ArticlesC2 Spring 2022Data SecuritySecurity Build a Cyber-Resilient Organization by Cohesity March 27, 2022 written by Cohesity [vc_row][vc_column][vc_column_text]People have always topped the list of what keeps enterprise executives up at night. Leaders wonder, “Is the right talent in the right places?” and “How do we maximize employee productivity and improve our customer experience?” Now two years into the pandemic, executives have a new people-related concern, “How do we stop bad actors from compromising our data and stealing it for gain?” Nearly nine in ten C-suite and other executives (87%) recently surveyed expect the number of cyberattacks targeting their organizations to increase over the next 12 months, reports Deloitte. And while almost two-thirds (65%) believe ransomware poses a major concern to their organization, only a third (33%) say they have prepared for such attacks. That’s not surprising considering how fast the vectors and targets of attacks are changing. The market saw a 1,070% increase in ransomware between July 2020 and June of 2021, according to a semiannual Global Threat Landscape Report. How can enterprise executives turn the tide, quickly pivoting from chasing to detecting and mitigating both external and insider threats? A giant first step is to rethink legacy data management infrastructure and architecture. Here’s why. Legacy Data Management Hinders Cyber Hunting Legacy infrastructure is complex and closed. An organization can have multiple silos, vendors, and fragmented data, leading to inefficiencies in processes, management, and systems designed to uncover threats. That makes it easier for criminals to get in and begin encrypting data for a quick payday (ransomware 1.0). Moreover, legacy infrastructure is vulnerable. Requirements for specialists to manage each silo individually and inconsistent patching and other protection processes are weak-link targets for hackers to enter the environment and not only encrypt data, but destroy backups to make data recovery more difficult (ransomware 2.0). Lack of intelligence in a data management solution is another flag to bad actors that enterprise data is not well protected. If IT teams have to spend hours or days manually sifting through logs to discover intrusions, attackers can penetrate and run malicious code inside of an environment for a long time before encrypting data, compromising backups, and stealing the data for maximum ill-gotten gains and reputational damage (ransomware 3.0). Although IT modernization is on enterprise executives’ minds, most are just beginning to recognize the important link between eliminating legacy data management and bolstering threat defenses. That’s where the Cohesity Threat Defense architecture and Cohesity and HPE solutions come in. By embracing an architecture and solutions focused on not only data security but on cyber resilience, organizations can better defend their data in the hybrid and multicloud era. Architecting for Cyber Resiliency Threat Defense is a defense-in-depth architecture to counter cyber threats that goes beyond Zero Trust security principles to keep data and applications secure. It helps keep bad actors away with least-privilege methods and advanced access controls while learning and continuously monitoring data changes using artificial intelligence and machine learning (AI/ML) techniques. It also serves as a framework for other security solution integrations. Comprehensive and multilayered, the Threat Defense architecture more closely aligns InfoSecOps professionals and teams, improving security postures. Figure 1. Comprehensive Threat Defense Architecture from Cohesity is Key to Cyber Resilience Key capabilities of the Threat Defense architecture, brought to life in Cohesity and HPE solutions, include: Data resiliency – At its core (as illustrated in Figure 1), Threat Defense is about providing organizations with a highly resilient platform that helps ensures confidentiality, availability and integrity of data. Key to safeguarding data is Zero Trust security principles, encryption, WORM (write one, read many) techniques, fault tolerance, and immutable snapshots. The latter ensures backups cannot be modified or deleted, thwarting ransomware 2.0 attackers. Data access – Policy-based controls within the architecture platform help prevent unauthorized access to sensitive data no matter where it resides—core, cloud or in edge locations. From role-based access (RBAC) and multi-factor authentication (MFA) to requiring more than one person to make root-level changes and continuous monitoring and auditing, Threat Defense helps ensure resilience for the data collected today as well as tomorrow. AI-driven insights – Another important architectural component to stopping threats is detection and analytics. These include data classification or cataloging what data is there and near real time anomaly detection or continually assessing the data to recognize and alert teams when patterns change, which can signal a ransomware attack. These capabilities give data security teams confidence they know where sensitive data resides and governance and compliance teams knowledge about who’s accessing it. Security features/apps extensibility – No single security product alone will be able to thwart all threats. That’s why the architecture platform features both integrated apps and APIs including vulnerability scanning, data masking and more that empower teams to join forces in combating bad actors. Threat Defense is designed for real-world environments, which means it’s architected to recover in a worst-case scenario ransomware attack or operational failure as well as failover gracefully in the event of a natural disaster. The platform supports the instant mass restore of hundreds, even thousands, of virtual machines (VMs), databases and more to the date and time of the last-known clean copy, providing confidence infected data isn’t reintroduced into the environment. Getting Executives a Better Night’s Sleep Cohesity and HPE at the foundation of Threat Defense architecture can help put enterprise executives’ minds at ease. They can be confident that a modern data management platform is keeping sensitive data protected and unplanned downtime to nearly zero. They also can be assured they have automated safeguards in place against human errors, natural disasters, and cybercriminals—but just in case, that their teams have the ability to recover data fast and with confidence that it’s free of ransomware. Moreover, jointly delivered Cohesity and HPE solutions empower organizations to reduce compliance risks and protect business reputations by preventing data downtime and breaches. Are you ready to defend your organization’s data against ransomware? Access this guide to find out. Discover Cohesity–HPE Solutions for Cyber Resiliency Together, Cohesity and HPE deliver integrated data protection and data management solutions that eliminate silos so you can easily back up, access and extract insights from data. Best-of-breed solutions, spanning on-premises, cloud, and the edge, combine the simplicity and efficiency of Cohesity data management software with the power and density of industry-leading, certified HPE Apollo and HPE ProLiant servers and can be delivered as a service through HPE GreenLake, hybrid cloud, or self-managed. Learn more about Cohesity and HPE.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/4″][vc_single_image image=”7119″][/vc_column][vc_column width=”3/4″][vc_column_text] Joanna Paul Senior Solutions Marketing Manager, Cohesity Seattle, WA, USA Joanna Paul leads the Cohesity | HPE Solution Marketing efforts for Cohesity. A seasoned technology marketing professional, Joanna is passionate about providing compelling value propositions and creating high value content. joanna.paul@cohesity.com LinkedIn[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space][/vc_column][/vc_row] March 27, 2022 0 comment 1 FacebookTwitterPinterestEmail
ArticlesC2 Winter 2021DataData Security Getting Started with Data-centric Security by Dan Simmons December 6, 2021 by Dan Simmons December 6, 2021 With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing … 0 FacebookTwitterPinterestEmail
ArticlesC2 Winter 2021Data SecuritySecurity How to Keep Employee Home Wireless Networks from Being Weakest Link your Cybersecurity Chain by Yash Vartak December 6, 2021 by Yash Vartak December 6, 2021 Now that we are slowly coming out of the COVID-19 Pandemic, work might never return to the “normal” of employees spending the majority of their days in an office building. Remote working, or some hybrid, is probably here to stay, says Forbes Magazine. How much did the Pandemic effect our … 0 FacebookTwitterPinterestEmail
AIAI-driven infrastructureArticlesArtificial IntelligenceC2 Winter 2021DataData Security Democratization of AI in the Enterprise by Frederic Van Haren December 6, 2021 by Frederic Van Haren December 6, 2021 The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn’t that long ago that applying AI to transform a business required a lot of technical expertise and hiring resources from a scarce talent pool. Let alone the expensive infrastructure to … 0 FacebookTwitterPinterestEmail
ArticlesC2 Winter 2021DataData SecurityData Storage Getting the most from your data-driven transformation: 10 key principles by Hewlett Packard Enterprise December 6, 2021 by Hewlett Packard Enterprise December 6, 2021 Best practices like determining what makes data valuable and creating company cultures that promote data sharing will enable businesses to embrace data in the modern enterprise. 0 FacebookTwitterPinterestEmail
ArticlesC2 Winter 2021DataData Security How to Safeguard Your Data & Applications from Ransomware by Cohesity December 6, 2021 by Cohesity December 6, 2021 It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work in or are aware of organizations that have been hit by ransomware over the … 1 FacebookTwitterPinterestEmail
Agile DevelopmentArticlesC2 Fall 2021Data SecurityData Solutions Balancing Agility with Data Security by Thomas Gloerfeld September 21, 2021 by Thomas Gloerfeld September 21, 2021 Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. … 0 FacebookTwitterPinterestEmail