Zerto and TenCate Discuss Ransomware Recovery at the Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2021, Americas
Lessons Learned from Two Real World Ransomware Attacks
Zerto, a Hewlett Packard Enterprise company, today announced it will be presenting alongside its customer TenCate Protective Fabrics at the Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2021, Americas. Focusing on TenCate’s experience of two ransomware attacks—one before Zerto and one in which Zerto protected the business against the consequences of the attack—the discussion will also detail best practices for ransomware prevention, preparation, and the role of Zerto in delivering resilience.
WHO: Jayme Williams, senior systems engineer at TenCate Protective Fabrics, will share his experience of two ransomware attacks, illustrating how with Zerto’s continuous data protection (CDP) deployed he was able to recover from the second attack in seconds with virtually no data loss. Joined by Caroline Seymour, VP, product marketing at Zerto, their presentation will also explain why disaster recovery must be part of any cyber resilience strategy in the context of traditional recovery methods that are unfit for purpose and don’t help mitigate the risk of data loss.
WHAT: A presentation by Zerto and TenCate, a multinational textiles company based in the Netherlands, which has experienced ransomware attacks twice. The first attack occurred prior to implementing Zerto and the second one after the Zerto implementation. Its experience recovering from ransomware using backups the first time versus Zerto the second time reveals the power of how Zerto enabled TenCate to recover quickly.
WHEN: Wednesday, December 8, 2021 at 2:15 p.m. to 2:35 p.m. ET
“Zerto enabled us to defend our business from the consequences and costs of ransomware,” said Williams. “We didn’t have to think about paying a ransom or spending weeks recovering and rebuilding from an attack. Zerto was able to protect our systems with minimal data loss and downtime by allowing us to rewind and recover data with granularity from any point in time—and we were able to do so within seconds of the disruptive event.”