Acronis Global Cyber Summit 2019 - Opening Keynote: Serguei Beloussov

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] today's world runs on data and protecting that data is more challenging than ever before due to three emerging trends greater complexity the number of connected devices will reach 200 billion in 2020 and in the near future only one percent of devices will be located in an organization's data center more security threats hackers are using more cloud computing power and artificial intelligence to make attacks more effective as a result global damages from ransomware are expected to reach 20 billion by 2021 increased costs the hardware and staff needed to manage and protect all of their data is a budgetary challenge for companies traditional approaches are no longer enough they can't keep up with today's ever-changing threats and they create a lack of integration across an organization's cyber security posture organizations must be cyber fit making them ready to take on the challenges of today and the future modern data needs a modern approach one that combines data protection with cyber security for something even better cyber protection there's a revolution happening organizations must address the five vectors of cyber protection known by the acronym sapos those five vectors are safety which ensures a reliable copy of data is always available for recovery accessibility which makes data easily available from anywhere at any time privacy by controlling who has visibility and access to data authenticity so there's undeniable proof a copy is an exact replica of the original data guaranteeing it is unaltered and security that protects data applications and systems from the latest cyber threats and zero-day attacks those who fail to embrace this new approach will have people processes and technologies that are not cyber fit which puts their organizations and careers at risk those who are cyber fit will be ready to protect their data gain more value from it and find more opportunity and success you're now at the forefront of this transformation welcome to the cyber protection revolution welcome to the acronis global cyber summit 2019 please welcome to the stage your host for today acronis chief growth officer dan havens good morning thank you for coming out this morning thank you for coming to the acronis global cyber summit uh i want to start out by just giving a hats off or a thanks to giacom who did the reception last night when i come into an event like this i always like the next morning i always try to keep my eyes on the people who went deep into the reception and maybe even snuck out to south beach and went to mangoes or something and you can always pick them out because they have a coffee in one hand and a red bull in the other and so as he lays his red bull down there so you you kind of know who you are but we'll we'll do that again tonight got a big day lined up today uh we talked a little bit last night about the opportunity that lies ahead this is front of mind front of line for every one of our customers and i think together we can really make an impact on this hopefully you're going to walk away with a number of insights to be able to write that business plan for going forward just a couple of reminders going mobile if you haven't done this already get this downloaded on your phone even i can do i went to public school and i was still able to do it in 45 seconds so get that downloaded onto your phone and then finally let's get social i mentioned to some of you some that weren't in the room last night the prizes that go to these insertions here anybody that can take a cool picture get that submitted we've got a number of them streaming in now a ton of gifts going out we'll have some at lunch today and we'll have some more at the reception tonight but these are truly truly collectors items so take advantage of that it's uh it's an easy win in my opinion so without further ado i want to get this bad boy started and see if we can get uh get our founder and our ceo up here to get us kicked off so with that ladies and gentlemen please help me introduce or help me welcome sergey belisa [Applause] [Music] hello everybody how many of you have been to reception yesterday okay okay well that's a large number almost everybody how many will have not been to reception yesterday okay anyways we'll repeat everything which you didn't hear almost so let's start so first of all i want to start with a little history uh this whole idea of having events for partners and working with partners deeply came from the time when uh me and and the team which works with me started with software business which was in singapore in 1996. this was my first event this was my first time when i spoke in english to a large audience in 1996 and it was in this pan-pacific hotel in singapore for supplements after the company which we eventually sold to microsoft then 2001 we had the first event for parallels at that time acronis was still part of sw soft and it was um actually an opening event um there are stories to tell about this event and the way we dealt with competitors i don't have time for it here but we also still had about 200 people who were still in singapore then we had first summit uh which was in hayat agency and one thing for you to understand the challenge of this particular event is that this event is the first large multi-day event acronis runs in its history acronis is 16 years old um as a separate uh entity and it's 19 years old as a brand and as a product and and we are doing this event for the first time actually in parallel summit we had 160 attendees and it was across the street from the office in in herndon virginia next to dallas airport and and we have many more people today here as you can see we planned for a little bit less and and so if we have any hiccups that's just because we're new then we had large event here which was in 2010 in fountain blue miami there was about one thousand attendees actually together with acronis uh two with parallels people and and that's how we ended up here it's also how i ended up having a chronic tattoo as i've realized watching the movie which i've shown last night on my right shoulder uh it stayed in my subconscious and subconscious actually makes you do very strange things so when we change the brand in acronis i i actually did put a acronis brand on my shoulder then we had the largest event which we had in this team and this was uh in caesar's palace in las vegas 1.6 000 people uh uh you know las vegas is a very uh uh unusual place or as a very usual place for the events and one of the problems in the las vegas is destruction which surrounds you there was a lot of destruction here we have a movie convention i'm not going to tell you at this setting what was a convention which was happening one flow below parallel summit but it was significantly more interesting for our hosting service provider partners some of them came to our event and then finally we had the first event which was large for chronic steel it was a single day half day event which was last year and so now we're here welcome to acronis uh global cyber summit we have about 1 000 people registered we have over 500 in this room there is more would not fit we have 57 countries of course most of you are from this country but there is a there are people from all countries and even typhoon which happened in japan did not stop our japanese team from coming japanese team where is the japanese here who who is from japan here there are people from japan thank you also special thanks to our sponsors uh this is the first time we're doing the event so they took a risk with us because they have no clue at this point whether we will deliver or not but we do have uh distributor service providers isvs oems analysts education and many other friends who are helping us with many parts of this event the way we're on acronis is the same way we're on this event and so it's not just about business so acronis as you know we are a global company we were founded effectively in singapore in 2003 and we have reincorporated ourselves in switzerland in 2008 so now we have two headquarters it's important part of our strategy we have two headquarters and two wealthy stable independent neutral and friendly countries switzerland and singapore uh we have rebuilt the company we and that is my team is running the company only for six and a half years and in this six and a half years we went through tremendous transformation which was probably the most difficult well not probably for sure it was most difficult uh part of my entrepreneurial career uh and and so we went through the very difficult times the worst uh time was probably in 2013 but it was also difficult in 2015 uh because we actually um were still rebuilding our products it took us much longer to rebuild our products however we recovered we grew 20 last year we are growing over 30 this year we grew well over 35 in the previous quarter and we are growing our new business 200 percent and we actually are accelerating we believe we will grow at least 40 next year and what does it mean for you it just means more business more growth all of us here want gross profit and less churn and that's what it means with acronis products why acronym is so unique is that on one thing acronis is relatively small company we only have 1.4 000 people we only have our locations in only 32 places which is of course very small for 1.4 000 people requires us to travel a lot in 20 countries we support 40 languages we do business in 150 countries however most important thing for acronis it is used by almost every large business in the world which makes it easy to sell because you come to a large business and all you need to do is need to find the pocket where acronis was used and you need to expand this pocket broader to a broader use in a company and we also used by a lot of businesses in general 500 000 business customers and 5 million consumers we just recently announced once important event in our transformation for the first time since 2000 uh well 2013 we did some kind of capital transaction where we raised 147 million dollars at a well over a billion dollar valuation which makes us into this acronym cyber dragon unicorn and uh why is it important for you because now we have money to spend we have money to spend to help you to grow faster and with more profit so let's talk about the trends i mean frankly speaking when i've seen the video which was shown actually since it's the first time it i've seen it first time i'm just thinking that i don't need to speak because everything i wanted to say is in the video but let me give you a bit of a longer version the world is becoming digital so autonomous car driving is a part of what what we do in acronis there's a cars without drivers a car on top drives with a driver and without a driver this is the first serious season we have a first race coming up for acronis team uh which is again primarily or rather only software the cars are physically identical and they drive without drivers one race and with drivers in other race but besides that there's all these other trends which are making our physical world much more digital digital is becoming extension of our physical world it's becoming impossible to live without digital and it's becoming part of every personal and business process in every aspect of life and as any universal scene like mobile phone it's becoming such in every country non-dependent on the country wealth non-dependent on the country uh position digital is important and there is one thing about digital which is um very very special it's very very different from my physical world unless it's protected it's very very easy to destroy wiping up one petabyte of valuable data potentially in the future you can't live with it requires no energy you just press a button and you wipe it and it happens in fact we had many situations with our partners when they wipe data accidentally and demolishing the physical object and and this particular building will require less than one petabyte of data to record everything about the building about the people who construct it about the construction process about all of the materials to construct it about the factories which will make the materials about the equipment which is needed all of this together is well less than one petabyte of data so all of the sort of description of how to make this building is less than one petabyte but it's uh many trillions of times easier to demolish digital copy of the building versus a billion plus in addition to that another annoying feature of the digital world and this is inherent annoying feature this is why we like digital vault as digital vault is extremely easy to replicate so you can have a copy many many many many copies of digital objects and you will not be able to find out which object is original and and which object is is a copy and and so there is a big concern about privacy and there is significant concern about security and of course there is a concern about authenticity now so you need to protect digital world however it's becoming harder it's becoming harder for the reason of these three very simple challenges in five years maybe in three years we'll have hundred to 200 billion intelligent stateful devices in the world today we have five to 10 billion so number of devices is going to grow 10 to 40 times 10 to 40 times and and that is very difficult to manage you have these devices no longer inside the core data center in a google cloud or in your large enterprise cloud in some contains place but all over in the buildings in starbucks locations and gas stations in hospitals in schools in the airports in smart cities and and you can roughly think about all devices as a core edge and end point and the problem with complexity is especially difficult on the edge and endpoint that's where you deal with very large number of not a small number of devices clustered in a single place in case of the edge or extremely large number of endpoints then security security is another saying together with us becoming i.t aware we are seeing that our uh potential villains are becoming i.t aware so building you know security security threats building viruses building malware building ransomware it's becoming a business you can actually sign up and get a ransomware as a service you can find sdks to build around somewhere and and so this is really a highly developed under world highly developed gray market where you can build cyber sets it's industrialized it's automated it's very inexpensive and it's almost always zero day in fact traditional security approach doesn't really work anymore because you don't really care about catching the viruses which was there one year ago or even one week ago yeah okay these viruses are no longer a threat for you but actually that's not the problem the problem is new since which you don't know and this is just some examples of some attacks um you know how many of you have experienced cyber attacks amongst your customers and partners well you see you see i mean that's i tell you what i always judge the danger of something for my business or for myself based on the fact if it ever happened to my businesses or whatever happened to people i know to their businesses and when i would ask this question 10 years ago five years ago there will be many less hands i remember one of the one of the luminaries of security industry i'm not going to name him who was one of the key engineers and and cto for a large security company one of the largest in the world once told me he doesn't use security software because it's not necessary because actually you don't go to a dangerous place and that's all now every place is dangerous every time you connect to wi-fi it's dangerous everywhere you connect to wi-fi everything you insert in your device every message which arrives to you is dangerous and so yeah you you have this as a problem and then of course the cost is a problem because number of devices are growing 10 to 40 times so if you pay per device well you might end up paying 10 to 40 times more and an amount of data is growing four times based on this estimate by igc in my opinion it is growing faster so if you pay per gigabyte it's also a challenge and so to protect the world you have these three challenges and we believe that there is a very simple solution which is what we call cyber protection which is unique and revolutionary solution because we build it painfully from scratch without losing features without losing capabilities of security our security is world-class it's it's the best without losing any features and capabilities of our data protection yet in a single solution combining these five vectors safety accessibility privacy authenticity and security combine it at a single agent combining it at a single ui combining it as a single product in such way that you can actually do it without complexity with a full security and at a reasonable cost and we believe cyber protection is amazing opportunity for all of you most of us make money on something which is a platform business if you look at cyber security plus data protection plus software defined storage plus privacy manager plus authenticity management together with services this is a 250 billion dollar market which is growing double digits and this market is extremely fragmented so everybody needs elements of that the only complete solution especially for edge and endpoint is coming from acronis it's a huge opportunity so when i talk to my salespeople about growing 40 next year they are getting concerned this is too fast you know we just were growing 20 years before now we're growing 30 until happy in my opinion we should grow 100 and that's what is happening with our business because it's a basic need of every person and every organization and every workload in the world and there are five benefits of doing it in the way we do which are which is integrated and these benefits are very simple it's very easy you don't need to worry multiple vendors multiple solutions it's very efficient especially cost division and you can't afford it to be inefficient because you have so many devices so much data it's designed to be secure security is built in the product from the start it's not a post effect you don't need a separate solution for it it is secure every our product is secure it's designed to be reliable you know in some ways our products and any protection products they don't work at all time most of the time they are off right in fact what that's what we want for our customers we want the products to be always off we actually don't want our customers to need to be able to go to our product because the best protection is when nothing happens right but but in in reality that brings a reliability requirement to a very high standard because the product is almost never used and then at some point five years from now ten years from now three years from now it needs to really work when something happens and finally very important part of any kind of protection is not to release control one of the problems of any protection is if you are protected you lose your privacy to the protector at least or maybe to other people and and then uh you are need to protect yourself against a protector and that's why we built our products again painfully in the architecture which allows us to protect cyber protect all data applications and systems with giving the full control to our partners and customers how to deploy it and so on and so again the the very important thing about our solution we have started doing this four years ago we shipped our first cyber protection product ransomware protection in the form of active protection into image about uh two two years ago but you know now we see some companies like some of our competitors buying security companies so security companies buying data protection companies emerging very important difference of our solution and that's what revolutionary it is fully integrated on these five levels it's a single package it's a single user interface for all of these aspects of protection it is a single management and single policy for all of these levels of protection it's a single product which allows the product to work with each other and to be protected in variety of different ways one product produces certainty another product produces uh security another product produces privacy combined there are some unique capabilities and finally there are technology integration on a deep technology level which enables us to do things which are literally impossible you know it sounds maybe very aggressive but we have the best ransomware protection in the world right now we have the best ransomware protection in the world most of those attacks which happened recently with ransomware if they were to use acronis product they wouldn't happen exactly all of these attacks and that's because we have these five levels of integration and in order to achieve this integration we aggressively innovate we file a lot of patterns and we aggressively do new things it's very difficult to do new scents it's very expensive to do research because much of the research does not result in technology uh they uh they they the number of patterns and number of research which ends up in the product is not so huge however we're actively doing it because deep innovation is the only way to deliver since easy secure and efficient we innovate in our core technology any data which is something we're shipping for almost 20 years we're innovating our acronym cyber infrastructure which is specially designed software defined infrastructure for protection and and i will talk about this we innovate painfully with our hybrid cloud architecture which is our promise to our partners and customers to give them full control how they buy how they deploy where they send the data and how they manage their product how they encrypt that data full control is given to customers full control is the most expensive thing in the world most expensive scene is to give control control is very expensive and we innovate with blockchain and we also innovate of course with artificial intelligence all of our products not just security products are based on e.i for behavioral analysis predicting failures and trying to prevent the need for protection whenever possible so there's this several things and many of you have seen me talk about this several important unique capabilities of acronym cyber protection first is acronis authenticity every product of acronis allows you to certify time step sign verifying the sign in and identify the person who signed for every piece of data which is an acronis we have done it a bit early that's one of the issues with any innovation sometimes you could be a little bit early we've done it several i think we started doing it five years ago and we shipped it about three years ago so we're shipping it for a really long time but we see that the usage was growing up what is this about is very simple you have a digital object which is a file which is a log which is an archive and this digital object can be modified and the only independent way to ensure that it's not modified and that you know it was modified is to make a digital signature and store it in blockchain and there is management around it then of course acronym cyber security very important part this is not a nice model here this is the model which i like about security it's about prevention detection response recovery and forensic if you look at majority of security tools they focused on detection and response so they basically talk about the fact that if something's going on with your computer we can catch it and and then we can stop it and the reality is that it's not enough so first of all many of the things which would be happening with your computer you don't want them to be happening you don't want to stop the villain inside your home it might be entertaining but not really very safe to have a villain in your home it's much better to never let him in so you need to do prevention and we have unique prevention techniques such as smart protection plans where you can do a backup we can do a copy of your infrastructure at any suspicion of a possible threat and the possible threat is not necessarily a security it could be a tsunami it could be a typhoon like in japan could be a hurricane like it happens here or it could be an earthquake or something like that not only we can do it um continuously on iranian infrastructure we also have a copy of your infrastructure so at relatively low overhead we can do it on the copy the problem with all these prevention techniques is like general checkup actually all of us in this room will live longer if we spend one day per half a year to do full general checkup but how many of you do one day of general checkup every year not very many but if you see the difference for example for u.s presidents they live very long lives if you notice and one difference between them and us is that they're sort of forced to do general checkup very regularly and and that's a difference so if they have any problem it's found in advance but it's very expensive and it's very time consuming and we can do it without expense and time consumption now another thing which is unique about our security product is recovery we can no longer rely on detection and response there will be smart guys who will break in through detection and response no matter what we do that's just the way the world works today software has defects any software has defects and so there would always be people who will be able to exploit them plus in addition to that if software doesn't have defects people will continue to be people they have defects so any company have employees and so even without vulnerability from the software they'll get vulnerability from their employees so when the threat happens you actually need to do recovery and we are unique in the ways that we keep a copy safe copy secure copy of your infrastructure and we can call it for recovery another thing which is unique nowadays you have to do forensic because the vlans they are no longer getting into the computer and immediately breaking it they're getting in they're setting the traps they sit in there then something happens then you recover and they're still there and so unless you know what happened you won't be able to be safe and so with our product we can keep much more about your um infrastructure running than a normal uh security solution and so we can do proper forensics these are unique capabilities only available with us and with that i want to invite our chief development officer nigri benikov with a with a new nickname cybernic cybernick will talk about him coming and so he will talk about uh our new product acronis cyber protect proactive protection before something happened the best way of protect active protection during something happening and reactive protection making sure that if something did happen and it wasn't stopped you can safely recover with minimal loss of money data or time nick please go ahead thank you sergey uh it's pleasure to be here and uh with my my about 15 years of experience in cyber security it's uh really uh great to present cyber protect product today so uh first of all i'd like to mention that traditional solutions which are traditional security traditional backup in isolation they do not work anymore so they can't protect customers we can protect organizations and governments against cyber attacks i think you read the newspapers you know about the news so even like last week there are additional attacks which are successful against uh very protected organizations and uh backup only backup also can be a solution because it's very time consuming it's very inefficient to do manual recovery from backups and if we combine antivirus and backups together just uh back to back it will not help also because it's really hard to take all the data without any integration between these solutions and if we talk about some additional tools uh tools also are not very efficient because there are gaps which cannot be closed without integration of solution on technical level on management level and when we talk about management tools it's actually very hard to manage uh different solutions say you have one console for anti-malware another console for backup another console for vulnerability assessment and another one to manage your customers so imagine how difficult the life of your technicians will be if you have so many tools it will be much better if you have just one console which manage all these policies and all these protection parts together and this is what acronis cyber protect is about so this is one continuous integrated protection with data classification in it and ability to be protected against natural disasters and other types of threats based on smart protection plans and remediation actions integrated into the product and it's also a recovery recovery should be safe if you just have one competitive uh backup solution when you try to recover but your backup copy is infected you will not be safe right you will just spend your time and money recovering uh the images which are already infected and you will fight against this infection again so integration of security into the recovery processes critical capability of modern solutions and forensic investigations already uh was mentioned by sergey so forensic experts they struggling a lot because they have just one slice of data when they come to you and you give them a hard drive they have just one slice and they can't uh make you a good advice what happened because we don't see the full story they don't hear the timeline and if they have several uh slices with the information about what's happened with your system say for a week it's much easier for them to make a conclusion and help you to protect yourself for the future and so let me show you several small videos from our modern product which is available on the booth today which will be available on first of november in a better program open beta and let's start so first of all i mentioned already that this is one single pane of glass and this is several dashboards you can see in the product so it's information about security it's information about backup it's information about vulnerable applications the history of security alerts and data protection alerts in one place patch management installation history information about what devices are protected what devices are discovered this hard drive failure digit and many others and very important is to have just one single protection policy where customers and administrators can define uh all set of protections uh in one place so backup anti-malware url filtering as well vulnerability assessment patch management and uh you are selling backup right now right if you are acronis partners and all backup is there so don't be afraid that we somehow put away backup it's all here all these great solutions which acronis has been developing for 16 years they're inside the product but just integrated right now and let's go next in this backup settings we have additional settings called continuous data protection and this is unique capability and only a combination of backup and security can bring such capability to you so when you enable it you can go and specify some applications which used by your employees to create to add some value into your organization so you can define applications you can define uh find folders where these files which they created by these applications will be stored so and our product will catch all changes which we which are done by these applications in these folders during the day and if something bad happen you can recover from backup from latest backup and add this additional additional files additional value which in place created using this application to this latest snapshot so you don't need to fight against threats in real time because if there is a targeted attacks with some people behind this attack probably your administrators will not be able to successfully protect you against it but with our product it's not needed and there is zero data loss because of this feature and this combination of backup and security interceptors together in one product so next let's look at let's look at after discovery because when you have some devices in your network and you don't know about them it's actually an also potential gap in security and our new product allows you to discover devices by different means so you can manually add some devices yourself or you can scan your active directory structure and uh our product will find all devices in this active directory or you can use a network scan like in windows and after that you can enable and add a protection policy immediately to such devices like in this specific uh screen you can see this device which we just discovered and when you discover devices and you create unified protection policy uh what you need to do you first need to think about your applications and the vulnerabilities and our product allow you to scan all your systems to find vulnerable applications and allow you to install patches into these applications and there is some process then administrator need to enable and agree to setup it and let's look at our additional feature remote connection you don't need anything just our product to remotely connect to the machines of your customers and you see mozilla firefox version 43 and immediately after installation this mozilla firefox will be updated to the latest version 69. there are many settings in patch management part of our product and it's backed up by acronis security operation centers in three locations in singapore in u.s and in switzerland and now analysts work 24x7 and they create vulnerability assessment and patch management records to minimize work of your administrators to protect your systems so you don't need anything except our product to make your systems and application patched and invulnerable but another issue can be not without not because of some attacks or because of some vulnerabilities it's just because your hard drives and your computers they can over time be less and less safe and we have a machine learning model in our product we collected billions of records from different systems and we can predict uh which hard drive in your systems will potentially fail and in this situation we allow you to create a protection plan and protect your systems against such potential issues and recommend to replace in a specific amount of days or months but it's not only thing our product can protect you against and uh as sergey mentioned we have this we have this uh smart protection plans and uh imagine there is a hurricane and our security operations center will issue an alert and you will be able to make some remediation actions and in this case this remediation is uh to enable your servers in acronis data centers through our chronic disaster recovery capability so you create recovery server it's very advanced it's very advanced network settings so it's not just one machine it can be a whole subset of machines which will be enabled in acronis data centers in if a hurricane is coming to your location and after that when it's over there is a fail uh fail back process to take this data from uh from acronis data centers to back to your location and always manage from one product based on acronis smart protection alerts and the last part of my speech here is backup is unique source of intelligence and by scanning backups we allow administrators to decrease uh performance impact on your systems so why to scan endpoints like thousands of endpoints in real time when we have a backup copy we can take this backup copy scan for viruses at night and you don't need to scan your end points and we allow to do it and you see we can find some infections within backups and solve these problems without touching your your customers without touching your in place and moreover we can even create a white list from backups and you know in security it's very important to have a great white list because when you are very smart and very sharp in detection you need some whitelist to prevent false positives and we are we use this unique source of intelligence to create this white list and create more sharp more advanced heuristics to protect you against cyber stress that's all for me today thank you thank you you know one one thing about nick uh is that if you let him speak he will speak unlimited amount of time so we trained this and he was supposed to speak for five minutes but as i've seen on this it took at least 12. and that's why we had to record the videos if you would allow him to show the product it may take one hour so next product which is next part of our capabilities which is very very vital is a privacy and control and in all of our products to some extent today to a larger extent with some products to a small extent with other products we have this five pillars for privacy and control the first pillar is just control management access it's just where you deploy the product and where you send the data and ability to change it the second thing is to control access to storage which is also very very important where you send the data and how you encrypt it who has control of it whether you give it to partners whether you give it to us whether you give it to us for a little while and then take it back then control access rights which is extremely important you want to know and and today it may look you know like you know do you really have data i remember i was sitting on the panel with some very prominent semi technology entrepreneur about five years ago and he told me i have nothing to hide i think reality is that now you are actually required to control access right because there are laws like gdpr for it but besides that everybody have something to hide if you have nothing to hide you have no control of what you do now this next thing which is very important is that one scene is to set access right another thing is to actually monitor what happened what you want you want to have a proactive monitoring of who has access to your data application on system and for that we use the same technique which comes to us from cyber security to data protection and here to privacy management is behavioral access control where we monitor the behavior of users and applications on your uh workload and and we signal you when something strange is starting to happen you know for a human it's always easy to see if you have an employee and most of the time he accesses a certain folder and then suddenly he start accessing every folder and downloading every file that's something wrong and so finally very important thing is lock and audit access for all of the data access with ability to sign these logs and store their uh the signature and blockchain to make sure that the logs were not modified because that's the only way for you to do forensics and believe me or not without forensic in the future you won't be able to be secure safe or private you will need to have to be able to investigate what happened and for that you need to have accurate logs and the first thing the bad guy will do is to modify your locks to hide himself on top of it we think data management is very important we're all about data applications and systems are some form of data and and with data you have to offer some data management today we're offering in our product is business continuity we're adding global search which is unique especially for the edge and endpoint you can't really run a search today against your edge and endpoint devices you have to run it by device which is basically impossible with large number of devices we have all of the devices in one place we can run the search on them you can keep it with us encrypt it you can keep it somewhere else unencrypted where you trust and you can run the search also automated protection which you've seen just now it's part of the fact that we figure out which applications which systems appearing on the network and whether there is a better way to protect them real-time analytics another scene which is very important dashboards without real-time analytics you don't know what's happening and finally policies and compliance another thing which you can do with your data ensures that you're actually compliant today you have regulations most of those regulations are followed in a very reactive manner just once a year you check what happened the reality is that when something will happen which will be bad you will need to prove that you were compliant and unless you constantly check it you cannot be sure that you're compliant you can only do it with a space with the help of special tools like acronis finally there is one product which is very important part of our offer one capability acronis cyber infrastructure again this is our own software defined infrastructure and one question which i'm always asked for the past six years around this company why are you so stupid why are you actually doing what amazon google microsoft vmware nutanix red hat and so on are doing these are big companies how can you do better and the reason we can do better besides the fact that we have unique expertise and many of the people who work for my organization actually invented many aspects in software-defined network infrastructure uh in general and and specifically storage and compute is the fact that we design it to be extremely easy because it's only for secondary workloads it's only for you to run them at from time to time when you have a failure very cost efficient which is extremely important because again it's not your primary infrastructure you run your primary infrastructure somewhere something happened you won't you want to run it on the secondary you don't want to spend extra money on it extremely secure basically we assume with our cyber infrastructure that you are connected to unsecured network at the edge this is how it is on the end point very often this is how it is and so we there is no point for us to provide any kind of protection infrastructure unless it's protected itself can it be 100 protected if it's physically connected maybe not but it can be much more protected than what you have otherwise very reliable especially on the edge you don't have ite expertise you want to put the box there forget about it and five years from now when there is a failure it must work and it's also universal we provide our own hardware already today we ship appliance in some parts of the world will ship appliance separately everywhere but also you can use it as software you can deploy it with us you can deploy it with yourself you can deploy it with your customer you can deploy it with your partner and with that i want to invite alex miro who will talk about acronym cyber infrastructure there are three primarily scenarios of usage of the cyber infrastructure cyber storage and compute destination cyber protection back end and scalable cyber appliance which you can sell to your customers or your partners and they can install to do protection themselves alex go ahead thank you okay sergey covered most of the points i'll give a little more details so what is our cyber infrastructure and sometimes people say like oh you guys just do yet another private cloud and it's much more than that sergey carried the most points what it is but underneath it contains everything you would typically expect from an enterprise and career grade infrastructure services so full-blown virtualization high-performance hypervisor and gives you full life cycle of all your virtual machines you can create them you can clone them migrate them whatever you normally expect of that software defined networking that again covers the all the virtual networking capabilities including the built-in firewall for security and endpoint protection software defined storage it's our own uh our own product our own technology that we developed in the company over the last several years that gives you a unique capability to do the high performance scale uh of all these storage components that can be deployed in the individual boxes you can have in there management and monitoring you have a full aspect and full control of all the components that you would typically expect there for compute storage uh networking uh global global tools to monitor our protection using we use the prometus and grafana there high availability and naturally protect against the old individual components failures as well as unique capability to deliver kernel updates that do not require your the system reboot when you update your operating system kernel running uh for your partners the benefits i think they are obvious i just gonna repeat them again it's a resilience against the data loss again you can control what kind of level of resilience you you're going to build and you you can control depending on your needs your customers your cost and capabilities doing that very attractive price point and flexible licensing uh we support commodity industry standard hardware you can again as sergey said you can pick up your own hardware supplier you can leverage your existing hardware investment uh you know like install the our cyber infrastructure and existing hardware if you need uh have full control over that or we can help you with the hardware as well uh scales to hundreds of petabytes that's the real number of storage that we're currently running in our data centers across the world and give you scalable remote access to manage all the components of that uh what i'm going to show you is a a quick demo how do you install and run uh backup and disaster recovery appliance appliance you know when you have your needs for disaster recovery then having your things in the cloud is often not not enough appliance is like a first line of defense of your office this is literally a cyber acronym cyber infrastructure in a box something you put in your office you plug it in and you start that and then you have a capability to have the first line of defense in your office we have your backups disaster recovery ability to you know recover your service and appliance as well as in the cloud it's fully integrated and i'll show you how easy it is to install and control that so we'll cover the installation and the operation of that from the point of view of both the customer and the managed service provider so from the point of view of the customer installation is very simple you get the box put it on your office you plug in two wires power naturally and the local network cable you fire it up and what it would do is at the at the boot process does it okay it starts running it gives you the code then you as a service provider you login into your cyber infrastructure and you have your clients here i'm using the voyager inc is the customer client and you go there and it basically says there's no appliances there here's when you register it you just plug in the code you get during the boot process you do the configuration supply the local credentials we configure the network as nick said we can detect all the net automatically you can override it with things you need to do here we go you have the green up and running appliance dashboard it's all what you just see in the next presentation again this so now you connected the appliance at the customer side to your cyber cloud you can verify that look at what how these things are parameters there now you need to configure the backup plans and the disaster recovery plans you log in into the local instance of the acronym cyber infrastructure in your box it looks essential identical to what you've seen there you look at the dashboard what's going on there uh this is actually the numbers that show that plane's been running for a little bit and it's automatically detected the servers the devices on your local network now you can configure the various backup and disaster recovery plans and using you can see here you have a several destinations where you can basically select uh actually easy for me to look at here what are you going to keep your we're going to keep your recovery you can do it both locally and in the cloud and you can set up a different uh schedules for example like for every hour you can have a a backup on your appliance and every 24 hours that goes in in the cloud there's no need to configure vpn it is all configured automatically by connecting appliance to the cloud so you have this full protection up and running now you want to create a recovery server which is basically a think about it as a virtual machine that is the total copy of your server in your network that will operate as a recovery as a recovery target again you can you can select that see what you need and you can choose where you want to do the recovery it is a test recovery or a full production recovery the only difference is what network connections being used for test recovery it's a sample network that does not interfere with your production for the full recovery it's the real network we set up all the networking configuration and then you just can go ahead and start the server login to that this is your disaster recovery copy there's also difference that for uh the appliance contains the backup disaster appliance in that configuration contains two classes of storage it's a hot storage for virtual machines basically to stand up the production version of your recovery server or it can be a cold storage uh usually hard drives much cheaper way to keep you your backups and you use that storage to directly stand up your recovery servers from their storage without consuming the more expensive ssds you have full control over that so that's pretty much it i mean i was actually trying to keep up speaking with the how fast this thing goes it's very close to real time uh the appliances are available right there on the show floor please stop by look at that see the live demo try that they're out there a couple of sessions that you actually three sessions you might find interesting two of them later this afternoon at the same time and then tomorrow i'm actually doing the last session tomorrow uh we'll go into more details on the cyber infrastructure and have a market you know opportunity to do the q a and go into more depth on that that's it alex that's it okay thank you one thing i want to point out if you think about the magic of cyber protection and magic of being easy efficient and secure it cannot be possible without cyber infrastructure because actually whatever you do with your infrastructure you need to be able to run a copy and and so for that you need some other infrastructure and that infrastructure has to be special and we are really the only company which have our own design technology for protection from the scratch fully integrated with the rest of our applications for protection and that cyber infrastructure which makes us sustainably easy sustainably efficient and sustainably secure for a foreseeable future and that means you can do business better but there is another thing which are very important to what we are talking on the summit cyber protection cyber infrastructure finally it is cyber platform we believe that there is so many different workloads application data and systems there is so many different protection types how you want to protect your data archiving compliance um different forms of backup different forms of replication different forms of synchronization there is so many software packages to integrate with and there are so many destinations for protection and again for us it's important that we want you to use cyber infrastructure but in fact with acronis you don't have to you can use your own infrastructure or you can use amazon or you can use microsoft you know if you have good amounts of money it's always good to spend it on something as good as amazon and and so please go ahead otherwise you can use ours but it works it's very important that it will always work because we believe in giving customers and partners a choice and so this is something which we have pre-announced in april and this is a focus of this summit this is in fact the reason why we have the samick acronym cyber platform which is an open ipi and sdk which will make more and more complete there is a application level cloud automation level business automation layer acronis any data layer and universal infrastructure layer on any of those layers you can add missing capabilities which is important i'll talk about why it's important in in the first session tomorrow in the keynote tomorrow i start the keynote i'll talk about it but in the meantime i want to invite our chief operating officer and president who is running all of the technology uh since in the company stanislav pratasa he will talk about acronis cyber platform how you can customize your cyber protection how you can integrate it with variety of different packages you use to run your business such as professional service automation provisioning billing and so on and so forth and how you can extend it to cover broader protection stanislav go ahead thank you sergey um so what is acronys cyber platform it's several pieces tied together definitely the core of the platform is uh sdks software development kits sergey listed them over there and uh i will be talking in more details tomorrow but actually this is how independent software vendors our partners and even customers can customize and extend our platform we are going to provide it in multiple programming languages and uh important part for using those sdks and building the extension to the platform and training those extensions is definitely people who support and guide you through so we have a team which helps partners to start working with us from business perspective we have team we are building that team of uh technical evangelists explaining how our platform works and what opportunities you have and we have people answering your questions on support forums and so on and so forth we have documentation which is a part of our platform and that documentation provides you with api reference which is probably the most important part of any documentation but it also contains samples and it also contains integration guides we are building the case system we are working with both independent software vendors uh integrators and our partners to build the new and unique services actually one of the major reasons why we are doing the video opening the platform is regardless how smart we are and how many developers we have we never will cover all the business needs and all the creative ideas of our customers and we have developers developer partel which is open right now and acronis is a creative company so we call it uh developer.cronus.com and this partil contains all the information you need to start working with us and start building your integrations so it has the documentation it has the links to all the samples on github and we license those samples under mit license so you can actually fork it modify it and use it freely while building your integration we have all the libraries actually by the end of this year we will support six most popular programming languages which are used in our industry for integration is python php java c-sharp and give me a second okay never mind it should be there and we definitely provide access to sandbox because if you build an integration you want to see it leaf and training you want to actually uh check it before moving into the production it's also over there and all the links to our forums community certified integrators and certified solutions are also on this portal let me show you very short demo just to give you an idea how good integration should look like i mean it should be simple and it should be fully integrated because if it's it looks aligned then it's actually not easy to use so let's imagine uh the small partner of acronis we don't have many customers so we're just signing a new one uh it's a low company and apparently since i don't have many customers i don't expect many other lawyers coming so it would have the name law firm we check the services as you can see all those familiar services is from acronis but the last one is actually the integration we are building like right now it's data loss prevention service and it's integrated into our management console so we select the quarter we let this law firm to protect up to 10 devices and make it a soft quota so we can uh charge lawyers for overusage which is very important yeah because charging lawyers is actually okay and now let's switch to this newly created customer management console and create a protection plan there are no devices we just created this customer so let's create a protection plan as you can see data loss prevention services here and we are lawyers so we are creative that would that plan we will call default protection plan okay here it is and in this service we do not have a lot to customize for the customers but let us protect from data loss from all possible sources so with that we create the protection plan you can see it now i can apply it to all my machines and have both backup and protection and the last part of this demo is actually our user interface design kit we use it for all our products ourselves all the controls are here and we give it actually to you and to understand how easy to add the support in the user interface that's actually the real code for the data protection plan for the customer showed that's pretty much it we want you to be able to add extremely easy new services and do a unique offering for your customers and please come to the sessions we are going to talk about cyber platform today and tomorrow start talking to our team thank you thank you sergey yeah i i just want to point out between these three products cyber platform is the newest and it's very very important for partners because it's ultimately about one thing you're making more profit having less churn and having more growth with your customers and you've been differentiated from others there is many other reasons why you want to develop something on top of acronis platform um you know you could be an isv and you could just develop and sell your application the importance in which we don't want to break for any customer is a single solution so you can build a completely separate product glp which we do not do today but when you integrate it with a chronic cyber platform is one solution it didn't make sense any more complicated hopefully not any more expensive and also it kept the security in place now finally there is another thing which is already sold today and that's a chronic cyber cloud that's something which we started doing six years ago we started shipping five years ago and four years ago more actively and that is something where we take cyber protection and we wrap it around uh we since required for service providers to be successful first of all all of our infrastructure is not only hybrid but it's also multi-tenant highly multi-tenant and highly multi-tiered you can have any number of tiers distributor reseller another reseller reseller consultant of a reseller who sells the customer we support it we provide complete provisioning and billing without which you cannot really run a service provider business in scale we do variety of audit and quotas which is required for you to build the products and service plans for your customers differentiated from your competitors we enable white labeling and complete integration what's unique we provide some integration with psa ourselves some of it is built by our professional service automation partners like connectwise who is here on the conference but some of it you can build if you want and you can extend it and it's ups already it's multiple products in one so as a service provider one of the best ways to decrease churn is by having multiple products sold to a single customer it's much harder to go away from multiple products and so they will stay with you with that i want to invite our cyber cloud expert james on stage he will talk about cyber cloud and the whole goal for cybercloud is to enable service providers to start selling fast to the reduced churn and earn more money and to differentiate your service you can get new customers go ahead james thank you sergey well howdy y'all good morning i'd like to go ahead and uh introduce you guys to the new additions that we have available that we're rolling out to you all right the new additions that we're rolling out will include our cyber advance and our cyber disaster recovery now let me go ahead and explain why we're rolling these out to you today the reason why we're rolling these out to you today so that you can meet and exceed your customers cyber needs the fact is is that today you're selling backup and soon you'll be able to sell all of our cyber protection services they're all built on one platform simple to sell very easy licensing so as i said today you're selling backup tomorrow you're going to be able to sell the entire cyber protection suite all tenants start out standard and you're able to then upgrade to the advanced edition the advanced edition is really built for our enterprise customers those who are supporting exchange sql oracle our disaster recovery is really built for those who have the need for high availability you know high rto requirements so we're giving you the ability to fail over to the cloud we're giving you the the ability to back up and fail over locally as well the nice thing with acronis is that we're not tying you to one thing we're allowing you to meet your customers needs right so with cyberadvanced you're able to meet your enterprise needs with cyber disaster recovery you're able to meet your high rto needs with cyber files you're able to provide secure enterprise grade file access sync and share tools with cyber notary you're able to provide the ability to certify and verify that your documents are authentic all of that's based off one platform like i said multi-tier multi-tenant built with the msp in mind now we've scaled this out to the enterprise as well we don't want to limit you guys to one situation we want to allow you to back up anything and we won't allow you to back it up anywhere okay with that being said there's multiple deployment options right sergey said we have the ability for us acronis to host this we have a hybrid model we also have a service provider model where you can back up to your own data center whether that be amazon azure or just your basement now the nice thing here is that we do have integrations available today with the top rmms and psas such as connectwise right and those integrations are phenomenal if you guys are looking to make some money today look at those integrations from there you can also create your brand awareness with our white labeling services right you can use our custom branding you can use your own logos and you can brand out all of our services with your business now with all that being said i'm going to give you a very very very quick demonstration it's going to be about 3 minutes and 30 seconds if you guys want to see more come and see us at the booth okay so what we're going to do is start off with creating a partner when you create a partner you have the option to select any one of the additions as i said we'll start with standard from there you could select advanced you could select the disaster recovery edition and the idea is that you could select multiple editions for your partners and you have the ability to select one of those editions for your customer now what i want to show you guys today is 2fa this is something we've been waiting to release for a while now what you'll see here is our user accounts you can see the progress of your user accounts and you'll see my user account does not have 2fa enabled so what i'm going to do here is disable 2fa and then enable it we'll log out here and log back in at this point you will need a totp authenticator app something like google microsoft and what you'll do is download that from the play store app store you'll open it up and scan our qr code once you scan the qr code it will provide you with an authenticated code which will log you into our management console once you're in that management console you can drill into your customers or into your partners you can see the usage the nice thing here is that you can then manage those services for your customers or for your partners so what we'll do is we'll jump from the management console right on over to our backup console what i'd like to show you guys here is that now we have the ability to do multiple hops with our backup job we can replicate to more than one location before it used to be backup local to and then go out to the cloud now we can back up to five locations so create a job we could do the entire machine files folders disks really whatever you'd like to and then we can back it up locally we can back it up to uh you know nas we can back it up to the cloud like i said we can go multiple hops and as the final resting place would be the cloud you also have the ability to set independent retention policies so if you want to have something like seven months in the cloud one week local you have the option to set those independently let me also talk about office 365 right so in addition to back up all of the things that we can back up we have office 365 as well office 365 and g suite are our cloud to cloud agents really not much configuration necessary you click it you provide your credentials global administrator credentials and we'll provide you a list of your users at which point you have the ability to use our group backup plan and group backup plan makes it so you don't have to go and modify these backup plans as your companies or customers have new or old users meaning we hire somebody new we don't have to add them we fire somebody we don't have to add them we don't have to delete them it is done automatically and then we have the ability to go in and do individual resources as well whether that be restoring an email restoring an attachment sending the email or recovering it to maybe a group so with all of the backups that we offer you today we also offer you the ability to restore them multiple ways in addition to that we also have our disaster recovery functionality for you to restore with right so with that being said if your site were to go out you don't have access to your exchange server how are you going to continue functioning as a business let's fail over to the dr cloud all you have to do is click our simple failover button click our console button and log right on in at which point you'll have the access to the original system as it were at that point in time not sure why that's happening like this guys but it looks much better in real life again come and see us at the booth and you'll be able to see a much better demonstration again this is a very very quick three minute thirty second demonstration but please in come take a look at the booth and we'll be able to show you the rest of the cyber security cyber protection services thank you how many people here already using cyber cloud today and offering services on top well once in which we are committed with every release of cyber cloud we're adding cyber protection features but we're also aging since to make it easier for service providers to do business ultimately our main target is to get all of you guys profitable growing and having less churn with our products and sky's the limit on how much we can do and one of the things which we are doing on the quest of our partners since about few quarters will launch a chronic cyber services and i want the partners to pay attention to this offering we have services in these five areas specifically cyber security several services in cyber security such as security assessment security awareness trainings incident response and forensic we will have more services for isv building since together with isvs integrated transparently into our rapidly growing platform with rapidly growing number of partners and workloads which are great channel for you artificial intelligence and machine learning services many of the people we work with especially in the sport industry but other industries considering the efficiency of our product now can keep a lot of data we can help to make sense of the data so they will keep even more data so if you charge per gigabyte or per workload you will be able to make more money blockchain based services another area which we are looking at for five years and we have a lot of expertise in this we actually just recently spin off a company which provides a blockchain application management platform and provision automation platform chain stack and just general purpose professional services not only we're offering it from acronis and this is something which we can jointly sell to your customers but we intend to teach our partners on how to do these services ultimately our partners are the best service delivery mechanism we want to focus on technology and software this is something we are doing today based on demand of customers and partners but eventually we want to make it possible for you to offer these services why we're doing all of that very very simple to provide complete cyber protection safety accessibility privacy authenticity and security stop us in such ways that it's low cost of ownership for the customer it's very very easy to use it's very reliable there is full control and it's always secure and of course not forgetting this it's also providing great margin and great profit opportunities for partners one other thing i wanted to talk about is today and this is much more about service providers and much more about isvs this event than it is about our classical partners nevertheless we are self-serving all of our classical partners and all of our classical customers with the same technology and we are officially renaming on this event acronis backup to acronym cyber backup we believe backup is dead and i can make a stronger statement and some other parts of a cyber security and cyber protection ecosystem but let's focus on backup so backups are not protected backup primarily data is not primary data is not protected the agents are not protected there is down time after the attack and there is no data authenticity guarantee so the backup as you use it you think we have competitors not going to name them here not a good practice but they don't actually have a proper solution that solution works inside the large data center it is private enough inside the light data center it is uh likely authentic enough it is secure on the perimeter and on the network and so on and so forth but once you move out to the edge and move out to the endpoint it's no longer the case so we provide cyber backup which is designed protected from all these five vectors from the start and this is a great opportunity for partners we continue to be very much dedicated to our partners and this is a main type of partners distributors cloud and classical distributors we believe you can sign many more service providers today we have six thousand four years ago we had zero we think in three years we should have 25 to 50 000 partners if you work with us as distributors you can have them as your partner service providers just an opportunity to do more business uh to provide broader set of products resellers and ic to convert to service providers or to sell our classical product i sus to build solutions on top of our acronym cyber platform and leverage our channel distributors and partners to our customers which is almost everybody selling your solution and oems leveraging our technology and one thing which we also want to bring to your partners is not just to be doing well but to be doing good and that's a chronic cyber foundation we truly believe in acronis and all evils are caused by insufficient knowledge one major knowledge which we have to bring to this industry is the knowledge of the fact that every workload every customer everywhere in the world must be protected but besides that we do this good things we build schools we built eight schools to date by building a nine school in uh acronyms we do it together with partners it's a great engagement tool for your employees and your partners we educate inmates in prison as i mentioned yesterday i don't know if there is any people who want to be in singapore prison we can get this organized uh it's a very nice prison it's very very safe in the prison if you really feel paranoid that you're being attacked if you put in the cell there is many levels of security there we also educate with our u.s subsidiary acronis scs veterans and we are starting the program for migrants in switzerland everywhere we are we're trying to engage with the local community and with local industry partners and we do much more so one thing which i wanted to say here i want to invite you to the way to help acronis cyber foundation there is two ways to help so one way is you can participate in a chronic cyber foundation charity reception many of you have had an opportunity to buy tickets we have really valuable gifts on there this is a wonderful cyber feed bike there are three bikes outside which is very important for your employees you can install it in your office and every single employee of yours will work harder and will actually work longer and be healthier will never get sick super expensive watch and other things the other way to to to support us is of course to just do more business if you do more business with us believe us we'll take some of the money and we spend it to do good since like helping migrants veterans helping inmates to find other jobs and building schools and i specifically wanted to stop on the most expensive present this is a present from our headquarter city from a very famous company um um moser which was founded in 1828 it's a luxury swiss watch branch and we're giving two watches away one watch to people who participate in a chronic cyber foundation raffle today how many of you bought lottery tickets anybody anybody okay there are some people buy tickets it's it's a very nice watch and the many other items available and the other way is to just attend enough boosters at the trade floor and then to attend our uh uh closing reception where we're gonna run the the second raffle for those who just been a good uh acronis partners and stay till the end was that a short movie about mozart and about this wonderful watch really amazing one of the best watch brands in the world of dreamers it's about creating products that we appreciate that we're proud to wear it's it's about love it's about passion when i meet the owners of omozaw watches what i realize is not only they want something very unique that not everybody else has but also they want true value product whereas there's innovation ingenuity amazing mechanics and appreciate that so henry moser was an entrepreneur we think that the mail and family are we are also entrepreneur and that's what we like my great grandfather had two talents he knew how to produce watches and he knew how to manage a company heinrich moser went to saint petersburg at the age of 21. czar nicholas the first needed a mechanical piece to be repaired and heinrich moser was the first one and the only one who could do it [Music] what's interesting about entrepreneurialism is i think it's what links us to heinrich mozar the founder of the company links us to our family i believe we are entrepreneurs it links us also to our customers very self-confident people they buying it for themselves it's not to show off it's not to to make a statement it's it's something they buy for for themselves people in this part of the watch industry are not buying an instrument to read time they buy the history they buy the design they buy all the ideas behind mechanical parts if you want to buy something just to read time you are not our customer right so i just want to say that the watch is most complex engineering product built to date and in the old world and and of course we are trying to make our product looks as beautiful as a luxury watch and they are perhaps very complex inside but you don't see that complexity and so if you actually participate you can win but there's only two watches and we are not actually you know trying to exclude any partners so if you just been a good citizen and just go to the trade floor and talk to the partners on the trade floor you will be able to get this wonderful swiss uh card very very useful device you see there are screwdrivers very important for service providers to help your customers right and every one of you can get one just just collect enough stamps we're really nice to our partners and so we will give you this if only possible so cyber protection revolution starts today uh traditional data protection solutions and not only are really that you have to have an integrated solution for the endpoint and edge and so that is the main messages of this event acronis cyber cloud which you can sell today is growing for us close to 150 percent it's becoming the largest portion of acronis business every product of acronis is part of the cyber cloud the three new since acronis cyber infrastructure which is our well-designed from the scratch for protection unique product which is very very easy to use and very cost efficient and very secure acronym cyber platform where you as isv as service provider can uh build new features and make your customers more sticky and satisfy them better acronym cyberprotect which is an amazing and the only proper way to protect your edge and endpoint workloads and of course i want to invite all of you to the next cyber summit we're still choosing the location there is a picture of miami here because i really like miami it should be around end of the year and it should be around maybe november but we're still choosing the location perhaps it's going to be miami already today we're not fitting initially we targeted 300 people and there is many more uh close to 700 which are present at that floor today with over 1 000 register thank you and with that i want to invite our marketing officer and strategy officer guider who will talk more about what we do and by the way i keep forgetting that as a company with dual protection just in case we have these two other stages right so i only use that stage but at that point i realized that i have to go and sit over there as well so yeah we have backup for everything thank you sergey and i won't take a lot of your time but marketing is also important right and the thing i want to talk to you about is cyber fit and you see this cyber fit hashtag everywhere and the reason we have it is the marketing campaign to get the cyber protection to the customers so all of us here we understand the importance of cyber protection we understand why we need it to protect our customers to protect our infrastructure to make money selling cyber protection but how do we get to the customer in this very noisy world like you do a search on the web and then embarrassing ads are following you everywhere so it's like everywhere the ads on you they're people trying to sell you something so it's very difficult to get people to listen to you so what we offer is the cyberfit campaign so first of all we work with the sports partners many of you have seen it many of you attended our events that we do with sports partners and we work with teams in formula one formula e football or how we call it here in u.s soccer we work with baseball we have many more partnerships and that's an opportunity for us to have a very specific case studies use cases with those teams because they all depend on data they all need cyber protection they have very specific use cases that we can advertise and we can talk to our customers about them and there's also emotional connection through the sports we can engage more people and can get time on their schedule to listen to us and to understand our cyber fit campaign better understand why we do cyber fit when you talk to a customer you tell them to be fit in the real life you do fitness so you can live longer you can be healthier so to be okay in the digital world you have to be cyber fit so that's the campaign that's what we explain to people and all those sports benefits are available to our partners so you can work with us you can reach out to the marketing team and we can do joint events we can do joint activities we have all the content available to you as well so you can promote acronis and cyber protection and cyberfit and what's in it for you so that's the way to differentiate in this noisy world noisy environment you can talk to customers you can tell them be cyber fit that's the way to educate them to talk to them and at the end of the day to generate the pipeline generate leads help you to renew the customers that you already have to cyber protection and also upsell the new services to customers because you do good to the customer they all need those services they all need the cyber protection and you offer them what they need that's a perfect fit right so at the end of the day those five vectors of zappas they actually target to the end customer the customer you customer you have a copy you can access your copy it's a private copy you have control who has access to it you are absolutely sure that you have the regional copy and of course it's secure copy so that's something that everybody needs and you have this campaign to get customers to understand it and just to illustrate that it's very important not only for us but to our customers our partners our friends to talk about it it's not only acronis talking about cyber protection important importance of being cyber fit uh i want to invite a very special guest an off council of the law firm greenspun and martyr and also the mayor of the city of miami mayor suarez please welcome good morning and uh welcome you all to the 2019 cyber summit uh cyber protection uh is something that is incredibly incredibly important to cities many cities have small it departments but they're managing very large volumes of sensitive data data that protects our residents their security and the viability and the effectiveness of how our systems function since 2013 we've had at least 169 ransomware attacks reported in the united states and that involves both cities counties and states as targets just recently in two in june of 2019 june 27th lake city had a major breach where they had to pay a 42 bitcoins as a ransom riviera beach is one of the most famous ones the riviera beach hostage situation key biscayne is another one that has had to deal with major attempts to infiltrate their system and we've had police departments in illinois maine massachusetts and tennessee that have all had major tech breaches in addition to that baltimore had to spend 18 million dollars on a recovery for a ransom of 800 000 and of course everyone knows my good friend in atlanta mayor keisha lance bottoms who had a major issue as well they're not only something that is on our radar screen the intrusions like phishing zero day exploits and other types of malware and more are growing concerns to all kinds of leaders not only from local governments but from governments across the nation and of course in the international community when a public sector organization lacks proper cyber security protections like a resilient backup recovery software segmented networks encryption and multi-factor authentication it becomes unnecessarily vulnerable to attack governments face unique and serious consequences including costly downtime loss of sensitive data and interruption to critical citizens services they stand to lose the one commodity that they can't lose which is the trust and confidence of the people that they serve and i can tell you that as mayor of the city of miami everything that we do is becoming much more tech focused much more tech oriented i can tell you that one of my major initiatives this year was electronic plans every single plan that is submitted in the city of miami for every single permit every single building is on an electronic platform that's not the way it used to be that my next initiative is called e-start we want to be able to start a business in the city of miami which is number one in the nation in entrepreneurship number one in the nation in job creation and number one in the nation in small businesses but we want to make it easier and better and we want to do that through a platform that we call east start e-start will allow every business owner in the city of miami to start their business from their cell phone but of course if we can't protect that data if we can't ensure that our residents can rely on it when they decide they want to push that button and start that business then what good is that platform and so for me it's a huge honor uh to present sergey with this salute and to declare today miami cyber fit day in the city of miami thank you thank you thank you thank you very much thank you for what you're doing for us thank you thank you so much yes all right let's hold it there we go all right let's go let's get the branding let's get it granny's important how are we talking here we got it so i think with that we're going to conclude our talk i think we heard from the mayor one thing which is critically important and suddenly all of us being an i.t business have this mission to provide protection for every workload and every customer and and so having a cyber feed day is something which is happening in miami but it should happen in every city everywhere in the world it's really important to be cyber protected
Info
Channel: Acronis
Views: 9,942
Rating: undefined out of 5
Keywords: AcronisSummit, CyberFit, CyberSecurity, CyberSecurityAwarenessMonth
Id: FEVtG1d_9Jk
Channel Id: undefined
Length: 98min 7sec (5887 seconds)
Published: Mon Oct 14 2019
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.