Zerto 10 Launch – Live Event page - Zerto

Real-Time Detection Meets Real-Time Protection

Zerto 10 Launch Event

Cyber-attacks and ransomware continue to evolve and threaten the ability of organizations to deliver 24x7 continuous availability. Zerto 10, the latest release of Zerto’s industry-leading solution, mitigates the devastating impacts of ransomware and helps businesses protect, detect, respond, and recover to all types of threats.

Zerto 10 Announcement Event

Empowering You to Unlock Ransomware Resilience

In the replay of this launch event, you’ll hear exactly how Zerto is delivering ransomware resilience using the new Zerto appliance combined with three key pillars:

  • Replicate and Detect: Streaming near-synchronous data replication protects every production write in real-time and immediately alerts on any suspicious anomalies.
  • Isolate and Lock: Separated vault is physically air-gapped and stores immutable data copies on secure, FIPS-validated hardware.
  • Test and Recover: Easily identify clean restore points and then quickly recover entire multi-VM apps onto high-performance storage  —all while maintaining cross-VM consistency at scale.

During the event, we were joined by Kevin Mitnick, world renowned hacker and cybersecurity expert, as he shared more about the changing threat landscape. In the replay, you’ll see real demos of the myriad methods attackers use to compromise accounts and hijack systems.

Together you’ll learn what your organization can do to rise to the challenge of ransomware by embracing resilience, rejecting ransoms, and radically reducing your data loss and downtime.

Meet the Speakers

Guest Speaker

Kevin mitnick

Chief executive officer

& The World's Most Famous Hacker

Mitnick Security Consulting

Kevin Mitnick

CEO, Mitnick Security Consulting

Kevin Mitnick is the world's most famous hacker, a New York Times bestselling author, and the top cybersecurity keynote speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

As a one-of-a-kind, public speaker, Kevin's presentations are akin to "technology magic shows," which include live demonstrations of the latest hacking techniques that educate while keeping people on the edge of their seats to help raise "security awareness" of individuals and organizations worldwide.

To exit, click outside the image

Matt boris

vp global go-to-market


a Hewlett Packard Enterprise company

caroline seymour

vp product marketing


a Hewlett Packard Enterprise company

deepak verma

vp product


a Hewlett Packard Enterprise company

Kevin cole

director technical product marketing


a Hewlett Packard Enterprise company

announcement highlights

Ransomware Resilience Enabled. Cloud DR and Mobility Enhanced.

Zerto 10 takes ransomware resilience to the next level with new innovations and updated product capabilities.

“At CRSI, our mission is to empower and support individuals with intellectual, physical, and developmental disabilities by providing an ecosystem of care, protection, and advocacy services. Our IT systems are at the heart of our services, so protecting our systems and the data of our individuals with Zerto is vital. We recently tested Zerto 10 and believe that real-time ransomware detection will help us deliver even greater protection from cyber threats.”

IT Director, CRSI

What's New in Zerto

Zerto delivers new ransomware detection, Cyber Resilience Vault, and enhanced cloud capabilities and security to deliver superior hybrid cloud availability.

Learn about the latest enhancements in Zerto 10 and what it means for your organization’s security, disaster recovery, and cloud initiatives.

Zerto for Microsoft Azure

Zerto 10 delivers enhanced DR and mobility for Azure, including new replication architecture for scale-out efficiency and native protection of VMs to, from, and within Azure.

See what this means to your organization's DR strategy and how it can be further enhanced.

Ransomware Hands-on Lab

Experience Zerto for free in an on-demand lab.

Deploy anytime, from anywhere, on your own computer—no infrastructure required and no need to be a Zerto guru already.

Practice recovering from ransomware using Zerto and see how easy it is to restore files, folders, VMs, or apps.


Guide to Real-Time Ransomware Detection and Recovery

Rethinking your disaster recovery strategies 

Not only does Ransomware threaten the very way we do business it also forces us to adapt as rapidly as it grows in variety. This Gorilla guide includes rethinking your disaster recovery strategies to ensure you do not rely solely on backups Any potential threat to any piece of data must be detected the moment it appears, but if all else fails then we must be able to recover all data from any point in time – fast – if we are to keep pace of our attackers.


Building a Cyber Resilience Vault

Secure, air-gapped, immutable and untouchable by ransomware

Learn how the Zerto Cyber Resilience Vault provides the fastest option for recovery during even the worst attacks. The secure, isolated vault uses zero trust architectures to enable a physically air-gapped recovery environment with immutable data copies that are untouchable by ransomware. Use the Cyber Resilience Vault to rapidly recover inside a clean room using the best of Zerto, HPE Alletra, HPE ProLiant, and HPE Aruba.

Demo videos

How to Recover from Ransomware

Watch five short videos covering a variety of infection scenarios

You’ll see how Zerto's flexibility unlocks multi-cloud recovery of files, VMs, or entire applications no matter how severe the ransomware attack. 

Ransomware Recovery After File Encryption 

Demo Video: Ransomware Recovery After File Encryption

To exit, click outside the image

Attack: small-scale attack that has encrypted files and folders on a VM.

Recovery: using instant file restores.

Ransomware Recovery After VM Encryption 

Demo Video: Ransomware Recovery After VM Encryption

To exit, click outside the image

Attack: an attack that has compromised an entire VM.

Recovery: using instant VM restores.

Ransomware Recovery After Application Infection

Demo Video: Ransomware Recovery After Application Infection

To exit, click outside the image

Attack: an attack that has infected all VMs that comprise a multi-VM app stack.

Recovery: using orchestrated failovers to a peer site.

Ransomware Recovery After Site Infection

Demo Video: Ransomware Recovery After Site Infection

To exit, click outside the image

Attack: an attack that has compromised the infrastructure at all on-premises sites.

Recovery: using orchestrated failovers to a cloud DR site.

Ransomware Recovery After Multi-Site Infection

Demo Video: Ransomware Recovery After Multi-Site Infection

To exit, click outside the image

Attack: an attack that has fully infected all on-premises and cloud infrastructure.

Recovery: using portable immutable copies that can be re-attached to any new or existing Zerto deployment.

next steps

Experience Zerto Firsthand, Your Way

Have questions about our product or capabilities? Contact uswe are here to help!

Otherwise simply pick one of the other offered options to further explore Zerto capabilities, on your own or with a Zerto expert.

Try Zerto

Try Zerto your own way, in your own environment.

Take a Platform Tour

Take a tour of our platform and learn the benefits.

Try Recovery in the Ransomware Lab

Self-paced lab with no download and no license needed.

Get a Custom Demo

Discover Zerto with a free demo customized to your requirements.

Other Resources

Stay informed on what is going in the industry and about Zerto via these valuable resources.

Analyst Reports

Get insights and comparisons from industry analysts into topics such as data protection, backup and recovery, disaster recovery, cloud, containers, etc.


Essential Guide: Ransomware Recovery

From the definition of ransomware, description of how a ransomware attack unfolds, right down to cyber resilience and ransomware recovery, we cover everything in this ultimate Ransomware Recovery guide.

Essential Guide: Disaster Recovery

From the definition of disaster recovery, right down to DR planning, technologies and deployments, gain more knowledge about this topic.


Stay informed on what is going in the industry, and learn from various subjects covering cloud data management, data protection, cloud migration, backup and DR, etc.