Acronis Global Cyber Summit 2020 - The Future of Cyber Protection: Serguei Beloussov

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
please warmly welcome to the stage ceo and founder of acronis sergey belusov [Applause] oh very glad to be here thank you everybody uh it's the first time we're giving hybrid event there are some people here looking at me from this wonderful studio and there are some people online and so i will be talking to the audience here but it's really to everybody who's listening so this is our headquarter in singapore but as we know today the world is rapidly becoming digital you know we used to see pictures like this believe it or not um in the future many of our children uh will see only digital pictures like this and we are talking to you from the wonderful shaft housing which in real life looks like this but our headquarter now looks digital for most of people and even many of our employees executives were not really able to come here even though they were planning to just about a week ago and so digital is what is becoming very solid and unmovable and physical which seem to be so solid becomes very much uh virtual and unreal and changing all the time and so now about acronis we are we are here in 2020 we are growing our new offering cyber cloud very very rapidly we are present in almost every fortune 1000 company many times when i speak i'm asked if we are present we are present in all those companies mostly in on the end points on the edge deployments and remote offices in factories in specialized locations we only do business with partners over the years 50 000 partners we sell to everybody we do not distinguish where the beats bytes applications and systems and workloads what we call all of that combined come from and so we also work with 5.5 million consumers we're not a small company we're not a huge company yet we're about 1.5 000 people we're based in 30 over locations for this event i stopped counting locations because number of locations is growing very fast but all these locations are really virtual so a lot of people work from home we are doing business in 150 plus countries which is evident from just registrations to this event 135 countries were identified really clearly and we are supporting certain languages of course the main language is english which is a language of this event but we actually simultaneously support and we are committed to deliver support in more languages in the future we believe it is becoming basic need and as it is a basic need you need to speak the language of the user this event has been challenging for us in many respects and so we have a lot of very valuable vip visitors 9 000 people registered 135 countries first of all before i start i wanted to thank our sponsors especially the our top sponsors we have several more top sponsors premiums persons this year godaddy ingram cloud scale computing pax 8 channel solutions intel and shareweb thank you very much we hope to do a good job for you and deliver value with this event and again this year is very very challenging for us so one side we have nine times more people registered you know when you're growing a company like acronis you still mostly based on physical species which are called people it's very difficult to multiply people nine times we have 135 countries versus 57 last year we have 128 speakers versus 74 last year and we have 93 sessions versus 46 yeah last year so you know number of speakers number of sessions number of countries have grown in a reasonable way but number of people who attend is really growing too much and of course we have more sponsors as well i also want to say thank you to our cyber feed partner of arts winners we are very proud to have them as our partners you know most of our great partners are growing over 150 per year for us the partners who are growing 50 are satisfactory 75 percent are good more than 150 percent are great and most of these guys are growing as much as great of course we also i recognize that leaders are different between different countries and this is our regional leaders we continue to believe that the right strategy for us is to be global local we're a global company with very strong local presence protection is something which has to be at your home so what this event uh what is in this event for you so it is about future of cyber protection and we believe this is the main audiences one of the challenges of virtual event is that you have very very broad audiences and so we have service providers which is our main audience and for service providers we believe cyber protection is an amazing way to continuously interpret your story and build bigger businesses with more value cloud distributors and aggregators most important thing about cyber protection is that you can get much better margins and with anything else you sell today and that you can sign a lot of new partner service providers which is the future icv and developers uh can get access to rich ecosystem and to the channel of cloud distributors cloud aggregators and service providers software resellers and classic distributors we see especially this year that the classic business a perpetual software business is really slowly and rapidly growing away dependent on the segment the future is service provider service provider is a way to go and so what we are committed to do is to help every of our service provider partners to convert to sorry every other classic partners to convert to be service provider this is super important if you want to sustain your business if you want to stay in business in the next five years especially and then of course we have our long-term friends and supporters i.t professionals and business owners and we really want to convince you guys that cyber protection not data protection which which is what we've done in the past seven years ago but cyber protection is the way to go is the only way for you to make your it work and in addition to that the service providers is the best way to run your rit operation relying only on internal i.t in many cases will not scale perhaps you can keep internality for your core data center operations and core applications but supporting variety of workloads on the age and endpoint you need service providers that's just a better way to go so this is a sort of a vault of the present right so there is a guy somewhere in the server room who maintains the server infrastructure the bunch of guys in other places and reality is that just before the pandemia if it doesn't work we get frustrated but we can continue to actually work with um condominium we know without i.t we cannot go on and so we believe digital workloads require protection and there is this five challenges complexity there is too many workloads in too many locations especially with remote workplaces we're talking about billions of locations for devices and we're talking about tens of billions of devices we believe today at least five billion deserve proper protection uh high cost if you pay per device or per gigabyte and you pay legacy prices which are probably five to ten times higher than the proper prices you simply will not be able to afford to protect all of them or to protect all of them in full security is just something which is required for every device including your tv including your refrigerator including whatever you have in the office and something which happens cyber crime is industrialized and it become really cyber you know global economy is 80 trillion dollars crime industry is four to eight trillion dollars five to ten percent of global economy only 10 percent of of of crime criminal industry is today's cyber crime just 400 billion to 800 billion dollars a lot but the point is it can still grow much more because as as uh the criminals realize that cyber is the way for them to sustain these criminal enterprises they will actually move cyber and so we're talking about potential of 5x growth in a cyber crime industry and as such huge 10 times 20 times 30 times growth potential in attacks privacy i think this is a tremendously misunderstood and underestimated issue nothing in the world today is private everybody is looking at your information everybody is trying to leverage your information to manipulate your behavior in variety of ways and then finally again you cannot live without it so not only all of these are challenges to protect it you just have to protect it because without it this conference will not be possible and so we believe the only way to protect your i.t is with integrated and autonomous cyber protection and this is our mission to protect all data applications and systems whether we do it ourselves or show example to the industry believe it or not in five years everybody will talk about cyber protection not cyber security everybody will talk about cyber protection not data protection cyber protection is the only way to go and the difference is that it's not just about safety and it's not just about security it is about safety nothing gets lost it's about accessibility everything's accessible at all times and and works at all times for your benefit it's all about privacy where you can control what is access and when it's about authenticity making sure that what you see is real you know in the physical world you can touch things you know when you're a child you don't know what is and how and you learn over time but it doesn't change that much in the digital world everything you see can actually be modified and with the achievements of ai can be modified in real time how do you know that the documents were not modified how do you know that the internet has not been modified just for your benefit and then finally security protection gold based agents all of this have to come together and with pandemia we especially learn that protection is not just about detection and response protection with biological threats it's prevention detection response recovery and forensic you know very simple since prevention most of you here are wearing masks i'm not wearing masks on stage and but otherwise these five simple synths there are enough to decrease the rate of sick people and dead people by the factor of one or several magnitudes especially with social distancing testing is very important even today tests are not really fully available here in singapore sorry here in switzerland in singapore you can test yourself in several hours you can get the result the same day you can take multiple tests here it takes 48 hours and time sometimes 72 hours it makes no sense i get sick well i feel maybe i'm sick can i test well i can test but i'll get the result in 72 hours makes no sense it needs to be much faster then of course um of course response and response is a protocol of how people are being cured and in countries where the protocol is correct where people use the right cure in fact the death ratio is very small in my country in singapore uh we have 28 people dying out of 60 000 people sick you know that's a ratio which is probably the best in the world and that is because the protocol which is used for response and for recovery which is super important is correct one in singapore people are recovering only inside special facilities and finally forensics super important as well without forensic you cannot really do anything of this and again if you do a good job with this simple sense prevention detection response recovery and forensic all together that is when you get protected against the viruses any viruses you know in fact being sick with anything is not good being sick with flu is not good you can actually die from flu as well and so the same comes with digital threats and with cyber protection we just need to provide it to you in an integrated and so on that point i just want to stop on the fact that backup in my opinion is that just wanted to show you this short video phil he might be okay well no probably not now [Music] the point here is backup is dead but at the same time long live backup backup needs to be part of cyber protection and the first thing about acronis cyber protection and acronym cyber protect it is a better backup what one thing you will learn from this speech today is we are going to discontinue backup as a separate product what we realized is just not enough to do backup backup needs to be proactive it needs to include vulnerability assessment patching configuration management it needs to deal with security and needs to work against security it needs to be active why to wait for something to fail to find out and then to restore then it needs to be not just breaker backup by itself is no longer possible you need to include instant automatic recovery and disaster recovery is really a feature of backup it's not a separate product or separate category it has to be as easy to do disaster recovery as to the backup waiting several minutes several hours especially several days for your it to go back up is not right and it needs to integrate with the rest of your tools because if it's not integrated and in that case you will have challenges to manage it and so again it needs to deal with productivity and efficiency because you're talking about very large number of workloads very large number of workloads unless you can be efficient you will not be able to afford or will not be able to configure because it's too complex and so that is something we believe is very important for us and we believe there is a huge opportunity for us to still continue to improve backup with cyber protection it is now a feature of cyber protection backup is a feature of cyber protection disaster recovery is a feature of backup and this is our investments again i i want you to believe after my speech that we are discontinuing our investment in making sure that your data is safe and accessible your workload is safe and accessible and so we'll support containers cloud applications will work on data management data management is already part of acronis we already have search across much of the data we will enable full search in all of the archives in the next three to six months and and then of course uh backup needs to be more than just backup we believe archiving is part of backup you cannot do backup without thinking what you do with all backups with all data because all data is both an asset and a liability and disaster recovery it's also a part of the standard data and finally it is not about just some workloads you have to be able to protect all workloads and our commitment is to grow from 26 workload type supported today to about 100 and 20 22. and so with that uh we are proud to introduce the full product acronym cyberprotect which is only product available today on the market and that's how it is super innovative way to do protection it's only product which offers all-in-one protection in a single product so there's five challenges of protection complexity cost security privacy and the fact that it has to work at all times the basic human need five vectors of protection which is really safety accessibility privacy authenticity and security five stages of protection prevention detection response recovery in forensic and doing it in a single product enable these five benefits which are really requirements making it easy to use low cost making it very very secure at all times keeping control in the hands of users especially with protection partners and customers want to keep their control and making it work at all times only when you have an integrated product only when you have one product with one agent single agent single binary not multiple binaries one policy which you set up for protection one user interface one license and and it comes from one vendor only then you can have a full protection from your workloads only then it could be really easy for especially smaller environment a smaller deployment but also really a large deployment at scale to be protected and so with that we really achieved something which i have never had in my career where we're really a company of a single product so single product for customers acronym cyber protect making protection available for on-premise and and and and cloud service providers and so it's available in both modes our commitment is to all of our partners acronis cyber cloud which is our way to engage with partners and customers today it is used by cloud distributors cloud aggregators and service providers in the very near future it is going to be available for classic distributor and classic partners as well and it will allow to manage and automate classic licenses along the way with a cloud licenses so you can actually have unified view of your customers if you do both classic and cloud this is all based on acronym cyber platform which is just the way which enables service providers and acronis other partners and developers to extend cyber protection for customers of cyber cloud for our channel cyber infrastructure which is our proprietary protection built infrastructure which makes all of these three things very very efficient and i'll talk about this later and the number of services which we provide to make it work ultimately it's all about one thing about acronym cyberprotect so this is a scary screen um this is a clop ransomware you hope that you haven't seen the screen before any of you have seen the screen on any of your computers okay well you know you can see it at any point this is nice screen so they they this ransomware vendors they evolve so they actually hire designers now you know that that is not built by an engineer so some designer actually designed it so it's easier to read and your network has been hacked you know remember renee in his speech spoke about the fact that you have to have poverty of reinforcement so i think the ransomware people also realize that they should not scare people too much because really if they have been nice and polite and perhaps they can get more and the point is that this is something which happens to everybody so software ag was hacked with klopp just just recently in october this month right would would you imagine soft regis a technology company i'm pretty sure they have very sophisticated cc so this is san rafael hospital in currently was hacked in may 2020 right with with uh with uh with what with well some data stealing attack cma cgm in france uh this uh shipping giant was uh hacked with ragna locker ransomware again it happened just in september aeg a jg in in the united states had a problem with 22 ransomware groups at the same time and argentina border control you know there's not so many columns here but i can continue forever was just having a problem with network ransomware in september 2020. so one thing you should ask yourselves why did they have it did they not have security i mean all of those are large companies did they not have chief security officers and the fact is that they did and they had chief securities officers nevertheless they had these problems if the all of them were you to use acronis they wouldn't have any problem at all so this is the challenges of which um are not the challenges for customers but the challenges for partners and the challenges are very very simple the threats are just happening too often and the surface of attacks is too large and so security right now for service providers is no longer an option many of our partners today we have 8 000 service providers as active partners which are doing significant amount of business with us many of them are sort of realizing that security is not just an add-on feature attacks happen every day you have to have it and when you cannot stop the attack it's you service provider who is responsible security is a very complex topic security just like curing covet is not just about having some magic cure some special vaccine as a special antiviral drug it is about following complex protocols so you have to really train your ite professionals your technicians and many of msps have really very simple technicians to be able to manage security the attack surface is growing very very rapidly and the problem with that is that you can't really sort of protect one portion of the surface you have to protect the whole surface because if there is a hole in the surface anywhere just like with with a hole in the plane that's not going to be very nice so the whole cannot happen anywhere for example garmin who is our neighbor here in shaffhausen they were hacked in one or several workstations i think i believe they have 14 000 employees or something like that just one call was enough for them to be hacked and under friends i'm not going to go into details but um that is just right inside the threat that's the major major threat if you think about it most of attacks of the present and a lot of attacks most vast majority of attacks in the future happen because of the insiders the the weakest link in any infrastructure is not really security tools it's really humans it's really your employees and that is especially a major problem for service providers themselves because their employees may be a source of the attack on their customers people have this wonderful feature given to them by god which is called free choice so today they may be good guys tomorrow they may become a bad guys and so they can just change and then threat automation that's another problem threats become very very inexpensive organizing sophisticated socially engineered phishing data theft or ransomware attack you used to require a significant number of people today it's an industry which is highly specialized you can buy components from multiple places you can get automatic ai engine and it will configure the attack and it will engineer the attack even though you attack a small business attacking people for even several thousand dollar benefit it's not so bad anymore so when we started doing security and this was seven years ago about seven years ago i became ceo of acronym seven and a half about maybe six years ago i realized that we need to build cyber production and from that point we started it took us much longer to actually build a final product we made an ongoing research of security industry this is our internal picture which is initially started from a 10-page powerpoint which ended up then 250 page powerpoint with description of different parts of the industry and this is just parts of different security solutions which you can actually install in order to fill protect large enterprise this is research by ecg that 78 of organizations use more than 50 different cyber security details okay and 37 use more than 100 cyber security tools well okay you might be actually running a small msp and you might think well these guys are crazy right i mean this is a messy large businesses they don't know how to run their infrastructure they have too much money well unfortunately that's not really true the reality is that if you were to protect your customers you might as well need to use as many tools is it really even possible even today it is difficult even today every msp in order to provide protection use some kind of antivirus plus plus and it's typically not one because there is different for different workloads different for different purposes different for servers different for clients then it has to use some kind of network security some kind of firewall plus plus again it's usually multiple right and it's managed in a separate way and one way is not connected to another it uses some kind of backup and disaster recovery and some form of archiving for different sense and and then it requires different management a lot of the management is focused on security and so i would think average msp even though it is small would run probably more than a dozen different tools for security and protection and there is other tools which are needed and some workloads such as encryption forensics access management and so it's really a messy solution and as you've heard from rene at the end of the day the main problem was that it's not that it is complex and it's not that it is expensive it is simply that it doesn't work because it's difficult to configure and unique thing about acronis is really due to integration we provide all of this together not only just because of the integration we also can afford to build number of unique features so this is just some example of unique features which you only get with acronyms so first of all automatic instant recovery very important do you have it in other tools against ransomware well yes you do but for very small amount of data 10 megabytes for some 100 megabytes for some other if you don't catch the ransomware which could be very sophisticated before it encrypted 100 megabytes 100 megabytes is nothing i started my way in i.t industry in 1992. i still remember installing 20 megabytes hard disks in my computer right now i have eight terabytes what is hundred megabytes on my hard disk there's nothing this presentation is 110 megabytes it's also version 78 my team actually run a ongoing test what's going to be larger the version of the powerpoint or the number of megabytes in it but in any case we have backup so we have automatic recovery no matter how much data was actually encrypted and it is automatic and it's seamless it took garmin 10 days to go back to normal 10 days probably 10 minutes okay unpleasant but it's kind of okay then we have forensic data and backup nobody else allows you to store forensic data and backup without forensic data you would never know for sure what happened real bad guys and by now it's an industry with four to eight trillion dollars of global revenue in criminal and 400 billion to 800 billion in cyber revenue this is an industry with very sophisticated people they know how to hide their tracks and so unless you store the information not just the data from your computer but information from memory of your computer and everything else you would not know what happened and as such it would happen again it will just wait a little bit and then application protection another thing which is super important really the protection goes down to the application level you cannot as you heard from rene you cannot really disallow everything to work on your computer and things do not happen on system level anymore you have to think about what happens in the application we already today support many applications specifically for support many collaboration applications uniquely zoom and webex and teams and believe it or not every collaboration application is not designed for protection it's designed for collaboration as such it is unprotected and then of course our protection is many many layers so we would have successfully prevented a wasted locker attack on many many layers this is just um uh you know it's just uh uh an example of how many layers so anti-malware engine which we have built and is part of cyberprotect would have stopped it even in case it would have passed it would have been stopped on ai-based uh ai-based static analyzer behavior angel rollback engine will also allow to stop it in case it would have actually done any damage to some unpatched or unprotected or misconfigured workload you would still be able to restore automatically from protected backup and the backup wouldn't have been broken so again our neighbor if they want to use acronis they wouldn't have had the problem hard to believe but it is true with with a you know with disruptive innovations like across cyber protect you get amazing results by just doing things together this is multiple five different ransomwares which happened recently all of them are less than um several well less than one year old i mean can you all of them are less than one year old acronis is the only vendor i mean these are big vendors big defender cloud strike kaspersky microsoft sentinel wall symantec trend michael weber all of them would have missed one ransomware and it's enough for you to miss just one run somewhere to have a problem because you're constantly attempting to be penetrated by all of them because you know you would think okay c-lop there must be some people who penetrate me these are seal of people no help is just a tool there are so many different groups which take this tool and which use it against many many customers so you have to be protected against all of them and we are the only ones who do it and that is because again we have multiple layers of security we have signature base detection which is a definitely necessary definitely the fastest way to detect scenes which we were able to put in and definitely something which is useful because just like with with new tools people will try all tools as well so you have to have it you cannot not have it then we have very very strong static behavioral analysis which is actually built by us and it catches a lot of things uniquely we have very strong real time threat detection you will see it in a candid game i'm pretty sure and dynamic uh behavioral analysis and prevention is also part of it this is the core of our offer long term we believe vast majority of threats have to be called automatically by our ai engine and we work very actively with the community we have hired experts from top security companies and we engage with top security alliances and we actively share information and we have a lot of unique information which nobody else has in this industry and because of that even though our solution pure security part of our cyber protection solution is only just four months old we actually shipped it in may we are already actually part of top tests and top uh security alliances and we got top certifications our goal is to be in top three in every of those tests you know we have many newcomers to the security industry which are sort of um you know deny the importance of this test like i don't know companies like crowdstrike for example we believe that it is important for us and for msps who are our partners and for the customers to for us to be number one in those tests because security needs to be verified and it needs to be verified by third party and and that's the only way to go and you know whenever we participate in competition we definitely need to be in top three on number one and not only it's important what we have now we continuously invest not in cyber security but in cyber protection we file more patents per capita or per employee than any company in the industry starting from the point when the new team came to run acronis back in 2013 these are the five areas of our investment so first of all is self-defense we believe the most important thing is for you service providers and for our solution to be protected against the bad guys we are somebody who need to first of all be protected not harm our customers but also we need to be protected by ourselves because we need to not harm our customers also with our employees and with our solutions then smart sensors we believe in collecting information from hundreds of millions or potentially billions of different data sources to be able to analyze it and with our backup integration uniquely analyze it over a long period of time to uh provide better protection then automated forensic we believe without forensic you cannot go on you have to do forensic you have to know what happened and that does not relate just to security problems it's also relating to safety problems privacy problems authenticity problems accessibility problems you need to know what happened but because there are so many problems there are 300 000 viruses every day new viruses every day there is so many mistakes in your workloads in applications and systems you have to do it automatically we also believe that it's no longer good for something to be down for several hours so disaster recovery needs to be part of every protection it needs to be used for security you need to not have more than several minutes downtime in case problem happen it doesn't matter whether you're a small business there is no reason to believe that small business cannot afford its id to be always up and finally we invest heavily in autonomous protection we really believe that protection has to work with and without us with partners and without partners with connectivity and without connectivity and it needs to continuously enhance itself anything static will not work and with that i wanted to invite to the stage our vp of cyber protection research uh kanjid woost who is actually based in drafthouse and nisa originally for shaft housing prior to acronis he worked for 19 years for a four semantic in elite research positions and and analyst positions and so he will show a dm of acronym cyber protect thank you welcome thank you sergey and also hello from my side to everyone so i'm really excited to show you the key features of the acronym cyber protect and of course as turkey knows i could talk for hours and hours and i don't want to take away the time so i definitely recommend that if you want to see more go and talk to our experts get a demo have a look and feel of it because there is a lot more that you can explore also if you're watching this as a stream at home i recommend go to full screen so you can best enjoy the demo and with that let's switch over to the console of acronis cyber protect so first let's talk about what you see if you log in you get the nice overview where you have all your workloads your different devices you can see the last alerts maybe there was a missing patch maybe there was some ransomware detected everything that you need to know to get an overview and of course you can customize it with your own widgets so that the information which is most important for you is visible if you go to the devices you can see the cyberfit score which is kind of like a risk score giving you the most kind of endangered devices inside your network and we also give you a recommendation how to increase it by installing encryption by having a backup and so on but let's go to the cyber protect plan which is kind of the hard here you find the backup so full disk or just some folders you have continuous data protection which means whenever an application like an office application creates some new device or some new document it will automatically be added to the backup also of course you can schedule if it's encrypted and so on and you can add additional features like the forensic backup that sergey was mentioning so we will take a memory dump at the time of the backup and store it with that data if we go to the security side yes we do have our active protection which is thread agnostic so we don't care if it's wasted blocker or clop we will block it and we also have the self defense to block our own application and all the backups from being deleted or manipulated we also have the behavior-based detection going after what's happening and exploit protection against any zero-day exploit so if there is no patch available we can still protect the application furthermore we have url filtering so we can block malicious urls if you go somewhere and kind of phishing website or come out and control servers but even in addition to that we can also do category filtering so maybe you want to block gambling might make sense right so you just enable it and from now on it is protected or blocked we also do vulnerability assessment and then patch management not just for microsoft applications but also for third-party application and of course you want to make sure that you're always protected so this is all inside one console in one plane you don't have to move to different consoles 10 different consoles making it very complicated you have everything here so if you go back and i already did a vulnerability assessment on my devices you can see a few missing patches so i could now go and say i approve it for all of my applications or i just deploy it on one server just to check if it's actually working and if not i can restore the backup which is automatically created before the rollout of the patch if we go back to the overview we also have a thread feed with smart alerts so this cyber protection operation center has analysts 24 hours searching the internet for new threats uh natural catastrophes and then giving you recommendation what to do maybe do a backup maybe do a scan and here we actually see one of my machines had some alert right so maybe we want to investigate further and see what did actually happen here so let's click on it it comes up with the activity that we had like was it scanned when was the last backup and so on but let's have a real look at the machine so we can actually use our secure remote connection to connect to that machine it's not exposing any rdp servers to the internet and all the bad guys but it's using our secure connection through the agent and now i have secure access to my remote machine i can interact with it i can check is the active protection still running is the agent still running here i see that yes it is still running and it's also protecting the webex right in addition well you could interact right and what would happen if we accidentally open one of those attachments it only takes one employee right to open one of those and as you can see by the green thing a lot of things are happening in the background because this is actually wasted locker it's now trying to delete my backups it's trying to shut down my security product and encrypting the files but as you can see the files are still here so was i just lucky of course not because in the background we see that acronis cyberprotect has blocked it just by the behavior of it and restored any file that was already tampered so you as a user you don't need to interact anything restore anything it all happens automatically without any data loss and even if it wouldn't work well you still got the backups right so you can go back to the backups and we also scan the backups for malware so before you restore anything we actually remove the malware so always if you restore you have an up-to-date and secure new machine to work with or you can spin it up as a virtual machine so it's very simple to stay protected on all of the level it's more than just backup it's more than just security it's a cyber protection integrated solution but let's say maybe we want to investigate further right so maybe the root cause analysis should be done because the well we want to know how they get in right so we can do the forensic analysis we can go back to the backups and instead of restoring we now take the forensic data that we acquired with the backup and this is something that your typical edr mdr solution will not offer we have the memory dump we have the running processes all at your fingertips so this is historical data that you can go through all the different backups finding out what actually happened and what was on that machine so if you open up for example all the running processes at the time well there are quite a lot of course but just by looking at it i see at least for me one which is suspicious it's an svc host with a zero instead of an o so that is definitely strange so let's have a look with one of those open source memory forensic tools like recall or volatility we can load it up we can do a scan for what was the active network connections at the time and you can see there are two outbound connectivities to some ip addresses which i don't recognize so maybe we should investigate further again we can do the process listing finding out yes the svc host with the zero still there so it's definitely something but what was it well since we have the whole data we can actually dump the binary from memory recreate the exe the binary and then do some tests on it for example on virustotal which is a free online scanner with multiple scanners giving us an idea well what was it and we see acronis of course detected it no surprise but the surprise is why wasn't he detected on the machine well since i have the backup i can go back to the configuration of it and check the configuration and yes unfortunately i see someone created an exclusion for the whole c drive so all the alerts were ignored was it an insider or just a bad sysadmin definitely something i should check out but if it's a critical system well i want to make sure that it's always up and running so let's look at disaster recovery if you're an msp you want to make sure that your customers they don't have any downtime at all right so if we go down into let's say one of your tenants one of your customers we can check again the protection plan where all the protection for security vulnerability assessment and also backup is happening it's the same place where we also configure the disaster recovery so at this place we can check yes we are doing a full backup of the machine which is required for the disaster recovery and then we can say yes we want to do automated disaster recovery which means we will automatically create a virtual machine in the background you don't need to configure anything like cpus or network card and stuff that's all done in the background automatically for you so if we would now actually do a failover we can go back and say yes we don't want to test it we're proud right we're gonna do production live failover and just like this we already started spinning up a new virtual machine in the background with the lost backup and within seconds and not 10 days right we're back up and running and you can actually verify it by connecting with the remote agent to it and we see the machine is already starting up and we can actually log in we can also have a look and see that our local environment was expanded through a secure vpn to the cloud where those two machines are up and running so you don't have any downtime and if needed yes you could even download the virtual vpn appliance locally or have a point to site vpn download it maybe for your sys admin to start working and updating something so in two minutes you're already up again no downtime so no cost that you need because it's all automated in the background very important to stay online and to stay healthy and with that back to you sergey thank you kanye and the most important point of all of this this only works if it's super easy and the other most important point it is not for large enterprise it is not for expensive server or large virtual machines for every virtual machine for every server for every company for every home that is what is required for us to continue with cyber wall with that i wanted to quickly cover several other areas so one of them is a chronic cyber cloud and you know i just want to point out that out of all people in this industry i'm one of the people and my team is one of the teams who work in the service providers for a long time exactly 10 years ago i had the first large parallel summit in this wonderful fountain blue miami beach hotel where we were supposed to be right now actually you know imagine that tomorrow is the birthday of my daughter which was supposed to be in switzerland i was ready to go to miami and not be present at the birthday but because of covet i can be together with her and not there and so back then in 2010 we had a summit where we talked about profit from the cloud and with these company parallels we built number of cents which are used by every hosting company in the world parallels basically built a complete set of tools for service providers sold to almost every hoster and every telco audience is something which enables perhaps five billion dollars of cloud revenues we sold it to ingram which is the core part of cloud blue many of the people connect to it many of the people use it as a third-party service or third-party product virtuals are perhaps less known but it's a part of every linux server it is the code which is underlying linux containers the containers which is used by everybody for kubernetes that's a code which is created by us patented by me and my partners and today it runs perhaps a small number of five million virtual machines and players depend on whm yes any of you use plastic on whmcs here no people using cpanel plus car no service no hosters but uh almost every hoster in the world hundred percent and fifty percent of all websites and besides that jelastic welfare act with cloud linux were all built partially by the team which is behind acronis just want to remind you of this part of the service provider market web hosters evolution started 95 probably about the same time many of you started msp businesses and it started from shared question it's evolved to higher end dedicated vps question by approximately 2000 and and you know it's still selling a lot of dedicated vps and it went to email an application hosting in in five years you know open exchange wordpress microsoft hosted exchange for applications which were widely sold then by 2010 that's a profit from the cloud simon that's actually you would be surprised is the first time uh parallels officially endorsed cloud uh is uh when the company switched to um to the cloud hosting you know one of the famous player software is actually a core of ibm cloud offering it's a company which was bought by cloud what is important for our service provider partners which is our main audience today to remember is that really the main source of income for founders for mergers acquisitions and ipos so some lucky ones when public vast majority of those who made money in this business who are today my partners and my uh my uh my my partners in business and investors are actually made money through acquisitions and so many of you should think about the future of your business in that respect so what happens in five and ten years at some point you will get older at some point you will get an opportunity how would you be able to sell the business and so with that we noticed several things which made service providers successful and we bring those sins complete automation is a sort of underlying word for it to make hosters uh make expertise which is coming from hostels to be applied to msps and we see the future of acronym cybercloud as really these five things so first of all delegation super important we don't want to build the business which is designed for certain business model we support oems we support white label distributors for support cloud aggregators we support service providers and service providers can have service providers who then sell customers delegation is super important at some point back in around beginning of a service provider era in the late 90s ibm have published an article where they said without delegation you cannot build service bureaus mass management another thing which is super important nobody in the hosting industry were able to succeed because without mass management in hosting industry you're talking about very large number of customers typical hosters deal with tens of thousands hundreds of thousands or millions of customers in the msp industry you will deal with very large number of workloads believe it or not every user will have around 100 workloads so even the company with just 10 users may end up having 1000 workloads and so if you have just you know hundred customers that could be a hundred thousand workloads without mass management and each workload actually has multiple applications without mass management you cannot survive and that's something which we will provide heavily and invest heavily in cyber cloud already doing it today automation super important this is an automated surgery by davinci surgery place the point of it without automation you cannot achieve efficiency efficiency is super important and so you need to automate all of your business processes you have to be able to do more with less people cost management one of the things you do for customers you manage their costs today service provider industry is growing msp industry is growing at 20 to 30 percent and really there is not as much pressure on competing on costs much more competition is on quality however you have to remember that cost management is not just about giving your customer a best price it is also about spending more money on marketing and getting more customers and only at scale you will be able to sustain your customers and if you don't want to grow it is also about providing better service so managing your cost is super important and you have to do it with a single system and finally integration that's the only way to achieve those benefits so with that i switched to the second part of of things which support success of cyber protect which is acronis cyber platform and so we believe that the only way to be successful is to provide an integrated sophisticated but fully integrated offer and so why integration first of all if you don't have integration you cannot achieve security security most of the time relies on humans who can figure since incorrectly or misconfigure since on purpose then you have to be very efficient so without integration you have to manage multiple tools multiple situations with multiple vendors coming at the different times and so you cannot really manage a lot of workloads or a lot of data per your technician then avoiding human errors human errors is still the main reason why things fail human error is the main reason why planes fall off the sky and why traffic accidents happen and only with integration you can minimize human errors reliability something which everybody strive here reliability is something which gets you to have a headache of your service provider because that is when you get an angry customer call reliability can cost you lost customer reliability in a service provider business can also cost you lost money because the customers of service providers can actually sue them and get the money back and finally scalability very important if you want to scale and become as valuable as godaddy or softlayer which are all made their founders billionaires and again when i met those guys in the early 2000s 2001 2002 2003 not many of them even thought they could be multi-millionaires but they ended up being billionaires because they were able to scale their businesses and with that we are not approaching it in a simple way in many companies in the space have went through providing and integrated products well integrated offerings by buying a lot of companies but keeping the products disintegrated we built a chronic cyber platform an acronym cyber platform based on a very special very unique integration technology called acronym cyber bus which includes acronis cyber mesh acronis cybersync cyber workflows set of apis and many implementation examples enabling us enabling service providers cloud distributors cloud aggregators and isvs to actually integrate in such way that for the user of the product the msp technician or the customer it looks like a single product and so why cyber platform first of all it includes integration technology which is very very unique it is the product which is built on integration technology it is also something which we built into business platform not just a platform for integration we intend to help our integration partners to build their businesses to grow their revenues through their third-party extensions and so on and so forth in addition to that with a chronic cyber platform we specifically focus on top msp managed service providers software vendors cloud service automation vendors like cloud blue and up direct um rm vendors like the people here connect wise attera ninja solarwinds casia professional service automation vendors we intend to provide top 15 of the msp software vendors integrated either by them or by us and top five for every geography very important that we only have 40 of our revenue coming from north america so for us having an integrated offering in italy or spain or switzerland or liechtenstein or austria or poland to czech republic is equally important and many of these top vendors from the msp software are different between different markets then finally we believe that our platform needs to be as easy as our product to be usable by service providers our main extension integration and customization partner is service provider which can leverage the rich ecosystem on top of the uh ours acronis cyber platform to extend their offering to make the churn less to improve the efficiencies and so on and so forth and one other thing which is very important we have announced already two acquisitions this year we actually intend intended to announce several more on simon they are actually processed but we couldn't announce them for technical reasons we will probably acquire a couple dozen companies over the next five years and probably a dozen just in the next 12 months now the important thing we will never sell those products separately from cyberprotect it will always be part of this cyberprotect console for a customer and for a service provider and for a distributor it will always be single agent single policy single ui so this platform is a platform which would allow us to integrate the acquisitions and that's why for example some of the media members ask me what happened with five nine and device log well we're integrating them it takes a little bit of time it's not years like for some of our competitors or never it is probably months but it needs to be transparently integrated to be available to you and with that i want you to invite you again to show a demo of a chronic cyber platform thank you sergey so yes cyber platform is definitely important as sergey said you need to automate you need to integrate to be efficient because we all know we don't have enough resources we have better things to do with the time than configuring in 20 different avenues right so let's switch over to the cyber platform website and get started from there so here if you become a partner with the acronis cyber platform you will also get access to the developer network which means you have access to all the documentation to sample code of course to the blogs and the support forums and the knowledge base so you get all the information that you need to actually create your own integration which means you have the documentation on the different apis with the details on how to do tasks how to do maybe file share and sync and you have also access to the github repository with some example code for example here the whmcs provisioning application that we created so you can have a look maybe modified to your own needs and so on but don't worry as sergey said you don't need to create everything on your own because we already have the solution portal with the whmcs but also a lot of other applications already fully integrated so you can simply pick the ones that you use for your workloads for your rmm psa whatever you need to automate and you probably should automate a lot of it for this demo here i'm going to focus on the connectwise control and connect wise manage just to give you an integrating approach and show how easy it is to roll out new machines and also do the billing as a service provider if you onboard a new customer you probably would go to the console and then add it with a new name right for the new customer define if it's self-service or if you will be managing it for it you define the login name and the email address so you can send in the default password that they have to change afterwards all those normal steps that you would probably expect and if you go one further of course you can select which editions which services you're going to offer and of course you should go for the cyber protect edition not just the backup and you can also define is it for virtual systems where will the backups being hosted on our cloud or some other clouds and so on so you'll define all those services and attributes and then you go further but we can save you all the time if you already use connect vise manage all you need to do for the integration is go to the module for the connect device integrate with the api which means you need the public key and the private key which is generated by the application click on it and now you already have access to all the applications all the customer data that you have generated in connectwise here inside the acronis console so if you switch back you see the same customers that you have created in connectwise listed here next thing you would do is do a mapping of the acronis products to the connect wise so for that you can go back and you have exactly the same services that we just looked at right so here those four main services they're already pre-populated inside the module so you can just click through see if you need all of those and then you either apply it with the default names or you can change it to new names if it's the first time for you to integrate well let's say we're going to use the normal mapping here for the products and would go one step further so now everything is already mapped all we have to do is let's go to one customer let's pick a demo customer here for the summit and we need to add a management agreement for it as in the managed services so we would go and open up and just add it that's all you need to do of course you need to fill out the information about when was it started billing address and everything that you would do normally as well but you can simply now select all the products that we defined automatically so you don't have to do a lot of it manually it can be automated as good as possible so now we have everything set up and well probably we want to map everything with that new costume right so let's go to the acronis side because it's integrated in both directions right we search for our demo customer and we apply the mapping in the background and it will now populate everything that we have defined through the module and it will be good to go and while it's doing this let's see how we could roll out the new agent to a new machine we use connectwise control and if it's a new customer again we could set it up with customer name login name email address we can even define the password directly here just like we saw before right let's because it's managed through connectwise we can use the connect vice control to roll out new clients and also create new clients if we need to do so for the onboarding and again on the lower part you see the same four options for which edition to use which cloud to use for the backup storage as we've seen here in the console before that's the same information just mapped into the connectwise side but of course we already created the mapping right you saw me clicking there for the test account so here we're not going to create a new customer account we're actually going to map it to an existing one so let's start over again say hey we already have a customer which we onboarded through connectvise manage we're going to select that one deploy it and now this client is already rolled out and we can see back in the console if you go to that specific customer that there will be already a new machine with the new agent rolled out as simple as that and we can use the control also to apply some protection plan maybe i want to make sure that they have a backup for the full machine running maybe even now right with the default settings so we can deploy the plan and run the backup and while we do that in connect wise we can switch back to the console and actually verify it's already starting to populate the backup which also means it's populating the attributes back to the connectvise manage where you will see that it's using some kind of storage a few agents and that will be going into your billing system and the ticketing system and so on so it's that simple to integrate everything and to make it as efficient for you to actually work with acronis because that's the only way to go forward and with that back to you sergey thank you candid so one thing which i want to point out we our best and most beloved integration partner is connectwise is our largest isv partner um and and they provide both msp software such as psa professional service automation and remote management and monitoring and many other tools for msps but we are committed to integrate with all top vendors and we are doing it and that's just a matter of weeks or months before we release humanly good integrations integrations are always just integration we're going to continue to make them better and better we believe ours are by far the best in comparison to anybody we can always get more feedback and make them better so there is couple more points so one of them is a chronic cyber infrastructure so what is it really i just want to explain so first of all if you look at my experience with service provider business it really comes from virtuoso virtuoso is is virtual machine virtualization software we invented containers and network virtualization then uh also storage virtualization it's a complete platform it's a small multi-10 million dollar company which we still own and and run separately now virtuoso expertise virtuoso achievement some of its technology is a core for a chronic cyber infrastructure what is it it's really uh storage our storage we believe is very very good very sophisticated it is block object it is snapshot hot storage it also has file storage we also make it available as protection storage for third parties but our core business to use it for as a protection storage for ourselves it is compute we do not believe in the future for many reasons you can have storage without compute having storage remotely from compute is very expensive and so there is lots of vendors in the space which are pure storage vendors or pure storage service vendors we don't believe that it's sustainable in order for you to achieve the best cost and the best service level you have to have compute just next to storage on the same machine because compute is needed to manage the protection infrastructure it is required to analyze it in order to be able to find malware to do data management and it is absolutely mandatory to be able to do disaster recovery which we believe is absolutely necessary for every virtual machine and every server it's also networking in the future we see that many of our customers and partners will keep multiple copies across multiple locations and so we need to have replicated global network to optimize not only the storage and compute but also to optimize upload and download speed and distribution of petabytes of data we just start in this business and we already have more than 500 petabytes in our cloud storage and it's growing over 100 per year and you know you have to think about 500 petabytes we have to upload it download it in many cases you have to multiply it then it is also the reason why we can afford to build global network or acronis data centers our goal is to have more than 100 data centers before the end of 12 months so by next summit that's our goal we will have close to 40 by the end of the year and in order to be able to do it in such way that it's profitable we have to have our own storage and we provide our storage not only as a service but also in the form of software appliance and hardware plans to partners and customers then you know the benefits of such approach so first of all we can control security super important if you have protection infrastructure you don't want protection infrastructure to not work in case of security that's your last line of attack and so it has to work at all times and it's really very special how you build infrastructure for protection yes you can use public clouds but they are not built for protection so in fact they will fail you at the wrong moment then reliability super important to have the right level of reliability there's many ways to manage availability and reliability protection infrastructure is something which is difficult to test you know failures don't happen that often for you to test it at all times so it has to be very reliable without too much continuous testing scalability we're talking about millions of workloads today we believe we're talking about hundreds of millions of workloads in the near future which needs to work on the storage potentially many billions of workloads very low cost of ownership very low cost of ownership is super important with the right service level for us to be sustainable for us to be competitive and sustainable in this business and for you as well and so we will continue to make our storage cost carefully lower and making sure that we can keep it extremely profitable for us and you in such ways that we can provide extremely good cost to the customer it's already better today to keep your data in the cloud in terms of course and keeping it on premise it is important of course to do it for protection storage and it's rather easy but what if you're talking about disaster recovery that's completely different scene what if you're talking about usage of ai and ml that's another completely different scene and of course it has to be extremely easy to use unless it's easy to use you can't use it and the fact is that any protection without storage can't work in the past a company like acronis used to sell backup but reality is that backup is not going to actually do backup you have to have a person and you have to have a hardware in order for backup to work in fact you also have to have a data center and you have to manage all of that with that person and so really backup was really a very small portion of the solution just even you talk about data protection and so that's our global local initiative why because we want to provide um you know this is just a reference 195 countries 48 separate territories over 100 thousand habited islands every country wants to have protection infrastructure in the country i just spoke to our partner from liechtenstein which is here where is our partner from liechtenstein and he wants to have it in liechtenstein would you imagine liechtenstein is one hour from here and they actually don't have their own currency they use swiss francs but they want to have the data centers in liechtenstein and czech republic wants to have data centers in czech republic and slovakia in slovakia i'm not even talking about countries like qatar or saudi arabia or any country in africa protection infrastructure needs to be next to you in your country in many cases in your region in many cases in your city for you to feel good and so with that we are committed to build very large number of data centers our goal is to have 300 data center by us 3 000 data centers and data destinations by our partners crazy numbers nobody else have such infrastructure today to provide geo redundancy as well to keep control with partners so that the partner chooses whether he sends the data to himself to somebody else or to multiple places to support local disaster recovery especially for disaster recovery it has to be next to your user and next to your workload and to keep very very competitive pricing pricing highly depends on the territory cost for internet cost for data centers place cost for different services are very different between different territories and what is acceptable for here may not be acceptable in a country in in i don't know let's say middle east even though it's maybe very close from the pink standpoint so that's cyber infrastructure cyber infrastructure is something which is extremely complex to replicate no vendor in the space have protection infrastructure which is specifically designed for protection it took me and my team 20 years building virtualization technologies network storage and compute to be able to build it and in this case we build it for special purpose for protection nobody else has it everybody else use some kind of general purpose third party general third party does not provide you the right service level then of course i wanted to talk about the last point which is i think perhaps less down to more down towards less less exciting but it's just addressing present partner requests so kind of south keeping so our partners want roadmap transparency we're committed hopefully before the end of this year to provide full transparency to partners about when do we resolve your issues you will be able to see in your partner portal you will be able to track it whether it's a defect whether it's a support call whether it's a feature request and and we will attend to it you will be able to call for other partners to vouch for your features if we see a lot of partners requesting certain feature we will be able to promote it in our roadmap but committed to monthly releases were committed to provide updates to you of course everything is very dynamic in the cloud is no longer kind of like i go this direction for for 12 months it's more or less you change direction every day a little bit so it's very very dynamic very frustrating for my engineers to plan then we realize that we need to provide much more attention to our top partners and to all partners and we're growing sort of our attention level in the average by the factor of three so partner account managers will get on the average three times less partners to attend to and um especially for top partners we are providing dedicated partner account managers to help you to grow your business not just to do better support we also grow in our support levels um we believe that the right support level eventually is very very quick response time um you know less than 15 minutes for top partners less than one hour for everybody really less than half an hour and we are launching premium services so premium services is something which you can buy and and these services are in these areas which are required for partners to be successful this is very very involved in engaged relationship between us and service providers and so it required premium support we by default have four hours response time we now launch one hour response time and 15 minutes response time then we also have premium education we have increased our investment acronym cyber academy by the factor of five we want to train 30 times more people periods that have trained before we believe our best way to keep our customers and partners protected to have them properly educated can only be done with special systems and a special content marketing service is very important to help our partners to get more customers and that is something we're starting to do now not just with distributors to get more service providers which is super important but also with our msps especially with msps which are interested to grow their businesses fast so come to your partner account managers and ask for it sales services we see that one of the most well working and well operating services right now is inside sales of some sort is having people from remote location to be able to assist your sales process that includes both service providers and distributors and development service all of the services are available for you at certain price but most importantly if you are having enough business with acronis they are going to be available for you for free as a part of your commitment contract or contract with acronis with that the last thing which are very important for us and partners we launched this year acronis cyber feed partner initiative so we started many years ago with cyber fit sports you know frankly speaking when i came up with the idea together with my team to build cyber protection it was 2014 and i was hoping to be here telling you all the same things by 2017 you know we started doing sports in 2014 and 2015 to prepare what i'm doing now so for many many years we're doing sport now it will start making sense we are providing our software and our services to top clubs in the year in the world several teams in formula one several teams in almost every type of sport several teams soon in switzerland several teams in germany uh top teams like liverpool like manchester city like arsenal like roma like inter milan like kayaks close to hundred teams overall now with that we will popularize the world cyber fit and we launched something which we call cyber feed score for workloads and that is going to be available it is already available for free from our website that's something which you can download install and see the how protected is your workload you know the good protection is 800 plus and and you know in most vast majority of cases you won't get the score and it will be very clear to understand why it is why it is important and we over time will provide information how workloads similar to yours had problems because they didn't increase their cyber score but more importantly we launched cyber feed score for partners which enables a level of engagement with partners across these five vectors support education marketing sales and development this is not really our rating of partners it's rather our rating of engagement on our site so it's much more our problem if the score is low the score from 0 to 33 our average score today for uh distributors is just 11 and for msps is just 12. we do have some partners we score 29 in terms of distributors and 27 for service providers and we can see that the people with high score correlate with very high margins in distributors and extremely fast growth so number two distributor in the world is growing at over 250 per year year-on-year and and they have a score close to 29 and our top service provider is growing over 150 percent and he has a score close to 27. then how to get the score up there is really two ways so one way is to do more business with us of course and you can do it by signing cloud provider license agreement which is a special agreement which is a commitment agreement which allows us to invest into partnership with you and you to invest in the partnership with us again this is not a reseller business as it was in the past the engagement requires integration on all this level and the more integrated you are the more margins you get and the more growth you get and it's a huge space it's growing very rapidly lots of money to make the other way of course to buy um to buy premium services so just to get your service up by going and educating your people the cyber feed level you can find it out from your partner account manager will directly correlate to your growth you we will provide more information about it today we just started that about six months ago we have only 1.5 000 partners which are fully rated out of 8 000 so there is not enough statistics but even with the current statistic we know that there is direct relation to growth so with that i just want to do a little recap this is singapore this is my country i moved to singapore about 27 years ago believe it or not it's crazy much more than half of my life and you know definitely 27 years out of 28 years in business i spent in singapore and in singapore we had a very interesting sense so first of all i looked it up just before coming up stage so over the past five days we had on the average less than one case per day in the community we have 5.6 million people less than one case in the community everybody's doing everything everybody's going everywhere nobody's scared of anybody nobody's wearing mask if you know if if they want to because it's there is really no cases now another thing which is even more interesting is that there was 58 000 cases almost as many as in switzerland but 28 deaths okay switzerland is very developed country and it was much more developed than singapore just about 30 years ago and in switzerland we have probably what 2.8 000 people that or 2.5 000 out of about 74 000 cases so that ratio of deaths is about 50 to 100 times higher what did singapore do to have zero cases we have three thousand cases here in switzerland three thousand versus zero a big difference you know almost the same population and twenty eight people well very simple things they did prevention so we prepared from the sars time and we had this basic prevention measures detection very rapidly we had tests and they were administered to the right people in the right way when the tests were not available enough and then they were available to everybody response correct isolation everybody in singapore gets isolated if they're sick and they're either isolated in a hospital or in a community facility so if you are not very sick you go to community facility you cannot really go around if you're quarantined in your home if you leave home first time you get a fine second time you get a large fine and potentially a little bit of a community service third time you go to jail and so singapore is not really a nice country like switzerland but you know it really worked then recovery we manage recovery really well both number of icu bets we actually increase number of icu bets uh by by the factor of it never was needed to have now zero people in icu but we could have dealt with with the problems at that time when we started if you remember everybody talked about ventilation and forensic amazing job by singapore police which really investigated every case for everybody who was sick investigated everywhere they went it sounds crazy but it's not really that difficult as a result of it we did not isolate people which didn't need to be isolated but resolated all the people which needed to be isolated and the difference is amazing right i mean think about what is happening now and you know that is really about complexity core security privacy and the fact that being healthy is of course basic human need safety accessibility privacy authenticity and security and very important all these five sins doing all these five cents in order to enable the benefits of the protection if you do that you can be protected if you don't do that as simple as that you are not protected and because of that we do this cyber protect cyber cloud cyber platform cyber infrastructure and cyber services reality is that cyber services cyber infrastructure cyber platform cyber cloud all of it is only done to make cyber protect be as easy as reliable as secure as cost efficient and yet keep full control with partner and customers because if you don't keep full control with them they won't do it but really most amazing thing is really singularity and i'm very very happy is that this year in addition to us doing our singularity and us launching the best product in our i.t career and our business career which is acronis cyber protect there was a nobel prize which is just given to this guy roger penrose you know for the discoveries that black hole formation is a robust prediction of general theory of uh relativity so really for singularity ultimate singularity is actually black hole uh you should read this wonderful book emperor new mind because roger penner is much more famous for saying that the brain is out of this universe so i think by giving him nobel prizes sort of confirmed that human brain is not a hot hot wet turing machine but with acronis cyber protect will launch this super amazing product which is one agent all of these services come from one agent with minimal overhead on your system and on your i.t people with one policy you only configure one policy why to go to multiple tools and look at multiple interfaces and get multiple certification with one user interface so you need to only learn one user interface it behaves the same way across all layers of protection across all vectors of protection one license and with today we're announcing new pricing where we're going to have only cyber protect and cyber protect standard effectively comes free if used per gigabyte pricing if you don't have any gigabytes and it includes all required protection across all the end vectors of security now of course if you start backing up you will be charged per gigabytes and if you will use advanced packs and we're going to have five advanced packs advanced management advanced security advanced backup advanced disaster recovery and advanced data leak prevention if you use them you will pay per workload additional pricing you can also pay per workload if you don't want to use our storage but it's really very simple model one product cyber protect and it will include disaster recovery and will include basic well it will include standard disaster recovery and standard data leak prevention in a core product and from one vendor so you can only work with us in terms of support in terms of partner success in terms of sales and marketing and in terms of development it's real real easy and it's a huge market we believe it's half a trillion dollar market just for cyber protection services and software combined and and so with that i just want to tell you what you can do next is just really five simple things to do next so really it is those things you can deploy cyber protection it's be it's amazing for me i feel so well that i can say this because this is super applicable to anyone all of you have i.t devices so amazing nobody in the world don't have any it devices almost nobody and you should deploy it whether you are an end user a customer whether you're a family whether your service provider whether you're a classic reseller whether you want to use our prosumer product you can deploy market and sell advanced packs if you're a service provider because they provide advanced level of protection and they are not expensive and they will get you to make more money have happier customers grow your cyber feed score if you are a partner if you are classic partner the best way to grow a cybersecure score to become a cloud partner leverage a chronic cyber platform to extend it and support acronis foundation we're going to have a fundraising event this evening here and and the the midday in eastern standard time uh on acronis foundation we're committed as acronis not only to build great products and great services but also to do good things it is really our strategy to do well to do good and to have fun and there's nothing more fun than to do well and to do good and part of doing good is building schools and so i invite you all to join this event i will actually uh be conducting this event and and my speech from here on stage and you can contribute building schools it is not so expensive to build schools everybody deserves access to knowledge and it is a lot of fun and it's a good business thank you you
Info
Channel: Acronis
Views: 16,381
Rating: undefined out of 5
Keywords: AcronisCyberSummit, Acronis, CyberFit, SergueiBeloussov, Beloussov, SB, Keynote
Id: bcnFNO7BY4s
Channel Id: undefined
Length: 86min 45sec (5205 seconds)
Published: Tue Oct 20 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.