www.veritas.com
Open in
urlscan Pro
23.75.66.32
Public Scan
Submitted URL: https://veritastechnologiesllc.tellwise.com/rest/v1/url/redirect/eyJJZCI6MTI3Mzg1NzY5OTg1MzExOCwiSW52aXRhdGlvbklkIjoxMjg1ODkxMzM3MTQ3MzgwfQ_...
Effective URL: https://www.veritas.com/resources/cyber-security-timeline.html?inid=us_homepage_hero_resiliency_timeline
Submission: On December 13 via manual from US — Scanned from DE
Effective URL: https://www.veritas.com/resources/cyber-security-timeline.html?inid=us_homepage_hero_resiliency_timeline
Submission: On December 13 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
This site uses cookies and related technologies, as described in our privacy policy, for purposes that may include site operation, analytics, enhanced user experience, or advertising. You may choose to consent to our use of these technologies, or manage your own preferences. Manage Settings Accept Decline All Assess Your Readiness A R A N S O M W A R E A T T A C K H A P P E N S 1 5 T I M E S E V E R Y S E C O N D . CLICK. CLICK. | When a cyber attack happens, there's a lot that can go wrong (or right!) depending on your data protection solution. Follow the sequence of events below to experience a cybersecurity breach from two very different perspectives: With Veritas vs. Without With Veritas INTRUDER ALERT! A phishing attack, disguised as a cat video, unleashes malware on your organization. Anomaly detection identifies abnormal data transfers and triggers malware scans. Users restore files, servers, and services, while you and your team investigate and lock down your network. Brief: Anomaly Detection ANOMALY DETECTION Veritas anomaly detection relies on artificial intelligence (AI) to identify abnormal events, changes or shifts in files, all with the objective of providing advanced warning of a ransomware event. Read the brief Video: Anomaly Detection, a Best Practice to Combat Ransomware ANOMALY DETECTION, A BEST PRACTICE TO COMBAT RANSOMWARE Catch a threat before it becomes a devastating ransomware attack with anomaly detection. This demo walks through how easy it is to use the anomaly detection engine and seamlessly integrate into the NetBackup primary server. Watch the video × Video Player is loading. Play Video PlayNext playlist item Mute Current Time 0:00 / Duration 2:50 Loaded: 5.81% 0:00 Stream Type LIVE Seek to live, currently behind liveLIVE Remaining Time -2:50 Share 1x Playback Rate Chapters * Chapters Descriptions * descriptions off, selected Captions * captions settings, opens captions settings dialog * captions off, selected Audio Track * en (Main), selected Picture-in-PictureFullscreen This is a modal window. Beginning of dialog window. Escape will cancel and close the window. TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque Font Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall Caps Reset restore all settings to the default valuesDone Close Modal Dialog End of dialog window. Close Modal Dialog This is a modal window. This modal can be closed by pressing the Escape key or activating the close button. Close Modal Dialog This is a modal window. This modal can be closed by pressing the Escape key or activating the close button. This is a modal window. Without Veritas IGNORANCE IS NOT CYBER-BLISS. Without access to a Veritas malware scanning tool for backup data, this attack will go undetected, leaving the hackers to recon your environment. Similarly, without near real-time alerting of suspicious events, unstructured data can be exfiltrated without your knowledge. Read How Every Second Counts < Back to Timeline EVERY SECOND COUNTS. HURRY! YOUR MONEY AND REPUTATION ARE GOING UP IN FLAMES. Getting breached is one thing; thwarting the attacker is something else. According to IBM, it takes an organization an average of 207 days to discover a breach and up to 70 days to contain it¹. That's a very troubling realization, especially considering that 96.88% of all ransomware infections take less than four hours to successfully infiltrate their target². In fact, the fastest malicious software on record can gain control of a company's systems in just 45 minutes³. When it comes to breaches, speed of response is crucial. Companies that contained a breach within 30 days saved more than $1 million as compared to those that took longer⁴. A slow response enables attackers to become more firmly rooted in your systems, making it more difficult and costly to remove them. This often results in losses of customer trust, productivity, and major fines. < 30 days $3.09M on Average 30 days > $4.25M on Average Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. Meanwhile, global spending on cybersecurity products and services is predicted to exceed $1 trillion, in aggregate, over the five-year period from 2017 to 2021, a growth rate of 12-15% year-over-year. VERITAS CAN HELP YOU PROTECT YOUR DATA IN THE CLOUD. Veritas offers next generation technology that revolutionizes data management, resiliency, cybersecurity, and sustainability in the cloud. Our multi-layered data security strategy safeguards your cloud data—anywhere and everywhere. In fact, we are the leader in multi-cloud data management. Over 80,000 customers—including 95% of the Fortune 100—rely on us to help ensure the protection, recoverability, and compliance of their data. We have a reputation for reliability at scale, which delivers the resilience our customers need against the disruptions threatened by cyberattacks, like ransomware. No other vendor is able to match our ability to execute, with support for 800+ data sources, 100+ operating systems, 1,400+ storage targets, and 60+ clouds. 1 “Cost of a Data Breach 2022,” IBM Security. 2 “Microsoft Digital Defense Report,” Microsoft, September 2020. 3 Ibid. 4 “Cost of a Data Breach 2022,” IBM Security. 5 “2022 Must-Know Cyber Attack Statistics and Trends,” Embroker, October 13, 2022. MON 9:00 AM With Veritas CALL OF THE HERO. You work quickly to stop ransomware from gaining control of your backups. Practicing Zero Trust Zero TrustDefinition:The Zero Trust security model describes a “never trust, always verify” approach to the design and implementation of IT systems. A Zero Trust strategy is based on continuous evaluation and verification of network access every time and for every single access. Not just users, but devices and workloads too. , you utilize immutable backups Immutable backupsDefinition:An immutable backup is a backup file that can’t be altered or deleted. Having an immutable backup ensures that you have a secure copy of recoverable data to protect against attacks or other data loss. and encrypted data. Near real-time alerts about accessed sensitive data allow you to swiftly identify and disable the compromised account. White Paper: NetBackup Flex Scale NETBACKUP FLEX SCALE Enterprises today need a data protection solution that integrates across cloud models, provides reliable cyber-resilience, and improves operational efficiencies. Download the white paper Brief: IT Analytics IT ANALYTICS Reduce data management and protection complexity while gaining visibility and control over enterprise data wherever it resides. Download the overview White Paper: Recovery Vault RECOVERY VAULT An organization can be confident its data is secure in the cloud, plan for disaster recovery, meet compliance and governance requirements, and prevent data loss from ransomware with Veritas Recovery Vault. Download the white paper Without Veritas WHAT YOU DON'T KNOW CAN HURT YOU. There’s a spike in Help Desk tickets. Something’s wrong, but without penetration test verification your vulnerabilities are unknown. Hackers are altering, erasing, and encrypting your data. Without secure-by-default immutability and indelibility, even your backups are at risk. Read Containment is Control < Back to Timeline CONTAINMENT IS CONTROL FAILING TO PLAN FOR CONTAINMENT IS PLANNING TO FAIL. Last year broke the records. According to CNET, we hit the highest number of data breaches with 1862 recorded. This was up 68% from the prior year, a significant and troubling increase. And when you consider that in 2022 the average breach cost $4.35 million², it’s easy to see why so many organizations are racing to bolster their systems, processes, and procedures designed to manage these crises. What is crucial for companies of all sizes to understand is that the long tail costs of data breaches extend for months to years and include significant expenses that most organizations are not even aware of and/or do not anticipate in their annual planning. A Data Breach Containment & Response Plan can make a crucial difference in the extent of your exposure and losses. While it’s true that different types of incidents like business email compromise, ransomware, or stolen data all require specialized responses to contain the incident and recover from it, there are a few common early steps that you should take regardless of the type of security issue you’re facing. DATA BREACH CONTAINMENT & RESPONSE PLAN - COMPONENTS³: > Containment: > Notify your local law enforcement agency immediately. Depending on the country > and jurisdiction of your business, there are various data breach reporting > laws that must be adhered to. As part of this, law enforcement agencies can > often help to investigate the scope of the breach and to try to track the > criminals behind the attack. > Communication: > Tell your stakeholder base there was a breach. You will not know all the > details immediately, but early communication is key. Let them know what you > did to prepare for this type of incident, that there was a breach, that it is > being investigated, and that more details are forthcoming. Then further > communication can be sent once it is contained, the amount of data loss is > known, and the plans for remediation and compensation are put in place. > Remediation: > Put steps in place to remediate the breach. This includes fixing whatever > caused the breach and looking at what systems, processes, and procedures are > in place to detect and reduce the likelihood of this occurring again. The > business needs to weigh the cost of the breach against the cost of > implementing mitigating controls. The containment process itself can be costly > and time consuming, and result in lost revenue. To learn more about response > strategies and tactics throughout every stage of a data breach, we recommend > the Cybersecurity & Infrastructure Security Agency’s (CISA) Federal Government > Cybersecurity Incident & Vulnerability Response Playbooks. To learn more about response strategies and tactics throughout every stage of a data breach, we recommend the Cybersecurity & Infrastructure Security Agency’s (CISA) Federal Government Cybersecurity Incident & Vulnerability Response Playbooks. Download the playbooks 1 “Number of Data Breaches in 2021 Surpasses All of 2020,” Identity Theft Resource Center, September 6, 2021. 2 “Cost of a Data Breach 2022,” IBM Security. 3 “Containment, Communication, and Remediation: The 3 Keys to a Breach Response,” Tripwire, January 25, 2022. MON 10:00 AM With Veritas YOU VS RANSOMWARE. While grabbing a quick drink you receive an alert: malware has been detected. You begin flagging suspicious events for investigation. Instant rollback Instant rollbackDefinition:Instant Rollback for VMware facilitates a speedy recovery from a ransomware attack by restoring all affected systems and secure mission-critical apps and data directly to the production environment, standing up anything from an individual server to an entire data center in a matter of minutes. and instant access Instant accessDefinition:Instant Access allows VM and workload administrators to quickly access their virtual machine, browse for what they need, and get their data back, eliminating the reliance on backup administrators. shrink recovery times. Consistent policy-based solutions help to minimize data loss. White Paper: Veritas Data Insight VERITAS DATA INSIGHT There’s compliance risk hiding in your data. Data Insight provides visibility, context, and analytics across your infrastructure so you can regain control of your information and protect your organization. Download the white paper Technical Brief: Malware Scanning MALWARE SCANNING Automated malware detection bolsters your defenses against undesirable data propagating within your environment. Download the white paper White Paper: Isolated Recovery Environment ISOLATED RECOVERY ENVIRONMENT Veritas provides a turn-key Isolated Recovery Environment (IRE) and immutable data vault ensuring a secure copy of critical backup data by creating an isolated, immutable storage environment. Download the white paper Without Veritas IT'S NO CONTEST. The hackers are winning. IT admins struggle to access systems—including backup or recovery infrastructure. Productivity is plummeting, the company is losing money, and the pressure is high. Meanwhile, you are not even aware that cloud object storage is being deleted. MON 10:30 AM With Veritas BUSINESS NEVER CEASES. Maintaining business continuity is critical right now so you and your team work fast to restore key systems, such as SaaS workloads and business apps. Pivoting to forensic reporting, you locate the blast radius in your cloud data and alert the IT team where to focus their efforts. White Paper: Veritas Alta™ SaaS Protection VERITAS ALTA™ SAAS PROTECTION Grow into the cloud safely. This cloud-based secondary storage platform enables you to centrally protect and manage all types of SaaS data at any scale. Download the white paper White Paper: Application Resiliency APPLICATION RESILIENCY Achieve high availability and disaster recovery for a wide array of critical business services across all major clouds. Increase application uptime and optimize performance with confidence. Download the white paper Without Veritas LOOKING FOR A LIFE JACKET. You’re swept up in a data breach tsunami—accounts locked, data compromised, and backups corrupted. And by not adhering to a shared responsibility model, you’re only now realizing that application reliability and data resiliency are YOUR problem. Read More Than Just Another Dollar < Back to Timeline MORE THAN JUST ANOTHER DOLLAR. THE EFFECTS OF A CYBERATTACK CAN EXTEND WELL BEYOND JUST THE FINANCIAL LOSS. The impact of a ransomware attack can be immense. Consider these key findings from Sophos’s State of Ransomware 2022 Report¹: * It took on average one month to recover from the damage and disruption. * 90% of organizations said the attack had impacted their ability to operate. * 86% of private sector victims said they had lost business and/or revenue because of the attack. * 72% put faith in approaches that don’t stop organizations from being attacked. The unfortunate reality is that there is a lot of data in the cloud today that remains unprotected due to the confusion of responsibility between cloud service providers and their customers. Many IT buyers assume that because they're effectively outsourcing the running of their infrastructure to a trusted third party, the provider will take care of everything. This is simply not true. To ensure cloud security, it is imperative that you, the customer, understand the shared responsibility model which, in its simplest terms, means that cloud service providers are responsible for delivering a highly available infrastructure, and you are responsible for application reliability and data resiliency. The good news is that Veritas can help you handle your responsibility, which leads to shorter downtimes and more complete data recovery, alleviating operational costs. SHARED RESPONSIBILITY MODEL IN THE CLOUD CONTINUALLY MANAGING YOUR CYBER RISK IS ESSENTIAL TO SUCCESS. For businesses of all sizes, managing cyber risk is critical. This requires continually assessing your cyber risk profile and proactively managing your defenses. But it’s also vital that you take steps to mitigate the impact a cyberattack could have on your reputation and brand. 1 “The State of Ransomware 2022,” Sophos, April 27, 2022. MON 11:30 AM With Veritas CONTROLLING THE SPREAD Reviewing data access patterns, you identify patient zero and the point of infection. These findings lead to the compromised user accounts and exfiltrated data. Plans are already in place to mitigate the exfiltrated data, so you set them in motion. Data Sheet: Data Protection for Cloud Workloads DATA PROTECTION FOR CLOUD WORKLOADS Minimize both the risk and impact of a ransomware attack with a solution that helps you protect against, detect, and recover from attacks quickly. Learn more about our ransomware resiliency strategy. Download the data sheet Brief: Trust Nothing, Verify Everything TRUST NOTHING, VERIFY EVERYTHING Zero Trust ensures that only verified individuals, systems, and processes have access to the parts of the network that they need. In addition to guarding against ransomware, it helps businesses develop a secure infrastructure of improved protection that can thwart future attacks. Download the white paper Without Veritas CHAOS REIGNS Operations have ceased, a ransom demand has been issued, and everyone is consumed by stress. Frantic, you try to identify which data and applications have been affected, but you don’t have the right tools. It won’t be long before regulatory and compliance issues are triggered. MON 2:30 PM With Veritas GOOD NIGHT RANSOMWARE! Ransomware thwarted and data restored, you are fully operational. Thanks to your robust cyber security response plan, you were able to quickly identify the risk and recover quickly using an unaffected backup image. You deserve that hot bath and a good night’s sleep. Without Veritas PRESSURE TO PAY. A sensitive document is posted online, which has customers worried and management on their heels. The pressure to pay the ransom is high. Meanwhile, with numerous cloud-hosted apps down, you are being confronted by frustrated employees who want answers and support. Read Paying Doesn't Mean Power < Back to Timeline PAYING DOESN'T MEAN POWER. A PAYOUT IS RARELY THE WAY OUT. Organizations are getting better at post-attack data recovery. As ransomware has become more prevalent, organizations have improved their ability to restore operations in the aftermath of an attack. Of all organizations hit by ransomware in 2021, almost all, 99%, were able to recover some encrypted data. This is up slightly from 96% in 2020. And of these organizations, almost half (44%) report using multiple restoration approaches to maximize the speed and efficacy with which they restart operations. While encrypted backups was the number one method used by 73% of impacted organizations, 46% reported that they paid the ransom to restore data. Notably, while “The State of Ransomware 2022” Sophos survey indicates that paying the ransom almost always results in recovering some data, the percentage of data restored after paying has dropped to 61%, down from 65% in 2020. Similarly, only 4% of those that paid the ransom got ALL their data back in 2021, down from 8% in 2020. 46 Paid ransom and got some of their data back 61 Data restored after paying ransom 4 Paid ransom and restored ALL of their data Veritas helps minimize how much data a hacker can access prior to being detected. We do this in two ways, first we encrypt the data so that whatever is exfiltrated is not usable and, secondly, by backing up the data often, we accelerate how quickly business operations can get up and running. DON'T TAKE OUR WORD FOR IT: ESG validated 12 test scenarios covering the Veritas solution for cybersecurity, including protecting data, detecting threats, and recovering at scale. A holistic, multi-layered, and comprehensive cybersecurity strategy is always the best defense against downtime and data loss due to malware infiltration. Veritas understands that this can be a complex challenge and has delivered an enterprise foundation to help organizations protect IT services as part of an overall cybersecurity strategy. The Veritas cybersecurity strategy provides organizations with the tools, functionality, and confidence that IT services will be highly available, resilient, and protected from ransomware. Read the ESG Technical Validation Source: “The State of Ransomware 2022,” Sophos, April 27, 2022. MON 9:30 PM With Veritas A NEW DAY. Battle-tested and energized, you and the IT teams are conducting a post-incident review. Areas of improvement are identified and discussed; test scenarios are updated. You’re feeling confident—when the next attack comes, and it will, you’ll be ready. White Paper: Best Practices to Combat Ransomware BEST PRACTICES TO COMBAT RANSOMWARE Ransomware is scary. But there are steps you can take now to avoid becoming a target, while also reducing the potential damage an attack could have on your business. Download the white paper Without Veritas YOU'VE HAD ENOUGH, BUT HAVE THEY? The VP of Operations requests that you and the CTO determine how this breach occurred and formulate a plan for remediation. Unfortunately, with little to no forensics, zero-day is unknown, forcing the organization to recover from one-month old backups. TUE 9:00 AM With Veritas PRACTICE MAKES PERFECT. Coming on the heels of the attack, your invitations to the next recovery rehearsal are readily accepted across the organization. Everyone better appreciates the importance of these exercises and is eager to put all the recent learnings into practice. White Paper: Preparing to Protect the Future PREPARING TO PROTECT THE FUTURE Data protection and recovery isn't a race that your company has to win; it's a journey that is embarked upon that with a forward-thinking attitude you can stay ahead of the curve and remain prepared for potential challenges along the way. Download the white paper Without Veritas YOU'VE LOST THE BATTLE AND THE WAR. Another sensitive file is posted online, operations are frozen, data infrastructure is corrupted, and malware is still on the loose. There’s no leverage and little hope of recovering the data. With the tough questions left unanswered, you’ve been asked to step aside. Hey, someone had to take the fall. Read Make A Bad Day Better < Back to Timeline MAKE A BAD DAY BETTER. THE AFTERMATH OF A BREACH CAN BE MORE ABOUT HOW YOU'VE HANDLED IT THAN THE ATTACK ITSELF. Capital One suffered a data breach in 2019 involving 100 million customers in the US and Canada. It issued a statement confirming the liability costs of managing the incident would be around $100-150 million to pay for “customer notifications, credit monitoring, technology costs, and legal support.” Just as damaging however was the immediate 6% drop in the stock price which was attributed to reputational damage. Soon after the breach, one analyst said: “This headline is not a good one for Capital One. We worry about longer term reputational damage and also the potential for political and regulatory actions, including penalties.”¹ The longer-term impact on reputation can also be a major factor. According to Aon and Pentland Analytics’ report Reputation Risk in the Cyber Age², the impact of cyberattacks on shareholder value can be substantial with some companies in the report showing a fall of 25% in their market value over the year following an attack. KEEP YOUR CUSTOMERS HAPPY. It’s not only shareholder value that is of concern – it’s also customer perception. The high-profile cyberattack in 2018 of telecommunications firm TalkTalk resulted in the hacking of the personal details of over 150,000 customers. In addition to the immediate cost of dealing with the incident, the company lost over 100,000 customers (as well as over one-third of its company value)³. Damage of this magnitude can be difficult, if not impossible, to repair. Creating perceptions of honesty and transparency are essential to retaining customers and avoiding a short-term reputational hit that transforms into a long-term reputational disaster. At Veritas, we recommend prioritizing backup and recovery as a reliable part of a comprehensive, multilayered resiliency framework— a part that supports the protect, detect, and recover components of your organization’s overall cybersecurity strategy. Our solutions help you fortify all critical and valuable data, detect potential ransomware threats and ensure orchestrated and automated recovery, so you are up and running quickly. 1 “Capital One shares dive after data breach affecting 100 million,” CNBC, July 30, 2022. 2 “Reputation Risk in the Cyber Age,” Aon and Pentland Analytics, July 18, 2018. 3 Ibid. TUE 10:00 AM IT’S A DANGEROUS WORLD FOR ENTERPRISE DATA. ARE YOU RANSOMWARE-READY? ANSWER 4 SIMPLE QUESTIONS TO DETERMINE HOW PREPARED YOU ARE TO HANDLE A CYBERSECURITY ATTACK. Take the Assessment Veritas 360 Defense | Launch Announcement Learn More