What to expect during the Dell ‘A Blueprint for Trusted Infrastructure’ event: Join theCUBE Sept. 20
In the continued evolution of the cybersecurity landscape, there is trust and there is zero-trust. Both need to be carefully integrated into compute infrastructure to ensure data protection and cyber resilience.
Zero trust dictates that users inside or outside an organization must be authenticated before system access is granted. This has become a key element in building a trusted infrastructure that combines permissioned users with validated software and hardware protections to leverage data in on-premises or cloud environments with confidence.
To shed new light on building cybersecurity in the enterprise, Dell Technologies Inc. is teaming up with theCUBE, SiliconANGLE Media’s livestreaming studio, to present “A Blueprint for Trusted Infrastructure” on Sept. 20. The broadcast will feature interviews with Dell cybersecurity executives Rob Emsley, Peter Gerr, Steve Kenniston and Parasar Kodati, who will explore the critical role that trusted infrastructure plays in the development of security strategies and describe the actions that organizations can take to become more resilient. (* Disclosure below.)
“Cyber resilience is top of mind, and robust solutions are required,” Dave Vellante, industry analyst for theCUBE, said in an analysis of the cybersecurity market. “It’s common, of course, for backup and recovery vendors to focus their solutions on the backup corpus because that is often a prime hacker target. We believe there is an opportunity to expand the scope from just the backup corpus to all data in a more comprehensive data management strategy.”
Balancing protection and recovery
What this data management strategy should look like has been the focus of Dell’s approach in crafting cyber resilient infrastructure. The company believes that current security challenges require a different mindset, one that realizes attacks will still penetrate the environment. Instead, Dell defines resilience as a balance of detection, protection, response, and recovery to minimize data loss or business disruption.
This philosophy can be seen in the company’s recent activity surrounding its product portfolio. In December, Dell teamed up with Amazon Web Services Inc. to deliver an air-gapped cyber vault that can isolate and recover data from the inevitable ransomware attack.
The release of Dell’s PowerMaxOS 10 software in July was accompanied by cybersecurity features designed to support a zero-trust architecture. “We’re adding more advanced cyber resiliency capabilities while enhancing business continuity and disaster recovery to help our customers identify, prevent, detect, and recover from these threats,” Ben Jastrab, director of storage product marketing for Dell, said at the time of the announcement.
Recovery from cyberattacks
One of the key drivers behind Dell’s cybersecurity approach is APEX, the company’s infrastructure-as-a-service portfolio. The APEX solution enables enterprises to scale on demand and provision rapidly across multicloud platforms.
The launch in May of APEX Cyber Recovery Services highlighted the firm’s intent to deliver a cloud experience that can simplify recovery from cyberattacks. Dell’s role is to manage daily cyber recovery vault operations while supporting data restoration.
The town of Gilbert, the fifth largest municipality in Arizona, offers an example of how Dell is assisting users with data protection and recovery plans. By using Dell Cyber Recovery Vault and CyberSense to scan data from backup, the town’s IT administrators are embracing an air-gap solution in the event of a ransomware attack.
“The reality is that you’re likely to see some type of cyber event, so you better be prepared for it because it’s not a matter of if, it’s a matter of when,” Tony Bryson, chief information security officer for the town of Gilbert, said in a recent interview with theCUBE. “What APEX and Dell Cyber Recovery Vault provide gives us the elasticity we need as a small organization to expand quickly and deal with our internal data concerns. It could be a game changer for us as a town.”
TheCUBE event livestream
Don’t miss theCUBE’s coverage of the “A Blueprint for Trusted Infrastructure” event on Sept. 20. Plus, you can watch theCUBE’s event coverage on-demand after the live event.
How to watch theCUBE interviews
We offer you various ways to watch theCUBE’s coverage of the “A Blueprint for Trusted Infrastructure” event, including theCUBE’s dedicated website and YouTube channel. You can also get all the coverage from this year’s events on SiliconANGLE.
TheCUBE Insights podcast
SiliconANGLE also has podcasts available of archived interview sessions, available on iTunes, Stitcher and Spotify, which you can enjoy while on the go.
SiliconANGLE also has analyst deep dives in our Breaking Analysis podcast, available on iTunes, Stitcher and Spotify.
Guests
During the “A Blueprint for Trusted Infrastructure” event, theCUBE analysts will talk with Dell’s Pete Gerr, senior consultant of cybersecurity and resiliency marketing; Steve Kenniston, senior cybersecurity consultant; Parasar Kodati, senior consultant of ISG product marketing; and Rob Emsley, head of data protection and cybersecurity marketing.
Here’s the event playlist:
(* Disclosure: TheCUBE is a paid media partner for the “A Blueprint for Trusted Infrastructure” event. Neither Dell Technologies, the sponsor of theCUBE’s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
Image: SiliconANGLE
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU