BlueXP is now NetApp Console
Monitor and run hybrid cloud data services
[music] Hi, good morning, good afternoon everyone. Um, and welcome to IDC NetApp Rubric roundt discussion how to build a cyber resilient hybrid cloud. My name is Rashni Sherura and I'm responsible for IDC's enterprise infrastructure research uh across Asia Pacific and I have these two lovely gentlemen with me. Um Andrew Fu from Rubric. He's head of umsales engineering uh Asia Pacific and then of course Chris Gund who's technology evangelist at NetApp Asia Pacific. So um they'll be joining me back for the discussion. But let me just kick off uh today's session with a quick backdrop of where we see things uh in the industry um from a business transformation standpoint uh um theshift and the move towards uh digital infrastructure and how hybrid cloud is the key underpinning for that. Uh and of course you know what's the state of cyber resiliency readiness of organizations in this part of the world. So let me just uh quickly share my slides just to show um give you a quick snapshot. I won't bore you with uh too many slides. Um so let me just quickly get started. Uh we ran a piece of research um last year across Asia Pacific with about 440 organizations and we asked them one of the questions we asked them was look what is themix of revenues that you're getting from digitally connected products services and customer experiences and the respondent said on an average about 34% um and that is expected to go up to 51% in the next 3 years. So clearly this whole talk about digital agenda, digital transformationuh is really starting to manifest in terms of um the business performance of every organization and not only commercial organizations. We see a lot of public sector organizations and uh government entities also starting to transform because the kind of experiences that the young citizens, the millennials and the Gen Z are starting to expect from governments not only in the more mature economies but also in the emerging economies like India and AAN countries is starting to change very dramatically. There's a whole emphasis on hyperpersonalization. There's a whole emphasis on being able to access government services through digital channels. And of course um we believe the economy uh is transforming at a very rapid pace. Uh transformation is taking place across vertical industries which is why twothirds of the region's economy is going to be digitalized um in the next um several years and that's going to drive $1.2 $2 trillion in investments in transforming people, processes and technology to achieve uh the digital outcome. Now the interesting thing is only 6.5% of the Asia-Pacific organizations have truly built digital resiliency to address any future disruptions in business uh and invested in the right digital capabilities and this is extremely important because if organizations are going to be su are intending to be successful and they want to build sustainable competitive advantage then they need to have the right levels of digital resiliency business resiliency uh and of course being cyber resilient uh to be successful and have non-disruptive business operations. Now of course one of the questions we asked them was look where are you in terms of your digital readiness and how strategic or tactical your plans are in terms of transforming your organization. And the interesting thing is only about a third of the organizations are really taking on a much more strategic approach to digital transformation. Which means these are the organization that have closely aligned or tightly aligned their digital strategy to the company's overall vision and business strategy. Um and that permeates across line of businesses and business function. Now the advantage is that these are the organizations that are also able to leaprog their competitors into the future and also build sustainable comparative advantage. But as those that are taking on a much more tactical approach are seeing limited benefits of any of the additional agenda. So clearly more organizations would need to move towards the right as we go forward into the future. Now, of course, every organization that intends to be successful needs to build the right capabilities in terms of having uh a digital infrastructure or mission critical digital infrastructure in place that can deliver or help run not only a traditional business critical or core applications but also many of the new modern cloud enabled datadriven application that are helping to drive all these digital outcome that we're talking about. Now when we ask them look what are the biggest barriers the number one challenge is missionritical workloads are having latency performance and security constraints given how these applications continue to be run using traditional platforms and legacy systems in many of the organizations. So there's a very big focus on modernization of not only applications um and workloads but also the underpinning infrastructure. In fact what we believe is the infrastructure and application modernization has to go hand in hand. The other challenge that many of the organizations face about 58% of organizations are facing is they're starting to build a very large desperate and highly complex environment. Multiple data centers multiple clouds both public as well as private uh clouds that are sort of starting to run in silos. And all this siloed infrastructure is creating a lot of complexity and is start starting to throttle innovation. And this is where you know many organizations are starting to say look we really need to build this hybrid cloud capability. You know, hybrid cloud is not only about just using multiple clouds, but really having seamless connect between these different destinations and locations where you want to run your workloads and data so that you can seamlessly drive data and application mobility as your business requirements change and evolve over a period of time. And of course um one of the other uh areas that every organization is um slowly and painfully working through is uh you know upgrading the skills or having the right human capital that will help them succeed in this new paradigm because the way you're building application microservices deploying them managing them uh and delivering business innovation is very different from how you've done it in the past.Now IDC came up with this framework for future of digital infrastructure last year to talk about you know how every organization would need to sort of embrace this future ready digital infrastructure to become the future enterprise uh and there are three key strategic imperatives to that. One is cloud native technologies or cloud centricity. Second is around autonomous operations. So every organization would need to quickly move away from manually provisioning, deploying, managing the infrastructure resources and services to an autonomous uh environment. And by autonomous, we are not talking about just building scripts that sort of automate the processes, but to be able to orchestrate the right infrastructure resources and services with the right levels of availability and scale using business KPIs and SLAs's in a much more automated fashion. And this is what is really going to help organizations achieve uh elements of business resilience that are becoming very critical. And of course, you know, uh to be able to deliver a ubiquitous experience and a ubiquitous set of processes, uh whether you're deploying applications at the core or at the edge locations or across the myriad of different clouds um that you would be using and consuming in your environment. And of course, a lot of CIOS and a lot of decision makers continue to ask us, you know, look, why do we need to modernize our infrastructure? Why do we need to change where when this infrastructure has served us well? And the reality is we really need to start to move to a much more software defined and less hardware hardwired infrastructure because we need a lot higher levels of agility, flexibility, scale, and resilience that we've all come to experience uh with public cloud. Every organization is now starting to create that public cloud-like experience and which is why we we're actually seeing a big shift towards private cloud and of course you know how you're building applications how the applications uh demand higher levels of RAS capabilities is very different today using APIs and single line of code that is being embedded into applications versus how um the infrastructure or the building blocks were sort of hardwired and optimized to deliver those higher levels of RAS capabilities in the future. Now, of course, the slide shows how um you know, organizations are running their mix of workloads across different destinations, public cloud, private cloud, and traditional infrastructure. And the interesting thing is um we still have about more than twothirds of the workloads actually running in traditional infrastructure and private cloud. And as we go forward, what happens is traditional infrastructureum orlegacy systems would continue to get retired and more of these workloads would either get migrated into private cloud or into public cloud as well. Now again the shift into public cloud of course is not a one-way street because we've seen tremendous amount of uh repatriation of workload back from public cloud into private cloud as well. In fact, the interesting thing is inthe more mature markets like Australia and Singapore um where we've seen the highest rates of uh repatriation of workloads back from public cloud because these are also the countries where we saw many organizations five seven years ago move lockstock and barrel um intopublic cloud and overthe last fewyears as the software tools have matureduh that helped them build that public cloud-like experience in their own environment. They started to realize that they can get much better performance, much higher much better levels of uh latency uh issues. um theycan get much higher levels of performance um and they can drive uh higher levels of speed um versus primarily using public cloud uh in the past which was all driven around cost optimization and which is why we seeing a much more pragmatic approach to workload placement across the different clouds and of course what customers actually need is really the hybrid cloud management platform that ensures seamless mobility of data and applications ations because what we believe is applications and data is going to continue to move both ways. Some would move from public to private cloud and others would move back from private into public cloud uh for the reason that the key metrics that will define where workloads should be running would continue to change and evolve over a period of time. Now, of course, any conversation around digital infrastructure and infrastructure modernization is not complete without the whole topic of cyber resiliency. And the reason for that is there is a growing number of ransomware and malware attacks that every organization is going through. In fact, IDC's research shows that 80% of the organizations and have had um a ransomware attack in the last 18 to 24 months and more than 70% of the organizations have had a malware attack andthe reason for that is of course you know the growing number of external touch points because today um your digital assets or data is not only being accessed by employees but your partners, suppliers, customers And also even within the organization uh a lot larger number of employees are accessing um you know different data points and digital assets and it becomes extremely important to build the right levels of uh cyber resiliency have zero trust capabilities so that you can ensure um the right access for the these different stakeholders and be able to proactively build capabilities to protect your digital assets because these will have not only direct tangible financial impact but also intangible impact. For instance, it can severely impact an organization's brand reputation. It can have uh serious implications uh from a risk compliance and governance perspective because many industries especially financial services and healthcare they're being governed by very stringent requirements in every country across the globe and even in this part of the world. Now where are organizations uh in terms of their cyber resiliency readiness and cyber security readiness? Uh and one of the questions we asked recently in our digital resiliency benchmark survey was um to understand look how ready are organizations and it it's interesting that only 30% of the organization are truly uh investing in robust and sophisticated capabilities that we would define as strategic. Um majority of the organization 70% of the organization as you can clearly see are taking on a much more tactical and ad hoc approach to building a layer of cyber security cyber resiliency in their environment to protect their digital assets. And increasingly we believe more organization need to take on a much more strategic view of how they're going to protect their digital assets in the future because these can have significant impact on your business on your organization's uh business continuity plans uh going forward. So clearly uh every organization needs to start to look at how they're going to build a much more cyber resilient hybrid cloud infrastructure that will help them compete and succeed in the digital economy. So with that uh I sort of come to the end of my pitch to kind of set the backdrop. So let me now sort of open up the floor with these gentlemen Andrew and Chris. Uh welcome back. Um let me stop sharing my slides um so that we can uh kick off the conversation. Now can you tell us Andrew um as organizations sort of start to embrace this whole digital transformation and move towards hybrid cloud? Um what are the kind of capabilities um they need to sort of build uh to become a much more cyber resilient organization? And of course um where do you see most organizations in this part of the world in terms of cyber resiliency readiness based on your experience working with customers? >> Yes. No. Well um thank you. That's a great question Rajnish andcertainly in terms of the word that you've just used there with cyber resiliency thatcertainly has become you know a hot topic um inthe industry um and one that is um being prioritized in a lot of companies andboardrooms today as we speak. Um, you know, from a capability perspective, um, companies that want to become cyber resilient or a cyber resilient company, um, typically would actually need to look at capabilities that have a plan and measures that allow you to go ahead and protect and recover your critical data um, and business applications from disaster events. And these days, you know, disaster events include um cyber attacks includes ransomware. In fact, um it was just yesterday um I was uh I was driving and uh Iheard on the radio thatwe are living in the age of ransomware, which is certainly very true today. you know, capabilities um thatwe want to look at are typically um you know, whatwe call uh you know, zero trust data management, which I'll go through and talk a bit more about that. Um it's making sure that you've got those multiple layers of security um that prevents you from never getting um you know, never being in a situation whereby your business gets shut down from a cyber attack. um making sure that you've got um you know simplified and defensibleaudit processes that you know allows you to be you know tomeet your compliance. Um you know one of the things that you know here at Rubric we want to make sure is that you know we actually provide that collaboration using you know common set of tool sets because you shared before in some of your slides over there where um you know there is you know multiple tools um andum you know administrators or users that um don't have you know the capability in doing so to go ahead andwork together proactively collaborating in preparation in responding to an attack, right? So, you know, thatall boils down to the point where you know you as an organization will have the ability go andmake sure that you don't have to pay that ransom. >> Great. Now, Rubric was one of the first companies that sort of started using the phrase cyber resiliency. Now, a lot of people tend to sort of interchangeably use cyber resiliency with cyber security. Now are these two the same things?>> Um [clears throat] that's a great question. Theyare related yet both distinct. Um today we are seeing companies shift from just talking about cyber security to being more cyber resilient and they do share the same tenets of data protection and business continuity but each also focuses on different aspects of protecting businesses in a digital age. Um both however are an essential part of any organization's cyber security strategy. Um cyber security is your first line of defense right it minimizes the risk of cyber attacks getting into your organization.Cyber resiliency is your last line of defense. So being a cyber resilient organization allows you to endure and recover quickly right when if not but when cyber attacks do get through um you know here at Rubik you know weget a lot of uminputs um and feedback from our customer advisory board um and they're telling us that you know ransomware um and cyber resiliency is really the number one reason why they have to pay attention to their backups. Yeah. And of course also being able to build proactively capabilities to thwart these growing number of ransomware and malware attacks. Um Chris um you know NetApp has you know transformed significantly over the years from being a storage company to a data management company um in the cloud or in the hybrid cloud world. Um, howare you guys helping customers truly leverage the value of data and help accelerate the datadriven innovation using this vision that you've built around data fabric? >> Yeah, brilliant question. Uh, thanks Rajnish. Um, so the data fabric uh isn't a particular product. It is actually the collection of our portfolio of technology that uh we've innovated over the years from very humble beginnings uh in the data center through to what has become this distributed infrastructure environment we now refer to as the hybrid multicloud. And so as more and more abstraction from infrastructure happens away from your asset data uh andwe've seen this as we're moving towards infrastructure as a service through to platform and right down to software as a service. Theonly remaining asset left for most businesses that's actually theirs that they have control of is the data. And so from a data fabric perspective, we see the ability to have choice in where you want to uh deploy your workloads and your applications uh is important because you may have reasons why you can't adopt an infrastructure as a service offering. You may have reasons why you are only going to be in the cloud and cloud native. But more often than not, we're seeing more and more of our customers in this hybrid multi cloud state across a distributed infrastructure model. So,what are we doing that's different that's unique that's enabling our customers to digitally transform to uh adopt uh ecosystems that make sense to them. uh we're doing this by trying to provide that same familiar experience and same familiar capability irrespective of which infrastructure environment you choose to deploy your applications in. Now this uh takes on many forms. We still uh create infrastructure for data center environments. We are inherently native in the hyperscalers in Amazon web services, Google cloud platform, Microsoft Azure and uh we are also innovating in the new cloudnative world around micros service architecture andserverless and containers where again further abstraction of infrastructure from the data is happening and we call this applicationled infrastructure. It used to be we took time to build the data center anddeploy infrastructure so that we can run the application. Now it's turned on its head. The developers aregiving the application the power to call on the infrastructure as necessary because of the elasticity and the availability ofcloud in the hyperscaler or even private cloud elastic architecture on premises. So in a way having that same functionality, that same capability uh in any environment that you find us in uh addresses a lot of the challenges around uh how will I serve my constituents uh in the data needs that they have and how will I leverage those data management services not just to deliver the application performance but also to enjoy the same capabilities we've had in the data center for many years in the hyperscalers which cloudnative environments don't necessarily do. They're not in the business of really giving you a distinct differentiated service. They're in the business of offering you infrastructure as a service. So these are large data center environments are built to be shared infrastructure commodity and there is a perception that uh you know public cloud whether it's more secure or not um is around the responsibility of these workloads and the responsibility of data ultimately and that's why I think we've seen some uh repatriation as you mentioned earlier ro >> okay great so if a customer is you know embraced your data fabric vision um and they're of course using all the systems and tools and technologies that NetApp offers, are they able to have one consistent set of data operations practicesuh for managing workloads and data in the public cloud uh resources or destination as well as what they're doing in private cloud or at the edge or at the core location or they still have to sort of have different management dashboards, different orchestration tools um you know all sort of distinct silos of management uh platforms in their environment. >> A brilliant question and theshort answer is that uh at NetApp we have a significant focus around user experience. It's becoming increasingly important because the more the distributed infrastructure environment you have the more your risk increases. And you were talking about uh you know the human currency earlier on. If I need to manage a team that h needs to have specialist skills in multiple different ecosystems, I'm either going to blow out my costs or I'm going to burn out an existing team. The more of these standard operations, I mean, we talked about threats to data and cyber resiliency needs to happen everywhere ubiquitously. I think I like the term that you used earlier, ubiquitous uh deployment. um the more um of these environments we adopt and embrace, the better for us it is if we have less to manage so there's less risk and less complexity but a more consistent and seamless outcome across these environments. And that's what the data fabric aims to do. When we deploy infrastructure in the data center, the capabilities of that infrastructure are equal to the capabilities that are deployed across the hybrid multicloud. On top of that, when we need to for reasons like disaster recovery or migration move workloads between these ecosystems, very rarely if ever uh do the users of our technology need to go into those ecosystems. It can all be driven and managed from the NetUP user experience. And uh furthermore to that data services themselves while infrastructure has evolved and I spoke about this earlier from you know physical systems to virtual systems to containerized and serverless the one constant through that is the data and the data still needs to be protected and most importantly which I think we're going to get to needs to be recovered and needs to be covered rapidly and in an automated fashion and um there are some challenges around that itself as you expand into multiple different ecosystems.>> Great. Let me switch gears and u you know pull Andrew in now. Andrew um how is Rubric really helping organizations build this cyber resiliency or higher levels of cyber resiliency uh that is going to be critical for their business continuity and success in the future. >> Um another good question there Rajnes. Um now you know I'llactually go ahead and answer >> and sort of differentiate yourself in the industry. Uh so would love to hear your perspective on that. Well,yeah. No, so you know, I'lltalk about, you know, I mentioned before that the, you know, we'reshifting mindsets from cyber security to cyber resiliency and how Rubric is actually helping ourcustomers and organization become more cyber resilient um is through our, you know, zero trust data management principles, right? And I'lltalk a bit more by, you know, giving you a bitof a visual. And in real time, what I might do is I might actually uh share my screen here. Um if uh if you guys can actually see this, I'll share my window. Is that coming through? >> Yes, itis. Uh >> great. >> great. >> great.So now you know more and more today boards areasking the question you know ishow's how safe is my data right you know they're asking you know what is our cyber resiliency agenda um and what measures are we putting in place to minimize you know the impacts of attacks and be able to recover quickly right and with any security focused company um you will have multiple layers of security to keep the bad threats out, to keep the bad guys out, right? This is your perimeter security, your network security, your endpoint security, your application security, all there to protect your data. Um, but the attackers are still getting in, you know, they're getting in through fishing attacks, they're getting in through spam emails, through Trojans, right? how Rubric does it and how we differentiate ourselves um from inthe market is we have cyber resiliency that's built in to the core of our architecture right and this provides our customers organizations you know security at the point of data that's whereyou see that cyber z resiliency built in so when attackers do get in um and they do you know you are sure thatdata pro is protected right so I'll give you an example let'stake a look at how ransomware you know attacks an organization Rajnish right one is that they compromise your network you know they load the malware and they move laterally within the organization right and then they scan and they excfiltrate your data once they've done that they go ahead and look to compromise your backups and then from there they will go ahead and encrypt and extort that's when you get that ransom note right so in this scenario companies ask three key questions right how do we secure backups from security threats right how we do know how do we know what's potentially exfiltrated you know what data has been compromised and how do we know what and when to recover um and automate it. Right? So this is where you know zerotrust data management comes in. Right? Theprinciple of zero trust data management assumes that you will be attacked right and that you actually have astrategy and a plan to be able to recover quickly. Now you know legacy storage centric backup software struggle with this. you know, first and foremost, um, we talked about the complexity, um, and being, you know, difficult to manage. Um, Chris talked a bit more about, um, about that earlier on, right? Um, when attackers do get in, right, your backups are modified and deleted and you have multiple attack entry points from there, right? Once they do that, right, yourbackup targets are affected. you know, they'revulnerable because of disbased storage backups, you know, through standards and protocols. And once your backups are compromised, that's where your primary storage or your um your production environment becomes an irreoverable event. Right? So, Rubric helps customers become cyber resilient organizations with a zero trust design. And how it works is through these capabilities that you actually see here, right? First and foremost, you know, by having a modern data protection platform. And this is the beauty of, you know, the partnership that Rubric and Natap has. Both organizations, right? Um, you know, consolidate and provide asingle platform that is born in the cloud, API driven, right? And we're both we provide policydriven simplicity in how we actually approach our backups, right? You know, both rubric andadd up, right? Um allow users to go ahead and manage millions and millions of objects with a single click or an API call. Now, why is this important? Because, you know, you want to be able to manage this at scale, right? When you have an explosion of apps, you know, an explosion of data, um, and the speed of which these attack vectors now are increasing, youcan't be managing, you know, this byeach application, um, or each data asset, right? Um, you know, also having, you know, a uh always available data, right? You would you will hear the term immutability um whereby um you can only append it's an appendon file system that's protected by an air gap um architecture and thathelps you protect and safeguard your data. built-in forensics, right? Making sure that, you know, whatever is happening internally, you know, we are always, you know, analyzing andensuring that, you know, in an event of attack, we can always go back and order that andcome back and say, "All right, you know, these are your data yourdata sets that have been compromised. Here is the blast radius of, you know, what the attack is in your organization, right? API integrations. I talked about making sure that your IT ops and your sec ops teams are collaborating, right? And having, you know, these um API integrations into yourseams and your saw platforms allows that cross collaboration and for teams to work together using that common tool set, right? and instant recovery. You know, that's where we actually have the ability to come in and say, right, we can go ahead and recover your data and recover it quickly to minimize the downtime that your business will actually incur in an event of an attack. Right? So with life mount you know we can have faster RTO's um we can get better RPOS and we can actually go ahead and re reinstantiate your virtual machine or your application up you know in a matter of seconds right um now you know Rubik does that you know by using multiple layered security architectures you know I mentioned before having that immutable file system is important right append only um making sure that you know it's not going to be able to be edited modified in any way but also having you know multiffactor authentication and temporary one-time passwords where we don't trust um anyone thathelps you protect you know yourbad actors that oraccounts that might have been compromised internally in organization right um and also you know with um withthe retention locks, right? We provide the ability to ensure that once you go ahead and you define the SLA domain or you define your policy thatis not actually changed in any way. Right? So thatis one of the um theum security principles that we actually provide to organizations and customers in terms of that capability. >> Okay, great. Um so Chris um NetApp also has uh a bunch of um capabilities and you've had them especially around uh you know doing um data replication and protection in the public cloud um and being able to do cross region replication. In addition to that you guys have also recently announced uh um things offerings such as cyber wall data bunker immutable storage. So one, what are these unique capabilities? What are the unique capabilities of these offerings? And two, how do they sort of complement uh your partnership with Rubric and what Rubric brings to the table for customers? >> Yep, a brilliant question. And um uh I guess uh the first way that I'll answer that question is you know being an organization that's innovated consistently for almost three decades now. We've seen the evolution of needs from data and that data lives somewhere on some sort of storage. that foundation that we lay of storage with the uh data service on top needs to inherently have some capabilities under the hood to react quickly if not instantly to when data shifts happen. So we've all heard of snapshots and replications for many years and snapshots inherently within a storage system uh can happen one of a couple of ways. I'm not going to go into too much technical detail, but some of these ways are aren't very efficient. The NetUP way is extremely efficient in that we created a method of always writing to new areas of the storage that gives us a lot of flexibility, gives us a lot of uh significant performance capabilities, but on top of that, it also lends itself strategically to data protection and recovery operations. Now, as you take that technology and spread it across different environments, um we deliver this as a production and primary data service. Our partnership with Rubric is all about the best of both worlds in what we can leverage out of our technology and what Rubric can leverage out of our technology as the I guess uh delivery mechanism of data protection and disaster recovery while we're delivering theproduction activity. So what I might do is uhI'llshare um my screen just for a moment very quickly to talk about you know the partnership whatis I guess um unique about our partnership andwhy we are ultimately better together. NetApp in itself we spoke about the data fabric the capability of having that ubiquitous data management data experience across a hybrid multicloud uh environment. Rubric very similar in their omniresence across all these infrastructures and environments. So it makes sense for us to connect together. Rubric is also really good at leveraging the extended NetApp portfolio in orchestrating movement of data protection copies uh from primary snaps to secondary copy area through to tertiary long-term retention copies as well. So the data fabric plus the zerorust data management model that uh Andrew was talking about really helps to address a lot of the challenges that we've been talking about today on how to build a cyber resilient hybrid multicloud. We say a lot in that sentence. We're talking about cyber resiliency beyond just the perimeter um beyond just the uh precautionary and prevention. We're talking about rapid recovery automated rapid recovery. We're also talking about a hybrid multicloud, multiple data center environments. You need a solution that you can rack and stack in the data center that works just as good as being able to be automatically deployed in cloudnative environments and hyperscalers. And this is what makes us uh unique in the industry. Our combined offerings together, there's very little if no environment left uh behind in terms of what we can offer for that uh holistic cyber resilient approach. um three things that I wanted to also um reiterate for what Andrew was talking about and bring to the surface why this is important. The protection is just one piece of the puzzle. Um being able to do this in an immutable fashion and airgapped means that the blast area thesurface area of attack it gets more complicated and more distributed in hybrid multiloud. So the more that we can do together to uh keep giving that service level across these multiple environments uh in a in the same kind of fashion and the same offering and the same user interface and experience the easier it's going to be for our customers. But then the next two points there recovery we talked about a disaster is taking out an entire system. It's not just I can't get to my data myapplication's offline completely. There are different types of modern-day disasters and a ransomware attack uh in some instances will go after the system itself not just the data rendering the whole application being offline. Now that last point is that potentially exfiltrated sensitive data. This is extremely important Rajes. You talked about brand damage in terms of a ransomware attack. Now, it could be one thing to get your systems back online quickly and in an automated fashion, but do we know what the attackers have stolen? There's two stories you can tell. We have had a breach. We've notified the authorities and we've told all our users to change their usernames and passwords or we've had a breach, but we've isolated and identified that data that was impacted and we can assure that no sensitive or personal information has been excfiltrated. So cyber resiliency and holistic cyber resiliency takes far more into account than just the storage service immutability and recoverability. We're also thinking about information. So the last thing that I want to touch on before I just finish up about the partnership is the things that affect um data protection performance. A lot of folks that work in data protection will talk about the density and capacity of data. how much of that data has changed and how much of that do I need to kind of shift or move in my backup window andoperationally and operationally this gets compounded significantly when we need immutability and I like to bring to the surface what is immutability some people just think worm if I switch on worm which makes something locked um that usually comes at a cost it's either costing me performance or it's costing me storage unless there is some sort of int intelligent appendable immutable file system like what uh Andrew was talking about earlier, you will not get zero trust without compromise or sacrifice. And this is where the NetApp and Rubric partnership really comes to play. So justclosing from uh from my um kind of presentation here um the deep integration between our two organization leverages the best of our unique uh universally uh unique differentiators. We have this capability of looking at what has changed just between highly efficient snapshots in any of these environments. Taking just those change differences and moving them off very efficiently to secondary and tertiary storage. So we are getting the zero trust and the immutability and the resiliency without compromise and without sacrifice. And this is what businesses really need as they want to get that speed is the new scale across these environments. You see there public cloud, private cloud, uh on premises applications, different types of specific and unique data. Together we are bringing assurance, security, mobility, governance, uh as well as the protection. And I think this is what really makes us stand out, this partnership stand out. >> Great. Um Andrew, so how are you guys, how is Rubric sort of helping customers move off their legacy environment? because I'm sure there's a lot of inertia out there in the industry where people are saying look uh I'm very happy with where I am with the state of affairs uh how we protecting our digital assets uh and there is no need so how are you sort of helping them understand realize the value of modernizing their cyber infrastructure uh one and two um what are the key steps that they need to take two or three steps that they need to um to embrace this modernization journey uh in a much more accelerated fashion. >> Yeah. No, thanks Rajnes. So,first and foremost, you know, ourpremise isin working with our customers to go ahead and modernize their data protection platforms and we do that through our products, our solutions, our partnership with NetApp. Um very much partof that is very much embracing the hybrid cloud, right? making sure that you are futurep proving your um yourdata protection strategy for your organization. So for us, it's not just about being able to go ahead and protect your data that's in your data center. Um data that's on premise, it's being able to go ahead and protect it in your private cloud, being able to actually protect your cloud native workloads as well. um whereby you know we either protect it on the cloud or we have data that's sitting on premise that we also go ahead and move up into long-term retention. So that agility that flexibility is veryimportant. The other aspect and Chris had it in his slide just before and it was right in the middle. It had you know snapright and this is where thevalue of the partnership comes in. We often talk about making sure that you have maximum uptime. We often make talk about RTO's, RPOS's. Um your apps need to be up. But when you talk about the data, right, and I think the last time I looked at this statistic, um is that um you know the data, you've got 80% of the world's data is unstructured, right? you've got lots and lots of data that's sitting in NAS appliances or NAS storage systems out there. Um inhaving that a lot of organizations often either one you know it becomes a um something that it's not as easily you know portable to the cloud or they may not even consider backing that up. The beauty about the partnership and the integration with snap diff is that you know we actually provide that efficiency with NATAB. We actually provide that speed that performance of protecting your NAS your unstructured data through that snapde integration. Um and what that isyou know think about if you come from a database world you've got this concept of CDC or change data capture. It's a you know it's a data access pattern that allows you to go and you know take action on change or incremental data right if you've got 500 million objects and pabytes ofunstructured data right with rubric and natap right we don't have to go and scan five 500 million objects right we will know and be able to go and protect that data therefore reducing the time reducing you know improving the efficiency in ensuring thatpart 80% of your organization's data is also protected.>> Great. So we sort of coming to the end of the discussion. If you have to leave a couple of key messages for the audience on how they should approach cyber resiliency uh and you have only 30 seconds what would each one of you uh tell the audience today? >> Iwould say think holistically. Don't just think about a restore from one particular cyber threat attack. Think about the combination of your perimeter security the prevention. Think about the zero trust model. Maybe leverage some sort of user behavior analytics so that you can detect the inside bad actors and internal threats as well as the external threats. And then also think about the rapid recovery and the automation of that rapid recovery andthe risk of what information may have been exfiltrated. When you have that holistic view and think about uh protection and recovery as the last line of defense, typically what you'll find is security and storage organizations in and business will come together uh to provide that holistic cyber resiliency. Yeah, I'll >> what Chris has to say there, Rajnes. Um, you know, he's hestole some of the uh the things that I would have called out, but you know, if I were to also call out, wetalked about, you know, cyber resiliency and cyber security before, right? Cyber resiliency needs to be absolutely needs to be part of yourcyber security strategy. Um, ransomware today isa disaster event. Um, and you have to have a ransomware remediation plan. You know, ifyou ask if you can't answer questions, you know, ask yourself these questions. If you can't answer how you can ensure your backups can't be compromised um by a cyber event [clears throat] or if you're not confident that your organization is not able to go and pay or is will have to pay a ransom if you are attacked. um that that's something where you need to go ahead and make sure that you know all those principles and all those things that we spoke about from a zero trust umperspective needs to be part ofwhat you actually do going forward. >> Great. So I ifI was to sum up I think uh what you guys are saying is basically one organizations need to start taking a much more strategic approach to cyber resiliency. Cyber resiliency is not the same as just cyber security, but it is really taking the key tenets of cyber security and data protection and sort of mashing them up together. Um, and what we now sort of define as cyber resiliency and of course um some key technologies that are really going to be the cornerstones of having the right cyber resiliency capabilities. one which is immutability uh or immutable file systems. Uh having the right air gapping uh technologies in place uh and of course sort of looking at security in a much more holistic fashion um and also looking inwards as well because a lot of the cyber security attacks and ransomware attacks tend to happen where you are actually not looking at um which is within the organization. So I think every organization needs to take a much more holistic view of security given that your digital assets are kind of quite spread out across different clouds and the rapidly expanding uh sprawl of edge infrastructure. So um with that I think we come to the end of the session. It's been a pleasure gentlemen uh talking to you. Um I don't think we have any time to take some of the questions that have come in from the audience but I think we'll get back to the audience um with all the responses and answers to their questions but uh thank you so much um for your time today. >> Thank you very much Andrew. [music] >> Thank you Chris. Pleasure talking to you.[music]
Cyber resiliency should not mean counter-productivity. We want to show you how to be the best version of yourself by not letting productivity and innovation slow down due to the increasing sophistication of Ransomware and Cyber Security attacks.