{"id":65690,"date":"2023-10-23T19:00:00","date_gmt":"2023-10-23T23:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/"},"modified":"2026-01-29T11:23:51","modified_gmt":"2026-01-29T16:23:51","slug":"nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/","title":{"rendered":"76: Nutanix Weekly: Beyond Ransom &amp; Recovery: Defend Your Data Proactively with Nutanix Data Lens"},"content":{"rendered":"<p><iframe loading=\"lazy\" style=\"width: 100%; height: 200px;\" src=\"https:\/\/www.buzzsprout.com\/1577275\/episodes\/13831147-nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens?iframe=true\" width=\"100%\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><b>Unstructured Data Under Siege<br \/>\n<\/b><\/p>\n<p>In today\u2019s digital age, data is the lifeline of businesses. It drives decision-making, influences strategies, and unveils market insights that can propel any organization ahead of its competitors. However, much of this data is unstructured, creating challenges with data visibility, and making it more vulnerable to cyber attacks and insider threats.<\/p>\n<p>The complexity of defending unstructured data from ransomware is a key obstacle hampering an organization&#8217;s security posture. Protecting only the endpoints and employing network-centric tools, and device authentication is no longer sufficient. For organizations, it&#8217;s imperative to deploy a holistic approach to data security, ensuring that the very essence of their business\u2014its data\u2014is safeguarded from these evolving threats.<\/p>\n<p><b>Starting with Storage: Laying The Foundation for Robust Data Security<br \/>\n<\/b><\/p>\n<p>To protect against ransomware and other malicious threats, IT and Security leaders should look beyond endpoints. To achieve true ransomware resiliency, an organization needs to be able to detect attacks from within the data layer, block the activity, determine the scope of the affected systems, and recover quickly.<\/p>\n<p>The <a href=\"https:\/\/www.nutanix.com\/library\/datasheets\/nutanix-data-lens\">Nutanix Data Lens\u2122<\/a> SaaS-based data security solution helps proactively assess and mitigate unstructured data security risks by identifying anomalous activity, auditing user behavior, and adhering to monitoring requirements &#8211; all at the primary storage layer, where your data is stored. Additionally, global data visibility across clouds helps with intelligent decision-making and lifecycle management of unstructured data stored on the <a href=\"https:\/\/www.nutanix.com\/solutions\/unified-storage\">Nutanix Unified Storage\u2122 (NUS)<\/a> platform<\/p>\n<p>The latest release packs powerful features for cyber resilience, permissions visualization, risk scoring, and support for the <a href=\"https:\/\/www.nutanix.com\/products\/objects\">\u00a0Nutanix Objects Storage\u2122<\/a> product<\/p>\n<p><b>What\u2019s New Today?<br \/>\n<\/b><\/p>\n<ul>\n<li><b>Threat Containment Window<\/b>:\u00a0 Proactively detect and block a threat, defend from further damage and get alerted to begin a One-Click Recovery process within 20 minutes of exposure. Don\u2019t just take our word for it, <a href=\"https:\/\/www.nutanix.com\/go\/esg-data-lens-report\">read this report<\/a> to see how Data Lens delivers on the promise.<\/li>\n<li><b>One-Click Recovery<\/b>: Seamlessly recover from the last good snapshot available and restore your data and operations swiftly.<\/li>\n<li><b>Permissions and Risk Visualization<\/b>: Identify the root cause of access control risks and monitor the risk score to track vulnerabilities within your data and user groups.<\/li>\n<li><b>Objects support<\/b>: Nutanix Data Lens has increased its coverage to include Nutanix Objects Storage, enabling customers to effortlessly access S3-available data, providing an intelligent understanding and forensic capabilities similar to those available for the <a href=\"https:\/\/www.nutanix.com\/products\/files\">Nutanix Files Storage\u2122<\/a> product today.<\/li>\n<\/ul>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\n\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092b\u093f\u0932\u093f\u092a \u0938\u0947\u0932\u0930\u094d\u0938<br \/>\n\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0939\u093e\u0930\u094d\u0935\u0947 \u0917\u094d\u0930\u0940\u0928<br \/>\n\u0938\u0939-\u092e\u0947\u091c\u093c\u092c\u093e\u0928: \u091c\u093f\u0930\u093e\u0939 \u0915\u0949\u0915\u094d\u0938<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>\n00:00:02.050 &#8211;&gt; 00:00:06.019<br \/>\nAndy Whiteside: Hi, everyone. Welcome to episode 76 of new tanks weekly. I&#8217;m your host<\/p>\n<p>2<br \/>\n00:00:06.240 &#8211;&gt; 00:00:14.220<br \/>\nAndy Whiteside: Andy, white side Podcast number 4 of the day and this is number 4. And the first 3, I forgot to say, the new tagline you guys ready<\/p>\n<p>3<br \/>\n00:00:15.230 &#8211;&gt; 00:00:24.490<br \/>\nAndy Whiteside: podcasting with context, cause, contacts, context matters. I love the blogs<\/p>\n<p>4<br \/>\n00:00:24.580 &#8211;&gt; 00:00:33.539<br \/>\nAndy Whiteside: I love. I love the blogs. But having this conversation with a group of people who, you know, passionately love the space and want to talk about it. That context is so valuable.<\/p>\n<p>5<br \/>\n00:00:34.200 &#8211;&gt; 00:00:39.050<br \/>\nAndy Whiteside: And I love that we do that. Phillip Sellers on from the Zintegr side. Phillip. How&#8217;s it going<\/p>\n<p>6<br \/>\n00:00:39.290 &#8211;&gt; 00:00:43.569<br \/>\nPhilip Sellers: good, Andy having a great afternoon. Looking forward to<\/p>\n<p>7<br \/>\n00:00:43.580 &#8211;&gt; 00:01:00.380<br \/>\nAndy Whiteside: to closing out the day. It&#8217;s been a good day, so I asked Philip while I go. He&#8217;s been on calls all day long with customers, and he gave me one example. What&#8217;s the not county, the one you just had when you gave me, land, the last podcast what&#8217;s the problem the customer was trying to solve. And and what pro? What problem did they bring?<\/p>\n<p>8<br \/>\n00:01:01.540 &#8211;&gt; 00:01:07.910<br \/>\nPhilip Sellers:\u00a0 now, I&#8217;m trying to think of a good one. Talked with a customer earlier who<\/p>\n<p>9<br \/>\n00:01:08.670 &#8211;&gt; 00:01:26.070<br \/>\nPhilip Sellers: we&#8217;ve got existing new tanks on vmware. And they are true believers. So we&#8217;re helping them migrate and upgrade and scale out and consolidate. So I would file that under simplification. They&#8217;re really place where<\/p>\n<p>10<br \/>\n00:01:26.240 &#8211;&gt; 00:01:31.249<br \/>\nPhilip Sellers: they believe in the platform wholly. And they&#8217;re they&#8217;re simplifying overall<\/p>\n<p>11<br \/>\n00:01:31.420 &#8211;&gt; 00:01:50.500<br \/>\nPhilip Sellers: operations down to to this way of working. So they&#8217;re Aos, currently on Vm, where they&#8217;re gonna go Aos on Hv clusters. They&#8217;re gonna be collapsing in as well. All in super nuts, were they always true believers? Or they had to get one over.<\/p>\n<p>12<br \/>\n00:01:50.910 &#8211;&gt; 00:02:03.329<br \/>\nPhilip Sellers: So yeah, I mean, it&#8217;s it&#8217;s an interesting thing we. We help them move. It&#8217;s a medical customer, and so we help them move trying to get better performance out of their emr we&#8217;ve made multiple different<\/p>\n<p>13<br \/>\n00:02:03.460 &#8211;&gt; 00:02:09.410<br \/>\nPhilip Sellers: improvements around the Emr helping with the database and how it runs on the back end. And so<\/p>\n<p>14<br \/>\n00:02:09.449 &#8211;&gt; 00:02:11.599<br \/>\nI think<\/p>\n<p>15<br \/>\n00:02:11.660 &#8211;&gt; 00:02:25.689<br \/>\nPhilip Sellers: they were one over. I don&#8217;t think they were true believers from the beginning. They were interested. Talk to other customers in the healthcare space and heard great things, and then out of the gate. It wasn&#8217;t<\/p>\n<p>16<br \/>\n00:02:25.930 &#8211;&gt; 00:02:47.460<br \/>\nAndy Whiteside: fantastic for them, but we help them change the way they were running. Some things follow best practices, and now they get that same result, great performance and great great outcomes. A very common story, and when they finally come to their own understanding of what it is they want. It really makes that advisory type partnership thing make make a ton of sense<\/p>\n<p>17<br \/>\n00:02:48.020 &#8211;&gt; 00:02:53.989<br \/>\nAndy Whiteside: Harvey Green founder, co-founder of Zintegrick. Gov what&#8217;s going on in Harvey&#8217;s world<\/p>\n<p>18<br \/>\n00:02:54.950 &#8211;&gt; 00:03:00.610<br \/>\nHarvey Green III: a little bit of everything. Jerry and I were just talking about it. You.<\/p>\n<p>19<br \/>\n00:03:00.630 &#8211;&gt; 00:03:08.869<br \/>\nHarvey Green III: You&#8217;re not at a conference today, I said, no, that&#8217;s next week, and I know it&#8217;s been last week. It&#8217;s been a few weeks, but you&#8217;re no longer in the basement, either.<\/p>\n<p>20<br \/>\n00:03:09.280 &#8211;&gt; 00:03:36.050<br \/>\nHarvey Green III: I am not I am upstairs in the kids playroom right now, which is fun I got. No, I got some some family that stand with me on and off. So it&#8217;s funny in it. Normally you move upstairs, and that&#8217;s an upgrade in this case. Not so much. Well, looks like a fun room.<\/p>\n<p>21<br \/>\n00:03:36.690 &#8211;&gt; 00:03:42.869<br \/>\nAndy Whiteside: Yeah, they have lots of fun. Same same question for you. What? What customer problem have you solved today.<\/p>\n<p>22<br \/>\n00:03:44.100 &#8211;&gt; 00:03:46.030<br \/>\nHarvey Green III: Today.<\/p>\n<p>23<br \/>\n00:03:46.430 &#8211;&gt; 00:03:51.269<br \/>\nAndy Whiteside: what? What problems did a customer bring? One problem that a customer brought today?<\/p>\n<p>24<br \/>\n00:03:52.380 &#8211;&gt; 00:03:57.940<br \/>\nHarvey Green III: Yeah. So talk with a customer earlier who was<\/p>\n<p>25<br \/>\n00:03:58.180 &#8211;&gt; 00:04:04.709<br \/>\nHarvey Green III: looking at options to help them move from on-prem to the cloud.<\/p>\n<p>26<br \/>\n00:04:04.970 &#8211;&gt; 00:04:32.040<br \/>\nHarvey Green III: And for them they don&#8217;t really have a cloud footprint right now. So it was trying to figure out, you know. Not just like there&#8217;s always a conversation on Prem to cloud. That sounds great, but you don&#8217;t pick everything up and just move it. Is not that simple? So, having conversations with them to think about, you know what stays and what goes? What has to live on? Prem. What? What can go to? The cloud<\/p>\n<p>27<br \/>\n00:04:32.100 &#8211;&gt; 00:04:34.859<br \/>\nHarvey Green III: was a little enlightening for them.<\/p>\n<p>28<br \/>\n00:04:35.100 &#8211;&gt; 00:04:42.260<br \/>\nHarvey Green III: Because they did not think that they had to. They did not consider that they had to leave some things on Prem. So<\/p>\n<p>29<br \/>\n00:04:42.290 &#8211;&gt; 00:04:49.110<br \/>\nHarvey Green III: being able to talk to them about options that allow them to have<\/p>\n<p>30<br \/>\n00:04:49.120 &#8211;&gt; 00:04:54.550<br \/>\nHarvey Green III: on-prem resources and resources in the cloud of their choice<\/p>\n<p>31<br \/>\n00:04:54.610 &#8211;&gt; 00:05:09.249<br \/>\nHarvey Green III: but still be able to use a model that allows them to consolidate control over both in the same way, and not have to do everything all over again was super helpful for them.<\/p>\n<p>32<br \/>\n00:05:09.380 &#8211;&gt; 00:05:12.070<br \/>\nAndy Whiteside: And when you say Cloud, you talk about public cloud in this case.<\/p>\n<p>33<br \/>\n00:05:12.220 &#8211;&gt; 00:05:12.990<br \/>\nHarvey Green III: public.<\/p>\n<p>34<br \/>\n00:05:13.260 &#8211;&gt; 00:05:29.050<br \/>\nAndy Whiteside: But cloud in this case. Yes, yeah. Cause in in Zintigra world we literally could come pick the stuff up, put in a colo, and it would be cloud to them. Might, we might, could actually just pick the stuff up and move it. I know that&#8217;s not the normal path. But if you, if you want that? Let us know. Cause that&#8217;s that&#8217;s possible.<\/p>\n<p>35<br \/>\n00:05:29.430 &#8211;&gt; 00:05:30.600<br \/>\n\u092c\u093f\u0932\u094d\u0915\u0941\u0932\u0964<\/p>\n<p>36<br \/>\n00:05:30.710 &#8211;&gt; 00:05:34.320<br \/>\nAndy Whiteside: Yeah. Gyro Cox gyra.<\/p>\n<p>37<br \/>\n00:05:34.520 &#8211;&gt; 00:05:35.930<br \/>\nAndy Whiteside: you about ready to move again.<\/p>\n<p>38<br \/>\n00:05:36.130 &#8211;&gt; 00:05:51.379<br \/>\nAndy Whiteside: We&#8217;re we&#8217;re staying here for a little while. What&#8217;s what? First of all, how are you doing? Well, thank you. How are you doing? I&#8217;m I&#8217;m I&#8217;m busy, but good, good, busy.<\/p>\n<p>39<br \/>\n00:05:51.770 &#8211;&gt; 00:05:53.420<br \/>\nAndy Whiteside: good, busy.<\/p>\n<p>40<br \/>\n00:05:53.780 &#8211;&gt; 00:06:14.479<br \/>\nAndy Whiteside: fun busy. Have a good time. I guess. Same question you have. I&#8217;m sure you&#8217;ve been on 1,000. Well, 18 customer calls today. What? What problem was brought to you today? Asked to address, I met a new software vendor who has like a secure ot access solution.<\/p>\n<p>41<br \/>\n00:06:14.480 &#8211;&gt; 00:06:40.429<br \/>\nJirah Cox: And they, because of a shared customer of ours, was trying to run that on Hv. For the first time walk them through. What does it look like, you know, they had a typical kind of vmware ova that they were used to giving their customers, and we kinda walk through some troubleshooting steps around, you know. Do you stuff the Ver I\/O drivers in there, or does like your packaging process, remove those. There&#8217;s some troubleshooting steps you can do on HD around booting the Vm. Even to like a de id disk mode.<\/p>\n<p>42<br \/>\n00:06:40.590 &#8211;&gt; 00:06:43.499<br \/>\nJirah Cox: And so we kind of reviewed some of those<\/p>\n<p>43<br \/>\n00:06:43.520 &#8211;&gt; 00:07:06.789<br \/>\nJirah Cox: troubleshooting steps, and ultimately I just want to spin up a lab and saying, Hey, here&#8217;s an Hv. Cluster for 3 days. Go, you know, kick the tires on it, and use it to help streamline giving an Hv friendly image, or really just a Kvm from the image to your customers for rapid deployment. So cause I think I think their requests to run on top of HP are only gonna increase over time.<\/p>\n<p>44<br \/>\n00:07:06.950 &#8211;&gt; 00:07:27.480<br \/>\nAndy Whiteside:\u00a0 Ot stands for operational technology. Right? It does. Thank you. Sorry. So I was listed a podcast. Mostly security related this weekend and the guy started talking about, you know, we have all these client server networks that are very you know, very dangerous, potentially. But, man, if the bad guys ever figure out how to get into Ot networks in mass. Man, we&#8217;re in trouble.<\/p>\n<p>45<br \/>\n00:07:28.690 &#8211;&gt; 00:07:37.009<br \/>\nAndy Whiteside: Yeah, so good that you were trying to help somebody in that space, and good that they&#8217;re going to be able to run it on new tanics Aahv or vmware, or both.<\/p>\n<p>46<br \/>\n00:07:37.070 &#8211;&gt; 00:08:01.129<br \/>\nJirah Cox: Cause we need that world to be very secure. Yeah, I was even running a boot camp last week for some customers, and showing them the latest version of prism central right, which we can do a later episode on that, even right there on the dashboard of PC. Puts a security dashboard around. Have you turned on Microsoft? If you turned on intrusion detection, you know, here&#8217;s how to scan your clusters and map them to publish Cvs, you know. Really.<\/p>\n<p>47<br \/>\n00:08:01.150 &#8211;&gt; 00:08:04.550<br \/>\nJirah Cox: kind of making it easy for customers to to decrypt.<\/p>\n<p>48<br \/>\n00:08:04.740 &#8211;&gt; 00:08:07.769<br \/>\nJirah Cox: How secure is mighty phenomena&#8217;s deployment? Yeah.<\/p>\n<p>49<br \/>\n00:08:08.600 &#8211;&gt; 00:08:18.310<br \/>\nAndy Whiteside: Well, you guys bought a blog for us through your day. Let me do my commercial real quick. If you&#8217;re a new Tanks customer and you&#8217;re not getting everything you can out of the platform. Because your existing partner is not<\/p>\n<p>50<br \/>\n00:08:18.520 &#8211;&gt; 00:08:45.150<br \/>\nAndy Whiteside: not bringing advisement to you. Let us know, cause that&#8217;s what we do. That&#8217;s why we do this podcast we also like doing it. We just happen to be nuts about space. But there&#8217;s so much opportunity to help people. And if you&#8217;re not getting the value out of new tanks platform, it&#8217;s not the platform, it&#8217;s you that&#8217;s really not in you. It&#8217;s your partner, and we would love to kind of up that game for you. Alright, Jair, I&#8217;m gonna read the name of the blog from October fourth to 2023. So very recent. And then I&#8217;m gonna ask you to pronounce the name of the authors ready.<\/p>\n<p>51<br \/>\n00:08:46.090 &#8211;&gt; 00:08:57.369<br \/>\nAndy Whiteside: The blog is beyond ransom and recovery. Defend your data proactively with new tanics data lens. I&#8217;m excited to talk about that. And this was written by<\/p>\n<p>52<br \/>\n00:08:57.430 &#8211;&gt; 00:09:00.219<br \/>\nJirah Cox: by Sneha and Tahina from our fowls team.<\/p>\n<p>53<br \/>\n00:09:00.400 &#8211;&gt; 00:09:04.009<br \/>\nAndy Whiteside: Alright, I&#8217;m not Gonna let you off. That easy last names.<\/p>\n<p>54<br \/>\n00:09:04.940 &#8211;&gt; 00:09:09.590<br \/>\nJirah Cox: I think. Has last name is Cheddar Vadula and Tahina Goyal.<\/p>\n<p>55<br \/>\n00:09:09.760 &#8211;&gt; 00:09:14.029<br \/>\nAndy Whiteside: Okay? Well, I must admit that was pretty impressive. I thought I was gonna stump you pretty hard, but<\/p>\n<p>56<br \/>\n00:09:14.230 &#8211;&gt; 00:09:24.260<br \/>\nAndy Whiteside: blew right through that. They would chase them down in the building the next time he was there. Alright Jair! Why this blog? Why today?<\/p>\n<p>57<br \/>\n00:09:24.630 &#8211;&gt; 00:09:36.579<br \/>\nJirah Cox: We already talked about it? Because it&#8217;s sort of topical and evergreen for customers right? Like security matters. So ransomware threats as usual, only increasing, not really decreasing. Those guys don&#8217;t take a day off<\/p>\n<p>58<br \/>\n00:09:36.730 &#8211;&gt; 00:09:53.639<br \/>\nJirah Cox:\u00a0 for the long time. Listeners. Good example of a bad style of automation and so the worth protecting against. Yeah. Well, good thing is, we got AI to the rescue right?<\/p>\n<p>59<br \/>\n00:09:53.670 &#8211;&gt; 00:09:56.279<br \/>\nAndy Whiteside: Is that gonna help us or help them more.<\/p>\n<p>60<br \/>\n00:09:56.330 &#8211;&gt; 00:09:58.859<br \/>\nJirah Cox: Why not both?<\/p>\n<p>61<br \/>\n00:09:58.910 &#8211;&gt; 00:10:00.490<br \/>\nAndy Whiteside: What&#8217;s good for the goose?<\/p>\n<p>62<br \/>\n00:10:01.650 &#8211;&gt; 00:10:09.010<br \/>\nAndy Whiteside: Alright! First section talks about unstructured data under siege. I&#8217;ll let you discuss that, and then we&#8217;ll have<\/p>\n<p>63<br \/>\n00:10:09.050 &#8211;&gt; 00:10:11.020<br \/>\nAndy Whiteside: Harvey and Phillips chime in<\/p>\n<p>64<br \/>\n00:10:12.100 &#8211;&gt; 00:10:12.840<br \/>\nJirah Cox: P.<\/p>\n<p>65<br \/>\n00:10:13.100 &#8211;&gt; 00:10:37.399<br \/>\nJirah Cox: I think the key points here that the the articles making are, of course, like everyone has unstructured data. It&#8217;s like required data for the business get gets mined. For, you know, stuff like customer interactions or fed into Kb, articles this data that you know is living on some file share somewhere that hopefully, you&#8217;re monetizing and isn&#8217;t just like some ball of data that you have to preserve from now until the heat death of the universe.<\/p>\n<p>66<br \/>\n00:10:37.560 &#8211;&gt; 00:10:51.729<br \/>\nJirah Cox: But as a result of that data having value to you, that data has value to attackers as well. Right enter Ransomware into the world we live in. And how do we help our customers elevate their security posture against those kind of threats.<\/p>\n<p>67<br \/>\n00:10:51.740 &#8211;&gt; 00:11:09.380<br \/>\nAndy Whiteside: Yeah, I use the following example, talking to my kids, whoever unstructured data that the little grocery thing you scan. So you get the discounts at the grocery store. All that stuff goes somewhere, and I&#8217;m sure the grocery store and all the vendors are finding ways to monetize that that data<\/p>\n<p>68<br \/>\n00:11:09.560 &#8211;&gt; 00:11:18.830<br \/>\nJirah Cox: this past weekend. I was like, how many stores can you walk into now and give them like your phone number? And they can pull up like your last receipt last transaction for like an easy swap, but like<\/p>\n<p>69<br \/>\n00:11:18.860 &#8211;&gt; 00:11:47.009<br \/>\nJirah Cox: what an amount of data to have to store and be able to pull back up so quickly that, like in the world we grew up in, that wasn&#8217;t a thing like Oh, you lost this piece of paper. Sorry no return or exchange for you back 2 days later for more toilet paper<\/p>\n<p>70<br \/>\n00:11:47.010 &#8211;&gt; 00:12:04.550<br \/>\nPhilip Sellers: during the pandemic, the amount of rich data they were getting because people had switched to their Loyalty program and their mobile app and mobile ordering. They went through and renovated all their stores, and that&#8217;s become their standard. I mean, completely pivoted their<\/p>\n<p>71<br \/>\n00:12:04.580 &#8211;&gt; 00:12:15.399<br \/>\nPhilip Sellers: way of doing business, because the richness of the data, the data profiles. How often someone eats what they eat, how to turn. I mean, yeah, talk about the<\/p>\n<p>72<br \/>\n00:12:16.020 &#8211;&gt; 00:12:19.370<br \/>\nPhilip Sellers: I mean absolute definition of monetizing your data.<\/p>\n<p>73<br \/>\n00:12:19.530 &#8211;&gt; 00:12:26.869<br \/>\nAndy Whiteside: Yeah. yeah. Keep waiting for the little lady with the samples. I come around the corner and she knows me by name and wonders why I&#8217;m 5\u00a0min later, and I&#8217;m not normally<\/p>\n<p>74<br \/>\n00:12:28.650 &#8211;&gt; 00:12:35.060<br \/>\nAndy Whiteside: Harvey, any comments on unstructured data being under attack.<\/p>\n<p>75<br \/>\n00:12:36.940 &#8211;&gt; 00:12:38.360<br \/>\nHarvey Green III: No, I mean.<\/p>\n<p>76<br \/>\n00:12:38.610 &#8211;&gt; 00:12:50.249<br \/>\nHarvey Green III: I think that we&#8217;ve kind of hit that pretty well. You can see that it definitely has value to the organization. And because it has value to the organization, it becomes<\/p>\n<p>77<br \/>\n00:12:50.700 &#8211;&gt; 00:12:59.070<br \/>\nHarvey Green III: something that they might have to might want to, or I might have to pay for to get back.<\/p>\n<p>78<br \/>\n00:12:59.630 &#8211;&gt; 00:13:06.720<br \/>\nAndy Whiteside: Alright, jyra! Next section says, starting with storage, layering the foundation for robust data security. What does that mean?<\/p>\n<p>79<br \/>\n00:13:07.820 &#8211;&gt; 00:13:27.619<br \/>\nJirah Cox:\u00a0 pivoting in here into a view point of view around like defense in depth is the, you know, kind of the standard in the environment here. And you know one phrase that the articles you&#8217;re about, you know it, and security leaders should look beyond endpoints. It&#8217;s interesting. I would even expand upon that to say you know, endpoints are important, too.<\/p>\n<p>80<br \/>\n00:13:27.660 &#8211;&gt; 00:13:46.910<br \/>\nJirah Cox: but of course, producing the the data source itself is which, of course, what we&#8217;re focusing on today is also a key part of that puzzle. Right? So like everything matters right? Like the the file server in in this case, like mechanics files, we&#8217;ll talk about and objects that can host the data itself like security. There detection. There matters recovery there matters<\/p>\n<p>81<br \/>\n00:13:47.040 &#8211;&gt; 00:14:00.310<br \/>\nJirah Cox: but detection on the endpoints, detection at the edge. All of these things, you know, are what contribute to an environment that lets you as the environment owner, as the administrator like sleep better at night.<\/p>\n<p>82<br \/>\n00:14:00.640 &#8211;&gt; 00:14:06.319<br \/>\nAndy Whiteside: Yeah, I look at all the different layers. And II know I can&#8217;t say this like I kinda just want to give up. But<\/p>\n<p>83<br \/>\n00:14:06.740 &#8211;&gt; 00:14:17.030<br \/>\nAndy Whiteside: you can&#8217;t do that, you gotta. You gotta cover the different layers the best way possible, and you stack it all up and make a big, nice security cake. Don&#8217;t you give up? That&#8217;s when the bad guys win. So yeah.<\/p>\n<p>84<br \/>\n00:14:17.220 &#8211;&gt; 00:14:19.199<br \/>\nJirah Cox: we don&#8217;t. We? Don&#8217;t negotiate with terrorists, Eddie.<\/p>\n<p>85<br \/>\n00:14:20.150 &#8211;&gt; 00:14:31.879<br \/>\nAndy Whiteside: I didn&#8217;t say negotiate just to give up and that&#8217;s just a joke. Please don&#8217;t take me for that being serious. That&#8217;s I have have people for that. People that love doing that. That&#8217;s why.<\/p>\n<p>86<br \/>\n00:14:32.020 &#8211;&gt; 00:14:38.210<br \/>\nAndy Whiteside: I just like talking about it. Harvey thoughts on the the layering of security.<\/p>\n<p>87<br \/>\n00:14:39.930 &#8211;&gt; 00:14:46.180<br \/>\nHarvey Green III: I mean, obviously, you. You definitely want more layers in your security cake, as you put it.<\/p>\n<p>88<br \/>\n00:14:46.340 &#8211;&gt; 00:15:02.929<br \/>\nHarvey Green III: Ii think, being able to have a a service like data lens is, you know, way way past just the topic we&#8217;re talking about. But just just for ransomware and be able to being able to detect things quickly<\/p>\n<p>89<br \/>\n00:15:02.930 &#8211;&gt; 00:15:17.190<br \/>\nAndy Whiteside: without having your eyes be the detection method is definitely a plus. Yeah. No way the human can keep up with close to what they need is really fill up your thoughts on layering and specifically, data being the foundational layer.<\/p>\n<p>90<br \/>\n00:15:17.480 &#8211;&gt; 00:15:23.059<br \/>\nPhilip Sellers: Well, what I like about this is, it&#8217;s so close to the data itself. Right? You know.<\/p>\n<p>91<br \/>\n00:15:23.080 &#8211;&gt; 00:15:30.590<br \/>\nPhilip Sellers: I&#8217;ve I&#8217;ve heard other solutions, particularly in the backup space, also do the same thing. They watch the data set. And<\/p>\n<p>92<br \/>\n00:15:30.920 &#8211;&gt; 00:15:34.520<br \/>\nthey, they try to find anomalies in that data set. And I think<\/p>\n<p>93<br \/>\n00:15:34.680 &#8211;&gt; 00:15:40.649<br \/>\nPhilip Sellers: this is gonna become the standard you have to have something watching your unstructured data.<\/p>\n<p>94<br \/>\n00:15:40.870 &#8211;&gt; 00:15:42.829<br \/>\nPhilip Sellers: I remember<\/p>\n<p>95<br \/>\n00:15:43.190 &#8211;&gt; 00:16:06.850<br \/>\nPhilip Sellers: companies like Baroness coming in and talking to me, you know, a decade ago and going. That&#8217;s nice to have. But I don&#8217;t know if I have a unstructured problem big enough to to buy software like that, I think we&#8217;ve completely changed. And today you absolutely need data analytics around your unstructured data because of branch where<\/p>\n<p>96<br \/>\n00:16:07.010 &#8211;&gt; 00:16:08.290<br \/>\nPhilip Sellers: in particular.<\/p>\n<p>97<br \/>\n00:16:08.650 &#8211;&gt; 00:16:27.629<br \/>\nJirah Cox: yeah. And to be fair, like, I would love for my customers to have you know inspection monitoring of the data itself and the backups right? Like, it&#8217;s almost moving into a world where monitoring for ransomware is everyone&#8217;s job, meaning every humans job. But every piece of technology&#8217;s job as well. Right like we&#8217;re better together.<\/p>\n<p>98<br \/>\n00:16:27.950 &#8211;&gt; 00:16:46.210<br \/>\nJirah Cox: but for sure. And and so, like the lay, the the layer of the cake we&#8217;re adding on this one or focusing on this new feature of it is data lens, right? So like, of course, the the data itself lives in Newtonix files wherever you run the cluster. Right? Of course, on Prem in its integrity data center in a Colo<\/p>\n<p>99<br \/>\n00:16:46.540 &#8211;&gt; 00:16:54.370<br \/>\nJirah Cox: you know, across the street, in the cloud anywhere. And then data lens is the sas component of that right? So you have monitoring<\/p>\n<p>100<br \/>\n00:16:54.640 &#8211;&gt; 00:17:15.950<br \/>\nJirah Cox: embedded in the file server. You have analytics about that running as a sas service. So that&#8217;s the the the always seeing. I never sleeping. Observability of that data, saying what looks normal here, what looks irregular here.<\/p>\n<p>101<br \/>\n00:17:15.980 &#8211;&gt; 00:17:26.470<br \/>\nPhilip Sellers: you, you talk about this fence and depth, you know each one of these layers has its own perspective, too. We need to have a perspective from the endpoint. We need to have a perspective from<\/p>\n<p>102<br \/>\n00:17:26.470 &#8211;&gt; 00:17:49.339<br \/>\nPhilip Sellers: the file servers itself. We need to have a perspective from the backups. Each one of those has benefits to be able to monitor, you know, from the endpoint we get to see where something, maybe trying to talk, and what targets and things, you know. So again. If you talk about defense and depth, think about the different perspectives that you need to give you good visibility.<\/p>\n<p>103<br \/>\n00:17:49.350 &#8211;&gt; 00:17:50.100<br \/>\nAndy Whiteside: Yep.<\/p>\n<p>104<br \/>\n00:17:50.550 &#8211;&gt; 00:18:10.930<br \/>\nAndy Whiteside: So it the next part of the blog talks about what&#8217;s new today. And I&#8217;m just gonna run through these and we&#8217;ll break them down. Threat, containment window, one click, recovery permissions and risk visualization and object support. Java. The first one says preemptively, detect and block attacks. Yeah, so this is pretty cool. Now, sort of stating the<\/p>\n<p>105<br \/>\n00:18:10.930 &#8211;&gt; 00:18:20.730<br \/>\nJirah Cox: the the sla we call. We used to hear the window right? Like, how frequently, how quickly can data lens the the monitoring Sas service<\/p>\n<p>106<br \/>\n00:18:20.750 &#8211;&gt; 00:18:26.050<br \/>\nJirah Cox: catch something going on in the environment, right? So now, we&#8217;re actually coming out and saying, that&#8217;s 20\u00a0min now<\/p>\n<p>107<br \/>\n00:18:26.210 &#8211;&gt; 00:18:40.079<br \/>\nJirah Cox: for data lens catching and really actually be able to respond to as well. That action right? So it uses lots of kind of stuff can do here. Right? Uses signatures like signatures on the files itself.<\/p>\n<p>108<br \/>\n00:18:40.090 &#8211;&gt; 00:18:57.740<br \/>\nJirah Cox: but also like user behaviors. Right? So like, IP, user connectivity details, file activity. And then we say also, like behavioral detection markers, right? So we can kind of fingerprint what looks like a regular usage of the file server. What looks like, you know, automated bad guys kind of like, you know, ransomware, malware kind of stuff.<\/p>\n<p>109<br \/>\n00:18:58.110 &#8211;&gt; 00:18:58.790<br \/>\n\u0939\u093e\u0902.<\/p>\n<p>110<br \/>\n00:18:59.150 &#8211;&gt; 00:19:08.780<br \/>\nAndy Whiteside: quick question for you, Jay. Right? And I should know this. But is data lens? Is that something you guys acquired or something you developed in house. That one is totally developed in house. That was a net new<\/p>\n<p>111<br \/>\n00:19:08.800 &#8211;&gt; 00:19:16.259<br \/>\nAndy Whiteside: non acquired Sas service. Yeah, that&#8217;s awesome. Philip. Thoughts on preemptively detecting the block attacks.<\/p>\n<p>112<br \/>\n00:19:16.500 &#8211;&gt; 00:19:23.989<br \/>\nPhilip Sellers: Well, what I like about this is is that as it detects, it&#8217;s also helping us with that snapshot like<\/p>\n<p>113<br \/>\n00:19:24.010 &#8211;&gt; 00:19:33.960<br \/>\nPhilip Sellers: that. It&#8217;s it&#8217;s giving us an extra safety net. You know, something anomalistic happened. It&#8217;s reacting faster than a human can. And so<\/p>\n<p>114<br \/>\n00:19:34.160 &#8211;&gt; 00:19:47.070<br \/>\nPhilip Sellers: that that&#8217;s something we can&#8217;t compete with. And so having that one click restore which we&#8217;ll talk about next. But I mean, that response is is huge. I mean, we we can&#8217;t replicate that in human.<\/p>\n<p>115<br \/>\n00:19:48.110 &#8211;&gt; 00:19:56.850<br \/>\nAndy Whiteside: Yeah, I I guess this will make sense. I was talking to by the day about how to teach someone to drive a manual transmission car, and their response was, no matter what happens if something doesn&#8217;t seem right pushing the clutch.<\/p>\n<p>116<br \/>\n00:19:57.200 &#8211;&gt; 00:20:01.230<br \/>\nAndy Whiteside: I like, you know, that&#8217;s that&#8217;s probably accurate. So in this case, if something doesn&#8217;t seem right.<\/p>\n<p>117<br \/>\n00:20:01.910 &#8211;&gt; 00:20:04.259<br \/>\nAndy Whiteside: start the snapshot. Is that what we&#8217;re talking about here?<\/p>\n<p>118<br \/>\n00:20:04.900 &#8211;&gt; 00:20:11.009<br \/>\nJirah Cox:\u00a0 how about? Automated Clutch pushing in on a schedule?<\/p>\n<p>119<br \/>\n00:20:11.200 &#8211;&gt; 00:20:23.260<br \/>\nJirah Cox: The analogy breaks down. But no, the not not take a snapshot, but more like the snapshots are always occurring right? So therefore, this is that ability to say, whenever you notice something go going wrong, the clutches already been pushed in<\/p>\n<p>120<br \/>\n00:20:23.280 &#8211;&gt; 00:20:27.319<br \/>\nJirah Cox: roll back to that snapshot. The analogy really gets problematic.<\/p>\n<p>121<br \/>\n00:20:27.330 &#8211;&gt; 00:20:28.860<br \/>\nJirah Cox: but I&#8217;m agreeing with you.<\/p>\n<p>122<br \/>\n00:20:28.870 &#8211;&gt; 00:20:32.110<br \/>\nAndy Whiteside: Yeah, Harvey, any comments on the concept here in general?<\/p>\n<p>123<br \/>\n00:20:32.800 &#8211;&gt; 00:20:34.440<br \/>\nHarvey Green III: Yeah, this this is<\/p>\n<p>124<br \/>\n00:20:34.760 &#8211;&gt; 00:20:53.279<br \/>\nHarvey Green III: when it when the product went from a security monitor to actual security guard before it would just tell you, hey, there&#8217;s a problem, and then depend on you to go take actions. Now it is taking action for you and giving you options which you know I always like.<\/p>\n<p>125<br \/>\n00:20:53.800 &#8211;&gt; 00:21:04.629<br \/>\nJirah Cox: The cool thing is Harvey, I can, I can think back to you. And I Podcasting about this basically day. It was announced at next. And now, like less than 6 months later. Here it is fully Ga for our customers.<\/p>\n<p>126<br \/>\n00:21:21.640 &#8211;&gt; 00:21:37.129<br \/>\nJirah Cox: The one code recovery talks about. Since we have these snapshots that we&#8217;re taking all the time we can take snapshots at like lots of levels we can do in guest, right in file system snapshots of the files themselves. We can also snapshot the entire file server at the Aos level and do phone stuff with that.<\/p>\n<p>127<br \/>\n00:21:37.740 &#8211;&gt; 00:21:43.629<br \/>\nJirah Cox: But this ability to say, Hey, here&#8217;s a share that&#8217;s had some level of infection activity on it.<\/p>\n<p>128<br \/>\n00:21:43.670 &#8211;&gt; 00:21:50.639<br \/>\nJirah Cox: Roll that whole share back to a known good point in time gets all of our end users back up and running faster.<\/p>\n<p>129<br \/>\n00:21:50.920 &#8211;&gt; 00:21:54.219<br \/>\nAndy Whiteside: Right? Phillip, you, okay with faster.<\/p>\n<p>130<br \/>\n00:21:55.190 &#8211;&gt; 00:22:07.769<br \/>\nPhilip Sellers: Yeah, I mean, that&#8217;s just name of the game. I mean, I can&#8217;t any. I can&#8217;t think of any customers gonna come to us and go. I want slower. It&#8217;s all about faster, faster. So yeah, I mean.<\/p>\n<p>131<br \/>\n00:22:07.950 &#8211;&gt; 00:22:22.869<br \/>\nPhilip Sellers: sure, you know, we when we redid our Dr at my last organization, we call the process the big red button kind of like the staples. Easy button, right? And that&#8217;s what I think of here. One click recovery is that easy button<\/p>\n<p>132<br \/>\n00:22:23.100 &#8211;&gt; 00:22:24.350<br \/>\nJirah Cox: cause I can think of.<\/p>\n<p>133<br \/>\n00:22:24.390 &#8211;&gt; 00:22:31.290<br \/>\nJirah Cox: You know there&#8217;s certainly the threat to the business of like the data staying encrypted. Right? That&#8217;s clearly, obviously, that&#8217;s the big threat of ransomware.<\/p>\n<p>134<br \/>\n00:22:31.420 &#8211;&gt; 00:22:44.140<br \/>\nJirah Cox: But I can picture a lot of customers actually would say, the most painful over the process of restoring. Right? It&#8217;s getting back to online state. Even if we don&#8217;t pay the ransom. Don&#8217;t get that file decrypted, even just using the backups we had<\/p>\n<p>135<br \/>\n00:22:44.920 &#8211;&gt; 00:22:49.939<br \/>\nJirah Cox: is too painful for the business to to accept, as is status quo.<\/p>\n<p>136<br \/>\n00:22:50.520 &#8211;&gt; 00:22:51.280<br \/>\nAndy Whiteside: Well.<\/p>\n<p>137<br \/>\n00:22:51.690 &#8211;&gt; 00:23:03.749<br \/>\nPhilip Sellers: you know, having been through situations, downtime situations not necessarily ransomware situations in the past, you know there is that very real business conversation of<\/p>\n<p>138<br \/>\n00:23:03.990 &#8211;&gt; 00:23:18.800<br \/>\nPhilip Sellers: do we do A or B. You know, what is more acceptable to the business. And you&#8217;re right getting back up online sometimes trumps, you know, getting a hundred percent of the data back. And<\/p>\n<p>139<br \/>\n00:23:19.130 &#8211;&gt; 00:23:31.669<br \/>\nPhilip Sellers: you know it mitigates a lot of times the the badness of a ransomware event. But you know, I mean in the just in this week. You know, we we have news of<\/p>\n<p>140<br \/>\n00:23:31.870 &#8211;&gt; 00:23:45.989<br \/>\nPhilip Sellers: multiple things going on and and major corporations, and you know the size of the payouts being requested or just increasing to. So I mean this, this is huge, just to be able to get back into business because<\/p>\n<p>141<br \/>\n00:23:46.100 &#8211;&gt; 00:23:51.120<br \/>\nPhilip Sellers: the other side of it is not just the ransom, your lost revenue, the lost<\/p>\n<p>142<br \/>\n00:23:51.280 &#8211;&gt; 00:23:54.820<br \/>\nPhilip Sellers: business that you could have been doing during that same time period.<\/p>\n<p>143<br \/>\n00:23:55.620 &#8211;&gt; 00:24:16.790<br \/>\nJirah Cox: III scroll past it pretty fast. I saw a report that was listing like, where in the Us. Is it even for our Us. Audience? Where in the Us. Is it even legal to pay a ransom for ransomware. It&#8217;s actually like most states, it&#8217;s actually federally illegal like, you&#8217;re not allowed to right. Because, of course, if you are allowed to that, just simply rewards the attacker and makes them go find some other victim<\/p>\n<p>144<br \/>\n00:24:18.370 &#8211;&gt; 00:24:19.440<br \/>\nHarvey Green III: agreed.<\/p>\n<p>145<br \/>\n00:24:19.620 &#8211;&gt; 00:24:25.020<br \/>\nHarvey Green III: Yeah, this this one click is the the difference between having to<\/p>\n<p>146<br \/>\n00:24:25.100 &#8211;&gt; 00:24:31.510<br \/>\nHarvey Green III: basically stop the world and bring all your it people in and try to recover things versus.<\/p>\n<p>147<br \/>\n00:24:31.530 &#8211;&gt; 00:24:37.049<br \/>\nHarvey Green III: Hey? Just everybody. Sit still, and I&#8217;ll touch anything for a couple minutes, and you&#8217;ll have everything back.<\/p>\n<p>148<br \/>\n00:24:37.190 &#8211;&gt; 00:24:42.219<br \/>\nAndy Whiteside: Obviously, the second situation is way better than the personal.<\/p>\n<p>149<br \/>\n00:24:43.020 &#8211;&gt; 00:24:44.999<br \/>\nPhilip Sellers: And I mean, realistically.<\/p>\n<p>150<br \/>\n00:24:45.960 &#8211;&gt; 00:24:58.940<br \/>\nPhilip Sellers: I&#8217;ve heard of is issues and incidents where this is great, but we also have to make sure that there&#8217;s not more. and that we&#8217;re not still susceptible. So it still makes take time to do forensics.<\/p>\n<p>151<br \/>\n00:24:59.090 &#8211;&gt; 00:25:13.049<br \/>\nPhilip Sellers: but just restoring. I mean, that could be multiple weeks work effort depending on your backup strategy depending on what you have available to you. So I mean, this is a huge accelerator.<\/p>\n<p>152<br \/>\n00:25:13.210 &#8211;&gt; 00:25:20.240<br \/>\nPhilip Sellers: Because of how Newtonics files is integrated into their overall solution.<\/p>\n<p>153<br \/>\n00:25:20.830 &#8211;&gt; 00:25:27.290<br \/>\nHarvey Green III: Yeah, to that point. There&#8217;s there&#8217;s always the question of when something like this happens of, Okay.<\/p>\n<p>154<br \/>\n00:25:27.980 &#8211;&gt; 00:25:32.540<br \/>\nHarvey Green III: now, I&#8217;m going to start recovering. What data can I trust?<\/p>\n<p>155<br \/>\n00:25:32.570 &#8211;&gt; 00:25:36.849<br \/>\nHarvey Green III: Right? What is available for me to go back to<\/p>\n<p>156<br \/>\n00:25:36.860 &#8211;&gt; 00:25:45.669<br \/>\nHarvey Green III: that I know is a known good and having an option like this that has a mutability built into it<\/p>\n<p>157<br \/>\n00:25:45.700 &#8211;&gt; 00:25:49.169<br \/>\nHarvey Green III: that gives you a very, very good.<\/p>\n<p>158<br \/>\n00:25:49.180 &#8211;&gt; 00:25:51.359<br \/>\nHarvey Green III: These these are things I can trust.<\/p>\n<p>159<br \/>\n00:25:51.480 &#8211;&gt; 00:26:05.530<br \/>\nHarvey Green III:\u00a0 once you figure out when the issue started. You can go back to when you know it wasn&#8217;t present. And then, you know, because it was never written to since the first time it was written.<\/p>\n<p>160<br \/>\n00:26:05.550 &#8211;&gt; 00:26:09.329<br \/>\nHarvey Green III: that it&#8217;s a good backup. It&#8217;s something you can definitely use<\/p>\n<p>161<br \/>\n00:26:09.750 &#8211;&gt; 00:26:20.359<br \/>\nPhilip Sellers: when that&#8217;s where that perspective comes in. You have that extra perspective to to feel good about these things, because you now have data that you can trust that<\/p>\n<p>162<br \/>\n00:26:20.580 &#8211;&gt; 00:26:26.319<br \/>\nPhilip Sellers: is, visibility, view otherwise would not have had. For your unstructured data.<\/p>\n<p>163<br \/>\n00:26:26.500 &#8211;&gt; 00:26:27.650<br \/>\nHarvey Green III: absolutely.<\/p>\n<p>164<br \/>\n00:26:27.760 &#8211;&gt; 00:26:36.490<br \/>\nAndy Whiteside: And and guys, the quote here is from Haiku. That means third party companies like Haiku can take advantage of this technology and and improve upon it<\/p>\n<p>165<br \/>\n00:26:38.050 &#8211;&gt; 00:26:45.950<br \/>\nJirah Cox: 100 even without direct, like actual like coding and api integration like that, like Sabaya, who is fantastic.<\/p>\n<p>166<br \/>\n00:26:45.970 &#8211;&gt; 00:26:51.170<br \/>\nJirah Cox: grant Guy, over at IQ. Vp of products. You know, saying like this<\/p>\n<p>167<br \/>\n00:26:51.310 &#8211;&gt; 00:26:56.200<br \/>\nJirah Cox: exactly fits in super well into a layer production strategy right like. If you can&#8217;t recover from snapshot<\/p>\n<p>168<br \/>\n00:26:56.230 &#8211;&gt; 00:27:09.700<br \/>\nJirah Cox: fantastic when you can&#8217;t go from snapshot. That&#8217;s when we have a backup and nobody would say, have just one or the other? Right? The answer is both and and lot, probably lots of both. So so yeah, it&#8217;s 100 collaborative there<\/p>\n<p>169<br \/>\n00:27:10.080 &#8211;&gt; 00:27:11.890<br \/>\nAndy Whiteside: a lot of immutable stuff?<\/p>\n<p>170<br \/>\n00:27:13.510 &#8211;&gt; 00:27:17.470<br \/>\nAndy Whiteside: Next one, it says, permissions and risk visualization.<\/p>\n<p>171<br \/>\n00:27:19.400 &#8211;&gt; 00:27:22.120<br \/>\nJirah Cox: Yeah. So I think I think a lot of us understand that, like<\/p>\n<p>172<br \/>\n00:27:22.760 &#8211;&gt; 00:27:37.069<br \/>\nJirah Cox: commonly attacks that occur are often exacerbated right by overly permissive file structures. Right? If if someone can get something and has like right access to something. Then that&#8217;s something else that can get attacked. And it&#8217;s it&#8217;s at<\/p>\n<p>173<br \/>\n00:27:37.210 &#8211;&gt; 00:27:44.259<br \/>\nJirah Cox: at risk there. Right? So of course, we&#8217;ve probably all heard the the industry buzz words around, please privilege and audit your<\/p>\n<p>174<br \/>\n00:27:44.310 &#8211;&gt; 00:27:59.520<br \/>\nJirah Cox: Your file shares to what users can see. We&#8217;re now making that a little bit easier. Right? So within the console we can now identify. Hey? These shares might be flagged as overly permissive right? How many folders in here have open access? How many folders have full control,<\/p>\n<p>175<br \/>\n00:27:59.530 &#8211;&gt; 00:28:04.359<br \/>\nJirah Cox: and even the screenshot here has been showing like which<\/p>\n<p>176<br \/>\n00:28:04.430 &#8211;&gt; 00:28:19.779<br \/>\nJirah Cox: which users can see what and do, what to what shares and what what sections of data. So, using this, our customers can now easily find what&#8217;s low hanging fruit that I need to go. What what doors in the wall do I need to go close and lock right? That didn&#8217;t need to be open. In the first place.<\/p>\n<p>177<br \/>\n00:28:23.470 &#8211;&gt; 00:28:25.579<br \/>\nAndy Whiteside: Philip. Thoughts here. Oh.<\/p>\n<p>178<br \/>\n00:28:26.580 &#8211;&gt; 00:28:38.369<br \/>\nHarvey Green III: I was, gonna say, this, this is this is the lens and data lens. This is when you actually get to see things that you would have had no other good way of seeing<\/p>\n<p>179<br \/>\n00:28:38.540 &#8211;&gt; 00:28:42.900<br \/>\nHarvey Green III: and the fact that they have it set up in this way. That<\/p>\n<p>180<br \/>\n00:28:42.910 &#8211;&gt; 00:29:07.180<br \/>\nHarvey Green III: is also, you know, easy to see visually pleasing, and gives you risk scores and places to go. Look, hey! This this might look a little different than what you know what you&#8217;re used to, or hey? You might want to pay attention to this like, Hey, that gives a lot of value in a in a very small package here. Yeah, here&#8217;s what I see, confirm. This is intentional.<\/p>\n<p>181<br \/>\n00:29:07.320 &#8211;&gt; 00:29:26.900<br \/>\nPhilip Sellers: Well, and I&#8217;ll I&#8217;ll actually take it a slightly different direction with that story. You know, a few years ago, working for an organization that decided to turn on sharepoint universal search and pointed it at file shares and because they were overly permissive. Well.<\/p>\n<p>182<br \/>\n00:29:26.910 &#8211;&gt; 00:29:39.449<br \/>\nPhilip Sellers: lots of data was getting surfaced in search. And so, yeah, this is a real concern. I mean that overly permissive is not just a security risk. It&#8217;s also, you know.<\/p>\n<p>183<br \/>\n00:29:39.940 &#8211;&gt; 00:29:58.170<br \/>\nPhilip Sellers: As we move forward with new technologies, it can also become a a discovery risk within your organization where you know, there may be any, any rule on a file share, and who knows what someone&#8217;s put in there? I mean, any kind of confidential information could end up on that share. So<\/p>\n<p>184<br \/>\n00:29:58.330 &#8211;&gt; 00:30:00.440<br \/>\nPhilip Sellers: you know, as a user.<\/p>\n<p>185<br \/>\n00:30:00.670 &#8211;&gt; 00:30:08.070<br \/>\nPhilip Sellers: they tend to gravitate to whatever&#8217;s easiest. And so I&#8217;ve seen organizations where they create shares that are tailored, and then<\/p>\n<p>186<br \/>\n00:30:08.140 &#8211;&gt; 00:30:22.249<br \/>\nPhilip Sellers: they get tired of using those tailored ones, because well, I need to share this file from this share to another team who doesn&#8217;t have permission. So I&#8217;m just gonna put it in the all company share where everybody has access to it, even when that&#8217;s not the appropriate<\/p>\n<p>187<br \/>\n00:30:22.370 &#8211;&gt; 00:30:33.979<br \/>\nPhilip Sellers: level of access for the data. So I love that part of this from the risk visualization standpoint helping us point out, you know. where do we have those problems? And<\/p>\n<p>188<br \/>\n00:30:34.820 &#8211;&gt; 00:30:37.830<br \/>\nPhilip Sellers: for me, it&#8217;s a huge reason why migrate?<\/p>\n<p>189<br \/>\n00:30:38.320 &#8211;&gt; 00:30:42.070<br \/>\nYour file share your instructure data onto Newtonics files.<\/p>\n<p>190<br \/>\n00:30:42.430 &#8211;&gt; 00:30:45.009<br \/>\nAndy Whiteside: Yeah, yeah, II hear any any.<\/p>\n<p>191<br \/>\n00:30:45.170 &#8211;&gt; 00:30:58.189<br \/>\nPhilip Sellers: And it still makes me cringe. Yeah, for those who who couldn&#8217;t see Harvey Space. He kinda looked like from home alone, with his hands and his face in between.<\/p>\n<p>192<br \/>\n00:30:58.190 &#8211;&gt; 00:31:15.729<br \/>\nHarvey Green III: Oh, my gosh! I&#8217;m sure it was like put in there just for troubleshooting. It&#8217;s just temporary, it won&#8217;t. That won&#8217;t stick around Number 4 support for in us<\/p>\n<p>193<br \/>\n00:31:16.460 &#8211;&gt; 00:31:22.910<br \/>\nJirah Cox: object storage in us. So Newtonics unified storage is sort of the the new<\/p>\n<p>194<br \/>\n00:31:23.210 &#8211;&gt; 00:31:25.690<br \/>\nJirah Cox: family portfolio, right of both.<\/p>\n<p>195<br \/>\n00:31:25.760 &#8211;&gt; 00:31:35.159<br \/>\nJirah Cox: You know. Smb, nfs objects s. 3. And then also, of course, ice cuz he block storage, right? So we call all that kind of our unified storage portfolio.<\/p>\n<p>196<br \/>\n00:31:35.170 &#8211;&gt; 00:31:38.250<br \/>\nJirah Cox: Story for your application, no matter how you&#8217;re<\/p>\n<p>197<br \/>\n00:31:38.370 &#8211;&gt; 00:32:08.139<br \/>\nJirah Cox: go ahead totally right. Storage for your application, no matter how your application wants to consume it right across across any of those 4 protocols. So within the nest family. Right? Then, we have specific products, right? Like files and objects and volumes depending. What protocol you&#8217;ve got. So that&#8217;s that&#8217;s what? That is enough objects there. Andy. But yeah, so with this, right? Like some of the the great things we&#8217;ve had for years and files on the Smb and Nfs side of the house<\/p>\n<p>198<br \/>\n00:32:08.490 &#8211;&gt; 00:32:15.099<br \/>\nJirah Cox: stuff like audit trails like, who has done what to this file or this directory and show me all of the user interactions or<\/p>\n<p>199<br \/>\n00:32:15.200 &#8211;&gt; 00:32:33.109<br \/>\nJirah Cox: opposite, you know. Show me if I give you a user, what has that user done in the last day week? Couple of weeks? Very useful if someone you know you know, has access to sensitive data turns in their notice, like, Okay, great. Well, hey? Let me know what you&#8217;ve done. Let&#8217;s go. Look now, see, we&#8217;ve done our last 2 weeks what might be walking out the door with you.<\/p>\n<p>200<br \/>\n00:32:33.480 &#8211;&gt; 00:32:59.290<br \/>\nJirah Cox: So these kind of activity, tracking and even anomaly identifications now come to objects as well. So this screenshot that we&#8217;re showing here talks about stuff like audit trails around what&#8217;s been done to a certain bucket bucket being akin to like an kind of folder, or even like uses trending right like, what&#8217;s growing? Where&#8217;s my data going? What are the consumers of a given type of like data store?<\/p>\n<p>201<br \/>\n00:33:01.370 &#8211;&gt; 00:33:03.040<br \/>\nAndy Whiteside: Fill up your thoughts.<\/p>\n<p>202<br \/>\n00:33:05.020 &#8211;&gt; 00:33:22.160<br \/>\nPhilip Sellers: Yeah, I mean this, you know, certainly, data lens I feel like is golden on on the styles side of the house. But yeah, I mean growing use of object storage. I mean it. It&#8217;s coming up so often in in conversations with customers. And there&#8217;s really a A,<\/p>\n<p>203<br \/>\n00:33:22.220 &#8211;&gt; 00:33:33.609<br \/>\nPhilip Sellers: you know, move towards object storage, not only from a backup perspective, but for a lot of different data types, a lot of different types of sharing and things. So the fact that we&#8217;ve got that<\/p>\n<p>204<br \/>\n00:33:33.930 &#8211;&gt; 00:33:39.769<br \/>\nPhilip Sellers: understanding here. Natively, in dated lens is gonna be huge. II feel like this is<\/p>\n<p>205<br \/>\n00:33:40.360 &#8211;&gt; 00:33:51.289<br \/>\nPhilip Sellers:\u00a0 I don&#8217;t know. Preparing for the future. II called it that an earlier podcast today. So feel like this is one of those things that is preparing for the future.<\/p>\n<p>206<br \/>\n00:33:51.640 &#8211;&gt; 00:33:53.699<br \/>\nAndy Whiteside: Future can need lots of preparation.<\/p>\n<p>207<br \/>\n00:33:54.610 &#8211;&gt; 00:33:55.360<br \/>\nHarvey Green III: Okay.<\/p>\n<p>208<br \/>\n00:33:55.720 &#8211;&gt; 00:33:56.670<br \/>\nAndy Whiteside: Harvey.<\/p>\n<p>209<br \/>\n00:33:57.780 &#8211;&gt; 00:34:21.989<br \/>\nHarvey Green III: II would just like to point out that at the end of this article, it talks about how you can get started for a year free on data lens. So if you are a new tanks, unified storage, new tanics, files and tennis objects customer today. And you are not using data lens. Let&#8217;s fix that<\/p>\n<p>210<br \/>\n00:34:22.139 &#8211;&gt; 00:34:25.219<br \/>\nJirah Cox: for free. You just go call this to action.<\/p>\n<p>211<br \/>\n00:34:27.219 &#8211;&gt; 00:34:39.810<br \/>\nAndy Whiteside: Well, and that&#8217;s how we end this every time. So neutanics makes it super easy to test. Drive this stuff and get engaged with the partner sales team the Nutan sales team and really just take it for test. Drive yourself.<\/p>\n<p>212<br \/>\n00:34:39.850 &#8211;&gt; 00:34:41.769<br \/>\nAndy Whiteside: So, Ira, I&#8217;m assuming you would recommend that<\/p>\n<p>213<br \/>\n00:34:41.870 &#8211;&gt; 00:35:00.359<br \/>\nJirah Cox: 100. Yeah, it cause nice thing. Is it something to install? Right? If you&#8217;re already running files today on Prem, this is a Sas service you connect to it. There&#8217;s literally no, literally nothing to deploy right? So just turn it on. Get the value out of it. Get that inspection that that doesn&#8217;t sleep right, that watches what&#8217;s going on within the file server, you know.<\/p>\n<p>214<br \/>\n00:35:01.370 &#8211;&gt; 00:35:07.620<br \/>\nAndy Whiteside: Java, does this require prism central? Or can you do this without prism, central?<\/p>\n<p>215<br \/>\n00:35:07.680 &#8211;&gt; 00:35:13.699<br \/>\nAndy Whiteside: I don&#8217;t. It&#8217;s a good question. I don&#8217;t believe it requires PC. Inherently.<\/p>\n<p>216<br \/>\n00:35:14.260 &#8211;&gt; 00:35:18.209<br \/>\nAndy Whiteside: Jyra! Wrap us up. From your perspective on this topic.<\/p>\n<p>217<br \/>\n00:35:18.750 &#8211;&gt; 00:35:20.799<br \/>\nJirah Cox: man, I just So<\/p>\n<p>218<br \/>\n00:35:20.850 &#8211;&gt; 00:35:45.049<br \/>\nJirah Cox: between this role and my previous role, like, I&#8217;ve had one customer who&#8217;s been on file since the day one release right. And I should just check some of the phone home data. They&#8217;re still on files. 9 years later. And I just think like what? How, what a transformative amount of value we&#8217;ve put into that offering from 9 years ago. I&#8217;m not gonna say bare bones, minimum viable smb, file share offering.<\/p>\n<p>219<br \/>\n00:35:45.200 &#8211;&gt; 00:36:12.290<br \/>\nJirah Cox: But you&#8217;d be justified in thinking of that 9 years ago to now what it is now, with dramatic performance, amazing availability. Super easy, powerful low latency. Dr. Replication right into it. And now, really going on the offense against ransomware as well helping make sure your data stays your data and stays online and available. I just think it&#8217;s it&#8217;s super cool stuff. I love you just coded all good offense. I mean, that&#8217;s that&#8217;s the only only answer here is to be on the offensive. And<\/p>\n<p>220<br \/>\n00:36:12.290 &#8211;&gt; 00:36:19.709<br \/>\nAndy Whiteside: yeah, put them on their heels. Bad guys are thinking about it. If you&#8217;re not, you&#8217;re kind of losing. Yeah, yeah, pretty much.<\/p>\n<p>221<br \/>\n00:36:19.880 &#8211;&gt; 00:36:25.250<br \/>\nAndy Whiteside: Yeah. And we have the tools today to kind of mitigate them to a large degree. Philip thoughts.<\/p>\n<p>222<br \/>\n00:36:26.470 &#8211;&gt; 00:36:28.489<br \/>\nPhilip Sellers: you know, I think this is<\/p>\n<p>223<br \/>\n00:36:28.790 &#8211;&gt; 00:36:41.459<br \/>\nPhilip Sellers: foundational technology. Now, II think, given the risk and the amount of risk you&#8217;re you&#8217;re probably gonna start seeing your cyber liability coverage starting to ask, What do you have watching?<\/p>\n<p>224<br \/>\n00:36:41.630 &#8211;&gt; 00:36:58.819<br \/>\nPhilip Sellers: And so, you know again, this is an easy button for getting that information and getting that monitoring that we&#8217;d love to help you set up if you&#8217;re not using it today and getting this in place only helps. For when things like AI become mainstream.<\/p>\n<p>225<br \/>\n00:36:59.600 &#8211;&gt; 00:37:15.550<br \/>\nPhilip Sellers: absolutely. I mean, you know, if if we look at this technology and look at others. Similar cloud based. And that&#8217;s where the Ml. And the AI datasets can really become powerful and helping pinpoint problems beforehand. I mean, we use it a lot and<\/p>\n<p>226<br \/>\n00:37:15.550 &#8211;&gt; 00:37:32.640<br \/>\nPhilip Sellers: hardware anomaly detection and support proactive support programs. I can see this continuing to to provide value as as more and more things get developed on the platform to to help you identify the problems before you know their problems.<\/p>\n<p>227<br \/>\n00:37:33.430 &#8211;&gt; 00:37:35.810<br \/>\nAndy Whiteside: Yeah, Harvey, your thoughts wrapping this up.<\/p>\n<p>228<br \/>\n00:37:36.580 &#8211;&gt; 00:37:40.470<br \/>\nHarvey Green III: Yeah, I mean, ultimately, II kinda go back to<\/p>\n<p>229<br \/>\n00:37:40.600 &#8211;&gt; 00:37:45.899<br \/>\nHarvey Green III: what I just said a few minutes ago. Like, if if you are a Nutanax files customer and the Santa Claus.<\/p>\n<p>230<br \/>\n00:37:46.190 &#8211;&gt; 00:37:52.310<br \/>\nHarvey Green III: I&#8217;m just customer not using us. Let&#8217;s fix that. If you&#8217;re a lieutenant&#8217;s customer, you&#8217;re not using unified storage.<\/p>\n<p>231<br \/>\n00:37:52.350 &#8211;&gt; 00:37:56.739<br \/>\nHarvey Green III: Let&#8217;s fix that. I don&#8217;t know anybody in it today<\/p>\n<p>232<br \/>\n00:37:57.450 &#8211;&gt; 00:38:03.470<br \/>\nHarvey Green III: who would say, No, I don&#8217;t want something looking to protect me from ransomware. That&#8217;s crazy talk.<\/p>\n<p>233<br \/>\n00:38:03.630 &#8211;&gt; 00:38:13.269<br \/>\nHarvey Green III: Alright. That&#8217;s just not the way things should be today. Well, and as we talked about here, it&#8217;s something helping me protect me against ransomware at all the different layers<\/p>\n<p>234<br \/>\n00:38:13.350 &#8211;&gt; 00:38:18.550<br \/>\nAndy Whiteside: and the new tanks platform has a couple of pieces of that, just if you just implement the platform.<\/p>\n<p>235<br \/>\n00:38:19.430 &#8211;&gt; 00:38:20.590<br \/>\n\u092c\u093f\u0932\u094d\u0915\u0941\u0932\u0964<\/p>\n<p>236<br \/>\n00:38:21.240 &#8211;&gt; 00:38:36.909<br \/>\nAndy Whiteside: Well, gentlemen, thank you for the time and helping me with the context, I appreciate it as always, and look forward to doing this again. What? In 2 weeks? Hey, Gyre! You know what you mentioned your new role a minute ago, and what? What? I&#8217;ve stopped asking you in the beginning of the podcast what your current role is, what is that new role?<\/p>\n<p>237<br \/>\n00:38:38.240 &#8211;&gt; 00:39:02.479<br \/>\nJirah Cox: Does that mention? I&#8217;m a new role. Oh, I just oh, I see, I&#8217;m sorry about yeah having customers. So in my current role. So I just get to have conversations like these now across the country, right? So I cover, I mean, enroll that covers the Americas, helping customers. Understand the portfolio. What can we do for them solve problems. And even architecturally, like, you know, get to designs. But how do we do this at scale for customers in very, very large environments.<\/p>\n<p>238<br \/>\n00:39:02.510 &#8211;&gt; 00:39:07.270<br \/>\nAndy Whiteside: No, that&#8217;s awesome. Alright guys, thank you for the time, and we&#8217;ll pick it up again next time.<\/p>\n<p>239<br \/>\n00:39:08.650 &#8211;&gt; 00:39:09.930<br \/>\nAbsolutely. Thanks.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Unstructured Data Under Siege In today\u2019s digital age, data is the lifeline of businesses. It drives decision-making, influences strategies, and unveils market insights that can propel any organization ahead of &hellip;<\/p>","protected":false},"author":7,"featured_media":65766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[122],"class_list":["post-65690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast","tag-nutanix-weekly"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>76: Nutanix Weekly: Defend Your Data Proactively<\/title>\n<meta name=\"description\" content=\"With unstructured data visibility your business is vulnerable to cyber attacks and insider threats. Nutanix Data Lens is your solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"76: Nutanix Weekly: Defend Your Data Proactively\" \/>\n<meta property=\"og:description\" content=\"With unstructured data visibility your business is vulnerable to cyber attacks and insider threats. Nutanix Data Lens is your solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T16:23:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"36 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"76: Nutanix Weekly: Beyond Ransom &amp; Recovery: Defend Your Data Proactively with Nutanix Data Lens\",\"datePublished\":\"2023-10-23T23:00:00+00:00\",\"dateModified\":\"2026-01-29T16:23:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/\"},\"wordCount\":8067,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"keywords\":[\"Nutanix Weekly\"],\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/\",\"name\":\"76: Nutanix Weekly: Defend Your Data Proactively\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"datePublished\":\"2023-10-23T23:00:00+00:00\",\"dateModified\":\"2026-01-29T16:23:51+00:00\",\"description\":\"With unstructured data visibility your business is vulnerable to cyber attacks and insider threats. Nutanix Data Lens is your solution.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"76: Nutanix Weekly: Beyond Ransom &amp; Recovery: Defend Your Data Proactively with Nutanix Data Lens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"76: Nutanix Weekly: Defend Your Data Proactively","description":"With unstructured data visibility your business is vulnerable to cyber attacks and insider threats. Nutanix Data Lens is your solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/","og_locale":"hi_IN","og_type":"article","og_title":"76: Nutanix Weekly: Defend Your Data Proactively","og_description":"With unstructured data visibility your business is vulnerable to cyber attacks and insider threats. Nutanix Data Lens is your solution.","og_url":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2023-10-23T23:00:00+00:00","article_modified_time":"2026-01-29T16:23:51+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"36 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"76: Nutanix Weekly: Beyond Ransom &amp; Recovery: Defend Your Data Proactively with Nutanix Data Lens","datePublished":"2023-10-23T23:00:00+00:00","dateModified":"2026-01-29T16:23:51+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/"},"wordCount":8067,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","keywords":["Nutanix Weekly"],"articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/","url":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/","name":"76: Nutanix Weekly: Defend Your Data Proactively","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","datePublished":"2023-10-23T23:00:00+00:00","dateModified":"2026-01-29T16:23:51+00:00","description":"With unstructured data visibility your business is vulnerable to cyber attacks and insider threats. Nutanix Data Lens is your solution.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-beyond-ransom-recovery-defend-your-data-proactively-with-nutanix-data-lens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"76: Nutanix Weekly: Beyond Ransom &amp; Recovery: Defend Your Data Proactively with Nutanix Data Lens"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=65690"}],"version-history":[{"count":1769,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65690\/revisions"}],"predecessor-version":[{"id":717562,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65690\/revisions\/717562"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65766"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=65690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=65690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=65690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}