Dell Cyber Recovery Qmg

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

DELL EMC This marketing guide provides an overview

CYBER of Dell EMC Cyber Recovery – including


product benefits, the opportunity that it
presents you and useful guidance to plan
RECOVERY and execute your own marketing campaign
using the available tools and resources.
Quick Marketing Guide
ABOUT CYBER RECOVERY
Data powers everything in modern organizations. It is also the currency of the internet economy and therefore a very
valuable resource and asset. The risks associated with not protecting core data properly are growing rapidly. That’s why all
organizations, irrespective of size or sector need comprehensive, modern, proven data protection solutions.
A cyber attack occurs every 11 seconds1 and the average cost of cyber crime for a single organization is $13M2. Accenture forecast over $5T of global value risk over
the next five years2.

However the Global Data Protection Index 2021 research results reveal concern A modern and powerful cyber resilience strategy, combined with the depth and
over cyber readiness: breadth of Dell’s cyber resilience portfolio, are key to enabling our customers to
increase business agility, accelerate time to market, improve their cloud economics
• Few are confident they can defend against data loss, despite
and reduce business risk.
financial repercussions
Dell EMC PowerProtect Cyber Recovery solution and ‘Business Resiliency
• Low confidence that they can recover from cyber attacks – amplified by
Services’ provide the highest levels of protection, integrity and confidentiality for
remote work
your customer’s most valuable data and critical business systems and are a vital
• Emerging technologies and the cloud further complicating data protection component of a comprehensive cyber resiliency strategy.

• Better protection against disruptive incidents by reducing number of vendors –


preference for those with as-a-Service
FEATURES AND
BENEFITS
Cyber Recovery protects and isolates critical data from
ransomware and other sophisticated threats. Machine
Learning (ML) identifies suspicious activity and allows
organizations to recover known good data and resume normal
business operations with confidence.

Reduce the business risk of lost data


from cyber attacks

Modernize data protection with intelligent and


automated cyber recovery

Efficiently recover “known good” data and


resume business operations
With innovative automation and intelligent tools, data can be easily isolated from the attack surface and
protected in a dedicated secure vault.

How we deliver:

ISOL ATION The significance is the three of these components


Separating critical data with an operational working independently and collectively within an
air gap provides critical data, production integrated solution to provide the maximum levels
and backup environments with physical and of security and protection for vaulted data, and to
logical isolation from attack surfaces give customers the best possible chance to recover
vaulted data with integrity and confidence should an
attack penetrate the data center.
IMMUTABILITY Cyber Recovery protects data and provides
Multiple layers of security and controls protect data recovery across on-premises and multiple cloud
against destruction, deletion or alteration environments including Dell Technologies Cloud
and other leading service providers such as AWS,
Microsoft Azure and Google Cloud Platform.
INTELLIGENCE
Leveraging ML and analytics to identify recoverable
data and offering insights into attack vectors from
within the Cyber Recovery Vault
CUSTOMER
BENEFITS
Secure Data Isolation
Automated workflows securely move business critical data to an isolated
environment via an operational air gap. Create protection policies in less than
5 steps and monitor potential threats in real time with an intuitive dashboard.

Intelligent CyberSense Analytics


Stay ahead of the rapidly changing threat landscape and sophisticated cyber
criminals with CyberSense adaptive analytics, machine learning (ML) and forensic
tools to detect, diagnose and accelerate data recovery within the security of the
Cyber Recovery vault.

Data Recovery with Confidence


Responding to cyber attacks and recovering critical data and systems requires
accuracy, simplicity and speed. Increase your business resiliency with automated
recovery workflows, CyberSense forensic tools and dedicated incident response
from SecureWorks.

7
As Dell EMC, 2017-2019; As EMC, 2005 – 2016; As Legato, 2004; As Legato Systems and EMC, 2003; As Legato Networker and EMC Data Manager (EDM), 2001; As Legato and EMC, 1999-2000
8
Information available at: https://itbrandpulse.com/2020-storage-leaders-enterprise-backup-software-appliances/
Enable a Cyber Recovery Strategy
To successfully recover from a cyber attack, it’s critical to have a strategy which is
aligned to the business needs and prioritizes recovering the most critical processes
first. Dell Technologies Services will work with you to strategize, implement, adopt
and scale a cyber recovery program to support the needs of your business.

Cyber Incident Response and Recovery


Responding to cyber attacks and recovering critical data and systems requires
accuracy, simplicity and speed. Increase your customers’ resilience with automated
recovery workflows, CyberSense forensic tools and dedicated incident response
from Dell Technologies Services.

Cyber Recovery Services


Synergy between technology and business process is where true business resilience
can be attained. Accelerate your customers’ business resilience planning and
implementation with the help of Dell Technologies Services across all key capabilities
related to designing, implementing and managing cyber recovery solution – aligning
recovery to the business needs by identifying key applications, required recovery
times and objectives.
PARTNER OPPORTUNITIES
Having a Cyber Resiliency strategy is a necessity for all organizations and can be seen as a competitive
advantage in today’s data-driven world. As a solution provider, Partners can play an important strategic
role in helping customers build their resiliency with Dell EMC Data Protection products and solutions.

MARKET OPPORTUNITIES
Cyber attacks are in business headlines every week, ensuring cyber recovery is on the radar of the vast majority of organizations, creating
an opportunity for you to help deliver the solutions, guidance and security they need:

82% 90% 69%

of organizations experiencing a of organizations are using, of IT decision makers lack


compromised production server3 planning for, testing, or confidence they could reliably
interested in using isolated data recover all business-critical data
recovery solutions3 in the event of a cyber attack4
While every organization has its own systems that are critical to its operations, there are often systems that are commonly most
important based on the industry:
• Healthcare – medical record systems are key for treating patients, • Oil and Gas industry needs to protect valuable seismic and geographical
but of course billing systems keep the organization running exploration data that costs millions to generate

• Financial Services – in banking, payment systems and core banking • Governments must protect critical systems that enable services to tax-paying
are particularly key citizens and generate revenue, such as property records and licensing processes

• Life Sciences and Pharmaceutical – Drug development and clinical trial data • Manufacturing needs to maintain plant and scheduling systems to
operate properly
• Retail – Point-of-sale systems, inventory and shipping systems

• Legal firms are often targeted due to lack of IT staff and budget and must
protect document management, conflicts checking, billing and email systems.
EXPLORE OUR DEDICATED
CYBER RECOVERY RESOURCES
Explore the range of marketing materials and campaign assets that are available to you – and discover a
whole host of opportunities to further build your business while helping customers to streamline theirs.

Thought Leadership Assets Sales Enablement Assets


Leverage the Stop At Nothing Campaign to share Dell Technologies’ Enable your sales teams to follow up on the leads you deliver
point of view to drive top-of-funnel demand generation activities. and convert to revenue by leveraging dedicated sales materials.

ACTIVATE
CAMPAIGN
Reference Material
Source Files and Images Mailings
Share key facts and figures with your customers
Access the source files, copy templates and images Help support your sales and marketing teams in their
about cyber recovery and how best to protect
to help maximize the impact of your campaign. conversations with prospects and customers.
and recover their data.

3
Global Data Protection Index Survey 2020 Snapshot.
4
2019 Official Annual Cybercrime Report — https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/
5
Hackers attack every 11 seconds – https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021/
6
2019 Verizon Data Breach Investigations Report: https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf

You might also like