Our latest spotlight on partners webinar gave us a chance to get to know our three awesome new cybersecurity integrations! We heard all about powerful network monitoring software providers Domotz, Threatlocker, a global leader in endpoint security – focusing on zero trust, and Veeam software, a leader in backups and data management.
We loved hearing from JB Fowler, the Chief Product Officer at Domotz, who walked us through the value that Domotz network monitoring platform brings to the party. The main goal is to help service providers to be more efficient and proactive about network issues. JB recognizes that it’s about a lot more than traditional endpoints, it’s servers and IoT and new cybersecurity challenges that may not have existed a few years ago.
Some of the main product features included in Domotz are IoT Discovery and Classification, identifying systems and devices that are sitting unseen on the network and developing a clear inventory of these devices, and Proactive Monitoring and Alerting, that allows you to know that there’s a problem ahead of time, so that you can become more proactive with your customers. The multi-tenant platform follows that up with Secure Connectivity & Management, so that you can log in via remote access and see what’s happening in real-time, and then Rapid Deployment and Troubleshooting to mitigate any risk, including Remote Power functionality.
Use cases that Domotz solves include:
- Asset Management and Documentation: This helps with compliance and governance regulations like NIST, CMMC, ISO and SOC, mapping and discovering all devices on the network from network-based devices to IoT like security cameras.
- Network Management and Diagnostics: Classifying all devices and making sure they work properly, proactively monitoring all network infrastructure and how all systems are connected to the network.
- Security and Awareness: Continuously monitoring for new devices, RCP ports and uPnP ports, and using two factor authentication, SSO, and SAML authentication so only trusted systems are accessing systems through Domotz.
We loved hearing about all the flexibility that Domotz comes with, allowing users to customize their dashboard for relevant information that’s contextually suited to their business needs.
Next up on the roll call, we welcomed Ben Jenkins, who is a cybersecurity expert and Director working at Threatlocker. Ben gave us his insight about protecting your networks with the support of a zero trust mentality at an endpoint level. The solution includes allowlisting, elevation control, network access control, ringfencing, and storage control.
Ben started by describing some recent cyber adversaries, from gangs and sophisticated cybercrime businesses to nation state attacks from places like China, North Korea and Russia. Ransomware is available on the Dark Web for anyone to purchase, and it’s never been easier to launch an attack, exploiting software we use every day. Last year alone, Threatlocker saw 21,000 exploits, and the number has already hit 17,000 in 2022.
Protecting against these attacks can be supported with some best practices, including the idea of “Allow what you need, and block everything else.” This is not just executables, but exe files, libraries, scripts, and more. If it is not explicitly known, it needs to be denied by default. Ben discussed how allowlisting used to be very difficult, causing admin headaches for application requests and keeping everything up to date.
However, Threatlocker has a mission to make this process easier, for example with its testing environment where you can check applications in a sandbox environment on the cloud so that you never have to take a risk about running software in your network or on the network of your customers.
Ringfencing is also an important part of zero trust. After all, where is the logic in MS Office being able to call PowerShell, for example? PowerShell can by default access your files and folders, which generally leaves far too much risk. Obviously PowerShell is a trusted app, but what do you do to ensure it can’t be weaponized? Using Threatlocker, you can set granular policies to say that PowerShell can run, but its usage is limited to certain communications and actions.
Ben also talked us through how to approach admin permissions with the idea of zero trust in mind, taking away admin permissions from users who don’t need them, and allowing them access to only what they need. The same is true for storage. Threatlocker allows you to deny USBs by default for example, or define what storage you’re happy to allow access to, and to what extent. Bottom line? Lock down your file and folder locations so that malicious applications cannot access that data.
Getting to know Veeam!
Finally, we got a chance to meet Dave Russell, who is the VP Enterprise Strategy at Veeam. Veeam has more than 450,000 customers, 53% of which are enterprise customers. Veeam markets itself as a single platform to protect all workloads, and is the most deployed solution for Microsoft 365. It protects cloud, SaaS, virtual environments, apps, unstructured data, and physical workloads, too.
Dave explained three focus areas for Veeam, which our Atera community can use to grow their own business.
Backup and Recovery Modernization
Oftentimes over the years, Dave realized that backup programs were unsuccessful, either because of cost, supply chain issues, lack of expertise, and more. Customers weren’t meeting their recovery SLAs, and were experiencing heavy cost concerns. Veeam works to support users with a 4 in 1 backup solution, combining backup, replication, continuous data protection and storage snapshots, and pioneering the idea of multi-VM instant recovery, accelerating return operations and disaster recovery, even if production environments are lost.
Cloud and Kubernetes Acceleration
As an increasing number of businesses move to the cloud, cloud native backup is more necessary than ever. Native AWS, Azure and Google cloud backup is part of what Veeam does best, as well as SaaS backup for Microsoft 365 and Salesforce, as your data is your responsibility according to the Shared Responsibility Model on the cloud. Veeam also supports cloud mobility so that businesses can backup, recover and migrate across, from, or within any cloud. Finally, Kubernetes backup is an essential task that Veeam can take care of, supporting native backup and restore, disaster recovery and application mobility.
Thanks to the proliferation of ransomware, the attack surface of your data loss could be 100%. Secure backup is your last line of defense against ransomware, so it’s really important that you ensure trusted immutability so that your data can always be recovered, and complete backup verification for integrity. The best practice is 3 or more copies of data, 2 or more media, 1 offsite, and also that 1 should be immutable so you are never left without your data, even during a crisis. Veeam supports you with instant recovery at scale, a secure restore so you don’t inadvertently add malware back into your environment, and orchestration of disaster recovery in a crisis.
That’s all, folks! If you missed this spotlight on partners event – we missed you! Catch up on the whole webinar here to learn more about how these integrations work with Atera, access the live Q&A, and see how our new partners shine in person.