As the IT Resilience Platform has evolved, so has its use cases. Zerto has seen every recovery scenario possible through its customers. One of the fastest growing recovery scenarios for Zerto users is ransomware.
Our customers organically began using our replication-based solution to solve for cyber attacks and ransomware that traditionally fall under backup use cases. As we dove deeper into the world of ransomware, we realized why our customers are using us instead of backup tape and disk to recover from ransomware.
Traditional backup and recovery solutions are outdated, and users aren’t confident in their ability to recover from backup tape and disk.
So this year, Zerto decided to attend the RSA Conference in San Francisco. RSA has been a flagship conference in cybersecurity for decades and remains at the forefront of innovations within the space.
We didn’t attend RSA as a cybersecurity vendor, we attended as a company challenging both cybersecurity and IT professionals to rethink their approach to recovery and risk mitigation.
The Zerto Booth
Our Zerto team was excited and well equipped for this conference. From Monday to Thursday each of us had insightful conversations with CISOs, security analysts, IT professionals and many more unique roles within the space.
After multiple demos and in-depth conversations, it was clear that our message was resonating.
Tencate, a Zerto Customer, presents at RSA
Jayme Williams, Systems Engineer at Tencate Fabrics, presented his Zerto success story to all sorts of attendees.
He explained how his organization was attacked by ransomware before and after and discussed the start differences between using backup tape and disk vs. Zerto’s Continuous Data Protection to recover from ransomware.
Throughout the week we had excellent conversations and gained many insights. I’d like to share some with you:
We truly enjoyed our experience at RSA and can’t wait for next year. In the meantime, I urge you to read one of Gartner’s latest reports titled: How to Prepare for and Respond to Business Disruptions After Aggressive Cyberattacks.