoveryStronger protectionagainst attacksAudit readinessZero trust alignmentKEY OUTCOMESPublic CloudStorageOn-PremisesStorageAppliancesTurnkey dataprotection
  • 12.
    NetBackup• Highly efficientcloud store with global deduplication• Backup + Disaster Recovery, Migration, Portability• Automated intelligent cloud protection• Recover anywhere – on-premises or cloudIaaS PaaS SaaSAlta Recovery Vault• Virtual air-gapped ransomware protection• Immutable cloud storage / unlimited scale• Predictable costs• Powered by and AzureBETB 1 or 3yearsIncludesdata transferChoice ofprovidersStandard orArchive tierAlta Recovery VaultA seamless, integrated cloud-based cyber vaultAltaRecovery VaultAlways Recoverable2
  • 13.
    3 DETECT ANDINVESTIGATE threatsRegularly conduct threat scanning & threat huntingAI-Powered Anomaly Detection | Automated Malware Scanning |User Behavior Analytics | Hash-based Threat Hunting | ForensicsEarly threat detection &mitigationBackup integrityassuranceFaster incident recoveryand reduced downtimeShared context for IT &InfoSec teamsKEY OUTCOMESIntegration with SIEM/SOAR/XDR SystemsScan Backupsfor Malware ThreatsBackups of internet-facingWindows clientsBackup StorageNetBackupMalware ScannerReal-time AI-poweredAnomaly DetectionClient SourceData (Objects)NetBackupMark asignoreConfirm asanomalyReport as falsepositive
  • 14.
    © 2025 CohesityInc. All rights reserved. 14OperationsBackupAdminAdmin BehaviorAnomaly Detection• Threat Actors steal admincredentials and attempt tocompromise backup data• AI-powered Self-Defensedetects anomalous behavior,steps in• Automatically adjusts MFA /MPA• If operation abnormal, operationis declined, and data secured• If operation normal, operation isapprovedIncreasedMFA / MPAAI-Powered Self-DefenseDetect and Investigate Threats3Only from Cohesity
  • 15.
    4Secure File Storage| Recovery Orchestration | Isolated Recovery Area |Zero-Ransom RecoveriesFaster &safer recoveryImproved RTOLower riskof re-infectionReduced disruption& financial riskPREPARE, PRACTICE, AND RECOVER from incidentsAutomate cyber recovery: initiate, investigate, mitigateKEY OUTCOMESRecover to AnywhereSnapshotsIdentify Last Known Good +Recovery Orchestration at ScaleRecoveryIsolated Recovery Area• Granular File Recovery• Bare Metal Recovery• Bulk/Instant RecoveryInstantAccessMalwarescan• Cloud Recovery• Instant RollbackMultiple Recovery Options
  • 16.
    © 2025 CohesityInc. All rights reserved.Up ToABOUT THE FEATUREBENEFITS• Threat hunting 105*faster vs. malware scanning.• Supports two threat hunting scenarios of file level data**:1. Entire backup searched automatically:• Daily, with updated threat intelligence• When malware detected.2. On-demand for forensics and investigations.• Automated threat hunting without disrupting productionsystems.• Rapid identification of malware blast radius whenmalware is detected.• Accelerated forensics to significantly reduce cyber recoverytime.a.Malware Scan Performance: ~15M file/hr; 16KB file; 4 scan hosts, each with 16 CPUs and 64GBb.Hash Search Performance: ~500M file hashes/sec; 1K hashes with 0.1% hits; 1 CPU 100%, 512MB, 10TB DBAutomatedThreat HuntingNo Impact toProduction Systems*Supports Windows, Standard and DNAS workloads**Prepare, Practice, and Recover4Ultra-Fast Threat HuntingOnly from Cohesity
  • 17.
    5Cybersecurity Ecosystem |SIEM/SOAR | DSPM Integration |Forensics | In-house Ransomware Readiness ServicesEnhanceddata visibilityProactive riskidentification &mitigationREDUCE YOUR RISK from data theftOptimize your data security postureKEY OUTCOMESSIEM / SOAR / UEBAPrivileged Access / Active DirectoryData Security / Data Loss Prevention Security Operations / ITSMSecurity Posture ManagementIdentity ManagementKey Management Malware DetectionIdentify Protect Respond RecoverDetect
  • 18.
    IT Analytics: RiskMitigation at Your FingertipsOut-of-the-Box Reports RapidlyIdentify Risks• Baseline of known successfulbackups• Analytics software automaticallyspots false positives• Displays anomalies in high-levelsummary graphics to help youassess risksRapid detection of ransomware anomalies with simplified visibility and actionable insightsReduce Your Risk5
  • 19.
    Ironclad protection withguaranteed recoveryAnomaly Detection& Malware ScanAuthentication& AuthorizationZero TrustArchitectureConsistentRecoveryNetwork AccessControlsReducing monthsof effort to hoursHardware PlatformOS & ApplicationsNetwork SecurityUser SecurityAppliances: Cyber Resilience Done for YouImmutability& Indelibility
  • 20.
  • 21.
    Data is AlwaysYour ResponsibilityResponsibilityvaries by typeResponsibilitytransfers tocloud providerResponsibilityalways retainedby the customerCSP Customer SharedResponsibility SaaS PaaS IaaS On-premInformation and dataDevices (mobile and PCs)Accounts and identitiesIdentity and directory infrastructureApplicationsNetwork controlsOperating systemPhysical hostPhysical networkPhysical data centerSharedResponsibilityModel
  • 22.
    The Limitations ofCloud Provider ToolsUnexpectedcostsNo deduplicationLack of scalabilityAdded feesOverprovisioned resourcesCostly replicationVM sprawl…all leading to ahigher TCO.IncreasedcomplexityMinimal on-premises supportNo multi-cloud coverageLimited application coverageManual scriptingLack of DR optionsAdditional staff training…all resulting inlost productivity.No anomaly detectionNo malware scanningNo clean restoresNo IRE / air gap…creating a larger attack surfaceand increasing therisk of data loss.Ransomwarevulnerability
  • 23.
    Advancedrecoverycapabilitiesimprovingrecovery pointand timeobjectivesFlexibleprocurementanddeploymentmodelsOnesolutionacross hybridmulti cloudRansomwareProtectionHighly costeffectivededuplicatedstorageAutomatedcross cloudmobility andrecoverywithout lock inpenalty costsElasticplatform andresourcemanagementIntelligentdiscovery andprotection forcloudapplicationsMoreworkloadsacrosstraditional,IaaS, PaaSand SaaSClose the Gap with NetBackupAWS BackupAzure BackupGoogle Cloud Backup (Actifio)Cohesity NetBackup
  • 24.
    Market-Leading Cloud SupportIaaSVMBackup from snapshot for:• Azure (Azure <-> AWS <->VMware recovery)• AWS (AWS <-> Azure <-> VMware recovery)• GCP• OCI4Kubernetes(Cloud Native)3+• Azure Kubernetes• Amazon Elastic KubernetesService• Google Kubernetes Engine• Plus, many more (list)10 Public Cloud ObjectStorage Protection• AWS stand/IA• AWS Glacier• AWS GovCloud• Azure• Azure Archive• Azure Data Lake G2• Azure Gov• GCP• IBM• AliCloudPaaS Workloads (Incremental support in bold)29• Amazon Redshift• Amazon RDS Custom SQL• Amazon RDS Custom Oracle• Google Cloud SQL• Google PostgreSQL• Google MySQL• Google BigQuery• Yugabyte Anywhere• Azure SQL Database• Azure SQL Managed Instance• Azure Database for MySQL• Azure Database for MariaDB• Azure PostgreSQL• Azure Github• Azure Devops• Azure CosmosDB: MongoDB• Azure CosmosDB: SQL API• Azure CosmosDB: Cassandra• Azure CosmosDB: Table API• Amazon DynamoDB• Amazon RDS SQL• Amazon RDS PostgreSQL• Amazon RDS MySQL• Amazon RDS MariaDB• Amazon RDS Oracle• Amazon Aurora PostgreSQL• Amazon Aurora MySQL• Amazon DocumentDB• Amazon NeptuneDBPrivate Cloud Object StorageProtection Validated14• Nutanix Objects• Cloudian Hyperstore• Hitachi Vantara• Scality RING• StorageGrid Webscale• Quantum ActiveScale• IBM COS• Pure FlashBlade S3• DataCore Swarm• IBM (RHEL) CEPH• Dell ECS &PowerScale• STACKIT• NetApp OnTap S3Cloud NAS(Cloud Native)4• Azure Cloud Volume OnTap• AWS FSx for NetApp• AWS EFS (filesystem)• Azure Files (filesystem)
  • 25.
    Cloud Scale TechnologyPoweringNetBackup in the cloudCloud Scale Technology is a new generation of the proven NetBackup architecture, modernized to leveragecontainerization, microservices, and elasticity to operate efficiently and cloud-natively and at scale within anycloud, while providing a foundation for our vision to deliver autonomous data protection.Up to90%Storage Savings40%Cloud SavingsEnabledCapabilities• Cloud-NativeImmutable Storage• Cloud-Native Snapshots• Integrated SaaS Protection• Elastic Snapshotsand Backups• Automated Snapshot Mgmt.• Automated Malware ScanningCloud ScaleTechnologyTechnologies• Containerization• Artificial Intelligence• Kubernetes• Ansible PlaybooksTechniques• Elastic• Subscription-Based• Hyper-Automation• Multi-Tenant
  • 26.
    Optimized for theMulticloud• Customer managed cloudworkload protection• Automating elasticity andplatform resiliency with use ofCloud Scale Technology• Multi-tier replication copiesbackups to any target• Optimizes storage and datafootprint to minimize costsAutomated and AI-powered intelligent data storageWorkloads in AWS, Azure, or GCPIntelligent Cloud Policy Engine performs automated discoveryNew instanceprovisionedCohesity AltaRecovery VaultCloud NativeSnapshotsCohesity AltaRecovery VaultCloud NativeSnapshotsRegion A Region BElastic Cloud Autoscalingdynamically adjusts cloudresources as requiredContainerized dedupe enginesimplifies deployment andoptimizes data footprintMulti-tier replication copiesbackups to any targetNetBackupCloud ScaleTechnology
  • 27.
    Cross-Cloud / Cross-PlatformRecoveryABOUT THE FEATUREBENEFITS• Capturing, storing, securing, andrecovering raw, cloud hypervisor-independent images of virtualized data• AWS to Azure• Azure to AWS• Recover data to alternate cloud whencurrent Cloud domain unavailable• Move data to different domains andClouds NetBackupCross-cloud Recovery
  • 28.
    Up to 90%costsavingsDIY Cloud StorageStorage Egress Data Operations Support ManagementRecovery Vault Recovery VaultArchive TierTCO advantage plus additional benefits • Provides a low-cost long-termdata retention option forNetBackup environments• Choice of back-end providers• Azure Archive• Glacier Deep Archive• Choice of a recovery time andcost structure that meets yourneeds• Mix and match storage tiers asrequiredAdditional TCO Savings with Recovery VaultAlta Recovery Vault delivers up to 90% savings vs. DIY cloud storage
  • 29.
    Kubernetes Supportin NetBackupGranularrecoverabilitySingleinterfaceOn-premisestocloud K8s backupPublic cloudHybrid cloudPrivate cloudDisaster recoveryProtectionat scaleAny workloadPLATFORM INDEPENDENCEDISTRIBUTION MOBILITYCentralizedManagementLeading the Industry• Automated deployment with Helm• Application consistent backups• Portability across distributions• Cross-platform restores includingInstant and Granular Recovery• Dedicated backup network support• Optimized footprint with deduplicationfrom cluster to target storage• Elastic data movement for optimizedperformance• RBAC enabled for self-service• Incremental and Accelerator backups• OpenShift/Kubevirt virtualization
  • 30.
    Integrated SaaS ProtectionAltaSaaS Protection is a complete SaaS backup solution. Integrated into NetBackup.Full SaaS Data ProtectionMicrosoft 365: Exchange Online, SharePoint Online,OneDrive for Business, Teams, and Entra ID supportGoogle Workspace: Gmail, Google Drive, Docs, Sheets,Slides, and moreSalesforce, Slack, Box, and moreEnterprise-readyPerformance and scalabilitySecurity hardeningEnd-user self-service restoreSingle-tenant architectureComprehensive eDiscovery searchesEnterprise-gradeSecurityGlobal datacentersfor data sovereigntyeDiscoverysearchEnd-user self-servicerestoresHigh performanceand scalability
  • 31.
  • 32.
    32© 2024 CohesityInc. All rights reserved.Heightened Expectations vs. Practical ApplicationGartner found that while 86% of CIOs plan to adopt AI, only 40% have done so*86%Intention40%AdoptionThe AI Promise• $15.7 trillion boost by 2030• Economic growth• Business transformationThe AI Reality• Intention vs. adoption• Implementation hurdles• Real-world challenges* Gartner CIO and Technology Executive Survey 2024
  • 33.
    33Centralized Management withAltaViewSimplified Interface withAI-Driven Reporting• Dashboard View• Fully Integrated Hybrid Experience• AI-Driven Insights• Simplified Navigation• Workflow Oriented
  • 34.
    ABOUT THE FEATUREBENEFITS•Identify ideal recovery points for complexcyber recoveries• Quicker recovery from cyber breaches• Increased confidence in recovered dataDETERMINING FACTORS• Job Risk Score• Estimated Data Loss• Media Type• HASH / Malware Scan Status• Time Since Backup‘Thumbs up”recommendedrecovery pointNow in Alta View:Automated Intelligent Recovery Point Recommendations
  • 35.
    © 2025 CohesityInc. All rights reserved. 35ABOUT THE FEATUREBENEFITS• User-defined process for automateddisaster and cyber recovery• Easily customizable and granularcontrols to meet complex hybrid, PaaS,containerized, and multi-cloudrequirements• Quick and confident recoveries• Easily test recovery scenarios• Meet emerging regulatoryrequirements for recoveryNow in Alta View:Recovery Blueprints for Orchestrated Recovery
  • 36.
    36ABOUT THE FEATUREBENEFITS•GenAI used to:• Analyze assets, workloads, andenvironmental conditions• Generate optimized policyrecommendations• One-button implementation• Streamlined Operations• Enhanced Security• Continuous OptimizationNow in Alta View:Automated Protection Policy Creation
  • 37.
    © 2025 CohesityInc. All rights reserved. 37ABOUT THE FEATUREBENEFITS• Alta Copilot IDs and analyzes failedbackup jobs• Uses AI to recommend correctiveactions• Comprehensive Coverage• Operational EfficiencyNow in Alta View:Intelligent Job Failure Analysis
  • 38.
  • 39.
    NBU 10.5The EvolutionContinuesNBU 10.2 NBU 10.3 NBU 10.4Single file restore fromsnapshot backupMalware scanning supportfor DNAS workloadsConcurrent MalwareScanningIncremental backup supportfor PaaS workloadsAutomated Recovery ofPostgreSQL and MySQLNAS Parallel Recovery fromDNAS BackupIntegration with Cloud-based SIEM/SOARReplication OrchestrationEnhancementsNBU 11.0Blast Radius AnalysisSecurity Risk MeterExpanded MalwareScanningSplunk IntegrationMulti-stream Cloud ObjectStorage ProtectionEnhanced Cloud ElasticityCross-Cloud RecoveryMSDP Volume GroupsCloud & KubernetesPolicy ManagementGranular RBAC forVMware vSphereMulti-Factor authentication(MFA) EverywhereMulti-Person Authorizationfor Critical OperationsAnomaly Detection userbehavior enhancementsInline Malware ScanningDuring RecoveryEnhanced Media ServerElasticity and IntelligenceExpanded S3 ImmutabilitySupportExtend CSI-based snapshotsupportFIPS Compliance for K8WorkloadsAdaptive Risk EngineAnomaly Detection:Entropy AnalysisAdaptive Multi-FactorAuthentication (MFA)Expanded Multi-PersonAuthorization (MPA)Intelligent Groups forPaaS WorkloadsUniversal SharesIntegration forOpenStackRecommendedRecovery PointsAlta Copilot AIQuantum-ProofEncryptionAdaptive Risk Engine 2.0Security Risk Meter 2.0Sheltered HarborSolution EndorsementEnhanced MSDPVolume GroupsExpanded Cloud SupportNew and ImprovedWeb UIEnhanced NutanixIntegrationKubernetes DedicatedNetwork Support
  • 40.
    What Sets UsApart?100% RansomwareRecovery Success RateFour years running, a levelof resiliency unmatched byany competitorRegulatory andIndependent IndustryCertificationsCohasset Associates,Sheltered Harbor,FedRAMP authorizedCross-CloudAnomaly Detection& VisibilityUnparalleledImmutabilityCloud RecoveryOn-DemandAutomated andOrchestratedRecoveryDeduplicated, CostOptimized DataCross-CloudMobilityAll of our cloud and cyber resilience features included inNetBackup’s modern, subscription-based licensing
  • 41.
    Gartner is aregistered trademark and service mark of Gartner, Inc. and/orits affiliates in the U.S. and internationally and is used herein withpermission. All rights reserved.Magic QuadrantLeader inEnterprise Backupand RecoverySoftware Solutions19xA LEADER2,000+DevelopersWorldwide2,200+GlobalPatents100+ EBData UnderManagement1,000+SupportedWorkloads1,000+StorageTargets19x a Leader
  • 42.
    © 2024 Cohesity,Inc. All rights reserved.Cohesity, the Cohesity logo, SnapTree, SpanFS, DataPlatform, DataProtect, Helios, the Helios logo, DataGovern, SiteContinuity, DataHawk, and other Cohesity marks are trademarks or registered trademarks ofCohesity, Inc. in the US and/or internationally. Other company and product names may be trademarks of the respective companies with which they are associated. This material (a) is intended to provide you informationabout Cohesity and our business and products; (b) was believed to be true and accurate at the time it was written, but is subject to change without notice; and (c) is provided on an “AS IS” basis. Cohesity disclaims allexpress or implied conditions, representations, warranties of any kind.Thank You
  • 43.
    • NetBackup DataSheet• NetBackup Product Web Page• NetBackup Appliances Web Page• Alta Recovery Vault Product Web Page• Alta SaaS Protection Product Web Page• Alta View Product Web Page• IT Analytics Product Web Page43Additional Resources

[8]ページ先頭

©2009-2025 Movatter.jp