{"id":65721,"date":"2022-02-21T15:00:00","date_gmt":"2022-02-21T20:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/"},"modified":"2026-01-29T15:07:32","modified_gmt":"2026-01-29T20:07:32","slug":"nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations","status":"publish","type":"post","link":"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/","title":{"rendered":"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection for State, Local, and Education Organizations"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1577275\/episodes\/10115184-nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>Cybersecurity attacks are becoming progressively complex with an increase in Cloud, Digitization, and Work-from-Anywhere practices.\u00a0 State, Local, and Education (SLED) organizations must begin improving their security posture and aligning to a Zero Trust Architecture (ZTA). Since organizations\u00a0 are required to move away from\u00a0 perimeter-based security solutions, they will need to modernize their IT operations, increase agility, and work to implement network, application, user and data-based security to support mission success based on Zero Trust.\u00a0<\/p>\n<p>This is where Nutanix comes in, helping you protect your SLED organization\u2019s public information from cyber threats. Over time, Nutanix has honed in on the core concepts of security while improving data resiliency strategies. We have elevated our presence in the security space by releasing new solutions with a proactive security focus.<\/p>\n<p>Animateur : Andy Whiteside<br \/>Coanimateur : Harvey Green<br \/>Co-animatrice : Jirah Cox<\/p>\n<div class=\"transcript\">\n<p><!--block-->WEBVTT<\/p>\n<p>1<br \/>00:00:02.639 &#8211;&gt; 00:00:10.980<br \/>Andy Whiteside: Hello everyone and welcome to episode 43 of new tactics weekly i&#8217;m your host Andy whiteside that Harvey back with his Harvey where were you last week.<\/p>\n<p>2<br \/>00:00:13.170 &#8211;&gt; 00:00:17.010<br \/>Harvey Green: Customer outside is it customer on site does.<\/p>\n<p>3<br \/>00:00:17.010 &#8211;&gt; 00:00:17.580<br \/>Andy Whiteside: It go.<\/p>\n<p>4<br \/>00:00:18.210 &#8211;&gt; 00:00:23.400<br \/>Harvey Green: It went well, it was called the but it went well.<\/p>\n<p>5<br \/>00:00:25.050 &#8211;&gt; 00:00:26.700<br \/>Jirah Cox: hint as to where we&#8217;re Harvey was.<\/p>\n<p>6<br \/>00:00:28.470 &#8211;&gt; 00:00:29.700<br \/>Harvey Green: upstate New York.<\/p>\n<p>7<br \/>00:00:30.210 &#8211;&gt; 00:00:31.650<br \/>Jirah Cox: whoa okay yeah that&#8217;s pretty cool.<\/p>\n<p>8<br \/>00:00:31.860 &#8211;&gt; 00:00:32.610<br \/>Harvey Green: It was no.<\/p>\n<p>9<br \/>00:00:32.670 &#8211;&gt; 00:00:34.230<br \/>Harvey Green: In February sure.<\/p>\n<p>10<br \/>00:00:35.040 &#8211;&gt; 00:00:38.010<br \/>Andy Whiteside: New tannic oriented customer or somebody is something else.<\/p>\n<p>11<br \/>00:00:38.940 &#8211;&gt; 00:00:42.840<br \/>Harvey Green: Yes, both were in the tactics oriented customer.<\/p>\n<p>12<br \/>00:00:44.490 &#8211;&gt; 00:00:51.090<br \/>Andy Whiteside: that&#8217;s good was it a on the government side of your hats you wear or commercial side of the hats you wear.<\/p>\n<p>13<br \/>00:00:51.840 &#8211;&gt; 00:00:52.380<br \/>Both.<\/p>\n<p>14<br \/>00:00:55.740 &#8211;&gt; 00:00:56.820<br \/>Andy Whiteside: coming in a real sales guy.<\/p>\n<p>15<br \/>00:00:56.970 &#8211;&gt; 00:01:01.440<br \/>Jirah Cox: Wait you&#8217;re saying you&#8217;re saying Angela Angela have to pay for half your expenses that&#8217;s what I heard.<\/p>\n<p>16<br \/>00:01:04.290 &#8211;&gt; 00:01:06.060<br \/>Jirah Cox: The other half good as INTEGRA go there you go.<\/p>\n<p>17<br \/>00:01:07.560 &#8211;&gt; 00:01:27.450<br \/>Andy Whiteside: Well, so on that note is going to apply here Harvey is a legacy, been a solutions architect as integrity, but he&#8217;s now leading and running the our gov business, which is our sled and fed focus so state Local Education focus the value added reseller as well as federal.<\/p>\n<p>18<br \/>00:01:28.830 &#8211;&gt; 00:01:34.080<br \/>Andy Whiteside: Value Added reseller Parviz harvest becoming a business guy yes.<\/p>\n<p>19<br \/>00:01:34.230 &#8211;&gt; 00:01:39.270<br \/>Jirah Cox: i&#8217;m hearing, this is a Zen tiger gov blah Gulf podcast episode number one.<\/p>\n<p>20<br \/>00:01:41.910 &#8211;&gt; 00:01:45.420<br \/>Andy Whiteside: that&#8217;s true we pay, you know what that&#8217;s a good idea hurry and you start doing another podcast.<\/p>\n<p>21<br \/>00:01:47.160 &#8211;&gt; 00:01:47.850<br \/>Jirah Cox: You can run with that.<\/p>\n<p>22<br \/>00:01:48.030 &#8211;&gt; 00:01:49.500<br \/>Jirah Cox: Okay that&#8217;s good you get the idea there.<\/p>\n<p>23<br \/>00:01:49.800 &#8211;&gt; 00:01:57.060<br \/>Harvey Green: All right, um I gotta bring jarrod on that one too, and you know, and he got I think he might be pretty good.<\/p>\n<p>24<br \/>00:01:58.710 &#8211;&gt; 00:02:00.090<br \/>Andy Whiteside: It is tapped out.<\/p>\n<p>25<br \/>00:02:00.720 &#8211;&gt; 00:02:01.290<br \/>Jirah Cox: Something something.<\/p>\n<p>26<br \/>00:02:02.220 &#8211;&gt; 00:02:06.570<br \/>Jirah Cox: yeah this podcast brought to you by his INTEGRA go something will do ad reads.<\/p>\n<p>27<br \/>00:02:06.840 &#8211;&gt; 00:02:10.080<br \/>Andy Whiteside: Every day, I would said what is that a advertisement in there.<\/p>\n<p>28<br \/>00:02:11.970 &#8211;&gt; 00:02:14.340<br \/>Andy Whiteside: Well gyros with this Jerry how&#8217;s it going.<\/p>\n<p>29<br \/>00:02:14.790 &#8211;&gt; 00:02:15.210<br \/>howdy.<\/p>\n<p>30<br \/>00:02:16.800 &#8211;&gt; 00:02:20.460<br \/>Andy Whiteside: jarrod is a legend of Rome, the new tannic side of the House.<\/p>\n<p>31<br \/>00:02:23.880 &#8211;&gt; 00:02:27.150<br \/>Jirah Cox: You know infamous versus famous is a Gray area.<\/p>\n<p>32<br \/>00:02:29.130 &#8211;&gt; 00:02:37.050<br \/>Andy Whiteside: I get on these qb ours, with the new tannic sales people and it&#8217;s a little bit in gyro we trust, so if your job is on the podcast.<\/p>\n<p>33<br \/>00:02:38.400 &#8211;&gt; 00:02:39.600<br \/>Harvey Green: It must be good.<\/p>\n<p>34<br \/>00:02:42.360 &#8211;&gt; 00:02:43.500<br \/>Jirah Cox: Every week at the Wednesday.<\/p>\n<p>35<br \/>00:02:46.170 &#8211;&gt; 00:02:46.560<br \/>Andy Whiteside : oui.<\/p>\n<p>36<br \/>00:02:47.910 &#8211;&gt; 00:02:56.910<br \/>Andy Whiteside: Well i&#8217;m harvey&#8217;s INTEGRA gov and sled tie in that gets us to our blog for today and I will share my screen whenever I get smart enough to do it let&#8217;s see here.<\/p>\n<p>37<br \/>00:02:58.050 &#8211;&gt; 00:03:05.310<br \/>Andy Whiteside: For those all those listeners i&#8217;ll share my screen share it so we can cover it here and then people can watch it later in the.<\/p>\n<p>38<br \/>00:03:05.640 &#8211;&gt; 00:03:19.110<br \/>Andy Whiteside: INTEGRA YouTube channel, so our topic is botanic solutions provide data and security, protection for state local and education and organizations, this is by harsha code T Ki law.<\/p>\n<p>39<br \/>00:03:21.030 &#8211;&gt; 00:03:23.250<br \/>Andy Whiteside: blog from January 24.<\/p>\n<p>40<br \/>00:03:24.360 &#8211;&gt; 00:03:30.480<br \/>Andy Whiteside: I wanted to first of all, highlight Harvey and the great things that we&#8217;re doing its integrity of giving.<\/p>\n<p>41<br \/>00:03:31.650 &#8211;&gt; 00:03:41.220<br \/>Andy Whiteside: going to market on the sled and fed side of the world, I also want to highlight things that people don&#8217;t really know about sled we&#8217;ve got.<\/p>\n<p>42<br \/>00:03:41.820 &#8211;&gt; 00:03:51.060<br \/>Andy Whiteside: Customers that are small city, you know 100 employees cities, maybe, maybe thousands do 100 to 1000 or greater.<\/p>\n<p>43<br \/>00:03:51.630 &#8211;&gt; 00:04:03.390<br \/>Andy Whiteside: Cities that we work with they have so many different departments they&#8217;ve got you know, water and sewer they have police they have this judicial judicial, but they have this executive department they&#8217;ve got.<\/p>\n<p>44<br \/>00:04:04.260 &#8211;&gt; 00:04:11.430<br \/>Andy Whiteside: You know power, whether maybe they run the power grid, or they own the power grid or service, the power grid and there they&#8217;ve got so many departments.<\/p>\n<p>45<br \/>00:04:11.910 &#8211;&gt; 00:04:20.490<br \/>Andy Whiteside: When you get inside of a city or a local county government or state of course there&#8217;s there&#8217;s a bunch going on inside those organizations.<\/p>\n<p>46<br \/>00:04:20.820 &#8211;&gt; 00:04:28.440<br \/>Andy Whiteside: And one of the reason why we picked this one was to highlight that they&#8217;ve got security needs, just like the average customer, but even more because.<\/p>\n<p>47<br \/>00:04:28.920 &#8211;&gt; 00:04:41.040<br \/>Andy Whiteside: Everybody knows who they are, I mean everybody knows you know Mecklenburg county that lives in North Carolina and the bad guys know hey let&#8217;s go target those guys I knew they&#8217;ve got money they&#8217;ve got tax money coming in yeah agreed.<\/p>\n<p>48<br \/>00:04:42.450 &#8211;&gt; 00:04:50.280<br \/>Andy Whiteside: So Jerry you want to just maybe highlights extend upon when I was talking about there when we talked about the introduction here that says modern challenges for slit.<\/p>\n<p>49<br \/>00:04:51.210 &#8211;&gt; 00:05:01.170<br \/>Jirah Cox: 100% right and the need for designing implementing like a zero trust architecture right like just because you are on the network doesn&#8217;t necessarily mean.<\/p>\n<p>50<br \/>00:05:01.680 &#8211;&gt; 00:05:12.750<br \/>Jirah Cox: You are in a position of power or your trusted inherently more by virtue of being on the network right because that assumes that we would always be able to keep the network, secure and clean and keep bad guys off of it.<\/p>\n<p>51<br \/>00:05:13.860 &#8211;&gt; 00:05:16.080<br \/>Jirah Cox: that&#8217;s not the world, we can live in right, we have to assume.<\/p>\n<p>52<br \/>00:05:17.460 &#8211;&gt; 00:05:19.500<br \/>Jirah Cox: assume compromise and then design.<\/p>\n<p>53<br \/>00:05:20.670 &#8211;&gt; 00:05:25.950<br \/>Jirah Cox: Assuming that that principle so yeah and for sure right I sympathize with.<\/p>\n<p>54<br \/>00:05:27.090 &#8211;&gt; 00:05:39.690<br \/>Jirah Cox: All of our flipped classroom cut sled customers that must just feel like they&#8217;re walking around with a target on their back all day long for sure right, you know where where most most ransomware these days is aimed at yeah extracting some sort of a.<\/p>\n<p>55<br \/>00:05:41.460 &#8211;&gt; 00:05:44.550<br \/>Jirah Cox: Money from the get the entity being attacked.<\/p>\n<p>56<br \/>00:05:45.990 &#8211;&gt; 00:05:53.070<br \/>Jirah Cox: Usually there&#8217;s a balance when you&#8217;re in that situation of trying to recover from it quietly without making a.<\/p>\n<p>57<br \/>00:05:53.760 &#8211;&gt; 00:06:03.240<br \/>Jirah Cox: Big deal but there&#8217;s so much potential yet for a very public failure right when it&#8217;s a city of county of state of right it&#8217;s it can be very hard to be a big challenge to hide that.<\/p>\n<p>58<br \/>00:06:04.890 &#8211;&gt; 00:06:10.260<br \/>Andy Whiteside: Well that&#8217;s the other party, when it does happen, not if but, when it does happen, and you know.<\/p>\n<p>59<br \/>00:06:11.370 &#8211;&gt; 00:06:17.550<br \/>Andy Whiteside: All your constituents are supposed to know about it because you&#8217;re there they&#8217;re your constituents there&#8217;s no hiding.<\/p>\n<p>60<br \/>00:06:18.240 &#8211;&gt; 00:06:20.310<br \/>Jirah Cox: that&#8217;s true yeah mandatory reporting could be I think do.<\/p>\n<p>61<br \/>00:06:22.200 &#8211;&gt; 00:06:29.160<br \/>Andy Whiteside: Harvey thoughts on just the general challenge that goes on on the sled side, above and beyond what our commercial.<\/p>\n<p>62<br \/>00:06:29.490 &#8211;&gt; 00:06:37.440<br \/>Harvey Green: yeah I mean, I think the the big one, is what you hit on the start with is you know so many different department so many different.<\/p>\n<p>63<br \/>00:06:38.280 &#8211;&gt; 00:06:58.500<br \/>Harvey Green: sets of needs, you know, down from potentially you know, a soup kitchen up all the way to 911 call centers and you know police evidence rooms and things like that those those have you know very differing sets of security that are needed.<\/p>\n<p>64<br \/>00:06:59.610 &#8211;&gt; 00:07:10.440<br \/>Harvey Green: So you definitely need a platform that can handle all of that and not put you in a situation where you&#8217;re also having to as an IT department.<\/p>\n<p>65<br \/>00:07:11.190 &#8211;&gt; 00:07:27.810<br \/>Harvey Green: handle 50 different departments 50 different ways on 50 different platforms, that would be both very expensive in terms of the actual dollars and hardware, but also, you know in in training and being able to support something that complex.<\/p>\n<p>66<br \/>00:07:29.070 &#8211;&gt; 00:07:36.870<br \/>Andy Whiteside: yeah and we&#8217;re going to talk about the prevent detection recovery now one thing to highlight, on the recovery side of this.<\/p>\n<p>67<br \/>00:07:37.770 &#8211;&gt; 00:07:49.950<br \/>Andy Whiteside: Know there&#8217;s life saving services that are involved in these organizations, they can&#8217;t play hardball and wait 2448 hours to restore everything they got to get it back up and going or people are dying.<\/p>\n<p>68<br \/>00:07:50.460 &#8211;&gt; 00:08:09.420<br \/>Harvey Green: yeah I mean again 911 call centers you and a lot of municipalities, you have different clinics or healthcare facilities as well that are under that umbrella too so yeah I mean you&#8217;ve got people&#8217;s health hanging in the balance so time is of the essence.<\/p>\n<p>69<br \/>00:08:09.870 &#8211;&gt; 00:08:15.990<br \/>Andy Whiteside: We think about you got people that might be needing critical care you got people whose toilets won&#8217;t flush magically can be that would be.<\/p>\n<p>70<br \/>00:08:16.560 &#8211;&gt; 00:08:18.090<br \/>Harvey Green: Right, I mean.<\/p>\n<p>71<br \/>00:08:18.690 &#8211;&gt; 00:08:19.890<br \/>Andy Whiteside: That was a joke your says laugh.<\/p>\n<p>72<br \/>00:08:20.160 &#8211;&gt; 00:08:22.020<br \/>Harvey Green: yeah no.<\/p>\n<p>73<br \/>00:08:23.070 &#8211;&gt; 00:08:25.050<br \/>Jirah Cox: No when it comes to flushing toilets man that&#8217;s not a joke that&#8217;s.<\/p>\n<p>74<br \/>00:08:28.560 &#8211;&gt; 00:08:36.300<br \/>Andy Whiteside: I forget what movie was and i&#8217;m gonna say this is gonna be really bad taste, but you know if it&#8217;s if it&#8217;s yellow leave a mellow if it&#8217;s a brown flush it down.<\/p>\n<p>75<br \/>00:08:39.330 &#8211;&gt; 00:08:40.320<br \/>Andy Whiteside: eyes are on you.<\/p>\n<p>76<br \/>00:08:40.410 &#8211;&gt; 00:08:44.220<br \/>Jirah Cox: Know that&#8217;s national lampoon that&#8217;s vacation.<\/p>\n<p>77<br \/>00:08:45.060 &#8211;&gt; 00:08:45.960<br \/>Andy Whiteside: Is it I don&#8217;t remember if.<\/p>\n<p>78<br \/>00:08:46.200 &#8211;&gt; 00:08:47.670<br \/>Jirah Cox: He goes to visit his brother yeah.<\/p>\n<p>79<br \/>00:08:48.030 &#8211;&gt; 00:08:50.820<br \/>Andy Whiteside: yeah I just I think about that every so often.<\/p>\n<p>80<br \/>00:08:51.090 &#8211;&gt; 00:08:53.940<br \/>Jirah Cox: that&#8217;s the value I bring here move your movie references yeah.<\/p>\n<p>81<br \/>00:08:54.810 &#8211;&gt; 00:09:05.760<br \/>Andy Whiteside: Alright, the next section, as I leave it to prevent, detect and recovery first section is prevents how his new tactics helping us prevents direct.<\/p>\n<p>82<br \/>00:09:08.250 &#8211;&gt; 00:09:13.770<br \/>Jirah Cox: So or yeah what how to use these techniques as part of your part of your spectrum right of prevention.<\/p>\n<p>83<br \/>00:09:15.000 &#8211;&gt; 00:09:26.700<br \/>Jirah Cox: I was in Texas secure platform secure, both in the development secure in the deploy ability secure in the ability to to self recover back to a secure state where you can define your security baselines.<\/p>\n<p>84<br \/>00:09:28.890 &#8211;&gt; 00:09:34.170<br \/>Jirah Cox: But beyond that right it&#8217;s not a product right it&#8217;s part of a security posture.<\/p>\n<p>85<br \/>00:09:35.640 &#8211;&gt; 00:09:47.550<br \/>Jirah Cox: So we could the article has out, you know strong password policies that both you know that&#8217;s both for users and for admins and for admin dashboards and privileged access, whether that&#8217;s if you have the humans, for it, you know.<\/p>\n<p>86<br \/>00:09:49.290 &#8211;&gt; 00:10:04.830<br \/>Jirah Cox: You know, sensitive password should be in an envelope in a in a break glass safe somewhere and all your daily driver admin access needs to be via you know multifactor login whether that&#8217;s, whatever your system as okta duo as your ad with you know authenticator Apps.<\/p>\n<p>87<br \/>00:10:07.170 &#8211;&gt; 00:10:14.640<br \/>Jirah Cox: For those break glass passwords you can either you know, put the password in a envelope in a safe or, if you have enough people for it.<\/p>\n<p>88<br \/>00:10:16.050 &#8211;&gt; 00:10:27.960<br \/>Jirah Cox: You know first customers that will be like you guys are team a yeller team B team a lot into the first half of the password team be as lead, into the back, half of the password right, so you got to get to people agreeing to login together.<\/p>\n<p>89<br \/>00:10:29.520 &#8211;&gt; 00:10:35.430<br \/>Jirah Cox: to accomplish that rest and out now, no one human can can get admin access to the system unmonitored.<\/p>\n<p>90<br \/>00:10:37.800 &#8211;&gt; 00:10:48.420<br \/>Jirah Cox: Block mauer spread with micro segmentation that one&#8217;s easy right nothing to install on a tedx HIV flow is right there you just simply turn on and define your your fencing policies of what shouldn&#8217;t shouldn&#8217;t talk to each other.<\/p>\n<p>91<br \/>00:10:49.800 &#8211;&gt; 00:11:08.670<br \/>Jirah Cox: Both, for you know whether that could be I can imagine that being all kinds of Apps in a like a county government sense of like accounting and payroll separated from like the GIs and mapping services separated from possibly things that might connect to you know power sewer water.<\/p>\n<p>92<br \/>00:11:10.020 &#8211;&gt; 00:11:21.540<br \/>Jirah Cox: Systems, you know, separate from united one systems right, I could, of course, by clusters for each of those or with flow, I can say they can all live on one cluster.<\/p>\n<p>93<br \/>00:11:21.900 &#8211;&gt; 00:11:32.220<br \/>Jirah Cox: But they can&#8217;t talk to each other whatsoever right, so that if there wasn&#8217;t a compromise that can limit or or slow the spread of those attackers laterally within the environment.<\/p>\n<p>94<br \/>00:11:33.480 &#8211;&gt; 00:11:37.410<br \/>Jirah Cox: And then, also for any easy environment right if i&#8217;m hosting desktops work from home.<\/p>\n<p>95<br \/>00:11:38.460 &#8211;&gt; 00:11:39.930<br \/>Jirah Cox: Any kind of citrix stuff like that.<\/p>\n<p>96<br \/>00:11:41.040 &#8211;&gt; 00:11:49.230<br \/>Jirah Cox: wrapping a firewall around every virtual machine to say you can only get to what you need to possibly even in an ad aware capacity right if Harvey logs in.<\/p>\n<p>97<br \/>00:11:49.800 &#8211;&gt; 00:12:00.630<br \/>Jirah Cox: And he needs to get to a GIs desktop he can only get to those things and can&#8217;t get to payroll or vice versa, if he works in payroll you can get to that and not get to like you know, no one systems so micro segmentation.<\/p>\n<p>98<br \/>00:12:01.800 &#8211;&gt; 00:12:13.590<br \/>Jirah Cox: Really, you know anywhere it&#8217;s possible to turn it on definitely use that and with flow, it can even tell you what your existing traffic patterns are so learn what your Apps talk to, and then write policies to lock those down.<\/p>\n<p>99<br \/>00:12:15.570 &#8211;&gt; 00:12:28.770<br \/>Jirah Cox: The third one here, I can certainly agree with right using maintain endpoint protection antivirus block malware I can&#8217;t say i&#8217;ve got strong opinions there i&#8217;m sure the Tigers got got much more recent experience consulting around what you probably need to use in your environment.<\/p>\n<p>100<br \/>00:12:31.890 &#8211;&gt; 00:12:32.370<br \/>Andy Whiteside : oui.<\/p>\n<p>101<br \/>00:12:33.180 &#8211;&gt; 00:12:45.330<br \/>Harvey Green: We would definitely agree that you need to do that will we can talk through you know different options, depending on what else you need to do to just besides look for.<\/p>\n<p>102<br \/>00:12:46.470 &#8211;&gt; 00:12:50.040<br \/>Harvey Green: Look, for exposure points that have already been exposed right.<\/p>\n<p>103<br \/>00:12:51.360 &#8211;&gt; 00:12:53.610<br \/>Harvey Green: So yeah we can definitely help with that.<\/p>\n<p>104<br \/>00:12:55.320 &#8211;&gt; 00:13:02.670<br \/>Andy Whiteside: it&#8217;s a multi faceted front right you got your traditional AV you got a wii that we&#8217;re not a Vb you got the software that kind of looks at.<\/p>\n<p>105<br \/>00:13:04.290 &#8211;&gt; 00:13:12.000<br \/>Andy Whiteside: kind of artificial intelligence types of things you&#8217;ve got intrusion detection stuff from from many, many years back you&#8217;ve got.<\/p>\n<p>106<br \/>00:13:13.860 &#8211;&gt; 00:13:25.890<br \/>Andy Whiteside: It intrusion detection response you&#8217;ve got elements of network flow you got all those different endpoint protection and, by the way, when you talk to the integrity endpoint is the endpoint.<\/p>\n<p>107<br \/>00:13:26.580 &#8211;&gt; 00:13:34.170<br \/>Andy Whiteside: Is in the endpoint is also that virtual APP or desktop server sitting back in the clock back in the data Center, no matter where that data Center is.<\/p>\n<p>108<br \/>00:13:34.440 &#8211;&gt; 00:13:34.680<br \/>Oui.<\/p>\n<p>109<br \/>00:13:36.510 &#8211;&gt; 00:13:42.990<br \/>Jirah Cox: The next one here about you know employee training on cybersecurity right bit of an old drum to beat on.<\/p>\n<p>110<br \/>00:13:43.620 &#8211;&gt; 00:13:47.580<br \/>Jirah Cox: I actually was reading a discussion thread last week with a bunch of SIS admins.<\/p>\n<p>111<br \/>00:13:48.090 &#8211;&gt; 00:13:59.280<br \/>Jirah Cox: That we&#8217;re talking about you know they were actually able to successfully go to HR and talk about you know how like a three strike policy of you know if this employee keeps on getting finished successfully right.<\/p>\n<p>112<br \/>00:14:00.330 &#8211;&gt; 00:14:11.130<br \/>Jirah Cox: The the quantifiable risk that that happens to the business is greater than ever right, and they are actually able to start talking about policies around hey if we&#8217;ve been fished three times right or you fail the fishing tests three times.<\/p>\n<p>113<br \/>00:14:12.690 &#8211;&gt; 00:14:24.750<br \/>Jirah Cox: We can put a price tag on that employee having email access right like is it worth this employee being able to send receive email externally versus like I don&#8217;t know a $5 million ransomware.<\/p>\n<p>114<br \/>00:14:26.220 &#8211;&gt; 00:14:35.160<br \/>Jirah Cox: ransom, you know and and, that being a more actual policy nowadays, more than ever, right 10 years ago, you know phishing attempts were prevalent and.<\/p>\n<p>115<br \/>00:14:35.670 &#8211;&gt; 00:14:45.720<br \/>Jirah Cox: Policies had i&#8217;m going to say, less teeth right compared to now protecting the organization is taken much, much more seriously because failure has consequences right failure, has a price tag.<\/p>\n<p>116<br \/>00:14:47.130 &#8211;&gt; 00:15:02.430<br \/>Andy Whiteside: No yes and it&#8217;s in the news everybody sees that it costs money and and that it&#8217;s been enabled by my opinion heavily enabled by cryptocurrency and the ability to pay anonymously and walk away with the money that&#8217;s worth something somewhere else.<\/p>\n<p>117<br \/>00:15:04.170 &#8211;&gt; 00:15:07.410<br \/>Jirah Cox: yeah, so I think if you don&#8217;t have teeth behind your policies around you know.<\/p>\n<p>118<br \/>00:15:08.700 &#8211;&gt; 00:15:14.100<br \/>Jirah Cox: Those Those sort of test failures right it&#8217;s worth talking about you know how do we limit our exposure.<\/p>\n<p>119<br \/>00:15:15.960 &#8211;&gt; 00:15:16.710<br \/>Jirah Cox: To those attackers.<\/p>\n<p>120<br \/>00:15:17.550 &#8211;&gt; 00:15:33.930<br \/>Andy Whiteside: The next bullet here talks about the object storage that&#8217;s amenable to being changed once it&#8217;s been written we&#8217;ll talk about new tannic specific things here in a second but that&#8217;s obviously a clear place where we need to protect the company jewels.<\/p>\n<p>121<br \/>00:15:34.530 &#8211;&gt; 00:15:46.140<br \/>Jirah Cox: Totally I think it&#8217;s I think it&#8217;s I like that&#8217;s under prevention, it also has surface area under recovery as well, later on, but in this case hundred prevention and they can almost as is thinking about taking your backups.<\/p>\n<p>122<br \/>00:15:47.490 &#8211;&gt; 00:15:52.500<br \/>Jirah Cox: On the offense right, what do I do to protect those if the bad guy was right next to them on the network.<\/p>\n<p>123<br \/>00:15:52.860 &#8211;&gt; 00:15:59.370<br \/>Jirah Cox: Well okay great I can sleep tell the backups are that they are configured in such a way that they literally are not allowed to self delete right.<\/p>\n<p>124<br \/>00:15:59.760 &#8211;&gt; 00:16:11.880<br \/>Jirah Cox: Even with admin access even with you know to humans logging in from A and B team, or whatever I say like weren&#8217;t for compliance, you know, the only way to get rid of the state is to go in the data Center and physically take a sledgehammer to it.<\/p>\n<p>125<br \/>00:16:13.410 &#8211;&gt; 00:16:22.140<br \/>Jirah Cox: You know which, hopefully, if you&#8217;re vulnerable to that maybe maybe you don&#8217;t need to talk to it consultants right, and you can go get some some beefy guys the guard your data Center right.<\/p>\n<p>126<br \/>00:16:23.460 &#8211;&gt; 00:16:32.550<br \/>Andy Whiteside: The last bullet here in this section is critically analyze and scan patchwork of vectors in data centers to monitor and continuous updates.<\/p>\n<p>127<br \/>00:16:32.910 &#8211;&gt; 00:16:38.340<br \/>Andy Whiteside: In areas of suspected susceptible to attacks.<\/p>\n<p>128<br \/>00:16:39.660 &#8211;&gt; 00:16:40.740<br \/>Andy Whiteside: we&#8217;ve recently started.<\/p>\n<p>129<br \/>00:16:41.820 &#8211;&gt; 00:16:49.950<br \/>Andy Whiteside: You know intrusion protection, excuse me penetration test type stuff we&#8217;ve also started doing something that I think can be a huge hit over here where we&#8217;re going to be doing.<\/p>\n<p>130<br \/>00:16:50.670 &#8211;&gt; 00:17:03.060<br \/>Andy Whiteside: vdi type of assessments, assessing the security for security vulnerabilities and a lot of times it&#8217;s not you know code it&#8217;s not up to date it&#8217;s doors that have been left unlocked that you can&#8217;t justify why they&#8217;re unlocked.<\/p>\n<p>131<br \/>00:17:05.070 &#8211;&gt; 00:17:23.130<br \/>Harvey Green: yeah for sure, being able to go back through the firewall rules, for example, and you know know the history behind well why did we do this again and was that for a test or does that need to be there for production, you know, eight years after it was put in so.<\/p>\n<p>132<br \/>00:17:24.150 &#8211;&gt; 00:17:28.170<br \/>Harvey Green: definitely need to keep some sort of history.<\/p>\n<p>133<br \/>00:17:29.310 &#8211;&gt; 00:17:51.030<br \/>Harvey Green: And also notes about different security exceptions, you make because eventually those exceptions either need to be taken away or kind of designed around so that you know what&#8217;s there why it&#8217;s there and what you&#8217;re susceptible to than the end to prepare for future attacks.<\/p>\n<p>134<br \/>00:17:52.050 &#8211;&gt; 00:17:57.330<br \/>Andy Whiteside: When I like the the very first word in this one that says critically at other words.<\/p>\n<p>135<br \/>00:17:57.870 &#8211;&gt; 00:18:14.670<br \/>Andy Whiteside: Yes, the critical eye with a look at look at it like if you&#8217;re paying your networking company that sets up your network to do your penetration test or your vdi companies INTEGRA to do your vdi security test, you know what&#8217;s the what&#8217;s the likelihood you&#8217;re gonna get a straight answer.<\/p>\n<p>136<br \/>00:18:15.300 &#8211;&gt; 00:18:20.430<br \/>Harvey Green: that&#8217;s right it&#8217;s like if gyrus is do it, you just do it, and if Harvey says do what you.<\/p>\n<p>137<br \/>00:18:21.510 &#8211;&gt; 00:18:22.260<br \/>Harvey Green: know about that.<\/p>\n<p>138<br \/>00:18:24.420 &#8211;&gt; 00:18:34.530<br \/>Andy Whiteside: Well, in our case we&#8217;re specifically bringing in a third party to do these in encouraging them to find everything you can and it only make us all, better if you do that yeah.<\/p>\n<p>139<br \/>00:18:34.650 &#8211;&gt; 00:18:40.410<br \/>Harvey Green: Absolutely that&#8217;s that&#8217;s important to for a lot of different environment so that.<\/p>\n<p>140<br \/>00:18:40.860 &#8211;&gt; 00:18:52.050<br \/>Harvey Green: You don&#8217;t have to worry about you know one person&#8217;s feelings getting hurt by the next person or somebody having you know, an agenda they&#8217;re out to get somebody to have a third party they&#8217;re balanced their neutral.<\/p>\n<p>141<br \/>00:18:52.590 &#8211;&gt; 00:19:04.740<br \/>Harvey Green: They come in and their goal is to make sure you&#8217;re either secure or let you know how you&#8217;re not secure so that you can take care of it, the the emotional piece of it completely comes out of it.<\/p>\n<p>142<br \/>00:19:06.060 &#8211;&gt; 00:19:13.470<br \/>Andy Whiteside: So let&#8217;s let&#8217;s translate the things that we just talked about in terms of things you need to be thinking about to new tactics products and services.<\/p>\n<p>143<br \/>00:19:14.280 &#8211;&gt; 00:19:26.610<br \/>Andy Whiteside: gyro let&#8217;s hit the first one new tonics ios which stands for Acropolis operating system and prison management what what of those bullets do we fix with a ios and prison management.<\/p>\n<p>144<br \/>00:19:27.780 &#8211;&gt; 00:19:34.920<br \/>Jirah Cox: yeah so so you know this talks about how we, we take the listings right thing Government issued.<\/p>\n<p>145<br \/>00:19:36.210 &#8211;&gt; 00:19:48.840<br \/>Jirah Cox: guidelines on how to secure system we don&#8217;t give that to you as a document for a human, to read, we also write copy that is machine readable, so you can automate that right so right out of the box, you can simply say enter state compliance mode.<\/p>\n<p>146<br \/>00:19:51.510 &#8211;&gt; 00:19:59.940<br \/>Jirah Cox: that&#8217;s not just a one time event that&#8217;s also a defined baseline that if you were to go in and do something to like compromise system security say weekend.<\/p>\n<p>147<br \/>00:20:00.360 &#8211;&gt; 00:20:09.150<br \/>Jirah Cox: Key base ssh down to password ssh we will note that flag it and then re he&#8217;ll back to the baseline saying I got to turn that off and go back to key based ssh.<\/p>\n<p>148<br \/>00:20:11.070 &#8211;&gt; 00:20:15.780<br \/>Jirah Cox: And then you know for the management layer right even limiting sort of bad actor admins.<\/p>\n<p>149<br \/>00:20:16.140 &#8211;&gt; 00:20:30.720<br \/>Jirah Cox: Are back for rural based control around what of what is it gives a given roll out to do within the environment, so if i&#8217;m from the backup guy from the you know database guy I can say, I can only see the parts of prison that are pertinent to my job role.<\/p>\n<p>150<br \/>00:20:35.130 &#8211;&gt; 00:20:46.230<br \/>Andy Whiteside: And that&#8217;s a has a lot to do with the origins of new tannic which is this user friendly interface, but with control yes.<\/p>\n<p>151<br \/>00:20:48.180 &#8211;&gt; 00:20:48.420<br \/>Oui.<\/p>\n<p>152<br \/>00:20:49.740 &#8211;&gt; 00:21:02.370<br \/>Andy Whiteside: Alright, so the next one on here is new tonics hv which stands for Acropolis hypervisor and flow micro segmentation flow is not an acronym it&#8217;s a real word.<\/p>\n<p>153<br \/>00:21:03.450 &#8211;&gt; 00:21:16.650<br \/>Andy Whiteside: And I am specifically emphasizing the word Acropolis, when I said it before and saying in here now, I still run into people everyday that use Acropolis interchangeably between these two things, these two areas and that&#8217;s just not right.<\/p>\n<p>154<br \/>00:21:19.170 &#8211;&gt; 00:21:19.740<br \/>Jirah Cox: i&#8217;m.<\/p>\n<p>155<br \/>00:21:21.510 &#8211;&gt; 00:21:25.620<br \/>Jirah Cox: yeah I don&#8217;t I don&#8217;t bother correcting people too often about that.<\/p>\n<p>156<br \/>00:21:26.910 &#8211;&gt; 00:21:32.340<br \/>Jirah Cox: You know branding is kind of always just a little bit fluid right i&#8217;ll spend more time, focusing on the problem to solve.<\/p>\n<p>157<br \/>00:21:32.820 &#8211;&gt; 00:21:37.770<br \/>Jirah Cox: But but yeah and like including this one right where you know delivering micro segmentation.<\/p>\n<p>158<br \/>00:21:38.280 &#8211;&gt; 00:21:43.920<br \/>Jirah Cox: making it easy to apply to your workloads see what they&#8217;re doing lockdown what they can and can&#8217;t talk to.<\/p>\n<p>159<br \/>00:21:44.280 &#8211;&gt; 00:21:56.670<br \/>Jirah Cox: But nothing, nothing to install all the code, you need is there on the system from day one and all, all you have to do is just you know set your policies in place and and switching them from monitor mode to enforce mode that&#8217;s it so couldn&#8217;t be simpler.<\/p>\n<p>160<br \/>00:22:00.390 &#8211;&gt; 00:22:03.690<br \/>Andy Whiteside: rv i&#8217;ll let you comment, I was gonna jump in on something else but go ahead.<\/p>\n<p>161<br \/>00:22:04.920 &#8211;&gt; 00:22:17.010<br \/>Harvey Green: No just this is, these are I guess very important tenants here, you know we&#8217;re talking through prevention and as we get to the one you just highlighted being able to.<\/p>\n<p>162<br \/>00:22:18.030 &#8211;&gt; 00:22:22.560<br \/>Harvey Green: create a mutable backups the right ones read only mode.<\/p>\n<p>163<br \/>00:22:23.610 &#8211;&gt; 00:22:44.490<br \/>Harvey Green: That will again be a great prevention tool and as as direct talk through earlier when we talk about what you do after something happens that&#8217;s that&#8217;s also a very, very important tool is to be able to know what you actually can trust, on the other side of something happening right.<\/p>\n<p>164<br \/>00:22:45.750 &#8211;&gt; 00:22:52.560<br \/>Andy Whiteside: And the guy was the last one in the these sets of bullets is new tannic objects, where does that tie into what we talked about above.<\/p>\n<p>165<br \/>00:22:54.270 &#8211;&gt; 00:22:57.150<br \/>Jirah Cox: yeah so objects, is our our.<\/p>\n<p>166<br \/>00:22:58.170 &#8211;&gt; 00:23:07.170<br \/>Jirah Cox: s3 compliant object storage solution on top of mechanics so you can use a node you know, these days, you can use a node for like I don&#8217;t know it&#8217;s called 1820 different things right from.<\/p>\n<p>167<br \/>00:23:07.470 &#8211;&gt; 00:23:20.880<br \/>Jirah Cox: Running vmware to running containers to running file services SMB nfl objects is like one of those things you can use a node to do right and you say next node so better living through software so objects, is our software based solution for.<\/p>\n<p>168<br \/>00:23:21.930 &#8211;&gt; 00:23:31.140<br \/>Jirah Cox: for storing data it lends itself to being a backup target very readily right, it can scale to absolutely huge data sets right so.<\/p>\n<p>169<br \/>00:23:31.560 &#8211;&gt; 00:23:42.090<br \/>Jirah Cox: started whatever hundred terabytes grow to petabytes object isn&#8217;t going to blank right grow grow right along with you as well as, of course, the new tonics cluster below it right scale out it&#8217;s very, very.<\/p>\n<p>170<br \/>00:23:43.650 &#8211;&gt; 00:23:55.140<br \/>Jirah Cox: alive aligned to that use case but that&#8217;s all the technical you know whiz bang storage stuff the security side of that is the ability to make it one compliance a worm being you know right once read many.<\/p>\n<p>171<br \/>00:23:56.190 &#8211;&gt; 00:24:02.880<br \/>Jirah Cox: The software itself will literally not allow a deletion of data if that flag has been set so, then it has to age out.<\/p>\n<p>172<br \/>00:24:03.300 &#8211;&gt; 00:24:12.090<br \/>Jirah Cox: According to your policy, whether that&#8217;s you know one year through your seven year whatever it is, it delusion there&#8217;s simply not allowed before that threshold has been reached.<\/p>\n<p>173<br \/>00:24:14.280 &#8211;&gt; 00:24:24.930<br \/>Andy Whiteside: And that&#8217;s a no brainer in our world right it doesn&#8217;t matter we don&#8217;t have to put the stuff on tape and send it off study more we can stick it across the aisle or we can stick it across the aisle and across the world, and another data Center.<\/p>\n<p>174<br \/>00:24:25.200 &#8211;&gt; 00:24:26.580<br \/>Andy Whiteside: never change it.<\/p>\n<p>175<br \/>00:24:29.940 &#8211;&gt; 00:24:31.860<br \/>Andy Whiteside: Harvey any specifics around.<\/p>\n<p>176<br \/>00:24:33.210 &#8211;&gt; 00:24:34.380<br \/>Andy Whiteside: immutable storage.<\/p>\n<p>177<br \/>00:24:35.310 &#8211;&gt; 00:24:39.870<br \/>Harvey Green: Know again just making it so that you&#8217;ve got something that you can trust in the end.<\/p>\n<p>178<br \/>00:24:41.010 &#8211;&gt; 00:24:56.850<br \/>Harvey Green: Again, being able to replicate that wherever you need it to live, so that you don&#8217;t just have it all sitting in the same physical location and just being able to have something that you know, no matter what isn&#8217;t going to be.<\/p>\n<p>179<br \/>00:24:57.900 &#8211;&gt; 00:25:06.090<br \/>Harvey Green: Written to or changed based on something other some other threat making its way into your environment.<\/p>\n<p>180<br \/>00:25:07.050 &#8211;&gt; 00:25:07.350<br \/>C'est vrai.<\/p>\n<p>181<br \/>00:25:09.000 &#8211;&gt; 00:25:22.470<br \/>Andy Whiteside: So guys, let me, let me do this to you two guys if I So you can see my screen right yeah but for for effect if I were to say, this is the end of the blog we&#8217;ve accomplished a lot right there, yes.<\/p>\n<p>182<br \/>00:25:23.460 &#8211;&gt; 00:25:24.690<br \/>Harvey Green: Absolutely for sure.<\/p>\n<p>183<br \/>00:25:25.260 &#8211;&gt; 00:25:34.890<br \/>Andy Whiteside: These are the things we just talked about are the no brainers from new tactics to help solve the security challenge both sledding commercial.<\/p>\n<p>184<br \/>00:25:36.480 &#8211;&gt; 00:25:37.110<br \/>Jirah Cox: hundred percent yeah.<\/p>\n<p>185<br \/>00:25:37.890 &#8211;&gt; 00:25:41.190<br \/>Andy Whiteside: But now let&#8217;s move on to the next section detection right so we&#8217;ve done.<\/p>\n<p>186<br \/>00:25:41.190 &#8211;&gt; 00:25:43.530<br \/>Andy Whiteside: Prevention never detection now you thought you were done, though.<\/p>\n<p>187<br \/>00:25:43.830 &#8211;&gt; 00:25:47.400<br \/>Jirah Cox: For sure that was Andy stretching one blog post into three episodes.<\/p>\n<p>188<br \/>00:25:48.780 &#8211;&gt; 00:25:50.460<br \/>Jirah Cox: Which i&#8217;m totally down for whatever you want me.<\/p>\n<p>189<br \/>00:25:50.790 &#8211;&gt; 00:25:52.560<br \/>Andy Whiteside: Just because it&#8217;s valentine&#8217;s day right.<\/p>\n<p>190<br \/>00:25:54.240 &#8211;&gt; 00:25:56.250<br \/>Andy Whiteside: Alright, the next one is detection and i&#8217;m going to.<\/p>\n<p>191<br \/>00:25:56.310 &#8211;&gt; 00:26:13.320<br \/>Andy Whiteside: i&#8217;m going to read the four bullets, so you don&#8217;t have to do it again and then we&#8217;ll talk about where to tactics play so leverage layer seven threat detection tools like intrusion detection and prevention systems, I think I mentioned this earlier to identify super serious serious.<\/p>\n<p>192<br \/>00:26:14.160 &#8211;&gt; 00:26:16.500<br \/>Harvey Green: Serious so curious.<\/p>\n<p>193<br \/>00:26:16.650 &#8211;&gt; 00:26:17.010<br \/>Jirah Cox: Network.<\/p>\n<p>194<br \/>00:26:17.640 &#8211;&gt; 00:26:25.680<br \/>Andy Whiteside: that&#8217;s the one number to use a consolidated security information used to call it is to consolidate security information event management, a Sim.<\/p>\n<p>195<br \/>00:26:26.220 &#8211;&gt; 00:26:45.660<br \/>Andy Whiteside: solution with real time analytics analysis of security event logs and possible orchestration capabilities that&#8217;s number two number three employee network honey pots to augment detection number four leverage anomaly detection tools for resource usage and storage activity.<\/p>\n<p>196<br \/>00:26:46.830 &#8211;&gt; 00:26:59.070<br \/>Andy Whiteside: If I go down to where new tannic fits first one talks about new tannic Acropolis hypervisor HP and flow service insertion and chaining gyro help us understand where that helps solve the bullets above.<\/p>\n<p>197<br \/>00:26:59.850 &#8211;&gt; 00:27:04.890<br \/>Jirah Cox: yeah so you can you know with with service insertion right that&#8217;s a like an advanced feature of flow.<\/p>\n<p>198<br \/>00:27:05.340 &#8211;&gt; 00:27:16.110<br \/>Jirah Cox: Obviously you can do a quick allow or deny at a packet level closer to the virtual machine on the virtualized Nick, but if you want to get fancier than that, obviously, you know, maybe I want to always block.<\/p>\n<p>199<br \/>00:27:16.980 &#8211;&gt; 00:27:32.730<br \/>Jirah Cox: You know, tell them that that&#8217;s an easy one, I don&#8217;t need to spend cycles on like a virtualized firewall you know disrupting those packets, looking at the source, looking at at headers are doing like fancier like web web application firewall.<\/p>\n<p>200<br \/>00:27:33.990 &#8211;&gt; 00:27:35.250<br \/>Jirah Cox: analytics of that traffic.<\/p>\n<p>201<br \/>00:27:36.480 &#8211;&gt; 00:27:43.290<br \/>Jirah Cox: You know that&#8217;s easy right telling that disallowed to my web server maybe on actual 443 packets, I do want.<\/p>\n<p>202<br \/>00:27:43.980 &#8211;&gt; 00:27:53.220<br \/>Jirah Cox: You know, certain traffic patterns, or maybe all traffic redirect through smarter tooling right, I want, maybe virtualized firewalls to be allowed to decrypt that traffic.<\/p>\n<p>203<br \/>00:27:53.610 &#8211;&gt; 00:28:00.780<br \/>Jirah Cox: Look at who it&#8217;s from see what&#8217;s happening in their permit injection attacks so that&#8217;s that&#8217;s you know another great use case for.<\/p>\n<p>204<br \/>00:28:01.590 &#8211;&gt; 00:28:18.540<br \/>Jirah Cox: flow as part of a Microsoft solution to allow for even more advanced functionality right, so we can work with virtualize firewall vendors application firewalls to do more functionality give you more functionality and more security around your traffic in your workloads traffic flows.<\/p>\n<p>205<br \/>00:28:20.850 &#8211;&gt; 00:28:22.050<br \/>Andy Whiteside: rv comments.<\/p>\n<p>206<br \/>00:28:23.280 &#8211;&gt; 00:28:35.670<br \/>Harvey Green: I our reserve to the till you get to the last one, but i&#8217;m just i&#8217;m watching this picture build and I just want to make sure, at the end that everybody sees the picture we were building.<\/p>\n<p>207<br \/>00:28:38.160 &#8211;&gt; 00:28:52.320<br \/>Andy Whiteside: The the next bullet as to how new tannic solve these challenges is files files analytics new tannic prison OPS in X play and I can I can fathom what files driver What is all this stuff what is this stuff.<\/p>\n<p>208<br \/>00:28:52.830 &#8211;&gt; 00:28:53.640<br \/>Jirah Cox: yeah so.<\/p>\n<p>209<br \/>00:28:55.230 &#8211;&gt; 00:28:57.180<br \/>Jirah Cox: Some some really creative you know.<\/p>\n<p>210<br \/>00:28:59.730 &#8211;&gt; 00:29:14.790<br \/>Jirah Cox: Collaboration you&#8217;re right among among the services, the file files analytics watches the traffic on mechanics hosted file servers right so new text files being our software defined scale out nas offering right, so it can host your SMB shares your nfl shares.<\/p>\n<p>211<br \/>00:29:15.840 &#8211;&gt; 00:29:25.770<br \/>Jirah Cox: When data lives on those, then we can generate metadata around about your data right you&#8217;re storing whatever word documents pdfs family vacation videos whatever.<\/p>\n<p>212<br \/>00:29:26.190 &#8211;&gt; 00:29:32.520<br \/>Jirah Cox: We can watch who&#8217;s accessing those what does normal look like what do anomalies look like right so hey it&#8217;s 3am.<\/p>\n<p>213<br \/>00:29:33.120 &#8211;&gt; 00:29:42.240<br \/>Jirah Cox: And you know somebody logged in from an accounting desktop coming through these file shares that&#8217;s an anomaly right, we need to throw an alert about that that can then be acted on.<\/p>\n<p>214<br \/>00:29:43.410 &#8211;&gt; 00:29:55.830<br \/>Jirah Cox: So, you know that that&#8217;s not not normal behavior there and then prison OPS can do the same thing for virtual machines right, it will actually learn what does normal look like, for your vm and he was like memory consumption cpu consumption.<\/p>\n<p>215<br \/>00:29:57.420 &#8211;&gt; 00:30:01.530<br \/>Jirah Cox: And they can also alert for anomaly so without you as a human needing to define.<\/p>\n<p>216<br \/>00:30:02.250 &#8211;&gt; 00:30:13.200<br \/>Jirah Cox: X percentage of threshold or somebody megahertz of what is what the steady state look like it&#8217;ll just learn and baseline against your own behavior and then be able to alert to you based off of anomalies like that.<\/p>\n<p>217<br \/>00:30:14.010 &#8211;&gt; 00:30:22.500<br \/>Jirah Cox: And then, and then cross play is the it&#8217;s our like coolest automation platform, so you can have lots of we call them playbooks to find.<\/p>\n<p>218<br \/>00:30:22.920 &#8211;&gt; 00:30:28.890<br \/>Jirah Cox: A playbook is almost like if you&#8217;ve used like the the Web service if this than that it&#8217;s like you know all point and click.<\/p>\n<p>219<br \/>00:30:29.490 &#8211;&gt; 00:30:37.650<br \/>Jirah Cox: automation and chaining of like I want you to take this and do this and strip out this you know third word and email that to me and send me a slack message or teams, or whatever I want.<\/p>\n<p>220<br \/>00:30:38.940 &#8211;&gt; 00:30:48.810<br \/>Jirah Cox: I can use that for like time based triggers on demand triggers or in this case more critically alert based triggers So when I get an alert from the system about X is happening.<\/p>\n<p>221<br \/>00:30:49.170 &#8211;&gt; 00:31:00.330<br \/>Jirah Cox: Right, then I want you to do whatever so I you know you can say hey my critical web servers web traffic is up 10 X, in the last hour right is that worth as a human me checking on.<\/p>\n<p>222<br \/>00:31:01.020 &#8211;&gt; 00:31:13.140<br \/>Jirah Cox: I can get that as an email as a teams message slack message pager duty whatever whatever fits into your ecosystem, so it brings that that detection, all the way to your right to your front door.<\/p>\n<p>223<br \/>00:31:14.880 &#8211;&gt; 00:31:21.960<br \/>Andy Whiteside: So diver are these all things that are part of new techniques or things that new techniques enables that third parties come in and actually do.<\/p>\n<p>224<br \/>00:31:22.710 &#8211;&gt; 00:31:25.200<br \/>Jirah Cox: i&#8217;m going to say both.<\/p>\n<p>225<br \/>00:31:25.530 &#8211;&gt; 00:31:26.430<br \/>Jirah Cox: Okay, so that.<\/p>\n<p>226<br \/>00:31:28.140 &#8211;&gt; 00:31:39.720<br \/>Jirah Cox: We have a lot of the the code closer to the virtual machine close to the workload closer to the metal we&#8217;re not like the APP on your smartphone that alerts you about something, but we work with that APP yeah.<\/p>\n<p>227<br \/>00:31:41.400 &#8211;&gt; 00:31:45.300<br \/>Andy Whiteside: Alright Harvey yeah I can&#8217;t believe you&#8217;re excited about number three the way you seem to be but.<\/p>\n<p>228<br \/>00:31:46.560 &#8211;&gt; 00:31:49.140<br \/>Harvey Green: Not so you&#8217;re actually you were.<\/p>\n<p>229<br \/>00:31:49.170 &#8211;&gt; 00:31:56.730<br \/>Harvey Green: kind of hitting on my point just just a second ago before I got to it, but I, like all of this.<\/p>\n<p>230<br \/>00:31:57.720 &#8211;&gt; 00:32:11.580<br \/>Harvey Green: Well, to jeremy&#8217;s point not every single piece of it, but all of this, that we talked about so far, these are things that are built into the platform things you can use things that you can have you know day one of implementation.<\/p>\n<p>231<br \/>00:32:12.810 &#8211;&gt; 00:32:19.800<br \/>Harvey Green: So I guess for those so far that have listened to, where we&#8217;ve gotten so far, and you don&#8217;t have.<\/p>\n<p>232<br \/>00:32:20.280 &#8211;&gt; 00:32:38.460<br \/>Harvey Green: All of these tools in place and you&#8217;re wondering how in the world, you can get all of them, and you know the thinking that is 15 vendors is the answer on just being able to do this, out of just the mechanics platform that you have is I mean I think that&#8217;s a very big.<\/p>\n<p>233<br \/>00:32:39.570 &#8211;&gt; 00:32:56.250<br \/>Harvey Green: very big deal that can definitely change an organization security footprint really from day one just being able to plan this out and implement these pieces that you have access to, I think, will be a very, very good change and security posture.<\/p>\n<p>234<br \/>00:32:56.940 &#8211;&gt; 00:33:04.410<br \/>Andy Whiteside: mean here&#8217;s here&#8217;s one of my look at this, you can you can move everything to an is you know, one of the big cloud hyper scales, and you can get all this stuff.<\/p>\n<p>235<br \/>00:33:05.400 &#8211;&gt; 00:33:17.040<br \/>Andy Whiteside: But most of us can&#8217;t do that move everything so then we got to go to some colo we got to go to some partner, other than the public cloud we gotta do our own on data our own premises data Center.<\/p>\n<p>236<br \/>00:33:17.940 &#8211;&gt; 00:33:33.450<br \/>Andy Whiteside: Because of you, because of the universal layer of new tactics and all this, whether it&#8217;s public cloud colo private data Center private cloud all these things become doable and they become doable in the same way.<\/p>\n<p>237<br \/>00:33:35.130 &#8211;&gt; 00:33:35.460<br \/>Jirah Cox: Right.<\/p>\n<p>238<br \/>00:33:38.190 &#8211;&gt; 00:33:47.820<br \/>Andy Whiteside: And so the third bullet here is about a Sim a security information and event management system that can easily tie into all this and keep you from having to look.<\/p>\n<p>239<br \/>00:33:48.540 &#8211;&gt; 00:33:56.190<br \/>Andy Whiteside: Under every object to find stuff in a place, you can go look to find everything that&#8217;s being reported and try to make sense of it.<\/p>\n<p>240<br \/>00:33:57.480 &#8211;&gt; 00:34:04.560<br \/>Jirah Cox: yeah I mean I don&#8217;t want to oversimplify or unintentionally trigger any of my friends in security, who could.<\/p>\n<p>241<br \/>00:34:05.010 &#8211;&gt; 00:34:13.620<br \/>Jirah Cox: describe like what the same as doing it way better than I could, but like in my simplified view of the world it&#8217;s telling it&#8217;s a record of what happened.<\/p>\n<p>242<br \/>00:34:14.070 &#8211;&gt; 00:34:27.810<br \/>Jirah Cox: And what&#8217;s normal and what&#8217;s weird right and that, basically, is like one dimension of like a big data problem of like capture this fire hose of information look for outliers and anomalies hopefully intelligently alert about that.<\/p>\n<p>243<br \/>00:34:29.730 &#8211;&gt; 00:34:42.420<br \/>Jirah Cox: But at that base layer right as a big data problem in taxes, like uniquely suited to do that right, because we have the compute for the actual computation that has to occur, you know, in the form of a virtual machine and V cpus.<\/p>\n<p>244<br \/>00:34:43.290 &#8211;&gt; 00:34:53.610<br \/>Jirah Cox: But we are the performance but the performance storage right they have to capture the data be able to ingest it be able to analyze it be able to search on it when you when you search for like occurrences of events and so forth.<\/p>\n<p>245<br \/>00:34:54.030 &#8211;&gt; 00:35:03.000<br \/>Jirah Cox: Or we need to go review your log data but storing everything in a performant way forever is crazy expensive, and you know public cloud vendors would love you to do that.<\/p>\n<p>246<br \/>00:35:04.530 &#8211;&gt; 00:35:12.060<br \/>Jirah Cox: You know anything new tannic says hey we can do stuff like fancy all flash nodes for your ingest and whatever you want, like last 90 days, perhaps.<\/p>\n<p>247<br \/>00:35:12.420 &#8211;&gt; 00:35:19.140<br \/>Jirah Cox: But if you need to maintain years worth of logs here, we also have a great solution for that with stuff like our our object storage solution.<\/p>\n<p>248<br \/>00:35:19.470 &#8211;&gt; 00:35:33.210<br \/>Jirah Cox: which a lot of security vendors can say we will you know at the application level gracefully aged out data from the hot teardown of the cold tier keeping everything performance, secure and economical, you know, and you have full governance over all that data.<\/p>\n<p>249<br \/>00:35:35.040 &#8211;&gt; 00:35:38.250<br \/>Andy Whiteside: Right it&#8217;s a it&#8217;s a platform right.<\/p>\n<p>250<br \/>00:35:38.640 &#8211;&gt; 00:35:53.610<br \/>Andy Whiteside: stuff can tie tie into and watch a new 10 is going from Acropolis operating system running on top of asx to the evolution to Acropolis hypervisor and then all the things the services that have come along with it.<\/p>\n<p>251<br \/>00:35:54.750 &#8211;&gt; 00:36:01.110<br \/>Andy Whiteside: As you guys start to solve cloud like challenges that don&#8217;t have to be in the cloud it&#8217;s it&#8217;s been fun to watch.<\/p>\n<p>252<br \/>00:36:03.570 &#8211;&gt; 00:36:13.890<br \/>Andy Whiteside: Alright last section of this is recovery and the bullets go like this, create snapshot and replication plans replicate data to one or more locations, as part of.<\/p>\n<p>253<br \/>00:36:14.220 &#8211;&gt; 00:36:21.270<br \/>Andy Whiteside: Business continuity and disaster recovery i&#8217;ve never seen this acronym before but BC Dr putting those two together.<\/p>\n<p>254<br \/>00:36:22.080 &#8211;&gt; 00:36:25.320<br \/>Andy Whiteside: Because Everybody talks about them, as if they&#8217;re one in the same and they&#8217;re definitely not but.<\/p>\n<p>255<br \/>00:36:25.800 &#8211;&gt; 00:36:30.180<br \/>Andy Whiteside: If that&#8217;s what somebody is talking about let&#8217;s give them both and just given one acronym that&#8217;s interesting I like that.<\/p>\n<p>256<br \/>00:36:31.140 &#8211;&gt; 00:36:46.290<br \/>Andy Whiteside: Follow the 321 rule for backup at least three copies to backups one copy should be located off site that goes back to those days of waiting for the iron mountain guy to show up every day and did lots of that and handing the the box will tapes.<\/p>\n<p>257<br \/>00:36:47.790 &#8211;&gt; 00:36:53.280<br \/>Andy Whiteside: Sometimes check and see if they work, sometimes not use automation and frequently test your recovery right so.<\/p>\n<p>258<br \/>00:36:53.610 &#8211;&gt; 00:37:01.380<br \/>Andy Whiteside: I don&#8217;t know we I know we brought it up multiple times on this podcast i&#8217;m glad glad you got a business continuity well i&#8217;m glad you got to Dr plan.<\/p>\n<p>259<br \/>00:37:01.710 &#8211;&gt; 00:37:06.210<br \/>Andy Whiteside: i&#8217;m glad there&#8217;s some element of business continuity in your day to day how often do you test it.<\/p>\n<p>260<br \/>00:37:06.960 &#8211;&gt; 00:37:13.650<br \/>Andy Whiteside: You know if you&#8217;re doing business continuity right you&#8217;re you&#8217;re actually testing alive every day you&#8217;re doing it, the modern way, but the Dr side of it.<\/p>\n<p>261<br \/>00:37:14.550 &#8211;&gt; 00:37:24.720<br \/>Andy Whiteside: Being able to proactively test that without actually doing it and then actually doing a couple times a year, those are the challenges that can real consulting firms need to have for their for their customers.<\/p>\n<p>262<br \/>00:37:27.030 &#8211;&gt; 00:37:34.110<br \/>Andy Whiteside: The new tannic answers to this starts with number one new tactics ios gyro how is mechanics Acropolis operating system.<\/p>\n<p>263<br \/>00:37:35.070 &#8211;&gt; 00:37:38.070<br \/>Andy Whiteside: i&#8217;m going to try to translate that real quick so that&#8217;s the new tactics.<\/p>\n<p>264<br \/>00:37:38.460 &#8211;&gt; 00:37:49.740<br \/>Andy Whiteside: Acropolis operating system which is really the storage magic and all this, which if I try to dummy it down a little is really the V San piece of what makes new techniques new teams, I know.<\/p>\n<p>265<br \/>00:37:50.550 &#8211;&gt; 00:37:57.960<br \/>Andy Whiteside: I know you guys don&#8217;t necessarily like somebody calling me saying, because it&#8217;s way beyond that but that&#8217;s what Acropolis operating system means to me.<\/p>\n<p>266<br \/>00:37:59.040 &#8211;&gt; 00:38:06.480<br \/>Jirah Cox: it&#8217;s it&#8217;s solving the need for highly available storage right now scale up fashion kind of no matter what the workload is right, whether it&#8217;s.<\/p>\n<p>267<br \/>00:38:07.020 &#8211;&gt; 00:38:17.160<br \/>Jirah Cox: You know right to your point where we started as simple as a virtual machine or as fancy as containerized workloads block storage file storage object storage, you know.<\/p>\n<p>268<br \/>00:38:18.510 &#8211;&gt; 00:38:22.770<br \/>Jirah Cox: I think if if the world&#8217;s invent a new kind of storage i&#8217;m sure will evolve to support that do one day.<\/p>\n<p>269<br \/>00:38:24.120 &#8211;&gt; 00:38:24.390<br \/>Andy Whiteside: Right.<\/p>\n<p>270<br \/>00:38:27.300 &#8211;&gt; 00:38:27.690<br \/>Andy Whiteside: rb.<\/p>\n<p>271<br \/>00:38:29.370 &#8211;&gt; 00:38:38.760<br \/>Andy Whiteside: it&#8217;s fair to say that the Acropolis operating system portion of this is that&#8217;s the Foundation that&#8217;s the cornerstone for all that&#8217;s happened since, yes it.<\/p>\n<p>272<br \/>00:38:38.820 &#8211;&gt; 00:38:58.140<br \/>Harvey Green: Is the magic, it is the secret sauce is the differentiation, so this is what makes the big difference between attacks and and a lot of the other solutions out there that can do as much or be as wide ranging.<\/p>\n<p>273<br \/>00:38:59.370 &#8211;&gt; 00:39:02.400<br \/>Harvey Green: As far as the workloads cover that and attachments can be.<\/p>\n<p>274<br \/>00:39:03.990 &#8211;&gt; 00:39:08.100<br \/>Jirah Cox: In the place where we fit into like the 321 rules specifically right.<\/p>\n<p>275<br \/>00:39:09.390 &#8211;&gt; 00:39:19.350<br \/>Jirah Cox: You know, three copies of of data, I think one of those should probably be you know, a new tannic snapshot on the primary cluster right where it&#8217;s it&#8217;s.<\/p>\n<p>276<br \/>00:39:20.310 &#8211;&gt; 00:39:23.220<br \/>Jirah Cox: it&#8217;s immutable right can be changed after it&#8217;s created.<\/p>\n<p>277<br \/>00:39:23.760 &#8211;&gt; 00:39:39.030<br \/>Jirah Cox: And it&#8217;s going to be the on the spectrum of recovery, the quickest option right, obviously, if I have a site denial event, if I have a physical event, if the sprinklers go off in the data Center also pro tip don&#8217;t have sprinklers in your data Center but if that cabinet is physically down.<\/p>\n<p>278<br \/>00:39:40.530 &#8211;&gt; 00:39:50.760<br \/>Jirah Cox: Then I can&#8217;t use that snapshot right but short of a cluster denial event that snapshot to me the quickest way to get up and going, if I have a drop the table a human caused.<\/p>\n<p>279<br \/>00:39:51.630 &#8211;&gt; 00:40:00.480<br \/>Jirah Cox: event a vm deletion, you know some sort of a miss configuration right definitely have backups as well, but one keep one copy right and then.<\/p>\n<p>280<br \/>00:40:00.870 &#8211;&gt; 00:40:07.680<br \/>Jirah Cox: I like the way this article writes it in terms of like match your business recovery objectives, basically, you know profile your vm is right find the important stuff.<\/p>\n<p>281<br \/>00:40:08.160 &#8211;&gt; 00:40:13.800<br \/>Jirah Cox: keeps Nash snapshots of them on the primary cluster more often, they may be retained for longer.<\/p>\n<p>282<br \/>00:40:14.430 &#8211;&gt; 00:40:22.020<br \/>Jirah Cox: You know, you can take snapshots right there taking instantly they don&#8217;t cause stun they don&#8217;t cause, you know them slowdowns as you retain them.<\/p>\n<p>283<br \/>00:40:22.650 &#8211;&gt; 00:40:36.750<br \/>Jirah Cox: So keep those there right there built in, as part of the Platform, beyond that, of course, then yeah get into get into your yeah BC Dr I think it&#8217;s a great acronym for it right, because I don&#8217;t always have to fail over to recover.<\/p>\n<p>284<br \/>00:40:38.310 &#8211;&gt; 00:40:41.460<br \/>Jirah Cox: You know I just need to get the business up back up and running back as quick as possible.<\/p>\n<p>285<br \/>00:40:42.570 &#8211;&gt; 00:40:53.460<br \/>Jirah Cox: The automation right we have another blog post and we did an episode about it, to talk about using our leap right which is that are orchestrated vm recovery, you know with run books and and.<\/p>\n<p>286<br \/>00:40:53.910 &#8211;&gt; 00:41:01.980<br \/>Jirah Cox: Non impactful out of band testing right, I could have that test run every morning at three in the morning and then just email me with the Dr tests.<\/p>\n<p>287<br \/>00:41:02.550 &#8211;&gt; 00:41:10.470<br \/>Jirah Cox: Success results right, I can just go into work every day, knowing that my Dr plan was tested last night, while I slept and we passed the test right.<\/p>\n<p>288<br \/>00:41:13.890 &#8211;&gt; 00:41:16.800<br \/>Andy Whiteside: So let&#8217;s talk leap.<\/p>\n<p>289<br \/>00:41:18.120 &#8211;&gt; 00:41:19.740<br \/>Andy Whiteside: And what leap does.<\/p>\n<p>290<br \/>00:41:20.760 &#8211;&gt; 00:41:35.280<br \/>Andy Whiteside: Like leap when I first started understanding mechanics my first thought went to the er and how entertainers could offer up a cloud that included that it had new tactics in it and we could easily use that as a replication target.<\/p>\n<p>291<br \/>00:41:36.780 &#8211;&gt; 00:41:43.530<br \/>Andy Whiteside: that&#8217;s leap right that&#8217;s that&#8217;s what the new tannic cloud has become, which is this no brainer place to at least a year, Dr.<\/p>\n<p>292<br \/>00:41:44.280 &#8211;&gt; 00:41:51.930<br \/>Jirah Cox: yeah if you don&#8217;t if you&#8217;re a customer without a without a Dr site today and no desire to invest in one a you&#8217;re in great company and be.<\/p>\n<p>293<br \/>00:41:52.140 &#8211;&gt; 00:42:00.780<br \/>Jirah Cox: As an easy problem to solve, you know absolutely you can you can you know basically rent if that&#8217;s the right word, you can get a Dr as a service solution.<\/p>\n<p>294<br \/>00:42:01.470 &#8211;&gt; 00:42:17.670<br \/>Jirah Cox: Three new tonics through through the leap service that we offer if you, of course, if you have clusters in you know your your primary and secondary data centers leaps also the software, you can run on Prem to get the same outcome right about vm replication.<\/p>\n<p>295<br \/>00:42:18.810 &#8211;&gt; 00:42:21.540<br \/>Jirah Cox: run book recovery out of ban testing.<\/p>\n<p>296<br \/>00:42:23.970 &#8211;&gt; 00:42:25.920<br \/>Jirah Cox: That full automation for that for that stack.<\/p>\n<p>297<br \/>00:42:28.290 &#8211;&gt; 00:42:33.840<br \/>Andy Whiteside: or via any first hand, knowledge and experience, using using leap for the Dr side.<\/p>\n<p>298<br \/>00:42:35.640 &#8211;&gt; 00:42:46.230<br \/>Harvey Green: Not not me personally, as far as recovering from it, but helping customers at least get it in place, yes conversations about it absolutely.<\/p>\n<p>299<br \/>00:42:47.550 &#8211;&gt; 00:42:55.260<br \/>Harvey Green: Definitely again like Darren mentioned, if you if you&#8217;re a customer who does not have any sort of backup Dr site.<\/p>\n<p>300<br \/>00:42:55.920 &#8211;&gt; 00:43:04.320<br \/>Harvey Green: Today this is definitely a way for you to do it there&#8217;s an affordable way to do it and it&#8217;s pretty easy to implement and get going.<\/p>\n<p>301<br \/>00:43:05.310 &#8211;&gt; 00:43:18.990<br \/>Harvey Green: where you have you know nothing now this This allows you to both check the box, but check it in a way that you&#8217;re able to actually utilize test and be able to actually say something for.<\/p>\n<p>302<br \/>00:43:20.100 &#8211;&gt; 00:43:21.930<br \/>Harvey Green: Not just check the box.<\/p>\n<p>303<br \/>00:43:22.440 &#8211;&gt; 00:43:29.640<br \/>Jirah Cox: Right, I think you get full credit for that answer, however, setting it up that&#8217;s that&#8217;s the important part right like you don&#8217;t get extra points for actually suffering the outage.<\/p>\n<p>304<br \/>00:43:29.730 &#8211;&gt; 00:43:30.390<br \/>That makes you guys.<\/p>\n<p>305<br \/>00:43:33.360 &#8211;&gt; 00:43:43.080<br \/>Jirah Cox: Hopefully that&#8217;s that&#8217;s what we want for all everyone right is is, you have the production in place capability to recover you test it and never actually need to maybe do a full on full blown full smash recovery.<\/p>\n<p>306<br \/>00:43:44.430 &#8211;&gt; 00:43:55.470<br \/>Andy Whiteside: Well, for for me leap is that story that came full circle, but then also watching new tactics doing what they&#8217;re doing with the clusters on azure clusters on aws maybe clusters on tcp.<\/p>\n<p>307<br \/>00:43:55.920 &#8211;&gt; 00:44:12.780<br \/>Andy Whiteside: it&#8217;s those types of things building out redundancy, but for people who just need that Dr scenario check a few boxes pay a few bills nothing compared to pass on guard bill kind of thing, and now you got it covered and when you need to test it, you can.<\/p>\n<p>308<br \/>00:44:12.930 &#8211;&gt; 00:44:18.000<br \/>Jirah Cox: it&#8217;s one yeah soundgarden last in the past there right like.<\/p>\n<p>309<br \/>00:44:18.300 &#8211;&gt; 00:44:19.860<br \/>Jirah Cox: Right it&#8217;s recovery that doesn&#8217;t involve like.<\/p>\n<p>310<br \/>00:44:20.220 &#8211;&gt; 00:44:24.630<br \/>Jirah Cox: backing up a semi you know into the parking lot and hooking into the power grid right it&#8217;s.<\/p>\n<p>311<br \/>00:44:24.750 &#8211;&gt; 00:44:35.460<br \/>Jirah Cox: Right software defined recovery to target of your choice right so that can be your cluster to to new tannic that can be your cluster to.<\/p>\n<p>312<br \/>00:44:36.120 &#8211;&gt; 00:44:46.980<br \/>Jirah Cox: Your other cluster it communicated your cluster to public cloud right which where you can also just run at 10 X cluster right so it&#8217;s really you&#8217;re in control of what your recovery environment should look like.<\/p>\n<p>313<br \/>00:44:48.330 &#8211;&gt; 00:44:48.720<br \/>Andy Whiteside: I went.<\/p>\n<p>314<br \/>00:44:50.400 &#8211;&gt; 00:45:02.520<br \/>Andy Whiteside: Before this world existed, we just I just implemented vmware for the first, second time in a data Center and I went to sungar to do my Dr test for the new company, I was working for fortune 500 company and.<\/p>\n<p>315<br \/>00:45:03.360 &#8211;&gt; 00:45:13.470<br \/>Andy Whiteside: The servers they gave me were so old I couldn&#8217;t even install the os on the server is much less the hypervisor and all the os on top of it to rebuild the environment, I was literally there an hour.<\/p>\n<p>316<br \/>00:45:14.250 &#8211;&gt; 00:45:18.960<br \/>Andy Whiteside: There were people walking around from hurricane Katrina 10 years earlier still walking around the data Center.<\/p>\n<p>317<br \/>00:45:20.160 &#8211;&gt; 00:45:31.980<br \/>Andy Whiteside: I was there, an hour this stuff wouldn&#8217;t work I just left and went out to a club with my buddy like that was the Dr test and I got back in on Monday, my boss said how to go, I said fine that&#8217;s all we ever talked about.<\/p>\n<p>318<br \/>00:45:35.910 &#8211;&gt; 00:45:40.530<br \/>Jirah Cox: Okay, I mean we should probably had an unwritten step here of have a more rigorous Dr tests than that.<\/p>\n<p>319<br \/>00:45:40.830 &#8211;&gt; 00:45:41.670<br \/>Harvey Green: Just a little bit.<\/p>\n<p>320<br \/>00:45:44.130 &#8211;&gt; 00:45:48.690<br \/>Andy Whiteside: But my I think we were spending 10,000 a month or something for the junk I got when I got there.<\/p>\n<p>321<br \/>00:45:49.350 &#8211;&gt; 00:45:59.940<br \/>Andy Whiteside: I was leaving anyway, I was like this is this is insane we have these guys have no idea what they were just checking boxes, this is the same place to the business continuity side of that plan was you ever buy a laptop.<\/p>\n<p>322<br \/>00:46:00.810 &#8211;&gt; 00:46:13.500<br \/>Jirah Cox: I mean I can&#8217;t think of a better segue than to say that leap has a Dr test auditing features, it will tell you what it did during the test and give you a PDF that you can you can send to somebody that cares about habit Tesco.<\/p>\n<p>323<br \/>00:46:15.210 &#8211;&gt; 00:46:17.340<br \/>Jirah Cox: thanks for the thanks for the tip there anything else fantastic.<\/p>\n<p>324<br \/>00:46:17.520 &#8211;&gt; 00:46:31.470<br \/>Andy Whiteside: You know i&#8217;m not proud of everything&#8217;s happening not everything something&#8217;s not all right last one is new tactics mine for backup what does new tannic mind doing to help us with the recovery side of the objective here.<\/p>\n<p>325<br \/>00:46:32.490 &#8211;&gt; 00:46:40.290<br \/>Jirah Cox: yeah I mean, I think this calls it out right is is turnkey data backup and archiving right So if you if you.<\/p>\n<p>326<br \/>00:46:41.160 &#8211;&gt; 00:46:51.750<br \/>Jirah Cox: are adopting the tactics, but you should treat HIV you&#8217;re open to maybe any backup provider, you could you could talk to Harvey you talk to the tactics and say hey what&#8217;s The easiest way to just drop in.<\/p>\n<p>327<br \/>00:46:52.890 &#8211;&gt; 00:47:05.970<br \/>Jirah Cox: My new backup target software to get there, all that good stuff and mine is the package you know newt annex for storage, as well as our software partners for the backup provider and like agents, if you need them.<\/p>\n<p>328<br \/>00:47:07.980 &#8211;&gt; 00:47:15.360<br \/>Jirah Cox: All in one in one single cluster right so he&#8217;s probably going to use our our object storage under the covers and then.<\/p>\n<p>329<br \/>00:47:16.050 &#8211;&gt; 00:47:25.500<br \/>Jirah Cox: Things like our mind partners like vm haiku calm vault as the actual software that is going to pick up your data, whether it&#8217;s you know if you say i&#8217;ve got physical sequel over there.<\/p>\n<p>330<br \/>00:47:26.310 &#8211;&gt; 00:47:35.580<br \/>Jirah Cox: or i&#8217;ve got vm server here, whatever right mine is that you know kind of all in one one stop shop for both backup software and storage in one cluster.<\/p>\n<p>331<br \/>00:47:36.270 &#8211;&gt; 00:47:40.560<br \/>Andy Whiteside: Right, I know our team is using it were to work with haiku.<\/p>\n<p>332<br \/>00:47:41.940 &#8211;&gt; 00:47:47.310<br \/>Andy Whiteside: leverage in mind underneath the covers in haiku turns around and adds additional value on top of that.<\/p>\n<p>333<br \/>00:47:47.850 &#8211;&gt; 00:47:48.540<br \/>Jirah Cox: couldn&#8217;t be simpler.<\/p>\n<p>334<br \/>00:47:50.310 &#8211;&gt; 00:47:51.840<br \/>Andy Whiteside: have anything on the unconscious mind.<\/p>\n<p>335<br \/>00:47:53.040 &#8211;&gt; 00:48:08.220<br \/>Harvey Green: i&#8217;m just looking at the full strategy there and I can&#8217;t get this thought out of my hand, so you have to forgive me but snapshot back backup Dr, otherwise known as Oh, oh no and oh snap.<\/p>\n<p>336<br \/>00:48:12.510 &#8211;&gt; 00:48:13.470<br \/>Jirah Cox: it&#8217;s a spectrum.<\/p>\n<p>337<br \/>00:48:13.890 &#8211;&gt; 00:48:14.490<br \/>Harvey Green: It is.<\/p>\n<p>338<br \/>00:48:18.330 &#8211;&gt; 00:48:20.010<br \/>Andy Whiteside: Spectrum sorry.<\/p>\n<p>339<br \/>00:48:21.660 &#8211;&gt; 00:48:28.140<br \/>Andy Whiteside: All right, um so new tannic select last section talks about any kind of new tannic solutions key to security posture.<\/p>\n<p>340<br \/>00:48:28.620 &#8211;&gt; 00:48:34.470<br \/>Andy Whiteside: I can&#8217;t think of a better way to tie it together than to talk about what i&#8217;ve talked about it, multiple times on this call, and that is.<\/p>\n<p>341<br \/>00:48:34.920 &#8211;&gt; 00:48:48.660<br \/>Andy Whiteside: cloud enabled technologies are allowing us to solve a lot of these problems, new tannic is the cloud enabled technology that can be anywhere you needed to be that&#8217;s what&#8217;s been so awesome about watching tanks journey here.<\/p>\n<p>342<br \/>00:48:50.040 &#8211;&gt; 00:49:06.120<br \/>Harvey Green: yeah absolutely um you know we we find a lot of customers in sled and fed who are not we&#8217;ll just say, not as excited to go run all of their information to a public cloud, so this gives them a lot of.<\/p>\n<p>343<br \/>00:49:06.900 &#8211;&gt; 00:49:14.400<br \/>Harvey Green: A lot of the same functionality, but being able to do that and still host it where they want to host it so.<\/p>\n<p>344<br \/>00:49:15.330 &#8211;&gt; 00:49:28.200<br \/>Harvey Green: That that is definitely a big one you&#8217;ve got the states, we talked about earlier you&#8217;ve got a bunch of the do the type of proof products, some of the certifications that are listed here.<\/p>\n<p>345<br \/>00:49:29.220 &#8211;&gt; 00:49:44.580<br \/>Harvey Green: that these are definitely very, very important pieces for the new tonics platform that people can use and have you know what they know to be a trusted solution.<\/p>\n<p>346<br \/>00:49:45.390 &#8211;&gt; 00:50:04.530<br \/>Harvey Green: One that&#8217;s compliant with the standards that they need, and something that they will be able to actually use, and you know really be able to just trust it, you know you&#8217;ve got everything built into this platform and everything built into this system from you know, again we just went through.<\/p>\n<p>347<br \/>00:50:05.580 &#8211;&gt; 00:50:07.140<br \/>Harvey Green: Protection backup and.<\/p>\n<p>348<br \/>00:50:08.160 &#8211;&gt; 00:50:15.180<br \/>Harvey Green: Recovery so you&#8217;ve got everything that you need to make all of those pieces happen, the way that you need them to.<\/p>\n<p>349<br \/>00:50:16.770 &#8211;&gt; 00:50:22.800<br \/>Andy Whiteside: Well, you spoke up there, and you brought the acronym slid back up I had forgotten, we were talking about slid.<\/p>\n<p>350<br \/>00:50:24.630 &#8211;&gt; 00:50:25.260<br \/>Andy Whiteside: Universal.<\/p>\n<p>351<br \/>00:50:25.350 &#8211;&gt; 00:50:27.480<br \/>Harvey Green: Across is it is.<\/p>\n<p>352<br \/>00:50:28.800 &#8211;&gt; 00:50:35.700<br \/>Andy Whiteside: gyro anything else on the security posture that can be enabled through and the tactics platform.<\/p>\n<p>353<br \/>00:50:38.940 &#8211;&gt; 00:50:53.970<br \/>Jirah Cox: What I think I think the bow tie around the whole thing is we&#8217;ve talked about you know virtualization talk about storage management for all of that security as as part of the DNA of that whole every layer of that stack.<\/p>\n<p>354<br \/>00:50:56.100 &#8211;&gt; 00:51:00.540<br \/>Jirah Cox: Micro segmentation backups Dr replication.<\/p>\n<p>355<br \/>00:51:02.190 &#8211;&gt; 00:51:08.010<br \/>Jirah Cox: And when I you know if for no other reason I do those things within the new tonics flavored fashion.<\/p>\n<p>356<br \/>00:51:08.850 &#8211;&gt; 00:51:15.510<br \/>Jirah Cox: I can call one number for support and get a world class support experience for every single layer of that stack right, so how many.<\/p>\n<p>357<br \/>00:51:16.080 &#8211;&gt; 00:51:30.390<br \/>Jirah Cox: How many vendors that I just pull out that can&#8217;t be pointing fingers at one another, when I need to make this all work for my you know, perhaps you know more rigorous Dr event than we talked about earlier yeah so.<\/p>\n<p>358<br \/>00:51:30.630 &#8211;&gt; 00:51:30.930<br \/>Ainsi.<\/p>\n<p>359<br \/>00:51:32.250 &#8211;&gt; 00:51:35.580<br \/>Andy Whiteside: I said the word platform intentionally and you expanded upon it.<\/p>\n<p>360<br \/>00:51:37.110 &#8211;&gt; 00:51:45.030<br \/>Andy Whiteside: You know you got it you got to have a platform or two that you that are your bread and butter and then things you add to it can work with that platform.<\/p>\n<p>361<br \/>00:51:48.810 &#8211;&gt; 00:51:52.770<br \/>Andy Whiteside: Having having one place to you know one place to go get the things you need.<\/p>\n<p>362<br \/>00:51:54.300 &#8211;&gt; 00:52:02.850<br \/>Andy Whiteside: That you can have the right customer service and then add you know additional things to that, but having that one, you know that one reliable place.<\/p>\n<p>363<br \/>00:52:03.570 &#8211;&gt; 00:52:11.940<br \/>Jirah Cox: You are calling, with a question about one part of that stack but the rest i&#8217;m talking to you understand everything else that i&#8217;m using there right, and you know just.<\/p>\n<p>364<br \/>00:52:12.660 &#8211;&gt; 00:52:22.530<br \/>Jirah Cox: You know piling a bunch of products on top of each other and hoping it all works together, and you are kind of in maybe in partnership with integrity you become the integrator no no they&#8217;re already integrated right yeah.<\/p>\n<p>365<br \/>00:52:24.120 &#8211;&gt; 00:52:28.080<br \/>Andy Whiteside: Well, I think that has a lot to do with i&#8217;m listening to the outliers book from.<\/p>\n<p>366<br \/>00:52:30.120 &#8211;&gt; 00:52:31.290<br \/>Andy Whiteside: What let&#8217;s the outliers book.<\/p>\n<p>367<br \/>00:52:32.760 &#8211;&gt; 00:52:34.020<br \/>Jirah Cox: that&#8217;s quite all right.<\/p>\n<p>368<br \/>00:52:34.380 &#8211;&gt; 00:52:47.100<br \/>Andy Whiteside: yeah Malcolm gladwell and he talks about you know, sometimes it&#8217;s just having the right tools and skills at the right time, you know new tactics coming of age in this cloud platform world.<\/p>\n<p>369<br \/>00:52:48.210 &#8211;&gt; 00:52:51.210<br \/>Andy Whiteside: prevents them from having to bolt a bunch of ugly stuff together.<\/p>\n<p>370<br \/>00:52:54.270 &#8211;&gt; 00:53:14.760<br \/>Jirah Cox: I think it&#8217;s that I think I mean honestly I my Hats off to our honestly, you know our data engineers back in the day right, like you, tax day one saying what can we do with software defined storage, that we can snapshot replicate recover firm roll back to offer immutability on.<\/p>\n<p>371<br \/>00:53:16.080 &#8211;&gt; 00:53:17.760<br \/>Jirah Cox: The data.<\/p>\n<p>372<br \/>00:53:20.190 &#8211;&gt; 00:53:24.930<br \/>Jirah Cox: sounds trite rarely come from a reformed former storage or a seller.<\/p>\n<p>373<br \/>00:53:26.130 &#8211;&gt; 00:53:35.070<br \/>Jirah Cox: The data is kind of those important thing right it&#8217;s like why we&#8217;re all here it&#8217;s why the applications exist, like yeah virtualization is great recovering that was great you couldn&#8217;t do one part without the others.<\/p>\n<p>374<br \/>00:53:35.550 &#8211;&gt; 00:53:43.110<br \/>Jirah Cox: But the other day without data integrity with that data agility and the ability to do fun things with the data we wouldn&#8217;t have.<\/p>\n<p>375<br \/>00:53:43.470 &#8211;&gt; 00:53:50.730<br \/>Jirah Cox: We wouldn&#8217;t be a suitable platform for backups we wouldn&#8217;t be able we shouldn&#8217;t be trusted with your first instance of the data in the application itself.<\/p>\n<p>376<br \/>00:53:51.060 &#8211;&gt; 00:53:59.460<br \/>Jirah Cox: let alone the backups right we wouldn&#8217;t be able to do database automation like we came with era, without a crazy crazy smart data platform below all of it.<\/p>\n<p>377<br \/>00:54:02.280 &#8211;&gt; 00:54:14.220<br \/>Andy Whiteside: it&#8217;s the it&#8217;s the last piece is the engine and everything else can be bolted around a really fast strong and reliable engine, you can you can do a whole lot with that yes.<\/p>\n<p>378<br \/>00:54:16.110 &#8211;&gt; 00:54:19.590<br \/>Andy Whiteside: Well, gentlemen it&#8217;s 506 on valentine&#8217;s day i&#8217;m already in trouble.<\/p>\n<p>379<br \/>00:54:22.020 &#8211;&gt; 00:54:26.820<br \/>Andy Whiteside: If you noticed, I was doing a lot of texting during some of this I gotta go have a good night.<\/p>\n<p>380<br \/>00:54:27.510 &#8211;&gt; 00:54:28.080<br \/>Harvey Green: yeah sorry.<\/p>\n<p>381<br \/>00:54:28.350 &#8211;&gt; 00:54:31.680<br \/>Jirah Cox: y&#8217;all y&#8217;all are gonna be my excuse for tonight too Nice.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity attacks are becoming progressively complex with an increase in Cloud, Digitization, and Work-from-Anywhere practices.\u00a0 State, Local, and Education (SLED) organizations must begin improving their security posture and aligning to &hellip;<\/p>","protected":false},"author":7,"featured_media":65766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[122],"class_list":["post-65721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast","tag-nutanix-weekly"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection<\/title>\n<meta name=\"description\" content=\"Nutanix ensures data resilience to protect your SLED organization&#039;s public information from cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection\" \/>\n<meta property=\"og:description\" content=\"Nutanix ensures data resilience to protect your SLED organization&#039;s public information from cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-21T20:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T20:07:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"49 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection for State, Local, and Education Organizations\",\"datePublished\":\"2022-02-21T20:00:00+00:00\",\"dateModified\":\"2026-01-29T20:07:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/\"},\"wordCount\":10951,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"keywords\":[\"Nutanix Weekly\"],\"articleSection\":[\"Podcast\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/\",\"name\":\"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"datePublished\":\"2022-02-21T20:00:00+00:00\",\"dateModified\":\"2026-01-29T20:07:32+00:00\",\"description\":\"Nutanix ensures data resilience to protect your SLED organization's public information from cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection for State, Local, and Education Organizations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/fr\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection","description":"Nutanix ensures data resilience to protect your SLED organization's public information from cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/","og_locale":"fr_CA","og_type":"article","og_title":"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection","og_description":"Nutanix ensures data resilience to protect your SLED organization's public information from cyber threats.","og_url":"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-02-21T20:00:00+00:00","article_modified_time":"2026-01-29T20:07:32+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u00c9crit par":"Chase Newmyer","Estimation du temps de lecture":"49 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection for State, Local, and Education Organizations","datePublished":"2022-02-21T20:00:00+00:00","dateModified":"2026-01-29T20:07:32+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/"},"wordCount":10951,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","keywords":["Nutanix Weekly"],"articleSection":["Podcast"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/","url":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/","name":"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","datePublished":"2022-02-21T20:00:00+00:00","dateModified":"2026-01-29T20:07:32+00:00","description":"Nutanix ensures data resilience to protect your SLED organization's public information from cyber threats.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-solutions-provide-data-and-security-protection-for-state-local-and-education-organizations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"43: Nutanix Weekly: Nutanix\u00ae Solutions Provide Data and Security Protection for State, Local, and Education Organizations"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"XenTegra","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"XenTegra","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/fr\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/65721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/comments?post=65721"}],"version-history":[{"count":1648,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/65721\/revisions"}],"predecessor-version":[{"id":715531,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/65721\/revisions\/715531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media\/65766"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media?parent=65721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/categories?post=65721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/tags?post=65721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}