{"id":65710,"date":"2022-06-29T11:00:00","date_gmt":"2022-06-29T15:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/"},"modified":"2025-02-13T07:01:39","modified_gmt":"2025-02-13T12:01:39","slug":"nutanix-weekly-nutanix-files-episode-4-1-a-security-story","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/","title":{"rendered":"54: Nutanix Weekly: Nutanix Files Episode 4.1 &#8211; A Security Story"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1577275\/episodes\/10875560-nutanix-weekly-nutanix-files-episode-4-1-a-security-story?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>With unstructured data growing exponentially, securing shared storage is increasingly becoming difficult. It is an operational nightmare to identify datacenter weak points let alone predict the next threat. Ransomware attacks are becoming more and more sophisticated, surpassing firewalls and anti-virus software.\u00a0<\/p>\n<p>Does this sound familiar? You plug one hole another opens, you update software, you train end users on how to detect suspicious files or emails but the threats keep coming. The rise of Ransomware in recent years has put companies on red alert. CIO\u2019s are well aware of the impacts this can cause and nearly all would say that security is a top priority for their business.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u093c\u092c\u093e\u0928: \u091c\u093f\u0930\u093e\u0939 \u0915\u0949\u0915\u094d\u0938<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092c\u0947\u0928 \u0930\u094b\u091c\u0930\u094d\u0938<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.550 &#8211;&gt; 00:00:09.809<br \/>Andy Whiteside: Hello everyone and welcome to episode 54 of new tonics week every host Andy whiteside i&#8217;ve got two new tonics folks with me.<\/p>\n<p>2<br \/>00:00:10.170 &#8211;&gt; 00:00:24.360<br \/>Andy Whiteside: gyro do you guys call yourself something special like, for example, this weekend I had on my citrix shirt and some guy recognize me as a citrix employee former citrix employee you guys have a new you guys have an affection and name for yourself don&#8217;t you.<\/p>\n<p>3<br \/>00:00:24.450 &#8211;&gt; 00:00:25.650<br \/>Jirah Cox: yeah man, we say mutant.<\/p>\n<p>4<br \/>00:00:26.880 &#8211;&gt; 00:00:29.160<br \/>Jirah Cox: which makes you curious what What do you say it&#8217;s INTEGRA.<\/p>\n<p>5<br \/>00:00:30.120 &#8211;&gt; 00:00:34.230<br \/>Jirah Cox: Is integrates okay well there you go that&#8217;s integrations know.<\/p>\n<p>6<br \/>00:00:34.320 &#8211;&gt; 00:00:41.010<br \/>Andy Whiteside: As integrations yeah we didn&#8217;t know we we pretty much steal from citrix all their good marketing stuff not the bad marketing stuff the good marketing stuff.<\/p>\n<p>7<br \/>00:00:42.600 &#8211;&gt; 00:00:44.130<br \/>Andy Whiteside: And they have had a lot of good stuff.<\/p>\n<p>8<br \/>00:00:44.790 &#8211;&gt; 00:00:46.260<br \/>Jirah Cox: That implies the existence of bad stuff.<\/p>\n<p>9<br \/>00:00:46.920 &#8211;&gt; 00:00:55.260<br \/>Andy Whiteside: It look if you&#8217;re it&#8217;s like I use this one, all the time it&#8217;s like it&#8217;s like auto racing specifically nascar in my case dirt track racing what have you.<\/p>\n<p>10<br \/>00:00:55.890 &#8211;&gt; 00:01:06.690<br \/>Andy Whiteside: If you&#8217;re not constantly tweaking you&#8217;re not really trying, because you know the tracks going to change the environments going to change what have you and there&#8217;s been probably half the tweaks i&#8217;ve ever done.<\/p>\n<p>11<br \/>00:01:07.200 &#8211;&gt; 00:01:15.900<br \/>Andy Whiteside: made it worse and half have made it better, but the truth is your environment is changing around you so you have to be doing something if not somebody else is going to catch you and passion.<\/p>\n<p>12<br \/>00:01:17.550 &#8211;&gt; 00:01:22.620<br \/>Jirah Cox: I just realized that we don&#8217;t do enough joint events together around dirt track, we need to fix that.<\/p>\n<p>13<br \/>00:01:22.800 &#8211;&gt; 00:01:23.880<br \/>Andy Whiteside: Oh man I would love it.<\/p>\n<p>14<br \/>00:01:24.270 &#8211;&gt; 00:01:28.710<br \/>Andy Whiteside: would be fun I love sliding sideways been a long time that really.<\/p>\n<p>15<br \/>00:01:30.060 &#8211;&gt; 00:01:39.600<br \/>Andy Whiteside: Well Okay, so that was the voice of jarrod Cox diaries our subject matter expert on all things new tannic if I ever get in a world where i&#8217;m talking to someone new tactics and i&#8217;m trying to validate myself I.<\/p>\n<p>16<br \/>00:01:39.930 &#8211;&gt; 00:01:47.430<br \/>Andy Whiteside: Talk about the podcast jarrod does with me and they say Oh, you must, you must be somebody then just associate with Diary, you should.<\/p>\n<p>17<br \/>00:01:47.460 &#8211;&gt; 00:01:47.940<br \/>Jirah Cox: You should.<\/p>\n<p>18<br \/>00:01:48.990 &#8211;&gt; 00:01:52.410<br \/>Jirah Cox: talk to people that are lost easily impressed, but I mean they&#8217;re pretty impressed.<\/p>\n<p>19<br \/>00:01:53.670 &#8211;&gt; 00:02:01.740<br \/>Andy Whiteside: Also, you guys heard been rodgers if you&#8217;ve listened to any of our other podcasts the citrix one been used to be a sales engineer over there now he&#8217;s ever written the tactics ben&#8217;s a former customer.<\/p>\n<p>20<br \/>00:02:02.580 &#8211;&gt; 00:02:11.670<br \/>Andy Whiteside: Used him as a reference, the other day, with a joint account they were both working on now, and you know think Ben Ben saw the vision of delivered computes in a.<\/p>\n<p>21<br \/>00:02:12.510 &#8211;&gt; 00:02:26.820<br \/>Andy Whiteside: Low compute fashion, in other words server hosted desktops at some point starts to bleed into vdi the world of hyper converge new tannic shows up there, but that&#8217;s been Rogers former citrus guy former customer now new tonics.<\/p>\n<p>22<br \/>00:02:27.930 &#8211;&gt; 00:02:31.470<br \/>Andy Whiteside: New new what you call it what was your fixing a name for yourself.<\/p>\n<p>23<br \/>00:02:31.650 &#8211;&gt; 00:02:32.460<br \/>Jirah Cox: or newton&#8217;s.<\/p>\n<p>24<br \/>00:02:32.640 &#8211;&gt; 00:02:34.290<br \/>Andy Whiteside: newton&#8217;s newton&#8217;s.<\/p>\n<p>25<br \/>00:02:34.350 &#8211;&gt; 00:02:34.980<br \/>Ben Rogers: yeah.<\/p>\n<p>26<br \/>00:02:35.220 &#8211;&gt; 00:02:39.690<br \/>Ben Rogers: I haven&#8217;t quite reached the level of Newton yet i&#8217;m called a newbie.<\/p>\n<p>27<br \/>00:02:42.180 &#8211;&gt; 00:02:47.520<br \/>Ben Rogers: So I think it&#8217;s when you complete your first year here you&#8217;re a newbie and and after that you can assume the name of Nick.<\/p>\n<p>28<br \/>00:02:48.270 &#8211;&gt; 00:02:48.630<br \/>hmm.<\/p>\n<p>29<br \/>00:02:49.800 &#8211;&gt; 00:02:51.900<br \/>Andy Whiteside: But the acronym F and G right.<\/p>\n<p>30<br \/>00:02:52.530 &#8211;&gt; 00:02:54.510<br \/>Ben Rogers: There you go yeah i&#8217;m a friendly guy.<\/p>\n<p>31<br \/>00:02:55.050 &#8211;&gt; 00:02:55.350<br \/>Jirah Cox: Really.<\/p>\n<p>32<br \/>00:02:55.380 &#8211;&gt; 00:03:03.090<br \/>Ben Rogers: Probably like I would like to think and I don&#8217;t know jarrod might agree or disagree with this, I would like to think i&#8217;ve shorten the learning curve, a little bit it&#8217;s just.<\/p>\n<p>33<br \/>00:03:03.840 &#8211;&gt; 00:03:13.560<br \/>Ben Rogers: what&#8217;s been interesting coming from citrix to new tonics citrix had a wide portfolio to that man is a sales engineer, you had to know a little bit of the whole portfolio from end to end.<\/p>\n<p>34<br \/>00:03:14.070 &#8211;&gt; 00:03:21.180<br \/>Ben Rogers: New tannic is similar, you have the core product which is the ACI product, but that product and spider out and do so many things so.<\/p>\n<p>35<br \/>00:03:21.810 &#8211;&gt; 00:03:27.630<br \/>Ben Rogers: Learning the core has been one thing learning the 5000 things the core can do like we&#8217;re going to talk about today has been the other so.<\/p>\n<p>36<br \/>00:03:27.930 &#8211;&gt; 00:03:36.810<br \/>Ben Rogers: Any i&#8217;m glad to be on the podcast with you excited to be hanging out with you guys day ready to learn a bunch, thank you for allowing me to continue my journey with you guys.<\/p>\n<p>37<br \/>00:03:38.130 &#8211;&gt; 00:03:43.200<br \/>Andy Whiteside: So you know we kind of told been coming into this, we want to his feedback on what we do and have him chime in.<\/p>\n<p>38<br \/>00:03:43.710 &#8211;&gt; 00:03:48.390<br \/>Andy Whiteside: just so happens harvey&#8217;s not here today, so probably play a larger role for now until he continues to evolve.<\/p>\n<p>39<br \/>00:03:49.350 &#8211;&gt; 00:03:59.370<br \/>Andy Whiteside: But I am going to go to been real quick and then you remember the first time, we talked about hyper converge and what you thought about my ideas that that&#8217;s where you should be heading at that moment and and how things have changed.<\/p>\n<p>40<br \/>00:04:00.180 &#8211;&gt; 00:04:09.840<br \/>Ben Rogers: yeah I mean I remember the conversation you I what&#8217;s really wild about my journey here in new tannic so far is that you know, I was a three tier guy.<\/p>\n<p>41<br \/>00:04:10.560 &#8211;&gt; 00:04:18.540<br \/>Ben Rogers: And the economics of managing that infrastructure can be an interesting according to how you&#8217;ve purchased that three tier yes it&#8217;s not always just one.<\/p>\n<p>42<br \/>00:04:18.840 &#8211;&gt; 00:04:27.450<br \/>Ben Rogers: purchase, so you have to work on when do the things to appreciate it out when does it make sense, so you know I never crossed the bridge of having to go ACI.<\/p>\n<p>43<br \/>00:04:27.930 &#8211;&gt; 00:04:40.710<br \/>Ben Rogers: it&#8217;s something that now i&#8217;m on the side, I would have definitely done, but I would have done it more to create the environment and the platform that would then allow me to spider out to the cloud services, so this whole concept of private cloud.<\/p>\n<p>44<br \/>00:04:41.130 &#8211;&gt; 00:04:48.360<br \/>Ben Rogers: Public cloud hybrid cloud and new tonics really has embraced that they&#8217;re creating the platform that will allow you to.<\/p>\n<p>45<br \/>00:04:48.630 &#8211;&gt; 00:04:56.190<br \/>Ben Rogers: Service your on Prem private cloud workloads but then also extend those out and not have to have employees learn a whole new set of.<\/p>\n<p>46<br \/>00:04:56.460 &#8211;&gt; 00:05:04.620<br \/>Ben Rogers: tools man so that&#8217;s been really interesting for me and looking on my past experience, I definitely could see where I would embrace that along with.<\/p>\n<p>47<br \/>00:05:05.070 &#8211;&gt; 00:05:13.200<br \/>Ben Rogers: Continuing to run citrix on top of it, because the goodness of the desktop that I got there and said yeah just man i&#8217;m learning a whole bunch and.<\/p>\n<p>48<br \/>00:05:13.770 &#8211;&gt; 00:05:26.820<br \/>Ben Rogers: Really any time to be in it and we&#8217;re in one of those moments where this is a paradigm shift of bringing in cloud, and how does that work for every organization because they&#8217;re all going to be faced with it before too long.<\/p>\n<p>49<br \/>00:05:27.360 &#8211;&gt; 00:05:33.000<br \/>Andy Whiteside: But it&#8217;s into I will use that to segue into the topic today, we have to you know you have the core of hyper converge, which is really.<\/p>\n<p>50<br \/>00:05:33.300 &#8211;&gt; 00:05:39.900<br \/>Andy Whiteside: cloud fundamentals in your data Center and then you have things like additional features we&#8217;re going to talk about today with files and then.<\/p>\n<p>51<br \/>00:05:40.140 &#8211;&gt; 00:05:49.710<br \/>Andy Whiteside: The the big scary security world that needs to show up and everything but file specifically and then, finally, the third thing which been brought up, which is now the elasticity of.<\/p>\n<p>52<br \/>00:05:50.100 &#8211;&gt; 00:05:57.210<br \/>Andy Whiteside: Multiple data centers and having that ubiquitous layer between all of them, which is going back to which is all of it right files and.<\/p>\n<p>53<br \/>00:05:57.810 &#8211;&gt; 00:06:03.870<br \/>Andy Whiteside: In the core operating system, the storage operating system and all that being prepared to go left or right go straight go backwards if you need to.<\/p>\n<p>54<br \/>00:06:04.320 &#8211;&gt; 00:06:11.970<br \/>Andy Whiteside: And that&#8217;s you know where new tactics is really aligned itself not witness like being the cloud but being an enabler of whatever your cloud strategy is.<\/p>\n<p>55<br \/>00:06:13.170 &#8211;&gt; 00:06:20.880<br \/>Andy Whiteside: And I had I was at a new tannic meeting last week in New York and I brought up to the team presenting right in the middle, you help customers understand it&#8217;s not the clouds clouds.<\/p>\n<p>56<br \/>00:06:21.210 &#8211;&gt; 00:06:27.630<br \/>Andy Whiteside: And it can really be clouds within one single organization like Microsoft, but it could be your data Center they are dirty data Center.<\/p>\n<p>57<br \/>00:06:28.230 &#8211;&gt; 00:06:42.900<br \/>Andy Whiteside: Data centers and the ability to be elastic and you pick what is layer in between all that the minute somebody shakes her head yeah I agree it&#8217;s clouds not cloud all the sudden this layer that new tannic brings to the equation becomes very applicable to all conversations.<\/p>\n<p>58<br \/>00:06:43.140 &#8211;&gt; 00:06:49.080<br \/>Jirah Cox: yeah I usually I usually say it a little differently in my customer meetings i&#8217;ll ask like who&#8217;s your cloud provider know, whatever they say, as your aws.<\/p>\n<p>59<br \/>00:06:49.530 &#8211;&gt; 00:06:56.070<br \/>Jirah Cox: i&#8217;ll say actually trick question you are your company five provider right, those are tools in your arsenal right but, but your company&#8217;s cloud.<\/p>\n<p>60<br \/>00:06:56.610 &#8211;&gt; 00:07:09.900<br \/>Jirah Cox: Can or can or might include all of those things or none whatever the right option is right choices for your company right but but yeah having that optionality that control that agility to say things to start one place move other places yeah absolutely invaluable.<\/p>\n<p>61<br \/>00:07:10.410 &#8211;&gt; 00:07:23.640<br \/>Andy Whiteside: And my argument there&#8217;s people that don&#8217;t don&#8217;t want people that want you to think it&#8217;s the cloud is one of these hyper scale or players who are trying to get you to go all in on their solution, and at that point, you might you might be able to think of as one big cloud.<\/p>\n<p>62<br \/>00:07:24.330 &#8211;&gt; 00:07:26.910<br \/>Andy Whiteside: The truth is that doesn&#8217;t work for probably anybody.<\/p>\n<p>63<br \/>00:07:27.150 &#8211;&gt; 00:07:33.780<br \/>Jirah Cox: And know we get we get far too much mileage out of like a single word there right so when you think about everything from people trying to do like.<\/p>\n<p>64<br \/>00:07:34.740 &#8211;&gt; 00:07:44.910<br \/>Jirah Cox: mainframe X in the cloud to like server list functions talking about very, very different on the clouds in there right and then containers in the middle vs in the middle.<\/p>\n<p>65<br \/>00:07:45.240 &#8211;&gt; 00:07:52.890<br \/>Jirah Cox: And and we&#8217;re we&#8217;re barely even talking about same technologies but we brought them all and shy and we&#8217;re doing too much work called cloud right.<\/p>\n<p>66<br \/>00:07:53.490 &#8211;&gt; 00:08:03.420<br \/>Ben Rogers: Now it&#8217;s been interesting Andy since i&#8217;ve been here one of the things that they really concentrate on his workload where where where do you need your workload to reside and said.<\/p>\n<p>67<br \/>00:08:03.780 &#8211;&gt; 00:08:10.650<br \/>Ben Rogers: You know, part of what we have to do we go in is kind of get customers to wrap their heads around you know you&#8217;ve got all the servers and all the services that you&#8217;re.<\/p>\n<p>68<br \/>00:08:11.070 &#8211;&gt; 00:08:17.610<br \/>Ben Rogers: You know spinning out to the company, but where what is really your workload and where do you need to concentrate those efforts.<\/p>\n<p>69<br \/>00:08:17.940 &#8211;&gt; 00:08:27.750<br \/>Ben Rogers: And those are different yeah I was in commercial at citrix now i&#8217;m over here enterprise, one of the things that shocked me dealing in the enterprise space is a lot of enterprise has legacy.<\/p>\n<p>70<br \/>00:08:28.320 &#8211;&gt; 00:08:40.590<br \/>Ben Rogers: And they can&#8217;t really man get rid of that legacy for different reasons, but they&#8217;re looking at ways to get that legacy spent out of private on Prem to the public and so it&#8217;s been interesting to.<\/p>\n<p>71<br \/>00:08:40.950 &#8211;&gt; 00:08:50.460<br \/>Ben Rogers: See how many attacks can help some of the larger customers that have these legacy Apps that they can&#8217;t unfold their business from how do they preserve that and make that known for.<\/p>\n<p>72<br \/>00:08:51.480 &#8211;&gt; 00:09:01.350<br \/>Andy Whiteside: And for me there&#8217;s two ways look there&#8217;s legacy Apps that you&#8217;re currently still using and there&#8217;s legacy Apps that you can&#8217;t retire, for you know archival reasons.<\/p>\n<p>73<br \/>00:09:02.670 &#8211;&gt; 00:09:11.850<br \/>Andy Whiteside: In both cases, you might approach them slightly different, but having a again that ubiquitous i&#8217;ll probably say way too many times in this podcast having that layer that allows you to have high performance computing.<\/p>\n<p>74<br \/>00:09:12.180 &#8211;&gt; 00:09:18.810<br \/>Andy Whiteside: and storage oriented low performance compute is super valuable versus trying to buy that three tier thing that fits it all.<\/p>\n<p>75<br \/>00:09:21.960 &#8211;&gt; 00:09:25.650<br \/>Andy Whiteside: All right, um so the blog they were looking at his new tannic files.<\/p>\n<p>76<br \/>00:09:26.460 &#8211;&gt; 00:09:40.530<br \/>Andy Whiteside: episode four dot one a security story and we&#8217;re going to have gyro walk us through this and we&#8217;ve been time or rent time in as to why it matters to him as a as a CIO along the way jarrod who&#8217;s the author of this one I can&#8217;t pronounce it.<\/p>\n<p>77<br \/>00:09:40.620 &#8211;&gt; 00:09:51.300<br \/>Jirah Cox: yeah so Angela Gianni runs our Community programs so that includes like the MTC program for field evangelists as well as the Community site here.<\/p>\n<p>78<br \/>00:09:52.830 &#8211;&gt; 00:09:55.950<br \/>Jirah Cox: called next not to be confused with that next conference.<\/p>\n<p>79<br \/>00:09:56.910 &#8211;&gt; 00:10:07.050<br \/>Andy Whiteside: And he jumps into the blog talk about unstructured data I guess in that really means a database will be structured or legacy database would be structured now.<\/p>\n<p>80<br \/>00:10:07.440 &#8211;&gt; 00:10:16.710<br \/>Andy Whiteside: Structured data would be files and even you know tables and things that have not tables, but things that are just random data, how does it help me help me define unstructured data.<\/p>\n<p>81<br \/>00:10:17.250 &#8211;&gt; 00:10:27.210<br \/>Jirah Cox: yeah so commonly used for describe things like file shares right on an as to whether it&#8217;s SMB nfl windows file shares windows file servers vm physical.<\/p>\n<p>82<br \/>00:10:28.500 &#8211;&gt; 00:10:42.030<br \/>Jirah Cox: You know unstructured data, basically, meaning that it&#8217;s like non database non big data there&#8217;s not a schema that describes it it&#8217;s the structure is whatever users feel like on that day right users can go create great great.<\/p>\n<p>83<br \/>00:10:42.780 &#8211;&gt; 00:10:47.070<br \/>Jirah Cox: folder hierarchies right and that becomes the de facto organization, if you will, of the data.<\/p>\n<p>84<br \/>00:10:47.550 &#8211;&gt; 00:11:03.960<br \/>Andy Whiteside: So in 1999 I was these wintel systems admin for a company located here in the Charlotte area we had 54 gigs of user data files, you know group shares and things like that, and my unix administrator was after me all the time to get that under control, I wonder how much they have today.<\/p>\n<p>85<br \/>00:11:05.400 &#8211;&gt; 00:11:14.100<br \/>Jirah Cox: So yeah 34 gigs in 99 yeah it was like probably rivaling like this, like hard drive in my PC yeah.<\/p>\n<p>86<br \/>00:11:14.550 &#8211;&gt; 00:11:15.660<br \/>Andy Whiteside: Yes, that was crazy to.<\/p>\n<p>87<br \/>00:11:15.660 &#8211;&gt; 00:11:16.740<br \/>Jirah Cox: think probably using you know.<\/p>\n<p>88<br \/>00:11:16.950 &#8211;&gt; 00:11:21.120<br \/>Jirah Cox: 1020 times many spindles and costing I don&#8217;t know 100 times as much yeah.<\/p>\n<p>89<br \/>00:11:21.720 &#8211;&gt; 00:11:28.530<br \/>Andy Whiteside: Well, and then for this conversation it&#8217;s really about securing not necessarily managing and reducing that size.<\/p>\n<p>90<br \/>00:11:29.130 &#8211;&gt; 00:11:37.290<br \/>Andy Whiteside: We go into some things we got three bullets here Darren you want to go and hit these bullets and we&#8217;ll come back to Ben and asked him as a put on a CEO hat and tell us why that matters.<\/p>\n<p>91<br \/>00:11:37.740 &#8211;&gt; 00:11:46.500<br \/>Jirah Cox: It totally um so a couple of data points shared for like table setting in the article around you know history in sort of growth of ransomware i&#8217;m.<\/p>\n<p>92<br \/>00:11:47.010 &#8211;&gt; 00:12:02.970<br \/>Jirah Cox: not going to surprise anybody listening to this right from 2015 which is like not quite dawn of ransomware but early days of ransomware through last year 57 X growth in ransomware grow into a global $20 billion revenue stream, which is terrifying.<\/p>\n<p>93<br \/>00:12:05.340 &#8211;&gt; 00:12:12.300<br \/>Jirah Cox: A really even more terrifying one right or even people that pay ransoms ransomware only 65% recover their data.<\/p>\n<p>94<br \/>00:12:14.280 &#8211;&gt; 00:12:19.590<br \/>Jirah Cox: And then perhaps like let&#8217;s keep escalating the terror terror here the worst one perhaps.<\/p>\n<p>95<br \/>00:12:21.060 &#8211;&gt; 00:12:29.280<br \/>Jirah Cox: Average impact of a ransomware event can be 21 days of downtime which is and that would be crippling to almost any company, I can think of.<\/p>\n<p>96<br \/>00:12:30.600 &#8211;&gt; 00:12:39.090<br \/>Andy Whiteside: Do you think that was a company That said, you know frickin i&#8217;m not paying the ransom or is that a command just took that long to figure it out.<\/p>\n<p>97<br \/>00:12:39.300 &#8211;&gt; 00:12:44.790<br \/>Jirah Cox: I mean jeez sometimes even the debate around which one, are we going to be can take that long yeah yeah.<\/p>\n<p>98<br \/>00:12:45.450 &#8211;&gt; 00:12:48.570<br \/>Andy Whiteside: So been your CIO again um.<\/p>\n<p>99<br \/>00:12:49.920 &#8211;&gt; 00:12:52.800<br \/>Andy Whiteside: What does this mean to you that these these concerns, I mean.<\/p>\n<p>100<br \/>00:12:53.790 &#8211;&gt; 00:13:02.430<br \/>Andy Whiteside: First of all, I have my normal ransomware conversation ransomware to me is really just been a result, primarily, of all this bad stuff existed, now they had you know cryptocurrency and ways to get paid.<\/p>\n<p>101<br \/>00:13:02.850 &#8211;&gt; 00:13:11.400<br \/>Andy Whiteside: Then, if you&#8217;re the CEO today versus when you were three four years ago, how much more scared are you were you were you scared then.<\/p>\n<p>102<br \/>00:13:12.090 &#8211;&gt; 00:13:19.230<br \/>Ben Rogers: Oh, I was definitely scared, then I mean you know, healthcare, this was hitting healthcare, you know before I made the transition over to be in a sales engineer.<\/p>\n<p>103<br \/>00:13:19.830 &#8211;&gt; 00:13:24.210<br \/>Ben Rogers: These numbers are real and you know this bottom statistic that Java introduced.<\/p>\n<p>104<br \/>00:13:24.480 &#8211;&gt; 00:13:33.210<br \/>Ben Rogers: The 21 days of downtime he&#8217;s absolutely right, I mean for where I was at healthcare that would have destroyed the business they couldn&#8217;t have been down 21 days I mean you&#8217;re talking.<\/p>\n<p>105<br \/>00:13:34.140 &#8211;&gt; 00:13:42.870<br \/>Ben Rogers: You know neurosurgery stuff so that is an emergency world The other thing you know we&#8217;ve seen clients in the past and Andy you and I have worked on a couple of.<\/p>\n<p>106<br \/>00:13:43.200 &#8211;&gt; 00:13:54.600<br \/>Ben Rogers: Projects together on this we&#8217;re ransomware not only wiped out their production environment, but it went ahead and wiped out the backup environment where there was nothing left and the client had to start from zero.<\/p>\n<p>107<br \/>00:13:55.110 &#8211;&gt; 00:14:06.780<br \/>Ben Rogers: from scratch right So these are all real world scenarios and the you know what keeps people up at night and so i&#8217;m glad to see that our company is addressing some of this and.<\/p>\n<p>108<br \/>00:14:07.050 &#8211;&gt; 00:14:16.200<br \/>Ben Rogers: and bringing some real world solutions to this, because these statistics are not made up they&#8217;re real and they&#8217;re staggering and they&#8217;re growing I mean this is not going away.<\/p>\n<p>109<br \/>00:14:16.860 &#8211;&gt; 00:14:32.520<br \/>Ben Rogers: The the bad guys are getting smarter and the good guys, are they always seem to me to be in reactive mode and trying to flip the script and being proactive, which is what some of these tools are going to do is a great thing, so I mean I applaud but yeah it scared me then scares me now.<\/p>\n<p>110<br \/>00:14:33.600 &#8211;&gt; 00:14:40.470<br \/>Ben Rogers: How you handle it, you know man, make sure you got your backups going and so these techniques that john has been talking about built into our systems.<\/p>\n<p>111<br \/>00:14:42.300 &#8211;&gt; 00:14:44.250<br \/>Andy Whiteside: And it highlights here in the very next statement that.<\/p>\n<p>112<br \/>00:14:44.340 &#8211;&gt; 00:14:54.270<br \/>Andy Whiteside: This is all targeted at unstructured data, where we can those bad guys can get there, get their hooks in and wait for the right moment to be called upon next key.<\/p>\n<p>113<br \/>00:14:54.570 &#8211;&gt; 00:14:59.400<br \/>Ben Rogers: yeah now let&#8217;s talk about I do have a comment on the unstructured data unstructured data.<\/p>\n<p>114<br \/>00:14:59.880 &#8211;&gt; 00:15:10.980<br \/>Ben Rogers: people think about shares and stuff like that, but there are some database systems that use image files and if that application was written before the days of blob and some of the you know.<\/p>\n<p>115<br \/>00:15:11.400 &#8211;&gt; 00:15:21.300<br \/>Ben Rogers: object storage that&#8217;s out now, you could have a database engine that is pointing to flat files we call it flat file back in the day, not unstructured data.<\/p>\n<p>116<br \/>00:15:22.200 &#8211;&gt; 00:15:29.490<br \/>Ben Rogers: But that was a worry for me, because I was like Okay, you have these images that are being produced by the database engine.<\/p>\n<p>117<br \/>00:15:29.910 &#8211;&gt; 00:15:35.520<br \/>Ben Rogers: But they&#8217;re not necessarily stored in the database engine or the storage that&#8217;s doing the database engine.<\/p>\n<p>118<br \/>00:15:35.790 &#8211;&gt; 00:15:39.510<br \/>Ben Rogers: they&#8217;re being stored out here on some kind of unc path that the.<\/p>\n<p>119<br \/>00:15:39.750 &#8211;&gt; 00:15:49.980<br \/>Ben Rogers: database is aware of it can call but that to me, I considered that unstructured data, and that was one of the big things that I was scared of is that you would have a ransomware attack.<\/p>\n<p>120<br \/>00:15:50.190 &#8211;&gt; 00:15:57.870<br \/>Ben Rogers: And those storage silos that might not necessarily meet your database engines, but guess what when a doctor goes and pulls up that image.<\/p>\n<p>121<br \/>00:15:58.110 &#8211;&gt; 00:16:01.980<br \/>Ben Rogers: And it&#8217;s sitting there going we can&#8217;t find whack whack you and see fat that up.<\/p>\n<p>122<br \/>00:16:02.190 &#8211;&gt; 00:16:15.150<br \/>Ben Rogers: That that&#8217;s you know some of the things that scared me so when we talk about those structured data just don&#8217;t assume that it&#8217;s shares these could be legacy Apps that have pointers in them that call out to unstructured data yeah.<\/p>\n<p>123<br \/>00:16:15.510 &#8211;&gt; 00:16:16.170<br \/>Jirah Cox: that&#8217;s a good appointment.<\/p>\n<p>124<br \/>00:16:18.360 &#8211;&gt; 00:16:27.420<br \/>Andy Whiteside: So gyro walk us through this next little section talking a little bit about what new tonics has done up till now, to help with unstructured data as part of its overarching operating system.<\/p>\n<p>125<br \/>00:16:27.660 &#8211;&gt; 00:16:37.080<br \/>Andy Whiteside: Storage operating system which, by the way, runs on multiple hypervisor Acropolis hypervisor being one being were being one what what is new tonics done up to this point.<\/p>\n<p>126<br \/>00:16:37.800 &#8211;&gt; 00:16:45.330<br \/>Jirah Cox: Sure, so yeah I mean everything we&#8217;re talking about comes over and above right some of the basics that we&#8217;ve had for a long, long time right around.<\/p>\n<p>127<br \/>00:16:45.750 &#8211;&gt; 00:16:56.850<br \/>Jirah Cox: antivirus integration for like pick your favorite antivirus scanning engine that can then come over and scan our shares, we can like notified when new files get written notified when people want to do a file access.<\/p>\n<p>128<br \/>00:16:58.620 &#8211;&gt; 00:16:59.670<br \/>Jirah Cox: You can of course block.<\/p>\n<p>129<br \/>00:17:01.170 &#8211;&gt; 00:17:11.820<br \/>Jirah Cox: undesirable file extensions right you keep people from storing you know, in that, in that 54 gig mountain of data in 1999 right, you know no MP3 collections right no rip CDs.<\/p>\n<p>130<br \/>00:17:13.290 &#8211;&gt; 00:17:18.630<br \/>Jirah Cox: As well as, of course, data snapshots right so of course fully agree with Ben right you don&#8217;t want to have your backups in order.<\/p>\n<p>131<br \/>00:17:19.650 &#8211;&gt; 00:17:24.570<br \/>Jirah Cox: test them regularly monitor for change rates hopefully at the moment i&#8217;m kind of an immutable platform.<\/p>\n<p>132<br \/>00:17:25.170 &#8211;&gt; 00:17:35.880<br \/>Jirah Cox: But we also ideally want to help you never need them either right if we can recover from a snapshot on the primary storage that&#8217;s when we faster than having to hold that back from the backup tier as well, so.<\/p>\n<p>133<br \/>00:17:36.870 &#8211;&gt; 00:17:43.530<br \/>Jirah Cox: Those snapshots also are in play, these are all just things that that files, I think, either launched with or got very, very quickly after.<\/p>\n<p>134<br \/>00:17:44.400 &#8211;&gt; 00:17:54.660<br \/>Jirah Cox: Last year, we also launched data lens right which does cloud based analytics of the data itself looking for things like ransomware signatures primarily for that launch.<\/p>\n<p>135<br \/>00:17:55.710 &#8211;&gt; 00:18:01.380<br \/>Jirah Cox: file extension based which is we&#8217;ll talk about you know is is something it might be slightly.<\/p>\n<p>136<br \/>00:18:02.400 &#8211;&gt; 00:18:08.310<br \/>Jirah Cox: imperfect or not all encompassing right we&#8217;ll get into more more advanced section we&#8217;ve got now but yeah.<\/p>\n<p>137<br \/>00:18:09.240 &#8211;&gt; 00:18:17.910<br \/>Jirah Cox: ransomware detection powered by cloud by data lens in the cloud looking at file extensions to help identify things more quickly, so we can alert on them, and you can react to them faster.<\/p>\n<p>138<br \/>00:18:19.170 &#8211;&gt; 00:18:23.490<br \/>Andy Whiteside: Now is that you jumping into the four dot one behavior of data lens.<\/p>\n<p>139<br \/>00:18:23.550 &#8211;&gt; 00:18:24.480<br \/>Jirah Cox: or sure can yeah.<\/p>\n<p>140<br \/>00:18:24.750 &#8211;&gt; 00:18:25.380<br \/>Andy Whiteside: yeah okay.<\/p>\n<p>141<br \/>00:18:25.440 &#8211;&gt; 00:18:27.510<br \/>Jirah Cox: yeah so with this with four dot one recent.<\/p>\n<p>142<br \/>00:18:28.800 &#8211;&gt; 00:18:41.310<br \/>Jirah Cox: files update this lots of then now also do even deeper analysis, so we can actually look into the data streams themselves and detect a this file, even if the extension is not changed actually has changed and now.<\/p>\n<p>143<br \/>00:18:42.420 &#8211;&gt; 00:18:50.940<br \/>Jirah Cox: is exhibiting indicators that are probably indicate ransomware right, so you can alert on that, even within the file decision falcons itself doesn&#8217;t change.<\/p>\n<p>144<br \/>00:18:52.050 &#8211;&gt; 00:18:57.660<br \/>Jirah Cox: As well as behavior analysis right around hey, this is the wrong time of day for this many files to be getting touched, this is the wrong.<\/p>\n<p>145<br \/>00:18:59.190 &#8211;&gt; 00:19:03.570<br \/>Jirah Cox: Perhaps unusual user activity right for this account to be touching.<\/p>\n<p>146<br \/>00:19:08.610 &#8211;&gt; 00:19:09.660<br \/>Andy Whiteside: Sorry guys I lose you.<\/p>\n<p>147<br \/>00:19:10.230 &#8211;&gt; 00:19:10.920<br \/>Jirah Cox: Different we&#8217;re here.<\/p>\n<p>148<br \/>00:19:11.310 &#8211;&gt; 00:19:12.930<br \/>Andy Whiteside: I moved my desk I sat down and.<\/p>\n<p>149<br \/>00:19:12.990 &#8211;&gt; 00:19:15.720<br \/>Andy Whiteside: All right, then you start speaking, I wonder if I miss things that.<\/p>\n<p>150<br \/>00:19:17.160 &#8211;&gt; 00:19:18.930<br \/>Jirah Cox: I can keep going so we&#8217;re all in in through.<\/p>\n<p>151<br \/>00:19:20.250 &#8211;&gt; 00:19:25.170<br \/>Jirah Cox: configurable remediation policies right so like once we detect this, how do we want to respond right, and this is always.<\/p>\n<p>152<br \/>00:19:26.190 &#8211;&gt; 00:19:33.900<br \/>Jirah Cox: A little bit of a cultural decision for every customer, but you know, usually i&#8217;d recommend take a stronger stance right go ahead and block a session terminates sessions.<\/p>\n<p>153<br \/>00:19:34.830 &#8211;&gt; 00:19:42.060<br \/>Jirah Cox: cut a user off from from perhaps SMB access or no final sessions block the IP address let them call the help desk.<\/p>\n<p>154<br \/>00:19:42.540 &#8211;&gt; 00:19:51.630<br \/>Jirah Cox: You know apologize to them say sorry what you were doing with like ransomware versus take a softer stance and like alert someone but maybe that looking at their email inbox for the next hour.<\/p>\n<p>155<br \/>00:19:52.890 &#8211;&gt; 00:20:07.230<br \/>Jirah Cox: You know don&#8217;t wait for a human, to respond to that threat, be a little bit more proactive, you know if it does, you know Bruce and feelings better to prevent something that might have the indicators of malware versus versus a softer stance and.<\/p>\n<p>156<br \/>00:20:07.260 &#8211;&gt; 00:20:13.260<br \/>Andy Whiteside: jarrod was this all new tannic development in the product or are these things that you bought through other companies and added.<\/p>\n<p>157<br \/>00:20:13.650 &#8211;&gt; 00:20:16.080<br \/>Jirah Cox: I think it&#8217;s all 100% organic yeah.<\/p>\n<p>158<br \/>00:20:16.680 &#8211;&gt; 00:20:18.600<br \/>Andy Whiteside: But I love that because That just shows that.<\/p>\n<p>159<br \/>00:20:19.710 &#8211;&gt; 00:20:30.120<br \/>Andy Whiteside: Even though well, I was gonna okay i&#8217;ll say it, you know file storage and it&#8217;s not the sexiest thing, however, security around fast file storage is you know, one of the hottest topics out there.<\/p>\n<p>160<br \/>00:20:31.470 &#8211;&gt; 00:20:49.260<br \/>Andy Whiteside: It just shows that you guys, have you have a platform, but you&#8217;re investing in extending that platform that again goes back to cloud use cases hybrid cloud use cases private data centers semi private data centers you know the same feature sets going to work, no matter where you&#8217;re landing.<\/p>\n<p>161<br \/>00:20:51.090 &#8211;&gt; 00:20:53.010<br \/>Jirah Cox: Like yeah hundred percent right it&#8217;s part of the.<\/p>\n<p>162<br \/>00:20:53.580 &#8211;&gt; 00:21:07.350<br \/>Jirah Cox: Enhanced value of the Platform right now trying to be a single you know one trick pony around like just desktops or just you know minimally viable file shares, but like what are we really need to run this for rich enterprise right with security controls that respond to real world situations.<\/p>\n<p>163<br \/>00:21:08.640 &#8211;&gt; 00:21:09.450<br \/>Andy Whiteside: Then you&#8217;re going to come in.<\/p>\n<p>164<br \/>00:21:09.540 &#8211;&gt; 00:21:20.490<br \/>Ben Rogers: yeah I mean one of the things that I think is so crucial about this article is one of the first things he says is that some of these exploits are getting past firewalls some of the first layer defenses.<\/p>\n<p>165<br \/>00:21:20.850 &#8211;&gt; 00:21:24.150<br \/>Ben Rogers: So you know somebody gets an email, and it gets to the email server I mean.<\/p>\n<p>166<br \/>00:21:24.690 &#8211;&gt; 00:21:31.950<br \/>Ben Rogers: Our users might not be aware of that these things are happening so having some of these additional remediation processes in the background, like.<\/p>\n<p>167<br \/>00:21:32.310 &#8211;&gt; 00:21:39.510<br \/>Ben Rogers: Are we seeing 10,000 files being encrypted at midnight on a Friday night when nobody&#8217;s in the office that&#8217;s that&#8217;s something that you know.<\/p>\n<p>168<br \/>00:21:40.230 &#8211;&gt; 00:21:48.000<br \/>Ben Rogers: cios and it directors are going to get a grip on because they might not have a lens on they might be enjoying your weekend or whatever so.<\/p>\n<p>169<br \/>00:21:48.300 &#8211;&gt; 00:21:58.590<br \/>Ben Rogers: Again, when you read the article in totality you&#8217;ll realize that it&#8217;s just a combination of multiple things it creates a secure environment, and this is just one cog in that wheel.<\/p>\n<p>170<br \/>00:21:58.830 &#8211;&gt; 00:22:09.390<br \/>Ben Rogers: i&#8217;m glad we&#8217;re developing it, because things do get past the firewalls things do get past, you know email security and so having this safety net at the storage level is awesome.<\/p>\n<p>171<br \/>00:22:10.110 &#8211;&gt; 00:22:11.970<br \/>Jirah Cox: Totally I mean and you mentioned how.<\/p>\n<p>172<br \/>00:22:13.290 &#8211;&gt; 00:22:20.250<br \/>Jirah Cox: In your mind, like the the rise of ransomware tied in with like the method of payment right so cryptocurrency kind of fosters.<\/p>\n<p>173<br \/>00:22:20.670 &#8211;&gt; 00:22:26.760<br \/>Jirah Cox: ransomware I think it&#8217;s totally valid I think it&#8217;s one of like eight different things that all sort of enabled the rise of ransomware right.<\/p>\n<p>174<br \/>00:22:27.660 &#8211;&gt; 00:22:37.920<br \/>Jirah Cox: Strong encryption right Sir encryption being able to be offloaded to like a consumer grade cpu right because it&#8217;s all done on the user&#8217;s workstation right, but they have a great cpu that can do strong ciphers.<\/p>\n<p>175<br \/>00:22:39.870 &#8211;&gt; 00:22:48.270<br \/>Jirah Cox: Encryption in general, being a good thing right that we can do strong encryption like for end users, because all the wrestlers doing right it&#8217;s just automating things the user has permission to do.<\/p>\n<p>176<br \/>00:22:49.560 &#8211;&gt; 00:23:03.510<br \/>Jirah Cox: The user getting too much visibility to too much data right 20 years ago 1989 most of that user&#8217;s data, even if there was a 54 gig you know aggregate file share for users, there was way more data on people&#8217;s desktops right but encrypting woman&#8217;s desktop.<\/p>\n<p>177<br \/>00:23:05.070 &#8211;&gt; 00:23:13.890<br \/>Jirah Cox: was kind of a less valuable target that desktop was more like more likely to just define up die anyway right like that you know workstations were just the thing they were always in the shop.<\/p>\n<p>178<br \/>00:23:15.750 &#8211;&gt; 00:23:23.430<br \/>Jirah Cox: Back then, so as a result, data migrated to the data Center right, so all the data moved into user shares home shares application shares team shares.<\/p>\n<p>179<br \/>00:23:24.750 &#8211;&gt; 00:23:29.880<br \/>Jirah Cox: On the NASA so then that put kind of more eggs in a more valuable basket right so ransomware so hey I can hit more.<\/p>\n<p>180<br \/>00:23:31.200 &#8211;&gt; 00:23:31.980<br \/>Jirah Cox: effectively.<\/p>\n<p>181<br \/>00:23:34.320 &#8211;&gt; 00:23:41.460<br \/>Jirah Cox: And then of course yeah speed of the modern cpu right so like it got a perfect storm ransomware was almost like in some ways it&#8217;s almost a.<\/p>\n<p>182<br \/>00:23:42.810 &#8211;&gt; 00:23:49.260<br \/>Jirah Cox: perfect example for bad automation we talked about you know it&#8217;s definitely automation start to finish right with lots of resilient error handling.<\/p>\n<p>183<br \/>00:23:50.670 &#8211;&gt; 00:23:54.720<br \/>Jirah Cox: But you know orchestration automation at the desktop level nonetheless yeah.<\/p>\n<p>184<br \/>00:23:55.830 &#8211;&gt; 00:24:02.070<br \/>Andy Whiteside: Well, this next section talks about right once read many which I.<\/p>\n<p>185<br \/>00:24:02.190 &#8211;&gt; 00:24:04.740<br \/>Andy Whiteside: Think comes from the s3 world you.<\/p>\n<p>186<br \/>00:24:04.800 &#8211;&gt; 00:24:13.080<br \/>Andy Whiteside: clarify that, for me, if you would I I will point out the acronym of worm which insecurity terms has historically to me mean like a bad thing.<\/p>\n<p>187<br \/>00:24:14.070 &#8211;&gt; 00:24:24.780<br \/>Andy Whiteside: Now we&#8217;re talking about worm also being reused again as an acronym to mean a good thing jarrod what what is right once read many and my correct that came out of the s3 concept or am I wrong.<\/p>\n<p>188<br \/>00:24:26.700 &#8211;&gt; 00:24:33.060<br \/>Jirah Cox: about it probably predated that right, because I can think of a couple of like backup applications even back in like the tape days.<\/p>\n<p>189<br \/>00:24:33.120 &#8211;&gt; 00:24:33.420<br \/>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0920\u0940\u0915 \u0939\u0948\u0964<\/p>\n<p>190<br \/>00:24:33.480 &#8211;&gt; 00:24:39.450<br \/>Jirah Cox: That would have operated like honestly most tape backups were sort of a right once read many construct.<\/p>\n<p>191<br \/>00:24:40.950 &#8211;&gt; 00:24:48.120<br \/>Jirah Cox: But but yeah it going back like a security model like what if we can take away from a vast set of users.<\/p>\n<p>192<br \/>00:24:48.990 &#8211;&gt; 00:24:56.640<br \/>Jirah Cox: and apply that sort of minimal permissions need to do their job and what if that includes deleting files right, can you maybe you need to be able to create files, but not delete files.<\/p>\n<p>193<br \/>00:24:57.300 &#8211;&gt; 00:25:05.460<br \/>Jirah Cox: or change files, which is what ransomware wants to do so, taking that away if that&#8217;s viable and a good option for for your company then it&#8217;s a great.<\/p>\n<p>194<br \/>00:25:06.060 &#8211;&gt; 00:25:13.590<br \/>Jirah Cox: problem solver right to say you know, maybe I can change a file for 10 minutes after I created, but after that maybe gets locked in, and now it can&#8217;t be.<\/p>\n<p>195<br \/>00:25:14.310 &#8211;&gt; 00:25:21.150<br \/>Jirah Cox: deleted, maybe by anybody or maybe only by like an administrator so that I can have more secure accounts that files could be deleted, if they needed to.<\/p>\n<p>196<br \/>00:25:22.320 &#8211;&gt; 00:25:23.730<br \/>Jirah Cox: kind of differentiating here between.<\/p>\n<p>197<br \/>00:25:24.930 &#8211;&gt; 00:25:31.740<br \/>Jirah Cox: You know enterprise mode versus like a true like legal legal compliance mode right we&#8217;re we&#8217;re kind of familiar with the concept of putting like a mailbox in a legal hold.<\/p>\n<p>198<br \/>00:25:32.190 &#8211;&gt; 00:25:38.400<br \/>Jirah Cox: fashion, so I can do the same thing with data right is it is it allowed to delete any data or it&#8217;s just really hard to delete any data.<\/p>\n<p>199<br \/>00:25:38.940 &#8211;&gt; 00:25:42.600<br \/>Andy Whiteside: And you know, maybe this is where i&#8217;m naive here so.<\/p>\n<p>200<br \/>00:25:42.900 &#8211;&gt; 00:25:54.240<br \/>Andy Whiteside: When it comes to the ransomware stuff are we taking the data letting it stay there, and encrypting it, or are we, the leading it and making the accessibility to get back to it encrypted what what, what do you ransomware folks typically do.<\/p>\n<p>201<br \/>00:25:54.870 &#8211;&gt; 00:25:57.000<br \/>Jirah Cox: So, usually most ransomware is going to.<\/p>\n<p>202<br \/>00:25:58.500 &#8211;&gt; 00:26:09.780<br \/>Jirah Cox: Take a given file like a word document andy&#8217;s favorite word document create another file that&#8217;s me andy&#8217;s favorite word document, maybe dot dot X, maybe Doc X dot bad extension here.<\/p>\n<p>203<br \/>00:26:10.440 &#8211;&gt; 00:26:14.730<br \/>Jirah Cox: but either way, creating a separate encrypted file and then deleting the original.<\/p>\n<p>204<br \/>00:26:15.240 &#8211;&gt; 00:26:24.960<br \/>Jirah Cox: Or maybe in some cases, doing an in place overwrite of that same file so such that the data is overwritten and only the encrypted data remains yeah in in either path.<\/p>\n<p>205<br \/>00:26:25.590 &#8211;&gt; 00:26:35.580<br \/>Jirah Cox: This kind of functionality to do right once read many the the either the update or delete gets blocked right the user, the user right bad actor ransomware.<\/p>\n<p>206<br \/>00:26:37.110 &#8211;&gt; 00:26:47.880<br \/>Jirah Cox: With the user credentials can either do the delete or can&#8217;t do the override to effectively destroy that data right and remove your copy of it, so the only the copier that remains yeah.<\/p>\n<p>207<br \/>00:26:48.510 &#8211;&gt; 00:26:54.390<br \/>Andy Whiteside: Okay, then thoughts on this technique Where are you guys using this where you came from, or.<\/p>\n<p>208<br \/>00:26:55.200 &#8211;&gt; 00:27:05.550<br \/>Andy Whiteside: Not in this like this version obviously you can extend have, at a time you haven&#8217;t enix but were you accomplished in this any other way or and I guess tape backup would be one of the ways we&#8217;ve done this through the years.<\/p>\n<p>209<br \/>00:27:05.550 &#8211;&gt; 00:27:18.960<br \/>Ben Rogers: yeah I mean man backing up to disk because there&#8217;s one way that we did we went back you know went to take to disk and then I think one comment I like to make about this particular part of the article was this idea of immutable backup.<\/p>\n<p>210<br \/>00:27:19.710 &#8211;&gt; 00:27:24.090<br \/>Ben Rogers: The back up not being able to be changed i&#8217;ve seen a lot of customers, as they go.<\/p>\n<p>211<br \/>00:27:24.390 &#8211;&gt; 00:27:36.330<br \/>Ben Rogers: we&#8217;re going to do on Prem backups for so many days are private cloud backups and the correct my my verbiage here private cloud backups for so many days, but then we want to tear those back ups off to cloud.<\/p>\n<p>212<br \/>00:27:36.630 &#8211;&gt; 00:27:44.970<br \/>Ben Rogers: And a lot of people want those backups when they&#8217;re tearing off the cloud to be immutable where they cannot be changed, you know and that&#8217;s the start of the Dr bcp.<\/p>\n<p>213<br \/>00:27:45.660 &#8211;&gt; 00:27:56.730<br \/>Ben Rogers: scenario so it&#8217;s been interesting to me and come to the side of the fence and here people go, you know what my backups go from private cloud public cloud we want them to be warm it stays.<\/p>\n<p>214<br \/>00:27:56.970 &#8211;&gt; 00:28:06.060<br \/>Ben Rogers: immutable no changes done told me when we will make sure that there are changes to be done so that&#8217;s where this has come up a lot for me and my conversations with my customers today.<\/p>\n<p>215<br \/>00:28:08.430 &#8211;&gt; 00:28:16.140<br \/>Andy Whiteside: Well, I, like you went down for the new article and brought up immutable and it&#8217;s just a smarter way to do immutable store drain.<\/p>\n<p>216<br \/>00:28:19.890 &#8211;&gt; 00:28:20.280<br \/>Andy Whiteside: My other than.<\/p>\n<p>217<br \/>00:28:20.340 &#8211;&gt; 00:28:32.670<br \/>Ben Rogers: That correct my opinion, yes, know that diary he&#8217;s the expert here but yeah if I was sitting in a another CIO role where I was responsible for the operations and, more importantly, getting the operations back up with.<\/p>\n<p>218<br \/>00:28:33.120 &#8211;&gt; 00:28:42.780<br \/>Ben Rogers: srp oh past are to this would be definitely something that I would be interested in, or if I was going to make that break where now i&#8217;m going to take my health care data.<\/p>\n<p>219<br \/>00:28:43.290 &#8211;&gt; 00:28:56.310<br \/>Ben Rogers: Which is hipaa protected and I need to ensure that it put it in a public area, even though it&#8217;s still my tenant and I should have access to it, I would want some kind of protection, ensure that that cannot be changed, was it broke that that barrier.<\/p>\n<p>220<br \/>00:28:57.330 &#8211;&gt; 00:29:04.170<br \/>Jirah Cox: yeah in my mind yeah immutability and worm really as a lot of overlap on the venn diagram right.<\/p>\n<p>221<br \/>00:29:05.880 &#8211;&gt; 00:29:16.950<br \/>Jirah Cox: That ability to save this file set can be touched can be changed until it ages out and hit some defined retention threshold right so yeah hundred percent just great label for some capability.<\/p>\n<p>222<br \/>00:29:19.050 &#8211;&gt; 00:29:23.940<br \/>Andy Whiteside: So this next section talks about multiple file server client networks.<\/p>\n<p>223<br \/>00:29:25.200 &#8211;&gt; 00:29:27.450<br \/>Andy Whiteside: gyro us and help us understand what this means.<\/p>\n<p>224<br \/>00:29:27.840 &#8211;&gt; 00:29:35.370<br \/>Jirah Cox: Totally so so some customers let&#8217;s say your service service provider, with a bunch of tenants that each have their own network that can&#8217;t talk to one another.<\/p>\n<p>225<br \/>00:29:36.930 &#8211;&gt; 00:29:46.320<br \/>Jirah Cox: In the before times right on like files for that oh and prior you would have to deploy a different files cluster right because you can X files is a cluster of virtual machines.<\/p>\n<p>226<br \/>00:29:47.610 &#8211;&gt; 00:29:50.550<br \/>Jirah Cox: You deploy a different cluster into each of those different networks.<\/p>\n<p>227<br \/>00:29:51.780 &#8211;&gt; 00:29:57.180<br \/>Jirah Cox: For each of those different tenants right which is totally fine very valid easy to size for.<\/p>\n<p>228<br \/>00:29:58.530 &#8211;&gt; 00:30:11.640<br \/>Jirah Cox: One objection, we would send us here is like well that&#8217;s a whole lot of compute a lot of cpu larger number of virtual machines given right every if I have a small tenant itself to deploy like three of these virtual machines to run the file services for that tenant.<\/p>\n<p>229<br \/>00:30:12.660 &#8211;&gt; 00:30:18.540<br \/>Jirah Cox: So this is more of a shared computer, but still network isolation approach to say I can run one cluster of.<\/p>\n<p>230<br \/>00:30:19.380 &#8211;&gt; 00:30:32.010<br \/>Jirah Cox: file server vm 119 X files deployment that I can then give different legs on the network right into multiple tenant environments and then even further restricted to say that if i&#8217;m coming from network, a I can only see shares a.<\/p>\n<p>231<br \/>00:30:32.790 &#8211;&gt; 00:30:45.120<br \/>Jirah Cox: Network beacon Lacey shares be and it&#8217;s still a shared compute environment right it&#8217;s only one set of FSB albums faster review comes to run all the different environments, but each tenant only sees their data yeah.<\/p>\n<p>232<br \/>00:30:45.600 &#8211;&gt; 00:30:53.520<br \/>Andy Whiteside: Not makes tons of sense, you would want this shared shared storage environment, but you would want to make sure people only saw what they had.<\/p>\n<p>233<br \/>00:30:54.630 &#8211;&gt; 00:31:03.300<br \/>Andy Whiteside: It really helps you in Ecstasy, they could only get to not solve but get access to what they use the network layer talk to what they have access to.<\/p>\n<p>234<br \/>00:31:03.690 &#8211;&gt; 00:31:14.790<br \/>Jirah Cox: Which is the same as it was before, but now we&#8217;re helping you run leaner as a service provider right or get more bang, for your buck out of the hardware you&#8217;re going to run these beams on right you leave more resources, free to do other workloads.<\/p>\n<p>235<br \/>00:31:15.360 &#8211;&gt; 00:31:27.690<br \/>Andy Whiteside: What was it called in the new dynamics of the Novell world where we hid shares will get hide shares from people and then Microsoft adopted that maybe 2012 timeframe of what it was that called you remember.<\/p>\n<p>236<br \/>00:31:28.020 &#8211;&gt; 00:31:30.000<br \/>Jirah Cox: Access based enumeration access.<\/p>\n<p>237<br \/>00:31:30.030 &#8211;&gt; 00:31:31.350<br \/>Andy Whiteside: yeah access based integration a.<\/p>\n<p>238<br \/>00:31:31.500 &#8211;&gt; 00:31:41.070<br \/>Jirah Cox: Man but it&#8217;s yeah cuz I remember, I worked in places where that like wasn&#8217;t turned on and you could see 500 file 500 directories under the share, but you can only touch two of them.<\/p>\n<p>239<br \/>00:31:41.550 &#8211;&gt; 00:31:51.810<br \/>Jirah Cox: Right and we tried to open any of the other ones you got an error right and access based enumeration which we also support it&#8217;s not really a security feature it&#8217;s one of the obscurity feature right.<\/p>\n<p>240<br \/>00:31:52.890 &#8211;&gt; 00:31:57.540<br \/>Jirah Cox: says, if I can only open to have them only show me those to not show me the 500 yeah.<\/p>\n<p>241<br \/>00:31:58.290 &#8211;&gt; 00:32:09.090<br \/>Andy Whiteside: yeah well and then at this point, I mean real security, especially if you said there were guys and they&#8217;re not wrong in this case starts at the network level if you can&#8217;t get there, then you have security.<\/p>\n<p>242<br \/>00:32:09.570 &#8211;&gt; 00:32:10.890<br \/>Jirah Cox: yeah yeah hundred percent.<\/p>\n<p>243<br \/>00:32:12.330 &#8211;&gt; 00:32:12.690<br \/>Ben Rogers: Okay.<\/p>\n<p>244<br \/>00:32:13.530 &#8211;&gt; 00:32:25.800<br \/>Andy Whiteside: The last paragraph, talks about those intent on unleashing malicious activities will continue to find strategies we just got to keep blocking them where we can and think proactively about where they&#8217;re going next.<\/p>\n<p>245<br \/>00:32:26.910 &#8211;&gt; 00:32:35.340<br \/>Andy Whiteside: You know what somebody wants to do harm they will find ways, but we need to turn off their basic ways they can get to us.<\/p>\n<p>246<br \/>00:32:35.520 &#8211;&gt; 00:32:49.380<br \/>Jirah Cox: Totally right, I mean Defense in depth applies to literally everything here right from you know, if at all possible, you know rewrite your URLs scan your incoming email block your outbound DNS so that you can&#8217;t even do look ups to get to you know bad places.<\/p>\n<p>247<br \/>00:32:51.180 &#8211;&gt; 00:33:01.230<br \/>Jirah Cox: But then let&#8217;s say the external is running on one of your desktops then if they can&#8217;t get there at like the layer three level that&#8217;s a good step if they can get there but they can&#8217;t enumerate that&#8217;s another good step.<\/p>\n<p>248<br \/>00:33:01.680 &#8211;&gt; 00:33:10.170<br \/>Jirah Cox: If they can see the file, but then that information to the directory again least possible permissions for a user role, then that&#8217;s a good thing.<\/p>\n<p>249<br \/>00:33:10.740 &#8211;&gt; 00:33:21.900<br \/>Jirah Cox: But then, if they can still see and touch the file Well then, if it doesn&#8217;t really need to be a file that allows updates, well then worm as well, so we&#8217;ve got a whole bunch of bunch of layers in that in that thread bottle yeah.<\/p>\n<p>250<br \/>00:33:21.930 &#8211;&gt; 00:33:30.390<br \/>Andy Whiteside: Well, I think Ben hit on this, a minute ago or in the beginning, that it&#8217;s lots of different approaches all coming together to form a solution.<\/p>\n<p>251<br \/>00:33:30.900 &#8211;&gt; 00:33:41.910<br \/>Andy Whiteside: And then I keep harping you know ubiquitously across multiple platforms, no matter where it is your cloud and your data Center your partner data Center and your pillow you know it&#8217;s all clouds at that point.<\/p>\n<p>252<br \/>00:33:43.020 &#8211;&gt; 00:33:54.690<br \/>Ben Rogers: funny at all i&#8217;ll jump on a funny bandwagon here with us, we kind of get to the end of this one of the things I get asked all the time come in new tannic says oh I hate Sky was dead, you know.<\/p>\n<p>253<br \/>00:33:55.710 &#8211;&gt; 00:34:02.130<br \/>Ben Rogers: Or, I thought you guys were storage company, you know a lot of customers think it was as a storage company or ACI what I look at him as.<\/p>\n<p>254<br \/>00:34:02.460 &#8211;&gt; 00:34:08.490<br \/>Ben Rogers: An ACI might be dead storage might be be dead, but what&#8217;s more important than anything is data management.<\/p>\n<p>255<br \/>00:34:08.910 &#8211;&gt; 00:34:19.920<br \/>Ben Rogers: And that&#8217;s really where some of these tools come into play is you know yeah yeah we can run it on the platform, but the platform doesn&#8217;t have to be physical, it can be hurtful it can be you know in third party data Center.<\/p>\n<p>256<br \/>00:34:20.430 &#8211;&gt; 00:34:30.060<br \/>Ben Rogers: we&#8217;re looking at tools that will allow you to manage that data set and ensure that that data set is operational and restorable if needed and multiple facets.<\/p>\n<p>257<br \/>00:34:30.480 &#8211;&gt; 00:34:38.940<br \/>Ben Rogers: I want to come in and one part of this article that we kind of glazed over is when I was in a managerial role, and I was responsible for these things.<\/p>\n<p>258<br \/>00:34:39.360 &#8211;&gt; 00:34:50.910<br \/>Ben Rogers: I selected the nist cybersecurity framework to model my framework around as far as you know, being able to remediate problems and how I go to make sure the environment is healthy and stay healthy.<\/p>\n<p>259<br \/>00:34:51.270 &#8211;&gt; 00:35:05.160<br \/>Ben Rogers: And part of this article addresses that man, and you know they they set they are looking at how this does things and trying to make sure that we can accomplish those things and that&#8217;s you know identify protect detect respond and recover.<\/p>\n<p>260<br \/>00:35:05.520 &#8211;&gt; 00:35:13.170<br \/>Ben Rogers: And if you know organizations are looking to meet those goals and that&#8217;s what they&#8217;ve set out to do, from an IP level and a business level.<\/p>\n<p>261<br \/>00:35:13.470 &#8211;&gt; 00:35:23.970<br \/>Ben Rogers: Our products really fall into that because we&#8217;re following those models and we&#8217;re making sure that those models are being met in our product set so I mean, I was pleased to see that when I read this.<\/p>\n<p>262<br \/>00:35:24.150 &#8211;&gt; 00:35:35.430<br \/>Ben Rogers: Today, that we had included a little bit of a blurb of we can help you get to a nist framework platform and and that&#8217;s that&#8217;s ministers, a lot, you know, and so I didn&#8217;t want to glaze over that.<\/p>\n<p>263<br \/>00:35:36.750 &#8211;&gt; 00:35:45.570<br \/>Ben Rogers: Another question I have you know we sell our based product does this technology come with our base product or just require.<\/p>\n<p>264<br \/>00:35:45.990 &#8211;&gt; 00:35:58.680<br \/>Ben Rogers: Additional licensing educate me, as you know what could have been a future customer now and employee trying to understand our licensing Where does this fit in our product set and how to our customers take advantage of this so.<\/p>\n<p>265<br \/>00:35:58.710 &#8211;&gt; 00:36:07.530<br \/>Andy Whiteside: been real quick for you go there, though, the fact that you know you haven&#8217;t done this standard that you go by that&#8217;s important, I hope, most companies have something that they&#8217;re that is their target, you know the go by.<\/p>\n<p>266<br \/>00:36:08.940 &#8211;&gt; 00:36:12.060<br \/>Andy Whiteside: The fact that you brought up credit lost my thought here.<\/p>\n<p>267<br \/>00:36:13.620 &#8211;&gt; 00:36:16.890<br \/>Andy Whiteside: The people think hyper convergence did have converged is not dead.<\/p>\n<p>268<br \/>00:36:17.430 &#8211;&gt; 00:36:21.930<br \/>Andy Whiteside: It is happening, whether you know it or not, and it&#8217;s obscured from you that&#8217;s that&#8217;s the thing I mean.<\/p>\n<p>269<br \/>00:36:22.140 &#8211;&gt; 00:36:28.200<br \/>Andy Whiteside: it&#8217;s become such the status quo behind the scenes that you think you&#8217;re getting some as a service been through there.<\/p>\n<p>270<br \/>00:36:28.440 &#8211;&gt; 00:36:39.060<br \/>Andy Whiteside: But if you&#8217;re building out your own or you&#8217;re planning your own companies destiny you better realize is still there and not think that you don&#8217;t need it because it only enables those things you&#8217;re going to do next, but you gotta have it if we get the next.<\/p>\n<p>271<br \/>00:36:39.360 &#8211;&gt; 00:36:47.850<br \/>Ben Rogers: Oh, I totally agree, I mean i&#8217;m sure there&#8217;s a lot of hyper convergence of these big data Center it means these cloud providers it&#8217;s just you know customers.<\/p>\n<p>272<br \/>00:36:48.660 &#8211;&gt; 00:36:52.080<br \/>Ben Rogers: You know, they want to challenges, so when I come back to you know yeah.<\/p>\n<p>273<br \/>00:36:52.380 &#8211;&gt; 00:37:00.780<br \/>Ben Rogers: Where I for converges company we&#8217;re storage company, we can do all those things, but more importantly we&#8217;re looking at data management and how can we make sure your data is available to you.<\/p>\n<p>274<br \/>00:37:01.110 &#8211;&gt; 00:37:09.990<br \/>Ben Rogers: And if something happens to it out quickly, can we get back the rpm in our to is always interesting conversation to have with it leadership.<\/p>\n<p>275<br \/>00:37:11.010 &#8211;&gt; 00:37:15.540<br \/>Andy Whiteside: So gyro who gets it who owns it who owns files for dot one that we&#8217;ve been talking about the last hour.<\/p>\n<p>276<br \/>00:37:15.930 &#8211;&gt; 00:37:17.580<br \/>Jirah Cox: yeah if you&#8217;re running an engine X cluster.<\/p>\n<p>277<br \/>00:37:18.750 &#8211;&gt; 00:37:26.220<br \/>Jirah Cox: Virtually every cluster in under the sun is licensed for its first tip which is like a terabyte but it&#8217;s based to versus base 10.<\/p>\n<p>278<br \/>00:37:27.540 &#8211;&gt; 00:37:30.750<br \/>Jirah Cox: But really close things we were you know engineers going to engineer.<\/p>\n<p>279<br \/>00:37:31.860 &#8211;&gt; 00:37:41.340<br \/>Jirah Cox: You can you can definitely try this out today on your cluster when you click to deploy files in prism right it&#8217;s an automated procedure for you just asked you for like some IP addresses.<\/p>\n<p>280<br \/>00:37:41.700 &#8211;&gt; 00:37:47.970<br \/>Jirah Cox: For what can it can assign there it&#8217;ll actually pull down the latest files at that time, so you can just tell it deploys straight on to four dot one.<\/p>\n<p>281<br \/>00:37:49.290 &#8211;&gt; 00:38:03.690<br \/>Andy Whiteside: And Java does files follow your your right frequency scenarios, in other words if i&#8217;ve got a file that&#8217;s in files within new tactics, is it going to be written twice written three times the data associated with it, is that the hell works.<\/p>\n<p>282<br \/>00:38:03.810 &#8211;&gt; 00:38:11.550<br \/>Jirah Cox: yep yeah files falls under that you know rf to rf three user configurable data management model for right right all all.<\/p>\n<p>283<br \/>00:38:12.060 &#8211;&gt; 00:38:17.880<br \/>Jirah Cox: pieces of data twice or three times for resiliency and then also to probably what you&#8217;re also has an Anti about.<\/p>\n<p>284<br \/>00:38:18.690 &#8211;&gt; 00:38:32.220<br \/>Jirah Cox: Data tearing right so hot as data lives in the hottest storage in the cluster right so whether that&#8217;s ssd versus hd or envy me versus sst or even now like updating versus envy me, whatever it is hot as data can float to the hottest tier of storage.<\/p>\n<p>285<br \/>00:38:32.430 &#8211;&gt; 00:38:37.470<br \/>Andy Whiteside: And then metro clusters we&#8217;re going to have it redone that somewhere else, and then we&#8217;re also possibly going to back it up on site.<\/p>\n<p>286<br \/>00:38:38.520 &#8211;&gt; 00:38:40.560<br \/>Jirah Cox: And we get your replicated we can.<\/p>\n<p>287<br \/>00:38:41.580 &#8211;&gt; 00:38:41.820<br \/>Ben Rogers: tear.<\/p>\n<p>288<br \/>00:38:42.090 &#8211;&gt; 00:38:43.260<br \/>Jirah Cox: It up, we can recover it.<\/p>\n<p>289<br \/>00:38:43.410 &#8211;&gt; 00:38:45.060<br \/>Jirah Cox: All the above yeah.<\/p>\n<p>290<br \/>00:38:45.420 &#8211;&gt; 00:38:54.990<br \/>Ben Rogers: i&#8217;ve had some conversations with customers talking about tearing in these different cloud providers because guess what that exists there and you&#8217;re paying for you know speed, the.<\/p>\n<p>291<br \/>00:38:55.440 &#8211;&gt; 00:39:02.340<br \/>Ben Rogers: ability so some customers have come to us and said how can you help us provide a better model for data data management and our cloud providers.<\/p>\n<p>292<br \/>00:39:03.420 &#8211;&gt; 00:39:03.630<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>293<br \/>00:39:05.040 &#8211;&gt; 00:39:13.920<br \/>Andy Whiteside: yeah I mean you want to kind of control that destiny to you don&#8217;t just want to rely on whatever services they&#8217;re offering because then they control the narrative that point.<\/p>\n<p>294<br \/>00:39:15.300 &#8211;&gt; 00:39:23.580<br \/>Andy Whiteside: Well, gentlemen, I appreciate it it&#8217;s been a Monday and I snuck in a dental appointment, which, by the time yeah that till Monday I don&#8217;t know what happened to the day, but.<\/p>\n<p>295<br \/>00:39:24.210 &#8211;&gt; 00:39:29.310<br \/>Andy Whiteside: it&#8217;s over and we&#8217;ll got four more days for the week and i&#8217;m sure you guys have plenty to do so i&#8217;m gonna let you go.<\/p>\n<p>296<br \/>00:39:30.450 &#8211;&gt; 00:39:31.890<br \/>Jirah Cox: cool pleasure talking to you all, as always.<\/p>\n<p>297<br \/>00:39:32.310 &#8211;&gt; 00:39:34.650<br \/>Ben Rogers: always find it again, we appreciate it thanks job.<\/p>\n<p>298<br \/>00:39:35.310 &#8211;&gt; 00:39:35.790<br \/>Jirah Cox: Thank you.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>With unstructured data growing exponentially, securing shared storage is increasingly becoming difficult. It is an operational nightmare to identify datacenter weak points let alone predict the next threat. Ransomware attacks &hellip;<\/p>","protected":false},"author":7,"featured_media":65766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[122],"class_list":["post-65710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast","tag-nutanix-weekly"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>54: Nutanix Weekly: Nutanix Files Episode 4.1 - A Security Story<\/title>\n<meta name=\"description\" content=\"Security is a top priority for CIOs as ransomware attacks are becoming more sophisticated.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"54: Nutanix Weekly: Nutanix Files Episode 4.1 - A Security Story\" \/>\n<meta property=\"og:description\" content=\"Security is a top priority for CIOs as ransomware attacks are becoming more sophisticated.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-29T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T12:01:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"41 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"54: Nutanix Weekly: Nutanix Files Episode 4.1 &#8211; A Security Story\",\"datePublished\":\"2022-06-29T15:00:00+00:00\",\"dateModified\":\"2025-02-13T12:01:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/\"},\"wordCount\":9103,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"keywords\":[\"Nutanix Weekly\"],\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/\",\"name\":\"54: Nutanix Weekly: Nutanix Files Episode 4.1 - A Security Story\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"datePublished\":\"2022-06-29T15:00:00+00:00\",\"dateModified\":\"2025-02-13T12:01:39+00:00\",\"description\":\"Security is a top priority for CIOs as ransomware attacks are becoming more sophisticated.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"54: Nutanix Weekly: Nutanix Files Episode 4.1 &#8211; A Security Story\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"54: Nutanix Weekly: Nutanix Files Episode 4.1 - A Security Story","description":"Security is a top priority for CIOs as ransomware attacks are becoming more sophisticated.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/","og_locale":"hi_IN","og_type":"article","og_title":"54: Nutanix Weekly: Nutanix Files Episode 4.1 - A Security Story","og_description":"Security is a top priority for CIOs as ransomware attacks are becoming more sophisticated.","og_url":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-06-29T15:00:00+00:00","article_modified_time":"2025-02-13T12:01:39+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"41 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"54: Nutanix Weekly: Nutanix Files Episode 4.1 &#8211; A Security Story","datePublished":"2022-06-29T15:00:00+00:00","dateModified":"2025-02-13T12:01:39+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/"},"wordCount":9103,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","keywords":["Nutanix Weekly"],"articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/","url":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/","name":"54: Nutanix Weekly: Nutanix Files Episode 4.1 - A Security Story","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","datePublished":"2022-06-29T15:00:00+00:00","dateModified":"2025-02-13T12:01:39+00:00","description":"Security is a top priority for CIOs as ransomware attacks are becoming more sophisticated.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-files-episode-4-1-a-security-story\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"54: Nutanix Weekly: Nutanix Files Episode 4.1 &#8211; A Security Story"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=65710"}],"version-history":[{"count":1759,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65710\/revisions"}],"predecessor-version":[{"id":716400,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65710\/revisions\/716400"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65766"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=65710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=65710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=65710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}