Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: Disaster Recovery
Author: 11:11 Systems
Date: June 2, 2017

Ransomware Recovery with Cloud Backup and DRaaS

Date: June 2, 2017

Author: 11:11 Systems

Editor’s Note: As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

 

In light of the recent ransomware attacks involving WannaCry, we wanted to write a blog article about how 11:11’s various cloud solutions can help customers recover from such attacks. Indeed, our solutions have protected a number of our customers recently, and they have been able to quickly recover, usually without even involving our support teams.

One of the aspects of ransomware attacks is that even fully patched servers, with anti-virus and anti-malware protection can succumb to ransomware attacks, due to the different attack vectors that they exploit.

Depending on what is being encrypted, and the urgency with which services need to be recovered, 11:11 offers a number of solutions that have been proven to help in these situations.

As has been well documented in the media, having good, reliable and frequent backups is key, and having off site backups has also been shown to be beneficial. There have been cases reported where the backup servers on-premises have also been compromised by ransomware attacks as the payload, once established, can move around the network and infect other servers.

First of all, let’s look at how ransomware works, using a free, available “friendly” ransomware product called Shinolocker.

Introduction to Shinolocker ransomware

In the case where user files have been encrypted (Office documents, photos, etc.), then recovering those files from a backup will be fairly straightforward. In a virtualized cloud environment, this could be done at either the whole VM level or on an individual file/folder basis, depending on what’s been hit.

In terms of cloud backup, 11:11 offers both backup of on-premises servers to the cloud, as well as backup of virtual machines running in 11:11’s Secure Cloud, where we offer seven day backups at no extra cost. In both cases this uses Veeam.

Recovering from encryption using 11:11 Cloud Backup for Veeam Cloud Connect,

As well as offering 11:11 Cloud Backup for Veeam Cloud Connect, we offer 11:11 DRaaS (Disaster Recovery as a Service) for Zerto. A relatively new feature of Zerto, since version 4.5, is that the replicated storage and journal offer file-level recovery capability where the journal can be selected in roughly five second increments. The journal can be increased from hours to days to weeks, so the granularity of the recovery can be selected as needed.

File-level recovery using the Zerto journal

For situations where whole applications and their databases have been affected by ransomware, it may be necessary to invoke a DRaaS service. Again, iland partners with both Veeam and Zerto to offer DRaaS.

Many people have commented in the media that replication solutions do not help with ransomware, because the ransomware and the encrypted files just get replicated across to the DR site. This is, of course, true. So, it is necessary to make sure that you have sufficient restore points or checkpoints in the DRaaS solution to enable you to ‘wind back’ to a point in time just prior to the ransomware being enabled. With Veeam, this is achieved by having sufficient restore points (snapshots), while with Zerto and its continuous replication capability, it’s a question of having a long enough journal, the longer the more cloud storage you will need. This is also dependent on the daily change rate of your data being protected.

One of the benefits of DRaaS is that you can recover entire VMs that make up an application and have them available for use by both internal and external customers, in as long as it takes to boot them all up.

The short videos below show how 11:11 deploys both Veeam and Zerto DRaaS solutions.

Zerto for DRaaS
Veeam Replication for DRaaS

 

Categories: DRaaS, Veeam, ZertoBy 11:11 SystemsJune 2, 2017
Tags: Disaster Recovery
11:11 Systems

Author: 11:11 Systems

Post navigation

PreviousPrevious post:iland, Now 11:11 Systems, Named a Leader by Gartner for Three Years RunningNextNext post:Running Docker Containers Using VMware Photon in the Cloud

Related Posts

Protecting Microsoft Teams Channel Chat Data: Are You Prepared?
March 15, 2023
Veeam 12
Veeam 12: Appropriate Direct to Object Storage Use Cases
February 15, 2023
Veeam 12
Veeam 12 Preview: Veeam Cloud Connect Backup vs. Object Storage
February 14, 2023
Veeam 12
Veeam 12 Preview: Multi-Factor Authentication
February 7, 2023
Veeam 365 Backup v7 BETA: SaaSy Immutability
February 2, 2023
Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}