BlueXP is now NetApp Console
Monitor and run hybrid cloud data services
This is Shira Rubenov, CEO of the Cyersphere Group. I'm here with Gagein Guladi, SVP and GM data services for NetApp. Gage, what a pleasure to be with you here again today. >> Oh, pleasure is all mine here. Thank you.>> Thank you. So, Gagan, we've had many conversations around the market cyber security ecosystem, what NetApp is doing, what where they're going, and everything and anything all in between. And let's just dive right in. I'd love to understand what you find the recent shifts in market trends are currently driving and if not forcing innovation in the cyber security capabilities.Oh, thanks for the question. Sh. Look, I would talk about two big things, right? Number one, I mean, cyber attacks continue to be on the rise. They're up 37% from last year according to a recent study. And what's also happening is that these cyber attacks are becoming more sophisticated. And now half of these attacks include breaches. And data breaches is basically becoming the number one problem that most customers are facing. So that's one and number two is regulations. Um an example of this is the DOA regulation which is a regulatory framework established by the European Union uh to strengthen the IT security of financial institutions and it has some very strict guidelines right from compliance and risk management to cyber resilience and recovery. How do you minimize the downtime? Incident response, incident reporting, and these shifts are now forcing our customers to pay an even bigger attention to cyber security than ever before. >> Well, that's very important. I'm glad you brought up the regulations because we talk about all these elements within the cyber security ecosystem all the time. That was always okay, we'd like to get there, but now with the regulations, they need to get there. So it's important to pay attention where companies are focusing, who they're utilizing, who their partners are in order to make sure that they're within compliance under these regulations. And Gagan, how is ransomware evolving? And that again is another big topic. It's evolving exponentially. And how is approaching the constant innovation required to stay ahead of these sophisticated attacks and particularly the growing challenge of double extortion which attackers are both encrypting and exfiltrating data. >> Look, you're right. The you know the ransomware attacks are getting more sophisticated.>> Yeah. >> Yeah. >> Yeah. >> And the threat landscape continues to evolve, right? and u and the ransomware attacks now you know they involve double extortion and these attacks have gone up 146% year-over-year and at NetApp we take this very seriously you know as some of our audience remembers we were the first data infrastructure company to deliver ARP AI you know built-in realtime encryption based ransomware detection on net app storage and what we're announcing today is that NetApp is again the first to embed data breach detection into enterprise data storage. Um, it's an AIdriven capability that identifies anomalous users and file system behaviors that are early indicators of potential data exfiltration and thus breach attempts. So, we're very proud of this and we hope that our customers are able to utilize this new amazing capability to protect their data estate um, you know, with NetApp. Well, I think that customers and clients and companies all alike are looking for as many capabilities as possible to protect data.is king. Everybody needs to make sure that that's protected. So, that's a very important point for people to take note of. And also with the rise of AI changing the threat landscape as we see it's moving so quickly. What are the next generation AIdriven threats that security leaders should be preparing for? And how is NetApp's intelligent data infrastructure designed to counter these emerging risks? So that's atwo-pronged [clears throat] answer for you. Yeah, look, I mean the rise of AI has led to a lot of challenges, right, for our customer because new techniques are emerging every day and the attackers are using them whether it's more adapted malware um you know advanced decryption techniques are going after quantum uh or less non-quantum you know encryption algorithms uh spear fishing to the hack the identities and just more intelligent exploitation of vulnerabilities and this is making life reallyhard for the security officers and the security operators in general. Um you know at we at data we continue to evolve our offerings with a whole sleuth of capabilities right from you know basic zero trust you have to do this right we recently had announced uh you know post quantum computing uh improvements that we have made to help against the advanced attacks that we're starting to see of course our flagship ARP AI we just talked about it from encryption perspective and also from data breach detection perspective that we just announced. A lot of these capabilities are something that you know we are offering to our customers so that they can counter these emerging risks and emerging attacks and really go prevent themselves and make themselves secure from you know what's coming um fromthe attackers. the attackers. >> Well certainly being prepared is key certainly in this uh ever changing world you know being proactive in their stance as well as reactive is critical. It's not a mayo it's a must do. So that'salso an important factor certainly. Andwhat makes clean data recovering so important beyond the obvious. And how does NetApp's approach to validating and cleaning data during restoration differ from traditional backup methods? So we have the traditional methods that everyone's aware of, but I know that there's more that you have to say about this. >> Yeah. Now look, when attacks happen, you know, you want to detect these attacks as soon as possible because you want to reduce the surface area. You want to reduce, you want to respond to them very quickly, right? And then you do the most important thing which is to recover from these attacks in a trusted way. >> And the word trust is super important because you want to make sure that the data you're recovering and the workload that you're recovering >> um is clean at all cost because you don't want to get into the place where you have the same problem again after you recovered the workload. And therefore recovery there of critical workloads is the most important operation in this entire journey. And you want to have the trust that this is happening in a clean way. Right? So what we're introducing today is the isolated recovery environments that are built into our ransomware resilience service. Now this these uh isolated recovery environment therefore ensure safe and malwarefree workload recovery for you. The isolated recovery environment utilizes deep proprietary AI powered scanning that you know we have built over years to precisely identify the maliciously impacted data and from which point it was modified. So you can go back and say hey this is my clean data and this is not and then you know we have what we've also done is that then we guide our customers through the entire workload restoration process for a fast and easy malware free recovery of the most recent data so they can bring the entire workload up thus preventing reinfection. So it's again a capability that we're introducing for our customers and we're very proud of it and I hope our customers get to use it in their environment you know as they become better and better at cyber resilience. >> I think you made a lot of important points there. One of them I just want to highlight is preventing reinfection. And that's something that people don't typically talk about or worry about but they should be worrying about and they should be thinking about. It's more of the recovery but what comes next. So the fact that you're able to understand that and place emphasis on that and be able to do that is very critical in our entire ecosystem and certainly in your offerings. So Gagen, pleasure to always speak with you and thank you for joining me here today and I look forward to a future conversation. So thank you. >> The pleasure is all mine. Thank you Shia very much. >> Thank you.
Learn how rising cyber threats and regulations drive innovation. NetApp uses AI-driven breach detection and isolated recovery environments with proprietary AI scanning for safe, malware-free restoration.