Ransomware Recovery in a Multi-Cloud World
Zerto Product Announcement Event
Zerto Announcement Event
Defeat the Risks of Ransomware — Recover in Minutes, At Scale.
As cybercriminals keep finding new ways of compromising your applications, we continue developing enhanced capabilities designed to help you recover from ransomware attacks with ease.
In this live discussion, you’ll hear about:
- NEW ransomware recovery capabilities for all apps – virtual, Kubernetes, in-cloud, and SaaS
- NEW supported cloud platforms
- NEW secure management layers bringing in depth defense to data protection
- Enhancements to Zerto In-Cloud for AWS
Join our guest speakers, IDC Research VP, Phil Goodwin, along with our Zerto experts to learn more about the state of ransomware and disaster recovery, key drivers for data protection, and the newest Zerto offerings to aid in the fight against ransomware and accelerate your adoption of cloud.
Meet the Speakers
Infrastructure Systems, Platforms and Technology Group
Research Vice President, Infrastructure Systems, Platforms and Technologies Group
Phil Goodwin is a Research Vice President within IDC’s Infrastructure Systems, Platforms and Technologies Group, with responsibility for IDC’s infrastructure software research area. Mr. Goodwin provides detailed insight and analysis on evolving infrastructure software trends, vendor
performance, and the impact of new technology adoption. His focus is on multi-cloud data management, data logistics, on-premises and
cloud-based data protection as-a-service, cyber protection and recovery, recovery orchestration and more. Mr. Goodwin takes a holistic view of
these markets, and covers risk analysis, service level requirements and cost/benefit calculations in his research. He also contributes regularly
to IDC’s CIO advisory practice.
Mr. Goodwin holds a Master of Technology Management and a BSBA in Marketing from the University of Denver.
To exit, click outside the image
vp product marketing
a Hewlett Packard Enterprise company
a Hewlett Packard Enterprise company
Avoid Data Loss, Downtime, and Pay No Ransoms
With this newest release, Zerto takes ransomware resilience to the next level with key product updates to enhance ransomware recovery, security, and platform support.
“Organizations face increased risks from the volume and sophistication of ransomware attacks prevalent today. With the capabilities we have added to the latest Zerto platform, customers are better positioned to meet new challenges head-on and mitigate their impact by recovering more quickly and with confidence.”
Deepak Verma, Zerto
VP of Products
What’s New in Zerto
Zerto delivers fast ransomware recovery with new capabilities to protect and recover your data on your terms.
When it comes to ransomware and other threats that can disrupt your business and cause costly downtime, Zerto’s got you covered.
Zerto and AWS Partnership
Zerto’s strategic relationship with AWS affords you a complete solution set across use cases for migrations, DR and backup to AWS, protection at scale across Amazon EC2 instances, and protection for applications on Amazon Elastic Kubernetes Service.
How to Recover from Ransomware
Watch five short videos covering a variety of infection scenarios
You’ll see how Zerto’s flexibility unlocks multi-cloud recovery of files, VMs, or entire applications no matter how severe the ransomware attack.
Attack: an attack that has fully infected all on-premises and cloud infrastructure.
Recovery: using portable immutable copies that can be re-attached to any new or existing Zerto deployment.
Experience Zerto First Hand, Your Way
Otherwise simply pick one of the other offered options to further explore Zerto capabilities, on your own or with a Zerto expert.
Get a Custom Demo
Discover Zerto with a free demo customized to your requirements.
Ransomware Readiness 101
Don’t wait to prepare. Learn how to be ransomware ready, leverage a ransomware readiness checklist and understand the benefits of continuous data protection.
ESG: The Long Road Ahead of Ransomware Preparedness
Learn how companies need to move beyond prevention technologies and look at more comprehensive backup protection.
Become more knowledgeable about Disaster Recovery and Ransomware Recovery through these in-depth guides.
Ransomware Recovery Blog Series
Ransomware attacks are capable of causing wide-spread disruption over supply-chains, services, institutions and more. Learn how to recover from them.