UPDATED 14:03 EDT / OCTOBER 11 2022

SECURITY

What to expect from the ‘Trusted Infrastructure: Episode 2’ event: Join theCUBE Oct. 18

In today’s increasingly sophisticated threat landscape, there just aren’t enough cybersecurity experts to go around. Technology is evolving to fill the gap, providing built-in security from the bottom of the stack to the top.

“One of the very important roles that a technology vendor can play is to take mundane infrastructure security off the plates of [security operations] teams … shifting much of the heavy lifting around securing servers, storage, networking and other infrastructure via [research and development] and other best practices like supply chain management,” stated theCUBE analyst Dave Vellante.

The role of infrastructure in a comprehensive security strategy was covered on theCUBE during episode one of a two-part Dell Technologies Inc. event. On Oct. 18, the conversation continues in the second episode of the “A Blueprint for Trusted Infrastructure” event. Building on the insights into the importance of trusted infrastructure provided during the first episode, episode two will go deeper into how Dell Trusted Infrastructure works and how servers, networking components and hyperconverged infrastructure play a part in enterprise security.

Join Dave Vellante as he talks with Dell infrastructure security experts about new infrastructure products, use-case examples, and industry analysis. (* Disclosure below.)

Everything is cloud, and it all needs to be secured

Security used to be achieved by adhering to a list of inflexible rules designed to protect a static environment. But the cloud presents an ever-changing domain, and modern security strategies need to evolve to meet the combined challenges of the dispersed cloud environment and the increasing sophistication and frequency of cyberattacks.

“I don’t see cloud computing as a panacea for security. I see it as another attack surface,” said Pete Gerr, senior consultant of cybersecurity and resiliency marketing at Dell, in his session during episode one of the “A Blueprint for Trusted Infrastructure” event. “It’s another aspect in front that security organizations have to manage; it’s part of their infrastructure today.”

Zero trust has become the default model to meet the demands of cloud security, establishing a set of rules for access that remove the need for perimeter boundaries. But cloud security needs to be both flexible and frictionless to implement. This means removing responsibility from overloaded DevSecOps teams through technological innovation.

A current security trend that builds on top of zero trust is the idea of becoming cyber resilient in order to recover from what is now the inevitability of cyberattack. Both zero trust and cyber resiliency differ from the “whack-a-mole” approach of monitoring the threat landscape and smashing down on any criminal dumb enough to show traces of their presence. Instead, the assumption is that the cybercriminal is already inside, and the aim is to prevent lateral movement and repel any attempt to cause damage.

Traditional hardware providers, such as Dell, have been enabling organizations to achieve cyber resiliency by building zero-trust security into their infrastructure-as-a-service solutions and edge devices.

“Clouds are infrastructure, right? So you can have a public cloud, you can have an edge cloud, a private cloud, a telco cloud, a hybrid cloud, or multicloud. ‘Here cloud, there cloud, everywhere cloud, cloud.’ Yes, they’ll all be there, but it’s basically infrastructure,” stated Michael Dell, talking about Dell’s movement into offering infrastructure-as-a-service, with theCUBE’s industry analyst John Furrier.

Securing that infrastructure – all of it, everywhere – is the concept behind Dell’s Trusted Infrastructure, a family of secure IT solutions and services designed and built to provide confidence, control and scale, the company said.

Episode two explores how Dell secures servers, networking and hyperconverged infrastructure

Dell Trusted Infrastructure includes the company’s storage, servers, networking, HCI, data protection and CloudIQ offerings. It’s a wide range, and the “A Blueprint for Trusted Infrastructure” event was designed to provide security executives with demonstrations and use-case examples of how trusted infrastructure enables organizations to build cyberresiliency and provide frictionless security across complex cloud environments.

“Why do organizations need a trusted infrastructure?” was the question answered during the first “A Blueprint for Trusted Infrastructure” episode. Speakers Pete Gerr and Steve Kenniston, senior cybersecurity consultant, discussed the evolution of Dell’s Trusted Infrastructure. Rob Emsley, Dell’s head of data protection and cybersecurity marketing, talked about how cyber resilience can combat ransomware attacks; and Parasar Kodati, Dell’s senior consultant of ISG product marketing, gave insights into how Dell’s storage portfolio is using artificial intelligence to help counteract and recover from cyberattacks.

The second episode of  “A Blueprint for Trusted Infrastructure” aims to expand on the Dell Trusted Infrastructure use cases and take a look at what trusted infrastructure means from the perspective of servers, networking and hyperconverged infrastructure.

“We will explore the changing nature of technology infrastructure; how the industry, generally, and Dell, specifically, are adapting to these changes; and what is being done to proactively address threats that are increasingly stressing security teams,” Vellante stated.

TheCUBE event livestream

Don’t miss theCUBE’s coverage of the “A Blueprint for Trusted Infrastructure: Episode 2” event on Oct. 18. Plus, you can watch theCUBE’s event coverage on-demand after the live event.

How to watch theCUBE interviews

We offer you various ways to watch theCUBE’s coverage of the “A Blueprint for Trusted Infrastructure: Episode 2” event, including theCUBE’s dedicated website and YouTube channel. You can also get all the coverage from this year’s events on SiliconANGLE.

TheCUBE Insights podcast

SiliconANGLE also has podcasts available of archived interview sessions, available on iTunesStitcher and Spotify, which you can enjoy while on the go.

SiliconANGLE also has analyst deep dives in our Breaking Analysis podcast, available on iTunesStitcher and Spotify.

Guests

During the “A Blueprint for Trusted Infrastructure: Episode 2” event, theCUBE analysts will talk with Dell’s Deepak Rangaraj, PowerEdge Security product manager; Mahesh Nagarathnam, networking product management consultant; and Jerome West, product management security lead for HCI.

(* Disclosure: TheCUBE is a paid media partner for the “A Blueprint for Trusted Infrastructure: Episode 2” event. Neither Dell Technologies Inc., the sponsor of theCUBE’s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Image: SiliconANGLE

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU