SlideShare a Scribd company logo
1 of 24
Protecting Data Everywhere
Protecting Data Here, There and Everywhere
Rod Mathews, VP and GM, Data Protection Business
Barracuda simplifies IT with cloud-enabled
solutions that empower customers to protect
their networks, applications, and data, regardless
of where they reside.
Our Vision:
Data is Everywhere
Human Error Data Corruption Viruses & Ransomware
What Hasn’t Changed
Same Business Requirements
RPO RTODisaster
Lost Data Downtime
Ransomware Discoveries
2005 2012 2013
Q1 Q2 Q3 Q4
2014
Q1 Q2 Q3 Q4
2015
Q1 Q2 Q3 Q4
2016
Q1
-
Gpcoder Reveton
Kovter
Urausy Nymaim
Cryptowall
Browlock Linkup Slocker
CTB-Locker/Citron
Synclocker
Onion
TorrentLocker
Zerolocker
Coinvault
TeslaCrypt
BandarChor
Cryptvault
Tox
Troldesh
Encryptor RaaS
CryptoApp
LockDroid
LowLevel404
CryptInfinite
Unix.Ransomcrypt
Radamant
VaultCrypt
XRTN
Cryptolocker2015
Simplocker
Pacman
Virlock Pclock
Threat Finder
Hidden Tear
ORX-Locker
Dumb
Maboua OSX POC
Power Worm
DMA-Locker
Gomasom
Chimera Locker Ginx
Ransom32 73v3n
CryptoJocker
LeChiffre
Nanolocker
Magic
Locky
Vipasana
Hi Buddy
Job Cryptor
PayCrypt
KeRanger
Umbrecrypt
Hydracrypt
Data Protection: Vx Form Factor
Barracuda Backup Offers Flexible Deployments
Virtual appliance that can be deployed to
leverage existing compute and storage infrastructures
Physical and virtual environments
Integrated cloud
Disaster Recovery as a Service
Competitive pricing
Barracuda Backup Vx vs. Competitor
SaaS
Human Error Data Corruption Viruses & Ransomware
Same Challenges Still Exist
Barracuda Essentials for Office 365
Comprehensivesecurity,archivingand
backupsolutionforOffice365
Centralizedadministrationthrough
BarracudaCloudControl
PerUserLicensing
Cloud-based multi-layer email security,
archiving, and backup for Office 365
• Compliments all Office 365 plans
• Built on proven Barracuda SaaS solutions
• Low cost, per user licensing
• Single SKU for simple quoting/bundling
• Centralized management
• Includes 90 Day PST Enterprise
• Compatible with on-premises and hybrid
configurations
Large Truck Dealership Group
• 30+ locations/1,450 users
• Standardizedon Office 365
Office 365 Email Security (EOP) Stopped Migration Dead
• Notgranularenough for theirneeds
• Wanted a SaaSsolution thatwould beeasyto run
Solution – Email Security Service from Barracuda
• Deployed in 1 day– and is easy to run
• Puttheirmigrations back on-track
Public Cloud
Amazon
Web Services
Human Error Data Corruption Viruses & Ransomware
Same Challenges Still Exist
Barracuda Solutions for Microsoft Azure
Deploying Multi-Tier Network Architectures
WAF Tier Web Tier App Tier
VNET
FW Tier
DB Tier
Our Azure Page – http://www.barracuda.com/azure
10:45-11:30 AM BREAKOUT SESSION
HPE
Breakout Room: Delta 360 Club
“Benefits of Transforming to a Hybrid
Infrastructure”
Timm Ideker, Director of Sales, Enterprise
Group
CANON
Breakout Room: Interview Room
“Learn How to Efficiently Manage Your Print
and Scan Environment”
Dana Mawn, Business Development
Consultant – NT-ware USA
NIMBLE STORAGE
Breakout Room: Guest Locker Room
“Overcoming the App-Data-Gap using a
Predictive Flash Platform”
Mitch Gram, Sr. Sales Engineer
M-FILES
Breakout Room: Main Field
“What You Don't Know About Document
Management – But Should”
Corey Candela, Channel Account Manager

More Related Content

What's hot

Providing Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsProviding Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsVeritas Technologies LLC
 
Cloud computing
Cloud computingCloud computing
Cloud computingjhoejoe
 
Guide to CASB Use Cases
Guide to CASB Use CasesGuide to CASB Use Cases
Guide to CASB Use CasesSachin Yadav
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
ProdSec: A Technical Approach
ProdSec: A Technical ApproachProdSec: A Technical Approach
ProdSec: A Technical ApproachJeremy Brown
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?MarketingArrowECS_CZ
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 
Machine Learning in the Enterprise 2019
Machine Learning in the Enterprise 2019   Machine Learning in the Enterprise 2019
Machine Learning in the Enterprise 2019 Timothy Spann
 
An Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking ApplicationsAn Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking ApplicationsDataStax
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computingJuber Mangure
 
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?FactoVia
 
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Precisely
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Cloudera, Inc.
 
Scenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudScenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudPracheta Budhwar
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...
MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...
MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...MongoDB
 

What's hot (20)

Providing Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsProviding Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud Environments
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Guide to CASB Use Cases
Guide to CASB Use CasesGuide to CASB Use Cases
Guide to CASB Use Cases
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
ProdSec: A Technical Approach
ProdSec: A Technical ApproachProdSec: A Technical Approach
ProdSec: A Technical Approach
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
Seven Seas Technology
Seven Seas TechnologySeven Seas Technology
Seven Seas Technology
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 
Machine Learning in the Enterprise 2019
Machine Learning in the Enterprise 2019   Machine Learning in the Enterprise 2019
Machine Learning in the Enterprise 2019
 
An Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking ApplicationsAn Operational Data Layer is Critical for Transformative Banking Applications
An Operational Data Layer is Critical for Transformative Banking Applications
 
What's New in Cloud Foundry
What's New in Cloud FoundryWhat's New in Cloud Foundry
What's New in Cloud Foundry
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computing
 
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?
 
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18
 
Scenarios for building Hybrid Cloud
Scenarios for building Hybrid CloudScenarios for building Hybrid Cloud
Scenarios for building Hybrid Cloud
 
Nutanix .NEXT London 2018
Nutanix .NEXT London 2018  Nutanix .NEXT London 2018
Nutanix .NEXT London 2018
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...
MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...
MongoDB Days UK: Building an Enterprise Data Fabric at Royal Bank of Scotland...
 

Similar to Protecting Data Everywhere - Barracuda

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSAShannon Lietz
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...Hillel Kobrovski
 
Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Acrodex
 
Level up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using RubrikLevel up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using RubrikJaap Brasser
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)iland Cloud
 
Tag productos y servicios
Tag  productos y serviciosTag  productos y servicios
Tag productos y servicioswebanexo
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the CloudWebinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the Cloudiland Cloud
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsErnest Mueller
 
The Last Frontier- Virtualization, Hybrid Management and the Cloud
The Last Frontier-  Virtualization, Hybrid Management and the CloudThe Last Frontier-  Virtualization, Hybrid Management and the Cloud
The Last Frontier- Virtualization, Hybrid Management and the CloudKellyn Pot'Vin-Gorman
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 
Migrating solutions to microsoft azure [Mihai Tataran]
Migrating solutions to microsoft azure [Mihai Tataran]Migrating solutions to microsoft azure [Mihai Tataran]
Migrating solutions to microsoft azure [Mihai Tataran]ITCamp
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 

Similar to Protecting Data Everywhere - Barracuda (20)

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSA
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
 
Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day
 
Level up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using RubrikLevel up your SQL and Azure, by using Rubrik
Level up your SQL and Azure, by using Rubrik
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
 
Tag productos y servicios
Tag  productos y serviciosTag  productos y servicios
Tag productos y servicios
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the CloudWebinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the Cloud
 
Biznet Gio Presentation - Cloud Computing
Biznet Gio Presentation - Cloud ComputingBiznet Gio Presentation - Cloud Computing
Biznet Gio Presentation - Cloud Computing
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
 
The Last Frontier- Virtualization, Hybrid Management and the Cloud
The Last Frontier-  Virtualization, Hybrid Management and the CloudThe Last Frontier-  Virtualization, Hybrid Management and the Cloud
The Last Frontier- Virtualization, Hybrid Management and the Cloud
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Resume
ResumeResume
Resume
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 
Migrating solutions to microsoft azure [Mihai Tataran]
Migrating solutions to microsoft azure [Mihai Tataran]Migrating solutions to microsoft azure [Mihai Tataran]
Migrating solutions to microsoft azure [Mihai Tataran]
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 

More from MarcoTechnologies

Deliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - MitelDeliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - MitelMarcoTechnologies
 
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareWhen Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareMarcoTechnologies
 
Learn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - CanonLearn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - CanonMarcoTechnologies
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - MitelMarcoTechnologies
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoMarcoTechnologies
 
Benefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEBenefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEMarcoTechnologies
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesMarcoTechnologies
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoMarcoTechnologies
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointMarcoTechnologies
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...MarcoTechnologies
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksMarcoTechnologies
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveMarcoTechnologies
 
What is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica MinoltaWhat is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica MinoltaMarcoTechnologies
 

More from MarcoTechnologies (15)

Deliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - MitelDeliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - Mitel
 
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareWhen Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
 
Learn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - CanonLearn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - Canon
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - Mitel
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - Cisco
 
Benefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEBenefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPE
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-Files
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton Interactive
 
What is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica MinoltaWhat is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica Minolta
 
Marco Gold Standard
Marco Gold StandardMarco Gold Standard
Marco Gold Standard
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Protecting Data Everywhere - Barracuda

  • 2. Protecting Data Here, There and Everywhere Rod Mathews, VP and GM, Data Protection Business
  • 3. Barracuda simplifies IT with cloud-enabled solutions that empower customers to protect their networks, applications, and data, regardless of where they reside. Our Vision:
  • 4.
  • 6. Human Error Data Corruption Viruses & Ransomware What Hasn’t Changed
  • 7. Same Business Requirements RPO RTODisaster Lost Data Downtime
  • 8. Ransomware Discoveries 2005 2012 2013 Q1 Q2 Q3 Q4 2014 Q1 Q2 Q3 Q4 2015 Q1 Q2 Q3 Q4 2016 Q1 - Gpcoder Reveton Kovter Urausy Nymaim Cryptowall Browlock Linkup Slocker CTB-Locker/Citron Synclocker Onion TorrentLocker Zerolocker Coinvault TeslaCrypt BandarChor Cryptvault Tox Troldesh Encryptor RaaS CryptoApp LockDroid LowLevel404 CryptInfinite Unix.Ransomcrypt Radamant VaultCrypt XRTN Cryptolocker2015 Simplocker Pacman Virlock Pclock Threat Finder Hidden Tear ORX-Locker Dumb Maboua OSX POC Power Worm DMA-Locker Gomasom Chimera Locker Ginx Ransom32 73v3n CryptoJocker LeChiffre Nanolocker Magic Locky Vipasana Hi Buddy Job Cryptor PayCrypt KeRanger Umbrecrypt Hydracrypt
  • 9. Data Protection: Vx Form Factor
  • 10. Barracuda Backup Offers Flexible Deployments Virtual appliance that can be deployed to leverage existing compute and storage infrastructures
  • 11. Physical and virtual environments Integrated cloud Disaster Recovery as a Service Competitive pricing Barracuda Backup Vx vs. Competitor
  • 12. SaaS
  • 13. Human Error Data Corruption Viruses & Ransomware Same Challenges Still Exist
  • 14. Barracuda Essentials for Office 365 Comprehensivesecurity,archivingand backupsolutionforOffice365 Centralizedadministrationthrough BarracudaCloudControl PerUserLicensing Cloud-based multi-layer email security, archiving, and backup for Office 365 • Compliments all Office 365 plans • Built on proven Barracuda SaaS solutions • Low cost, per user licensing • Single SKU for simple quoting/bundling • Centralized management • Includes 90 Day PST Enterprise • Compatible with on-premises and hybrid configurations
  • 15. Large Truck Dealership Group • 30+ locations/1,450 users • Standardizedon Office 365 Office 365 Email Security (EOP) Stopped Migration Dead • Notgranularenough for theirneeds • Wanted a SaaSsolution thatwould beeasyto run Solution – Email Security Service from Barracuda • Deployed in 1 day– and is easy to run • Puttheirmigrations back on-track
  • 17. Human Error Data Corruption Viruses & Ransomware Same Challenges Still Exist
  • 18. Barracuda Solutions for Microsoft Azure
  • 19. Deploying Multi-Tier Network Architectures WAF Tier Web Tier App Tier VNET FW Tier DB Tier
  • 20. Our Azure Page – http://www.barracuda.com/azure
  • 21.
  • 22.
  • 23.
  • 24. 10:45-11:30 AM BREAKOUT SESSION HPE Breakout Room: Delta 360 Club “Benefits of Transforming to a Hybrid Infrastructure” Timm Ideker, Director of Sales, Enterprise Group CANON Breakout Room: Interview Room “Learn How to Efficiently Manage Your Print and Scan Environment” Dana Mawn, Business Development Consultant – NT-ware USA NIMBLE STORAGE Breakout Room: Guest Locker Room “Overcoming the App-Data-Gap using a Predictive Flash Platform” Mitch Gram, Sr. Sales Engineer M-FILES Breakout Room: Main Field “What You Don't Know About Document Management – But Should” Corey Candela, Channel Account Manager

Editor's Notes

  1. Hi and welcome. It’s great to spend a little time with this group to introduce you to Barracuda and talk about our company. I think we are a little different and as we present ourselves in the market place and provide services to our customers, we find that we do it a little differently from a lot of folks.
  2. What we become…. Our mission has evolved over the years but its foundation in simplicity remains. Focus on customers: Barracuda simplifies IT with cloud-enabled solutions that empower customers to protect their networks, applications, and data, regardless of where they reside.
  3. Data Protection is undergoing tremendous change
  4. Data is now everywhere – lots of new problems to solve Virtualized infrastructure Internet of Things SaaS Public Cloud Almost every company has a hybrid environment now
  5. Fundamentals of data protection haven’t changed – still have to protect against: Human error / accidental deletion Data corruption Viruses and APTs and Ransomware (CryptoLocker example)
  6. In archiving, we started by archiving cloud data to a local appliance Office 365 and Google Apps Many customers liked this approach because they get a local copy of the data   We evolved that into a direct-to-cloud archiving offering Simple to deploy, requires no local infrastructure   Our backup team then built a cloud-to-cloud backup connector for Office 365 Supports Exchange Online and OneDrive for Business Enables point in time recovery - easy to recover deleted email and files
  7. First, virtual.   Almost all of our customers have deployed virtual infrastructure Almost all of them also have hybrid environments – very few are 100% virtualized   We’ve supported virtualized environments with our physical appliances for years We’ve had a lot of success with the virtual edition of the Barracuda Message Archiver Now we have introduced a virtual edition of the BBS, known as the BBS Vx   It provides all of the same functionality as our physical appliance It’s easy to deploy, it’s easy to manage, and it’s easy to configure and buy
  8. As compared to Veeam, we have significant advantages: Protect both physical AND virtual with the same solution Integrated cloud for simple offsite protection Cloud enables incredibly simple DRaaS Very competitive price This is an exciting use case for us, and our new Vx has been well received
  9. Lets move on to SaaS   Office 365 has been one of the most rapidly adopted SaaS offerings to date ** Enterprise SaaS market grew 40% overall in 2015, while Microsoft grew 70% YoY. This number excludes home sales of Office 365. Microsoft will overtake Salesforce.com as the number one enterprise SaaS player in 2016, and the enterprise SaaS market is is forecasted to triple in size over the next five years. (Source: Synergy Research Group) **   This data still needs to be archived and protected Some customers need more than the native tools that are included with the offering
  10. Put up earlier slide about same challenges still existing – reiterate points for a third time Human error / accidental deletion Data corruption Viruses and APTs and Ransomware (CryptoLocker example)
  11. Summit Trcuk Group out of Dallas, TX has 30 locations with 1,450 users Made decision to standardize on Office 365 and began the migration They had challenges managing built in security in Office 365 (Exchange Online Protection) In fact, they stopped the migration all-together until they could figure out a solution to the problem Needed SaaS-based email security service Had never done business with Barracuda but knew of the company Trialed Email Security Service Immediate improved spam filtering, easy to manage with intuitive operation and had fewer false positives It was also non-intrusive for email users Best part was they had it up and running in less than 1 day
  12. Shifting to public cloud… In 2016, spending on public cloud Infrastructure as a Service hardware and software is forecast to reach $38B, growing to $173B in 2026. (Source: Statista 2016)   largest initiative at Microsoft ** Microsoft Azure revenue grew 127% (Source: Microsoft quarterly filing) Very rapid adoption – AWS just crossed the $10B threshold ** Amazon Web Services did $2.56 billion in revenue in Q1 2016, representing 63.8% growth from last year (Source: Amazon quarterly filing) (show some market examples relevant to EMEA regional adoption (UK and DACH)
  13. Put up earlier slide about same challenges still existing – reiterate points for a third time Human error / accidental deletion Data corruption Viruses and APTs and Ransomware (CryptoLocker example)
  14. In Summary Data Protection is changing quickly
  15. Barracuda is well positioned to help you across the spectrum of data locations