BlueXP is now NetApp Console
Monitor and run hybrid cloud data services
(film clicking) (musical flourish) (gentle piano music) (optimistic music) (phone ringing) (participants chatting quietly) There's that camera guy again. What is he doing here? It's a surprise! Wrong. Tell me now. He's making a documentary. On what? Ineptitude in action. Well, you asked me to write up about the factors that allowed us to avoid the recent malware attack. You mean the one last month, or the one you caused yesterday? Last month. Anyway, we thought- What do you mean, "we?" It would bring more value if we turned it into a training video so others could learn from it, too. And I no longer have any doubts that they will. Wait, is this why you were so over budget this quarter? Oh. Spence, I asked you to email me with a couple bullet points, not to make a damn movie. People are way more engaged by video. I mean, who's gonna read a dry old email with a bunch of bullet points? Nobody. Everybody! That's their damn job! I mean, you wanna tell a story. Have people you can relate to. No company in their right mind would drop a ton of money to tell a story they can accomplish with a simple email or PDF. It's ridiculous. Okay, I think I'm ready. Yes! (slapping table) Of course. This is the big surprise. We had it all planned all along. I'll just hand it over to my partner in crime, my main man, Will Doucette, Will Do, The Big Deuce! Don't call him that. (phone clicking) (message notification chiming) What's going on in there? Spence just called Will the Big Deuce. Eww! For true cyber resilience, you need an architecture that delivers simple data management to identify and protect all of your data, to detect and respond to all threats, and to recover quickly, with minimal exposure, both on prem and in the cloud. We're quite keen on cloud. But we're not really there yet. We have a cloud-first mandate, though. But worry about cost and security. No need to worry about either, Gabs. You told us to worry about both last quarter. I was still a quarter shy of a full buck. Naw'm sayin'? No! I'll let Will tell you. I have no idea he's saying. But, the NetApp portfolio simplifies everything, because it's built on NetApp ONTAP software, which gives you a seamless experience across edge, core and cloud. We're worried about migrating data, but also about storing data in the cloud, because we're in financial services. Sure. So the NetApp platform discovers all your data automatically, and then classifies it whether it's on NetApp or non-NetApp storage. That's the identify piece. A quick search shows where all the data is stored, how sensitive it is, and who has access. That would save me so much time compared to all the Python scripting and guesswork I've been doing since the attack. Yes, we need to smarten you up! You can run quick reports to assess compliance with regulations like PCI DSS. And since you always see right where your data is, it's actually a great way to prep for data migration. Will Do tell. Will, do tell. Will do tell? You don't get it? Yes. We all get it. Protection is built into the NetApp platform. So both local and remote copies are secure and efficient, making recovery from cyber threats much quicker. Combined with automated data discovery, it makes the question of what data to protect easy to answer. Any other easy questions? Effective threat detection is your next consideration. With NetApp, you can use AI to quickly identify storage and user behavior anomalies. Meaning?if I login every weekday at 10:00 a.m., and access three directories and ten files and that's it, the NetApp platform will automatically learn that's my normal behavior. It will then monitor to detect any changes. So suddenly if my user account logs in at 3:00 a.m. on a Saturday, that'll throw up a red flag. If I try to access a thousand directories, or modify files from another department I never normally touch, that's a red flag. NetApp will recognize that unusual behavior in real time and respond by blocking the user account and create a snapshot copy to protect the data. Exactly. It's like, I have this app. And if I try to text my ex-girlfriend after 10:00 p.m., I have to answer three math questions and then my phone blocks automatically. It's like that. Does that work? Like a charm. I think that's a red flag. Because if she won't respond, I don't have to recover. Just curious, Spence. Are you still working for our company, or for Will's? (chuckles) Great question, Jack. That depends. Are you buying it? (all laughing) You sure better hope so.
Third Bank needs help in figuring out a solution after their data ransomware attack. Using key principles of effective cyber resilience they can protect data, detect threats, and recover quickly with minimal data loss.