Ransomware Recovery in a Multi-Cloud World: Launch Event - Zerto

Ransomware Recovery in a Multi-Cloud World

Zerto Product Announcement Event

Zerto Announcement Event

Defeat the Risks of Ransomware — Recover in Minutes, At Scale.

As cybercriminals keep finding new ways of compromising your applications, we continue developing enhanced capabilities designed to help you recover from ransomware attacks with ease.

In this live discussion, you’ll hear about:

  • NEW ransomware recovery capabilities for all apps – virtual, Kubernetes, in-cloud, and SaaS
  • NEW supported cloud platforms
  • NEW secure management layers bringing in depth defense to data protection
  • Enhancements to Zerto In-Cloud for AWS

Join our guest speakers, IDC Research VP, Phil Goodwin, along with our Zerto experts to learn more about the state of ransomware and disaster recovery, key drivers for data protection, and the newest Zerto offerings to aid in the fight against ransomware and accelerate your adoption of cloud.

Meet the Speakers

Guest Speaker

phil goodwin

Research VP

Infrastructure Systems, Platforms and Technology Group

IDC


caroline seymour

vp product marketing

Zerto

a Hewlett Packard Enterprise company


deepak verma

vp product

Zerto

a Hewlett Packard Enterprise company

New IDC Report

The State of Ransomware and Disaster Preparedness for 2022

Expanding ransomware resilience. Recover in minutes, at scale. 

The demand for data has never been greater and yet the vulnerability and risks to data integrity are escalating with ransomware attacks growing in both severity and scale. An IDC report found that in the past 12 months: 

With the costly and severe consequences of unplanned downtime, IT priorities are shifting to a cloud-first strategy and continuous data protection (CDP) to achieve more demanding service levels.

0 %

of those surveyed activated a disaster response (DR) 

0 %

experienced data corruption from an attack

0 %

of DR efforts were triggered by ransomware or other malware

0 %

experienced unrecoverable data

announcement highlights

Avoid Data Loss, Downtime, and Pay No Ransoms

With this newest release, Zerto takes ransomware resilience to the next level with key product updates to enhance ransomware recovery, security, and platform support.

“Organizations face increased risks from the volume and sophistication of ransomware attacks prevalent today. With the capabilities we have added to the latest Zerto platform, customers are better positioned to meet new challenges head-on and mitigate their impact by recovering more quickly and with confidence.”

Deepak Verma, Zerto

VP of Products


What’s New in Zerto

Zerto delivers fast ransomware recovery with new capabilities to protect and recover your data on your terms.

When it comes to ransomware and other threats that can disrupt your business and cause costly downtime, Zerto’s got you covered.


Zerto and AWS Partnership

Zerto’s strategic relationship with AWS affords you a complete solution set across use cases for migrations, DR and backup to AWS, protection at scale across Amazon EC2 instances, and protection for applications on Amazon Elastic Kubernetes Service.

Demo videos

How to Recover from Ransomware

Watch five short videos covering a variety of infection scenarios

You’ll see how Zerto’s flexibility unlocks multi-cloud recovery of files, VMs, or entire applications no matter how severe the ransomware attack. 


Ransomware Recovery After File Encryption 

Attack: small-scale attack that has encrypted files and folders on a VM.

Recovery: using instant file restores.


Ransomware Recovery After VM Encryption 

Attack: an attack that has compromised an entire VM.

Recovery: using instant VM restores.


Ransomware Recovery After Application Infection

Attack: an attack that has infected all VMs that comprise a multi-VM app stack.

Recovery: using orchestrated failovers to a peer site.


Ransomware Recovery After Site Infection

Attack: an attack that has compromised the infrastructure at all on-premises sites.

Recovery: using orchestrated failovers to a cloud DR site.


Ransomware Recovery After Multi-Site Infection

Attack: an attack that has fully infected all on-premises and cloud infrastructure.

Recovery: using portable immutable copies that can be re-attached to any new or existing Zerto deployment.

next steps

Experience Zerto First Hand, Your Way

Have questions about our product or capabilities? Contact uswe are here to help!

Otherwise simply pick one of the other offered options to further explore Zerto capabilities, on your own or with a Zerto expert.

Protect 10 VMs. Right Now. For Free.

Try Zerto Free Edition your own way, in your own environment.

Take a Platform Tour

Take a tour of our platform and learn the benefits.

Try Recovery in the Ransomware Lab

Self-paced lab with no download and no license needed.

Get a Custom Demo

Discover Zerto with a free demo customized to your requirements.

Other Resources


Ransomware Readiness 101

Don’t wait to prepare. Learn how to be ransomware ready, leverage a ransomware readiness checklist and understand the benefits of continuous data protection.

 

ESG: The Long Road Ahead of Ransomware Preparedness

Learn how companies need to move beyond prevention technologies and look at more comprehensive backup protection.

Specialized Guides

Become more knowledgeable about Disaster Recovery and Ransomware Recovery through these in-depth guides.

Ransomware Recovery Blog Series

Ransomware attacks are capable of causing wide-spread disruption over supply-chains, services, institutions and more. Learn how to recover from them.

Phil Goodwin

Research Vice President, Infrastructure Systems, Platforms and Technologies Group

Phil Goodwin is a Research Vice President within IDC’s Infrastructure Systems, Platforms and Technologies Group, with responsibility for IDC’s infrastructure software research area. Mr. Goodwin provides detailed insight and analysis on evolving infrastructure software trends, vendor

performance, and the impact of new technology adoption. His focus is on multi-cloud data management, data logistics, on-premises and

cloud-based data protection as-a-service, cyber protection and recovery, recovery orchestration and more. Mr. Goodwin takes a holistic view of

these markets, and covers risk analysis, service level requirements and cost/benefit calculations in his research. He also contributes regularly

to IDC’s CIO advisory practice.


Mr. Goodwin holds a Master of Technology Management and a BSBA in Marketing from the University of Denver.


To exit, click outside the image

Demo Video: Ransomware Recovery After File Encryption

To exit, click outside the image

Demo Video: Ransomware Recovery After VM Encryption

To exit, click outside the image

Demo Video: Ransomware Recovery After Application Infection

To exit, click outside the image

Demo Video: Ransomware Recovery After Site Infection

To exit, click outside the image

Demo Video: Ransomware Recovery After Multi-Site Infection

To exit, click outside the image