Transcript
Mike Matchett: Hi, Mike Matchett with Small World Big Data and I'm here today to talk with Zerto. That's Zerto about some of the latest and greatest things coming out, including Zerto 10. What's in that? There are some cool things to tease right now. I'll just say it's more secure. It has a vault and you can run it in another cloud provider full out. So let's get let's get Zerto on the line here. Hold on a second. You. Welcome, Caroline. Welcome back to our show. Always glad to have you here. Caroline Seymour: Good to be here, Mike. It's been a while. Mike Matchett: Not that long, but, you know, there's certainly some new things you've been doing. And we want to talk about some of those today because obviously ransomware is still a big thing. Obviously, backup and recovery are on everyone's mind. D.R. is really the what people are really trying to achieve because it's not about backing up. It's about recovering. And you've got the world class replication solution there to make that happen. First of all, let's start a little bit before we get into the Zerto 10 announcement. Tell us tell us about how Zerto and have been getting along. How's that? How's that marriage going? Caroline Seymour: Oh, it's been great. It's been since 2021 now September 2021, that we were acquired by HP. So we've actually been working to integrate Zerto technology into Greenlake and that is going very well and that's going to be launched and in the next month as well in June. So that that in itself is is going very, very well. Mike Matchett: All right. So you've just you've just teased another thing than what we're talking about. So you have to come back and do that again. So let's let's get on to Zerto 10. When we look at the look at what we were doing before in Zerto, you have you have this journaling replication system. Just briefly, describe to people who may not be familiar with what Zerto does. What is Zerto doing? Caroline Seymour: Yeah. So we've we're better known for our continuous data protection. In fact, we're the pioneers of it. We've been doing that since 2009 as part of that is our near synchronous replication, our unique journaling capability, as well as also our app centric consis10cy. So those are the three sort of core components that really make up the continuous data protection that we offer with Zerto and the disaster recovery that we're better known for. Mike Matchett: All right. So when we talk about continuous, we really mean at any point. So you're not having to worry about just finding your last incremental backup to recover to. You can go back into the journals basically and recover to any point that that you have a check mark in there. Caroline Seymour: Yeah, exactly. You can actually go back to within five seconds. So you're actually using the journal and setting your different checkpoints. And when you want to actually recover, you can go back to any specific checkpoints, find out whether it's clean, recover, you can do test and then go back again. But you're using that journaling technology that really allows you to have that very low level granularity to achieve the fastest. And RPOs. Mike Matchett: All right. So let's talk about what happens with ransomware. You know, a lot of people get a hacker into their environment. There's some dwell time. It could take up to six months before that person really pulls the trigger and says, hey, I've got you. You know, give me give me a ransom. Right. There's there's a lot of movement around on there. This idea of waiting six months while someone hacks through your environment is terrible to a lot of people. But that's that can happen. That time frame is compressing a little bit. We've heard, you know, people are now saying they aren't waiting that long. Maybe it's still a month. That's really a long time to let someone run loose in your environment. So what are we what are we doing with Zerto 10 to help people address this threat? Because it's the biggest threat still, right? Caroline Seymour: Yeah, no, absolutely. You're right. And and we're starting to see the dwell time go down as well. But it is still there and it is still problematic. And as you say, ransomware is still the number one concern for organizations globally And keeping up to, you know, ahead of, I would say, the new security, new threats that happen whether the ransomware as a service, the new, um, you know threats that come about and so what we've been doing with Zerto 10 and what we're going to be introducing with Zerto 10 is first real time inline encryption detection. Secondly, we're also introducing a new Zerto cyber Resilience vault, and we're also introducing a new secure appliance. And so and then lastly, we're doing additional work with Cloud, with specifically Microsoft Azure. So we've got some new and enhanced protection for Microsoft Azure and particularly around scale too. So significant amount. And one of the things that we've been really focused around Zerto 10 is, is helping organizations meet this problem with ransomware head on. And so organizations as we see it is, is, you know, when you look at protection, it's not it's not necessarily or detection. It's not enough, as is recovery. It's not enough. They're both absolutely critical. But what you need now really is more around resilience. And so ransomware resilience with Zerto is around the detect and replicate or replicate and detect, isolate and lock and also test and recover. So we're very focused around those core pillars to help organizations meet ransomware head on. Mike Matchett: It's almost like the old world is fading away a little bit where we did backups and sent them off to tapes in the desert and if we had to recover, we sent the truck up to a world where we don't even want to think about really backup. We just want to think about turning the dial back to right before we something happened and and keep running, right? It's like you said, you can call that resilience. I think that's fair. Uh, let's just. Let's just. Talk just a little bit more about this real time detection. So you've got. Are you detecting. The hackers in the stream. Are you detecting the unknown encryption happening at the ingestion point or at the replication point? What are what are you doing there really? Caroline Seymour: So as as the data is streaming through and we're using our continuous replication as it goes through, we're detecting it at that point of encryption so we can actually detect it there as it's streaming in versus at the point of, say, backup or after backup. Because if you can think about your backup, you've got the various different stages and you've got this long window and you know you've backed up and then you do your detection. We're doing it at the point that it's actually coming in. And we can do that because we're leveraging our continuous data protection, we're leveraging the replication. And so therefore, at that point we're delivering that real time inline encryption detection. All right. So I'm sorry. Mike Matchett: No, because you're streaming the data around in the replication mode so you can you're processing it anyway. And I can imagine if you go to encrypt something to send it over the wire or to make it safe, you can detect it's already been encrypted and you probably could have done that before. So this is great. Caroline Seymour: Yes. And what we'll do is is to provide an alert and a warning so that administrators can then actually sort of take a look at that. But from our perspective, it's really helping organizations, um, be warned at the earliest possible time of an attack. And that obviously saves a huge amount of time, um, especially when if you need to recover to Yeah. Mike Matchett: I've of10 asked, uh, storage vendors included in the past, you know, when are you going to have something in the storage array or the storage sand or whatever it is that will detect that everything's getting encrypted and they'll say, you know, at some point, at some point, at some point. But I'm glad to see, you know, Zerto is going well. No, we are actually at the point of replicating all that data in real time. And we are going to we are going to do that check. And then it doesn't matter so much what the downstream applications were, the particular disks involved or anything. You're going to catch anything wherever it is. Right? Caroline Seymour: Exactly. Exactly. And funny enough, our tagline for our launch is Real time detection meets real time protection, which I think, you know, really is a great phrase because it captures exactly what we're introducing, but also looks at what we're better known for with our real time protection to our replication and detection protection. Mike Matchett: I also want to ask you, so that's that's really great. I just wanted to ask you a little bit about this resilience idea, because you've announced now this vault, the Cyber Resilience vault. Yeah. What, what, what what is a vault? And why is it different than what we were just doing before the revolts? Caroline Seymour: Yeah. So we've obviously been better known for all of all of the recovery, whether you're recovering from a on an application, a site and so forth. But what is, what is pressurizing organizations today is the changes in a lot of the regulatory landscape, the compliance and regulatory requirements, highly regulated industries. Um, are are being put under tremendous pressure to have what they call either a vault or a a clean room. And even cyber insurance is, is requiring it to. So this is becoming more mandatory for a lot of organizations. And so what it is, is really a highly secure, isolated physically airgapped in with immutable data copies on a secure Fips validated hardware. So it's really your last line of defense in the sense that if it's more than an application that's got infected more than, say, your, your production, but your replication as well, in fact you're completely toast and you need to be able to have a vault to be able to recover on. And I think one of the the key things that we're doing to is enabling an organization in, say, in the fact that your production, your replication target is all encrypted and it's locked down, You can actually run your applications and your production environment within the vault itself. So it's really reducing the amount of time an organization is down and you have this isolated, physically airgapped environment that you can run from mean. Mike Matchett: You know, in case the audience is wondering, is trying to puzzle this through in their head. So so we've got we've got. You know, Zerto replication protecting the original production environment. But hackers have been aiming for a while now at the recovery environments, at the backup targets, at the replication targets, at those machines, Right. So when you're introducing this cyber vault, you're really saying, okay, even if they get into that and take that down, I still have the vault at the end of the line that they can't get into and do anything to. Speaker3: Correct? Mike Matchett: Yes. Okay. So this is really for those Uber, Uber compliant and wise organizations, the ones who know they're going to get hacked, which is everybody. Caroline Seymour: They think this is becoming a requirement for most organizations, certainly for sort of highly regulated organizations. But why wouldn't you want to actually sort of put that extra layer of security by having this vault architecture? And so what we've we are or have introduced is, is the different bundles for this vault architecture. So we've got think T-shirt style. So extra small, small, medium and large, large. And it includes everything that you need because what we've done is to package together Zerto 10 or so with HP Proliant for Compute and HP, HP, Electra for storage, as well as also HP, Aruba for networking. So it's a complete bundle package with services that can actually build your vault and work with you to to pull together and deploy this vault architecture. Mike Matchett: So really think we use a converged solution. But you did that for security because now you can you can wrap that down and basically lock it down configuration wise and everything, which makes sense, right? You wouldn't we wouldn't want to be building a lock down solution from third party parts and trying to say that this is secure so you guys know what you're doing there. That's a great that's not the only thing you've done here. So you think you mentioned yet for security, you also secured further the appliances themselves. Tell me tell us a little bit about that. Caroline Seymour: Yeah, we have a new Linux security hardened appliance with multi-factor authentication and rollback access control, but also, um, so it's we've added in a new migration capability. So in the fact that we're Zerto 10, you can migrate within less than five minutes from your Windows environment to this new Linux. And so to me it's about having another layer of security and why wouldn't you want to actually deploy that? And we've made it so easy for you to be able to take advantage of the new Linux appliance. Mike Matchett: So, so the so the vault is a lot of secured hardware, production, grade data center hardware. The secure appliance is now a hardened virtual appliance for the Zerto itself. Yes. Yeah, which is great. So you've really hardening. Guess is resilience is the word. Caroline, you said it. Speaker3: Before, but that's right. Caroline Seymour: That's why we thought this is more than just recovery. It's really setting up that resilient environment for you to meet this big problem that we've got. Speaker3: All right. Mike Matchett: And then you just the last thing you mentioned, you were working with cloud providers on their of course, this is a Zerto is a great way to replicate across all your different infrastructures and globally distributed infrastructures, whatever you have. But Azure is something that you've been working on, especially to improve its scale. Guess now you can do how many, how many VMs can I, can I, can I protect in Azure? Caroline Seymour: Well, yeah, that's one of the big enhancements that we've made is the scalability. So it's a completely refactored architecture with scale out and we're looking at, you know, thousands of VMs say up to 5000 VMs that we're sort of targeting with Zerto 10 and the new Zerto for Azure. Um, we've worked very closely with Microsoft in partnership with them and we've been working on a new API that we're actually launching as well with Zerto 10 that allows us to go, you know, to to from and also across regions. So the multi-disk consis10cy is what the API supports. Mike Matchett: All right. So we can, we can set up some fairly, I don't say intricate, but enterprise grade replication networks and meshes and whatever it is we're trying to accomplish, going from cloud to cloud or getting in and out of different different sites with Azure being very prominent in there because of. Caroline Seymour: Yeah, absolutely. So you can use, um, you know, Azure as a target itself. But if you're looking to move workloads to Azure, we can help you do that too with our migration. But once you've got workloads in Azure, we allow you to be able to use Azure as a site within so you can go across regions, um, to, to protect your Azure environment inside. And then, you know, if your cloud strategy changes and you're looking at based on. You know, your cloud journey is you can also migrate out of Azure, too. So you have a lot of flexibility. Mike Matchett: That is a that is also a hot topic and we'll probably have to have you come back and talk about how Zerto replication becomes a way to fluidly and agilely work with your hybrid multi-cloud environment by being able to move things around where they belong. A whole nother whole nother business that we can get into bit there. Um, but guess, guess this is great. So Zerto 10 if someone wants more information on that, obviously you've got websites, but is there anything particular you'd point them at that they can learn more about? I think. Caroline Seymour: If you go to.Zerto.com because we have on our home page so it's the easiest thing zerto.com and we have a landing page with everything that you need to know about Zerto 10. We've got what's new in Zerto 10. We've got a Zerto for Azure data sheet. We've got a data sheet for the replication, sorry, the detection, um, new detection capability and the Cyber Resilience Vault. And a gorilla guide too. So we've got a lot of information on that. So zerto.com. Mike Matchett: Thank you so much. I think we also discovered a couple of topics you have to come back and tell us about soon. Caroline Seymour: We'd love to. Mike Matchett: All right. So but thank you for so much for being here today to tell us about the new Zerto 10. Thanks. Caroline Seymour: Thank you, Mike. Good to be with you again. Mike Matchett: Check it out. Whether you're a existing Zerto client and you've got some great upgrades ahead of you or you just are pushing the buttons and figuring out what you should do better or next looks like Zerto 10 is something that should be on your short list for consideration. So take care, folks. You.