We`ve Got Your Back
Transcription
We`ve Got Your Back
Customer profile We’ve got your back In the global battle for cyber security, ISC8 is thwarting millions of cyber attacks. Behind the lines, NetVault Backup protects it from data loss. Company Industry Country Employees Website ISC8 IT Security United States 18 www.isc8.com Business need A new backup strategy to save on IT productivity, restore confidence in the system and eliminate the risk of losing data required for financial auditing and product development. Solution ISC8 chose NetVault Backup and DR4100 Disk Backup and Deduplication Appliance. Benefits • Ending threat of serious data loss to finance/development departments • Boosting confidence in the IT system to protect digital assets • Saving 10% of IT staff time by performing backups with NetVault Backup • Recovering an entire file share server (9TB) in under 20 minutes • Shrinking backup footprint to 31:1 ratio “The biggest surprise really was around the DR4100 and the rate of integration with NetVault Backup software — how easy it was to deploy and how painless it is to use, it’s really pretty amazing.” Scott Millis, Chief Security Strategy Officer, ISC8 Solutions at a glance • Backup & Recovery, Disaster Recovery & Replication, Network Security ISC8’s technology aims at protecting critical business assets by helping companies detect the presence of sophisticated adversaries hiding inside enterprise networks. “We shed light where there was only darkness before,” explains ISC8’s chief security strategy officer Scott Millis. ISC8’s intelligent solutions empower cyber security professionals to more accurately assess serious threats by including the largely missing insideout protection so that their organization doesn’t become “the next big headline.” “We are able to run all of our weeklies in just a few hours. To date we have protected 78TB of data, using only 2.55TB of physical storage on the DR4100. This is about a 31:1 ratio.” Scott Millis, Chief Security Strategy Officer, ISC8 The need for ISC8’s services has never been greater. Online security can make or break a company and targeted network break-ins are on the rise. A single security breach can damage, sometimes irreversibly, proprietary data. In the worst-case scenario, a company loses not only commercial secrets and valuable IP but also its hard-earned reputation. ISC8’s product line addresses some of the toughest security challenges an organization can face, including the human, “8th layer” — a problem that until now has gone virtually unanswered. Backup turmoil While busy solving the latest advances in cyber attacks, ISC8 discovered it faced a challenge on the home front: it was urgently in need of a new backup strategy to protect its intellectual property. “Virtually all of it,” says Millis, “is comprised of digital assets.” And some of those assets were at risk. Over a period lasting roughly a year, he estimates the company had been losing nearly 10 percent of IT staff time either babysitting backups or rerunning backups that failed. The resulting data consumption was “very large and growing quickly.” Millis, who is responsible for IT at ISC8, was running weekly full backups that had to be divided over several days, “because of the length of time to run the agent on every server and push the data to the data store, without deduplication.” 2 The data sets he describes as “core” are about 40TB. “We were spreading this around different system targets. Management was difficult and we were consuming approximately 80TB on several physical systems.” A small company with a big role ISC8 did not have IT resources to spare. It is a small company that nevertheless plays a big role in the rapidly changing world of information security. Since the majority of available security tools have been deployed to safeguard against anticipated threats rather than alerting on suspicious “inside” activities, ISC8 is on a mission to not only educate about the growing scope of the threat ecosystem, but also to help ensure that the security postures and practices companies around the world adopt are sufficient and work holistically to protect their digital property as well as their reputation. Products & Services Hardware DR4100 Disk Backup and Deduplication Appliance NSA 3600 Network Security Appliance NSA 220 Network Security Appliance Software NetVault Backup Given this mammoth task, the loss of productivity on backup issues was of real concern. But there were other, far greater risks. “Aside from the qualitative service issues and associated lack of confidence in IT, there was a very real risk of losing unique proprietary data and electronic records required by regulations for a public company. And that could be very serious,” says Millis. “Our financials are audited, we must have security and reliability.” “The main victims,” of this backup turmoil, according to him, were “the development and finance departments. Their peace of mind was constantly challenged.” Millis needed a solution that would not only secure and protect these assets but also make them permanently available to the right people and processes, at the right time — no matter what. Bit perfect When the maintenance license of the previous backup solution came up for renewal, Millis decided it was time to look elsewhere. After exploring multiple options, he chose NetVault Backup software. The reason: “The total solution architecture works together to lower the total cost of ownership and improve service levels.” The Dell licensing model, based on capacity, was also a factor. “It allows unlimited agent types, which should come in very handy as we scale up the business.” Millis was already using another Dell product to mitigate risk at ISC8. SonicWALL secures all data from prying eyes. He describes the VPN solution as a “dream.” All inbound ISC8 connections come from either nailed-up tunnels using SonicWALL or SonicWALL VPN solution(s). It’s a “simple, effective high availability solution for our main site and remote sites.” 3 NetVault Backup now protects data and software applications in ISC8’s physical and virtual environments — Windows and Linux Ubuntu — all with one crossplatform solution. At the same time ISC8 installed NetVault Backup it also purchased Dell’s DR4100 rack-mounted deduplication appliance. “We wanted the simplicity of a single-vendor solution in this critical business service area,” explains Millis. In particular, he appreciated the ease of installation. “It took less than 30 minutes to install the server and the VMware agent, and run the first backup. It couldn’t have been any easier.” The next step was trial by full recovery. “We actually did a test on one of our servers where we copied all the data off of the D drive to a safe place and then did a full recovery and a bit wise comparison: The full 8 terabytes were bit perfect. It was really pretty impressive how easy it was to restore.” With a mostly virtualized IT environment, ISC8 needs to protect its own virtual machines from disasters, media failure and data corruption. Since NetVault Backup is completely integrated with VMware vStorage APIs for Data Protection (VADP), it allows ISC8 to protect an entire VMware environment (without the need for complex scripting) from a single, centralized console. Via the NetVault Backup web user interface, which can be accessed from any browser, Millis can get a realtime read on what is happening in his backup environment and can simply create backup and restore policies as needed for virtual environments. “I was impressed with the Server Monitor page and the Device Activity page. It really helps us a lot when we’re trying to figure out what’s going on in the system.” “It took less than 30 minutes to install the server and the VMWare agent and run the first backup. It couldn’t have been any easier.” Scott Millis, Chief Security Strategy Officer, ISC8 Boosting speed, shrinking the footprint With NetVault Backup, Millis has seen a dramatic increase in the speed of backups while their footprint has shrunk. “We are able to run all of our weeklies in just a few hours. To date we have protected 78TB of data, using only 2.55TB of physical storage on the DR4100. This is about a 31:1 ratio.” “We have recovered an entire file share server (9TB) in less than 20 minutes.” How is this possible? NetVault Backup software orchestrates backup, replication, and recovery in sync with DR4100’s built-in deduplication and compression. The DR4100 leverages Rapid Data Access (RDA) technology to track all the data prior to backup. Only new and changed data is sent over the wire. The result it significantly reduced backup times between ISC8’s offices in Dallas and California. “We have recovered an entire file share server (9TB) in less than 20 minutes,” using NetVault Backup in an actual restore,” says Millis. “The biggest surprise really was around the DR4100 and the rate of integration with NetVault Backup software — how easy it was to deploy and how painless it is to use. It’s really pretty amazing.” About Dell Software Dell Software helps customers unlock greater potential through the power of technology—delivering scalable, affordable and simple-to-use solutions that simplify IT and mitigate risk. This software, when combined with Dell hardware and services, drives unmatched efficiency and productivity to accelerate business results. www.dellsoftware.com. Scott Millis, Chief Security Strategy Officer, ISC8 View all Dell case studies at Dell.com/CustomerStories 4 Dell, the Dell logo are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others. Availability and terms of Dell Software, Solutions and Services vary by region. This case study is for informational purposes only. Dell makes no warranties – express or implied—in this case study. Reference Number: 10013595 © September 2014, Dell Inc. All Rights Reserved CaseStudy-ISC8-NVBU-US-KS-25052