UPDATED 15:43 EST / NOVEMBER 22 2021

SECURITY

The enterprise prepares for increasingly sophisticated, malicious cyberattacks

Given the explosion of new distributed computing frameworks, including hybrid and multicloud, the enterprise is also seeing a rise in new strains of ransomware and DDoS attacks across on-premises and cloud repositories.

A more innovative, streamlined and focused approach to cybersecurity, with technologies like artificial intelligence and machine learning at the helm, will allow enterprises to nip these malicious activities in the bud.

“We have to  go beyond just thinking how do you build in technical capabilities into the product to make it difficult for attackers,” said David Noy (pictured, left), vice president of product management at Dell Technologies Inc. “We actually want to get predictive. We want to use advanced technologies and capabilities like artificial intelligence and machine learning to go out and scan users environments and look at their data, which is really the lifeblood of a businessand say, ‘Hey, we can see that there is potentially an attack looming.'”

Noy and Rob Emsley (pictured, right), director of data protection product marketing at Dell, spoke with Dave Vellante, host of theCUBE, SiliconANGLE Media’s livestreaming studio, for a digital CUBE Conversation. They discussed cybersecurity at the cutting edge. (* Disclosure below.)

Building toward cyber resilience

Given the fact that the occurrence of ransomware attacks is a matter of “when” not “if,” many experts believe organizations must achieve a state of cyber resilience in order to stay ahead of any unfavorable outcomes and mitigate losses.

“One of the things that we introduced pointing back six months ago is a globally available cyber resiliency assessment,” Emsley said. “And we worked in collaboration with the Enterprise Strategy Group, and we put out a free online assessment tool to allow customers to really answer questions around a big part of the NIST [cybersecurity] framework, around detection, protection and recovery.”

Network infrastructures are often built to link to one another; therefore, it’s possible for an outside entity to gain access into an organization’s entire set of data repositories by entering just one system. Dell’s unique “vault-based” approach helps safeguard its customers’ data by creating a security barrier between each vault, according to Noy.

“We take a more of a vault-based approach, which means that when you create a cyber vault, it’s essentially locked down from the rest of your environment. Your cybercriminal is not able to get to that solution because it’s been air-gapped,” he stated.

Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s CUBE Conversations(* Disclosure: Dell Technologies Inc. sponsored this segment of theCUBE. Neither Dell nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo: SiliconANGLE

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU