UPDATED 15:30 EDT / SEPTEMBER 20 2022

SECURITY

Dell weighs in on data storage’s role in enterprise cyber resiliency

Beyond preemptive cybersecurity, resiliency means that enterprises are better equipped to withstand and recover from damage-inflicting attacks when they happen.

However, porting principles like zero trust to the storage application layer requires some rethinking and retooling, an initiative that Dell Technologies Inc. has taken upon itself, according to Parasar Kodati (pictured), senior consultant of Infrastructure Solutions Group product marketing at Dell.

“Cybersecurity is all about securing your data applications and infrastructure,” Kodati said. So for storage, what it means is bringing it all to the data layer, porting over principles like zero trust, leveraging artificial intelligence and machine learning to look at access patterns and make intelligent decisions about an indicator of a compromise and identify them ahead of time.”

Kodati spoke with theCUBE industry analyst Dave Vellante at the Dell Infrastructure “A Blueprint for Trusted Infrastructure” event, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. They discussed the need for enterprises to stay secure and resilient at the data storage level. (* Disclosure below.)

Act as if the attack has already happened

One of the foremost principles in cyber resiliency is that defenders must always act as though the attacks are imminent or have already happened. With this mindset in place, porting ideas like immutability and network isolation must also happen at the storage level, according to Kodati.

“The question is, how do we fortify the infrastructure and the switch infrastructure to withstand those attacks and have a response plan where we can recover the data and make sure the business continuity is not affected? So that’s really cybersecurity and cyber resiliency at the storage layer,” he explained.

AI and ML algorithms study the patterns and behaviors in a computing environment to determine insights, and those characteristics are being leveraged by Dell to glean signals into areas of compromise within data storage.

“There are also additional applications like CloudIQ, which is like an infrastructure-wide health monitoring system for Dell infrastructure. And now we have elevated that to include cybersecurity as well,” Kodati concluded.

Here’s the complete video interview, part of SiliconANGLE’s and theCUBE’s coverage of the Dell Infrastructure “A Blueprint for Trusted Infrastructure” event:

(* Disclosure: TheCUBE is a paid media partner for the “A Blueprint for Trusted Infrastructure” event. Neither Dell Technologies Inc., the sponsor for theCUBE’s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo: SiliconANGLE

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU