Cyber Resilience: A Framework PDF
Document Details
Uploaded by QuaintOphicleide
Tags
Related
- Cyber Risk and Cyber Liability Insurance PDF (University of the Witwatersrand)
- Chief of Detectives Notice PDF - October 30, 2019
- ANNEX Guidelines on Cyber Security Onboard Ships v.4 PDF
- Good Practice Guidelines 2018 PDF
- Séance 1 à 7 Intra (Études Commerciales Supérieures de Montréal) PDF
- Singapore's Anti-scam Public Education Approach PDF
Summary
This document provides a framework for cyber resilience, outlining key aspects like protecting against attacks, minimizing recovery time, and quickly responding to incidents. It also highlights the importance of cyber resilience by discussing the cost of downtime and the various types of cyberattacks.
Full Transcript
### Cyber Resilience is a Framework 1. **Protecting** and **Detecting** against attacks and privileged users 2. A plan to minimize the overall **Recovery** Time, which includes Work Recovery Time. 3. Quickly **Respond** and **Contain** the cause as quickly as possible. Why Cyber R...
### Cyber Resilience is a Framework 1. **Protecting** and **Detecting** against attacks and privileged users 2. A plan to minimize the overall **Recovery** Time, which includes Work Recovery Time. 3. Quickly **Respond** and **Contain** the cause as quickly as possible. Why Cyber Resilience? --------------------- ### Protect your Treasure: Data - The next five years will see a 15% increase in cybercrime costs reaching 10.5 trillion by 2025. -- Cybercrime Magazine. - Cybersecurity Ventures predicts crypto crime will cost the world \$30 billion annually by 2025. - Ransomware will cost its victims around \$265 billion (USD) annually by 2031. -- Cybersecurity Ventures - 80% of reported cybercrimes are generally attributed to phishing attacks in the technology sector. - AI-driven cyber attacks are rising with a 66%increase in deepfake phishing, 30% enhanced malware, and 32% rise in brute force attacks. - AI's role in tailoring social engineering campaigns has grown by 90%, due to its ability to manipulate behavior with more precision. - Supply chain attacks leveraging AI have seen a 200% increase. ### Cost of Downtime 1. **Financial Impact:** Downtime can lead to substantial financial losses. The financial impact depends largely on the size of the organization, for example, a company doing **\$10 million in revenue**, downtime can cost up to **\$55,000 per day** **(\$6,884 per hour or about \$115 per minute)** versus a company like Amazon that is doing **\$115.9 billion in revenue**, downtime can cost **\$816 million per day (\$34 million per hour or about \$9,615 per second)**. These numbers also do not include recovery costs, overtime, consulting fees, SLA penalties, regulatory fines, or data loss. You can access a Downtime Calculator [[here]](https://www.google.com/url?q=https://www.encomputers.com/2024/03/small-business-cost-of-downtime/&sa=D&source=docs&ust=1731079611892746&usg=AOvVaw0lLWPrHJMp1awAbm9rMw9Z). a. **Critical Applications:** For mission-critical applications, downtime tolerance is extremely low. According to ESG, 15% of users cannot tolerate any downtime whatsoever, and an additional 44% cannot tolerate more than 15 minutes of downtime. This means that a significant portion of organizations require near-instant recovery for their most critical applications. b. **Operational:** Organizations could see a loss of resources on projects as those resources would need to be diverted to handle the outage to resolve it quickly. Additionally, there is an impact on production, such as a manufacturer losing an entire production line for a few hours. Downtime can affect supply chain orders, debt financing, R&D, and costing market share. 2. **Reputational Impact:** Extended downtime can lead to the loss of customer trust, brand integrity, lower stock price, and damage to the organization\'s reputation. Ensuring quick recovery and maintaining business continuity is essential to mitigate these risks. 3. **Legal Impact:** Downtime can open organizations to lawsuits or cause them to lose industry licenses/accreditations. Lawsuits can drag on for years and generate further bad press. The loss of an industry license/accreditation could prevent them from performing business activity, essentially stopping production. 4. **Cost of Mitigation**: A data breach often means identifying the users impacted and compensating them with identity protection or restoration services by third party companies. ### Common Types of Failures & Attacks - Drives - Networks - Controllers - Arrays - Power modules - - - ### Cyber Attacks 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. ### Attack Vectors - - - - - - ### Ransomware Attacks - - - - - Crypto Ransomware/Encryptors - Most well-known and damaging variant - Encrypts the files and data within a system, making the content inaccessible without a decryption key - Scareware - Fake software that claims to have detected a virus or other issue on your computer and directs you to pay to resolve the problem; some types lock the computer, while others simply flood the screen with pop-up alerts without damaging files ### The Positive Business Impacts of having a robust cyber resilience posture 1. **Minimized Downtime:** Cyber resilience helps organizations minimize downtime following a cyberattack or other disruptive event. This is crucial for maintaining business continuity and meeting internal recovery time objectives and service level agreements (SLAs) with customers. 2. **Enhanced Data Protection:** Implementing cyber resilience strategies, ensures that data is protected and can be quickly restored. This reduces the risk of data loss and helps maintain the integrity and availability of critical information. 3. **Cost Savings:** By reducing the duration and impact of downtime, cyber resilience can lead to significant cost savings. This includes avoiding the financial losses associated with business interruptions and the costs of recovering from data breaches or ransomware attacks. 4. **Improved Customer Trust:** Demonstrating strong cyber resilience capabilities can enhance customer trust and confidence. Customers are more likely to do business with organizations that can ensure the security and availability of their data. 5. **Regulatory Compliance:** Many industries have regulatory requirements related to data protection and business continuity. Cyber resilience helps organizations meet these requirements, avoiding potential fines and legal issues. 6. **Operational Efficiency**: Regularly testing and updating cyber resilience strategies ensures that organizations are prepared for various types of disruptions. This proactive approach leads to more efficient operations and a quicker response to incidents. ### NIST Cyber Security Framework 1. 2. 3. 4. 5. 6. WEEK 2 ====== Govern ------ Govern essentially sets the organization\'s cybersecurity risk management strategy, and expectations. Within Govern the policies are established, communicated, and monitored. These activities are divided into 6 core areas: - Organizational Context - Risk Management Strategy - Roles, Responsibilities, and Authorities - Policy - Oversight - Cybersecurity Supply Chain Risk Management - Cyber Event Recovery Strategy - Business Impact Analysis - Disaster Recovery - Business Continuity ### Organizational Context ### Risk Management Strategy ### Roles, Responsibilities, and Authorities ### Policy ### Oversight 1. **Penetration Testing**: - Simulates real-world attacks on an organization\'s systems to identify vulnerabilities that could be exploited by malicious actors. Helps organizations understand how their defenses hold up against actual attack scenarios and provides actionable insights to improve security measures. 2. **Cyber Security Audits**: - Systematic evaluations of an organization\'s information systems, policies, and procedures to ensure they are secure and compliant with relevant standards and regulations. Identifies differences between an organization\'s current security measures and the desired state as defined by industry standards or regulatory requirements. Identifies and evaluates potential risks that could impact an organization\'s information systems and data by assessing the likelihood and impact of various threats, such as cyber attacks, data breaches, or system failures. ### Cybersecurity Supply Chain Risk Management ### Business Impact Analysis #### SLA #### Business Continuity Planning - Assessing functions: Prioritizing business functions like customer service, sales, and production - Assessing suppliers and service providers: Ensuring they have their own business continuity plans and are flexible - Complying with standards: Ensuring the business meets local, national, and international standards - Creating a plan: Outlining roles and responsibilities, and how to keep the business running (this includes people). - Using automated processes: Implementing failover and failback processes so that a secondary system can automatically take over if the primary system fails - A common tool for business continuity planning is a checklist that includes: supplies and equipment, location of data backups, where the plan is available, and contact information for emergency responders #### Disaster Recovery Planning #### RPO, RTO, & WRT Objectives - - - How long will it take an environment to recover from an outage? - How much does it cost your organization per hour or minute to be down? - Once the data has been recovered, how long would it take your organization to resume normal business operations? #### Determining RTO Per System ### #### Determining RPO Per System ### Testing Disaster Recovery #### ### How can Security features impact a customer\'s RTO & WRT 1. 2. 3. 4. 5. WEEK 3 ====== Identify -------- ### Data Classification 1. Protect data - By applying security measures to each data category, organizations can protect their data from potential threats. 2. Manage data - Data classification helps organizations efficiently manage their data assets. 3. Comply with regulations - Data classification helps organizations track regulated data and ensure compliance with government regulations. 4. Respond to data breaches - Classification labels, such as Tiers, help organizations identify the type of data that was compromised and prioritize data recovery based on importance. ### Legal Regulation ### Data Retention - - - - #### Types of Data Retention 1. - - - 2. - - - #### Data Retention Requirements - **Legal and regulatory requirements:** Laws such as HIPAA (Health Insurance Portability and Accountability Act) and SOX in the U.S., and GDPR in Europe, set strict guidelines on how long specific data types must be retained. For example, financial records may need to be stored for seven years under SOX, while healthcare organizations must retain patient records for extended periods as dictated by HIPAA. - **Business and operational needs:** Some data, such as operational records, intellectual property, or internal communications, may be kept indefinitely to support long-term business activities, research, or historical analysis. Organizations need to evaluate their internal needs alongside external mandates to determine the most appropriate retention periods. - **Financial and regulatory compliance:** Financial records, audit reports, and other documents related to regulatory compliance must often be retained for a set number of years to meet legal requirements. Failure to retain these documents can result in hefty fines, penalties, and audits. - **Heritage and historical preservation:** For organizations involved in preserving cultural or historical data, such as libraries or government archives, certain records must be retained permanently. Digitization of rare documents, books, or other artifacts is common in this area. - **Data protection and backup:** Backup data must be stored long enough to ensure it is available for recovery in case of system failure. The duration of backup retention depends on the organization\'s operational needs and its risk management strategy. Data protection laws may also dictate how long copies of data must be retained to ensure they can be recovered if the primary data is lost. ### Categorization of Data ### ### Data Prioritization Strategy WEEK 4 ====== Protect ------- Protect and Recover is where Pure Storage really comes into play. These sections will dive a little deeper to cover some Pure Storage concepts. ### Identity and Access Management - - - - - - - - - ### Zero Trust Architecture 1. 2. 3. ### Awareness and Training - - - - ### Platform Security - Comprehensive approach - encompasses securing all aspects of the platform, from the underlying hardware to the applications running on it, including user access controls, data encryption, and system configurations. - Resilience focus - Beyond just prevention, platform security prioritizes the ability to detect attacks early, respond effectively, and recover quickly from incidents. - Architecture design - Implementing robust security features within the platform architecture is crucial, like secure boot processes, hardware-based encryption, and trusted execution environments. - Continuous monitoring - Regularly monitoring platform activity for suspicious behavior and potential vulnerabilities is key to maintaining a secure environment. ### Data Security - - - - - #### Multi-Factor Authentication (MFA) #### Data Encryption #### Patching ### Technology Infrastructure Resilience #### Layered Resilience #### Snapshots - Data protection: Snapshots can help minimize downtime, data loss, and RPO. - Recovery: Snapshots can be used to restore an application to a previous state, which can be useful if there\'s a data breach or corruption. - Auditing: Snapshots can be used to audit the state of a database at a specific time. ### Replication Methods 1. **Synchronous replication** involves replicating every IO operation to the secondary copy before acknowledging the data is written on the primary volume to the host. Replicating the data in this manner ensures that if there is an issue with the primary copy of the data, every single IO will still be applied to the secondary copy. - - - 2. **Near-synchronous replication**, also known as continuous replication, involves streaming the changes made to the primary data as fast as the network link to the secondary copy will allow. The primary volume acknowledges the write back to the host while the data is still being replicated to the secondary array. Replicating the data in this manner means that there is no delay for the application write operation, but the changes are still being streamed to the secondary volume as quickly as possible. - - - - - 3. **Asynchronous replication** involves calculating the changes that have been made to the primary data after a given period, then sending those changes to the secondary copy, usually on a defined schedule. Replicating the data in this manner means that there is no delay in waiting for the write operations to be sent to the secondary volume before acknowledging the write to the host. - - - ### ### Multiple copies ### The "NEW" 3-2-1 & Why 3-2-1-1-0 is the Next Step - **Enhanced Security:** The addition of an air-gapped or indelible copy significantly improves protection against cyber threats like ransomware, which can compromise connected backups. - **Data Integrity:** The emphasis on zero errors ensures that backups are reliable and can be restored without issues, which is critical for business continuity. - **Comprehensive Coverage:** By addressing both physical and cyber threats, the 3-2-1-1-0 strategy provides a more robust framework for data protection and availability. ----------- ----------------------- ------------------------------------ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- **3-2-1** **3-2-1-1-0** **Strategy** **Definition** ![](media/image2.jpg) **3 Copies of Data** This could mean one production copy that contains live data with two backup copies. These backup copies are usually based on a specific point-in- time view of the production copy to ensure it is application consistent and can be restored without crashing the application. ![](media/image2.jpg) **2 Different Media Types** This could mean the primary copy is on flash media on the primary storage array. The second media type could be a cloud provider or a different storage array. ![](media/image2.jpg) **1 Offsite Copy** This could mean having an offsite copy in a different cloud service or separate data center than your primary data lives. **1 Air-Gapped or Indelible Copy** One copy should be either air-gapped (physically isolated from the network) or indelible (cannot be altered or deleted). This protects against ransomware and other cyber threats. ![](media/image2.jpg) **0 Errors** Ensure that all backups are verified to be error-free. This involves regular testing and validation to confirm that backups can be restored successfully. ----------- ----------------------- ------------------------------------ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- WEEK 5 ====== Detect ------ ### Anomalies and Events - Anomalies refer to deviations from normal behavior within a system, which could indicate malicious activity or system malfunctions. For example, a sudden drop in data reduction ratios (DRR) might signal an unusual operation or a potential attack, such as large-scale encryption followed by data deletion. - Events are specific occurrences that can be logged and monitored, such as unauthorized access attempts or system failures. ### SIEM, XDR, EDR, SOAR 1. - - - 2. - - - 3. - - - 4. - - - Pure Storage integrates with these solutions and can accelerate the detection and response strategies. It can quickly identify and extract relevant alert information, then automate responses via Pure Storage developed custom action scripts. Learn more with these links: - - - - Respond ------- ### Cyber Attack Containment 1. 2. 3. 4. 5. 6. ### Data Bunker and Clean Rooms - 1. 2. 3. 4. 5. ### Forensics and Analysis- 1. 2. 3. 4. WEEK 6 ====== Recover ------- ### Restoring at Scale from a Cyber Attack 1. - - 2. - - - - - 3. - - 4. - ### Data Restore Options #### Array Data Restores - **Individual block volume:** arrays can only restore the full volume. If the protected volume can be mounted to another host, the administrator can navigate to an individual file or directory and restore that individually, but the array will not be able to complete that operation. - **File system (NAS**: array can fully restore file system or individual files can be copied from a snap. The individual file restore may be possible to do without mounting the file system on a host depending on the file array. - **Array Based Disaster Recovery Methods (Video)** #### Backup Software Restore - - - - - ### What does it take to recover ### Regular Cyber Recovery and Disaster Recovery Testing ### Analysis of Cyber Recovery Event Week 7 ====== Section 2: How to Qualify a CR Opportunity ========================================== ### Who Needs Cyber Resilience? EVERYONE!! ### Qualifying the customer's value and need for change ### Customers and Industries with a High Need While every customer should have a solid cyber resilience strategy, there are some industries and customer profiles that have specific mandates or a higher propensity to address this need. These sectors often face challenges like compliance with regulations (e.g., HIPAA, SOX, DORA), the need for robust ransomware protection, and the complexity of managing disaster recovery. By addressing these pain points, Pure Storage positions itself as a comprehensive solution for ensuring cyber resilience and business continuity. ### Common Customer Challenges - **Complex Solutions-** These disparate systems often lead to performance bottlenecks, the need for more staff to maintain the infrastructure, and lead to frequent disruptions and inefficiencies. a. **Staff Education**- can require additional training for storage admins b. **Admin Errors**- can increase incorrect configuration, accidental deletion, and other errors that impact data availability or recovery. c. **Increased Management**- can require more time installing,configuring and testing the solution. d. **Unable to Scale**- as everything scales up, admins find that backup and recovery speeds decrease, the management gets more complex, and troubleshooting gets increasingly more complex, especially when there are products from multiple vendors as each vendor might need to be involved in the troubleshooting process. - **Outdated Solution Costs** e. **Opportunity cost** is due to the inflexibility, day-to-day care, and the management overhead needed when these systems fail to align with the evolving needs of the organization, leading to inefficient use of valuable resources. f. **Tech debt** is the cost of time, resources, and budget to modernize at some point, but they are potentially unable to do so because of the time and money invested in the existing solution. Here is the how to find the Tech Debt Ratio [[ TDR=(Cost to Fix Technical Debt/Total Development Cost)×100%]](https://brainhub.eu/library/technical-debt-ratio) g. **Sunk cost** is the idea that so much time and/or money has been spent on one the current solution that you might as well keep it. With the amount of money spent on a solution or with the reputation of the project leader at stake, organization leaders may decide that the best course of action is to continue with the current solution. - **Inefficient Restore Strategy-** can lead to prolonged downtime, significantly affecting business operations and potentially causing financial losses. A slow inefficient recovery process can also impact customer confidence and lead to regulatory consequences. h. Reduced Restore Speeds from offline Backup, Spinning Disk, or Physically Moving data- can be extremely slow and often add further delays. i. Lack of a Clean Room**-** difficult to ensure that restored data is free from malware or indicated of compromise j. Loss of Equipment for Forensics After a Cyber Attack- can severely disrupt restoring business operations. - **Inefficient Backup Strategy-** can lead to incomplete backups within the designated windows, increasing the risk of data loss. k. Slow Backup Speeds- make it difficult to fit large dataset backups into low activity windows l. Lack of Frequent Recovery Points**-** mean that more data is at risk of being lost between backups - **Slow Ransomware Detection-** Failure to detect ransomware promptly can lead to significant data loss and operational disruption. m. **Challenge**: Detecting ransomware attacks in real-time is crucial to prevent data encryption and loss. Ransomware detection involves identifying unusual patterns or anomalies in data access and usage, which can be computationally intensive and require sophisticated algorithms and containing the threat. - **Rising Costs** n. **software or product licenses** needed to be fully operational. o. **network bandwidth** may need to be increased to handle additional network traffic. p. **utilizing cloud storage** must be monitored carefully to ensure that there are no unexpected spikes in utilization and fees. q. **power, cooling, and floor space** costs need to be calculated as part of the budget r. **vendor costs** around service or support contracts and training for the admins to be able to manage the solution effectively s. **Insurance cost-** Organizations can purchase insurance for ransomware or cybercrime protection. If the organization does not have an adequate solution to protect against ransomware, their insurance costs could increase drastically or they may be denied coverage. ### Opportunity Drivers 1. a. **If a threat actor gained access to your environment how quickly could you detect their presence?** b. **Do you have an automated way to respond to detected threats?** - *Have you heard that the average breakout time these days is 90 minutes or less? Discuss how Pure Storage aligns with NIST CSF 2.0 to address holistic challenges enterprises face, ensuring comprehensive security and recovery to create a resilient architecture.* 1. **Inability to Adapt, Respond, Recover** - Next discover their current infrastructure's ability to adapt, respond, and recover from a cybercrime or disruption and get back to operational business. c. **If your environment was compromised how quickly could you recover your entire IT estate?** d. **Have you ever tested restoring your entire environment?** - *Emphasize the importance of rapid recovery and minimal downtime. Mention Pure Storage capabilities such as SafeMode™protected snapshots, which provide immutable and indelible snapshots to protect against tampering or deletion.* - *Highlight the use of ActiveDR for seamless failover and recovery to help businesses get up and running quickly after an incident.* 2. **Regulatory Compliance Readiness** - Then ask about their strategy to meet regulatory compliance and their plan if an attack occurred. Do they have a clean room ready to prove restored data doesn't still have malware? e. **If you were attacked by ransomware, do you have a clean room to scan and validate your recovery copies?** f. **If your infrastructure was confiscated by law enforcement, how quickly could you replace and rebuild it?** - *Mention the Cyber Recovery & Resilience SLAs, which includes quarterly resilience assessments and remediation services to ensure compliance.* - *Explain the concept of a \"clean room\" environment and how Pure Storage can help maintain such environments through features like SafeMode protected snapshots and comprehensive security assessments.* 3. **Recovery at scale**-The next topic to discuss is their ability to restore large datasets fast. Discuss how long it would take to restore not only their highest priority data, but all their data. Then discuss what the cost of downtime would be to wait for the restore. This is important to highlight and encourage them to test if they haven't recently. g. **If you were to lose half of your environment how long would it take you to recover, and what layers of recovery are currently in place?** - *Address the benefits of Rapid Restore and a Layered Resilience Architecture.* 4. **Modernize Current Approach without Disruption**- Next, discuss how they plan to modernize their infrastructure in the future to keep up with the growth and challenges AI brings and if their current approach causes disruption to their business. h. **What are the main obstacles you face when trying to modernize your current IT infrastructure?** i. **How do you manage upgrades and integrations with your existing systems?** - *Discuss how Pure Storage enables modernization with minimal disruption through non-disruptive upgrades (NDU) and seamless integration with existing infrastructure. Mention the flexibility and adaptability of Pure Storage solutions to evolving business needs.* 5. **ESG Commitments/ Additional Cost Reduction-** It is important to always discuss if they have any ESG commitments or the weight of maintenance costs specifically around power, cooling, and rack space. j. **What are your current limitations regarding power, cooling, and rack space?** k. **How do these limitations impact your ability to implement new solutions?** - Acknowledge the resource constraints and discuss how Pure Storage's efficient design can help reduce power, cooling, and rack space requirements. Highlight the energy efficiency and compact footprint of Pure Storage arrays, which can help customers achieve their goals within existing resource limitations. 7. Week 8 ====== ### Personas (101 Deck Slide 97) \[[[Marketing Personas]](https://docs.google.com/presentation/d/1evNPyp5RsnAsUvV7_IN_mN3O_KmD7Tc8176Z3o5wVoI/edit#slide=id.g2fac63b62fa_0_252) - [[Deck]](https://www.google.com/url?q=https://docs.google.com/presentation/d/1kzIOD_ov_IKdpOEWj3NoMaZYaup-Cx9WXm_r4KqDB1I/edit%23slide%3Did.g272aefc12e6_0_298&sa=D&source=docs&ust=1731079611769448&usg=AOvVaw278CprudpAUOYtQ1b3O9nK)\] #### Non Technical Leaders - - - - - - -. #### Technical Leaders - - - - - - #### Infrastructure Owner - - - - - - #### Security Officer/Administrators - - - - - - - #### Application Owner/Platform Engineer - - - - - - - #### Technical Infrastructure Administrators - - - - - - - ### Key Influencers in a Cyber Resilience Deal 1. - - 2. - - 3. - - 4. - - - Section 3: How to Position CR to a customer =========================================== - - - - - ### Why the Pure Storage Platform - Ensures agility and flexibility, effortlessly adapting as an organization scales. - Provides continuous NDUs to ensure the customer's system is always up-to-date and ready for any mass-storage challenge. - - - - - - - - - - ### Pure Storage Cyber Resilience Key Differentiators 1. 2. 3. 4. 5. WEEK 9 ### Pure Storage Platform Offerings that Support Cyber Resilience #### Pure Fusion #### Asset Management #### Policy-Driven Self Service Upgrades - **Fleet-Wide Upgrades:** Users can set policies to perform upgrades across multiple arrays simultaneously, reducing the time and effort required for manual upgrades. - **Self-Service Upgrades**: This feature empowers users to execute upgrades themselves, without needing to rely on Pure Storage support, making the process faster and more efficient ### Cyber Resilience Offerings #### Pure Storage Safemode Protected Snapshots 1. 2. 3. 4. +-----------------------+-----------------------+-----------------------+ | **Feature** | **Definition** | **Description** | +-----------------------+-----------------------+-----------------------+ | **Snapshot** | Unable to change | This is sometimes | | | | called Write Once | | (Immutability) | | Read Many, (WORM). | | | | Immutability often is | | | | simultaneously used | | | | to provide a chain of | | | | custody guarantee, | | | | ensuring that data | | | | has not been changed | | | | since it was first | | | | written to storage. | +-----------------------+-----------------------+-----------------------+ | **SafeMode** | Unable to delete/ | This is particularly | | | eradicate | important in | | (Indelibility) | | scenarios where data | | | | must remain unchanged | | | | for legal, | | | | regulatory, or | | | | operational reasons, | | | | ensuring that | | | | organizations can | | | | trust their data | | | | remains unalterable | | | | and undeletable, | | | | ensuring constant | | | | possession and | | | | recovery of data. | +-----------------------+-----------------------+-----------------------+ #### Snapshot Policy Simulation #### Enhanced SafeMode Management #### DRR Anomaly Detection #### Enhanced Anomaly Detection #### Data Protection Assessment #### #### Security Assessment #### AI Co-Pilot #### Pure Protect™//DRaaS- #### Cyber Recovery & Resilience SLA Add-on ### Where FlashArray and FlashBlade Fit Both FlashArray and FlashBlade are designed to provide robust cyber resilience, ensuring data protection, rapid recovery, and high availability. Each device has features that make its data as secure and recoverable as possible. **FlashArray Features:** - ActiveCluster and ActiveDR: These features provide high availability and disaster recovery capabilities, ensuring data is always accessible and can be quickly recovered. - SafeMode Protected Snapshots: Snapshots can be protected by SafeMode to make them indelible - Asynchronous Snapshot Replication: This allows for the creation and replication of snapshots to a secondary FlashArray, with the option for asymmetric retention policies. - Rapid Data Locking: is a feature that allows all data on an array to be quickly and, if desired, irrevocably rendered inaccessible or \"locked.\" - CloudSnap: is a built-in feature that allows customers to quickly send snapshot copies of their FlashArray or Cloud Block Store volumes to cloud targets like Azure Blob storage or Amazon S3 buckets. - Snapshot Offload: is a feature that allows snapshots to be replicated to non-Purity storage targets (AWS S3 and Azure Blob) and is used for backup, restore, migration, and DevOps purposes. **FlashBlade Features:** - High-Speed Backup and Restore: FlashBlade is designed for rapid backup and restore operations, significantly reducing the time required to recover large data sets. - Unified File and Object Storage: FlashBlade provides a scalable and efficient storage solution for both file and object data, making it suitable for a wide range of workloads. - SafeMode Snapshots: Snapshots are automatically protected by SafeMode and are indelible - Object Lock: is a feature that provides data protection by making objects immutable for a specified retention period. This means that once an object is locked, it cannot be deleted or overwritten until the retention period expires. - SafeMode Retention Lock: prevents bucket deletion after the object is locked ### So how do all these features, add-ons, and products work together? WEEK 10 ======= ### Portworx®Backup: Protect Kubernetes Data Anywhere - Get started faster than ever on a fully managed data protection service with no install and easy cluster onboarding with auto-discovery - Run apps in production with confidence with self-service management empowers app owners to centrally manage all backup and restore on their own - Makes it easier to backup and protect data just the way app owners need - Giving backup and restore policy setting to those who know best - Quickly backup and restore in a single click, and fully protect all associated application data, like configurations and objects with an app-aware, container-granular solution that was built to protect Kubernetes applications - Backing up at the app level instead of the machine level allows for greater efficiencies--don't have to backup all these components separately in multiple machines, but also speeds up time to restore - Easily migrate applications between clusters, clouds, and regions in minutes - Any public cloud or on prem environment--provides a lot of flexibility in how and where to backup and restore - Guarantee protection against ransomware with S3 object lock and immutability - Gain peace of mind with sophisticated RBAC controls and 3-2-1 compliance - Portworx is able to protect your cloud-native workloads against failures or outages with zero RTO and low RPO disaster recovery for mission critical data ### Alliance Vendors #### Commvault Solutions #### Veeam Solutions #### Rubrik Solutions #### Veritas Solutions #### IBM Storage Protect Solutions #### Cohesity Solutions ### Objections and Advisory Consulting ### How and When to engage with the FSA team 1. - - 2. - - 3. - - ### Professional Services (ProSvcs Partnerships)-Differ to your partner