43: Nutanix Weekly: Nutanix® Solutions Provide Data and Security Protection for State, Local, and Education Organizations

Feb 21, 2022

Cybersecurity attacks are becoming progressively complex with an increase in Cloud, Digitization, and Work-from-Anywhere practices.  State, Local, and Education (SLED) organizations must begin improving their security posture and aligning to a Zero Trust Architecture (ZTA). Since organizations  are required to move away from  perimeter-based security solutions, they will need to modernize their IT operations, increase agility, and work to implement network, application, user and data-based security to support mission success based on Zero Trust. 

This is where Nutanix comes in, helping you protect your SLED organization’s public information from cyber threats. Over time, Nutanix has honed in on the core concepts of security while improving data resiliency strategies. We have elevated our presence in the security space by releasing new solutions with a proactive security focus.

Host: Andy Whiteside
Co-host: Harvey Green
Co-host: Jirah Cox

WEBVTT

1
00:00:02.639 –> 00:00:10.980
Andy Whiteside: Hello everyone and welcome to episode 43 of new tactics weekly i’m your host Andy whiteside that Harvey back with his Harvey where were you last week.

2
00:00:13.170 –> 00:00:17.010
Harvey Green: Customer outside is it customer on site does.

3
00:00:17.010 –> 00:00:17.580
Andy Whiteside: It go.

4
00:00:18.210 –> 00:00:23.400
Harvey Green: It went well, it was called the but it went well.

5
00:00:25.050 –> 00:00:26.700
Jirah Cox: hint as to where we’re Harvey was.

6
00:00:28.470 –> 00:00:29.700
Harvey Green: upstate New York.

7
00:00:30.210 –> 00:00:31.650
Jirah Cox: whoa okay yeah that’s pretty cool.

8
00:00:31.860 –> 00:00:32.610
Harvey Green: It was no.

9
00:00:32.670 –> 00:00:34.230
Harvey Green: In February sure.

10
00:00:35.040 –> 00:00:38.010
Andy Whiteside: New tannic oriented customer or somebody is something else.

11
00:00:38.940 –> 00:00:42.840
Harvey Green: Yes, both were in the tactics oriented customer.

12
00:00:44.490 –> 00:00:51.090
Andy Whiteside: that’s good was it a on the government side of your hats you wear or commercial side of the hats you wear.

13
00:00:51.840 –> 00:00:52.380
Both.

14
00:00:55.740 –> 00:00:56.820
Andy Whiteside: coming in a real sales guy.

15
00:00:56.970 –> 00:01:01.440
Jirah Cox: Wait you’re saying you’re saying Angela Angela have to pay for half your expenses that’s what I heard.

16
00:01:04.290 –> 00:01:06.060
Jirah Cox: The other half good as INTEGRA go there you go.

17
00:01:07.560 –> 00:01:27.450
Andy Whiteside: Well, so on that note is going to apply here Harvey is a legacy, been a solutions architect as integrity, but he’s now leading and running the our gov business, which is our sled and fed focus so state Local Education focus the value added reseller as well as federal.

18
00:01:28.830 –> 00:01:34.080
Andy Whiteside: Value Added reseller Parviz harvest becoming a business guy yes.

19
00:01:34.230 –> 00:01:39.270
Jirah Cox: i’m hearing, this is a Zen tiger gov blah Gulf podcast episode number one.

20
00:01:41.910 –> 00:01:45.420
Andy Whiteside: that’s true we pay, you know what that’s a good idea hurry and you start doing another podcast.

21
00:01:47.160 –> 00:01:47.850
Jirah Cox: You can run with that.

22
00:01:48.030 –> 00:01:49.500
Jirah Cox: Okay that’s good you get the idea there.

23
00:01:49.800 –> 00:01:57.060
Harvey Green: All right, um I gotta bring jarrod on that one too, and you know, and he got I think he might be pretty good.

24
00:01:58.710 –> 00:02:00.090
Andy Whiteside: It is tapped out.

25
00:02:00.720 –> 00:02:01.290
Jirah Cox: Something something.

26
00:02:02.220 –> 00:02:06.570
Jirah Cox: yeah this podcast brought to you by his INTEGRA go something will do ad reads.

27
00:02:06.840 –> 00:02:10.080
Andy Whiteside: Every day, I would said what is that a advertisement in there.

28
00:02:11.970 –> 00:02:14.340
Andy Whiteside: Well gyros with this Jerry how’s it going.

29
00:02:14.790 –> 00:02:15.210
howdy.

30
00:02:16.800 –> 00:02:20.460
Andy Whiteside: jarrod is a legend of Rome, the new tannic side of the House.

31
00:02:23.880 –> 00:02:27.150
Jirah Cox: You know infamous versus famous is a Gray area.

32
00:02:29.130 –> 00:02:37.050
Andy Whiteside: I get on these qb ours, with the new tannic sales people and it’s a little bit in gyro we trust, so if your job is on the podcast.

33
00:02:38.400 –> 00:02:39.600
Harvey Green: It must be good.

34
00:02:42.360 –> 00:02:43.500
Jirah Cox: Every week at the Wednesday.

35
00:02:46.170 –> 00:02:46.560
Andy Whiteside: yeah.

36
00:02:47.910 –> 00:02:56.910
Andy Whiteside: Well i’m harvey’s INTEGRA gov and sled tie in that gets us to our blog for today and I will share my screen whenever I get smart enough to do it let’s see here.

37
00:02:58.050 –> 00:03:05.310
Andy Whiteside: For those all those listeners i’ll share my screen share it so we can cover it here and then people can watch it later in the.

38
00:03:05.640 –> 00:03:19.110
Andy Whiteside: INTEGRA YouTube channel, so our topic is botanic solutions provide data and security, protection for state local and education and organizations, this is by harsha code T Ki law.

39
00:03:21.030 –> 00:03:23.250
Andy Whiteside: blog from January 24.

40
00:03:24.360 –> 00:03:30.480
Andy Whiteside: I wanted to first of all, highlight Harvey and the great things that we’re doing its integrity of giving.

41
00:03:31.650 –> 00:03:41.220
Andy Whiteside: going to market on the sled and fed side of the world, I also want to highlight things that people don’t really know about sled we’ve got.

42
00:03:41.820 –> 00:03:51.060
Andy Whiteside: Customers that are small city, you know 100 employees cities, maybe, maybe thousands do 100 to 1000 or greater.

43
00:03:51.630 –> 00:04:03.390
Andy Whiteside: Cities that we work with they have so many different departments they’ve got you know, water and sewer they have police they have this judicial judicial, but they have this executive department they’ve got.

44
00:04:04.260 –> 00:04:11.430
Andy Whiteside: You know power, whether maybe they run the power grid, or they own the power grid or service, the power grid and there they’ve got so many departments.

45
00:04:11.910 –> 00:04:20.490
Andy Whiteside: When you get inside of a city or a local county government or state of course there’s there’s a bunch going on inside those organizations.

46
00:04:20.820 –> 00:04:28.440
Andy Whiteside: And one of the reason why we picked this one was to highlight that they’ve got security needs, just like the average customer, but even more because.

47
00:04:28.920 –> 00:04:41.040
Andy Whiteside: Everybody knows who they are, I mean everybody knows you know Mecklenburg county that lives in North Carolina and the bad guys know hey let’s go target those guys I knew they’ve got money they’ve got tax money coming in yeah agreed.

48
00:04:42.450 –> 00:04:50.280
Andy Whiteside: So Jerry you want to just maybe highlights extend upon when I was talking about there when we talked about the introduction here that says modern challenges for slit.

49
00:04:51.210 –> 00:05:01.170
Jirah Cox: 100% right and the need for designing implementing like a zero trust architecture right like just because you are on the network doesn’t necessarily mean.

50
00:05:01.680 –> 00:05:12.750
Jirah Cox: You are in a position of power or your trusted inherently more by virtue of being on the network right because that assumes that we would always be able to keep the network, secure and clean and keep bad guys off of it.

51
00:05:13.860 –> 00:05:16.080
Jirah Cox: that’s not the world, we can live in right, we have to assume.

52
00:05:17.460 –> 00:05:19.500
Jirah Cox: assume compromise and then design.

53
00:05:20.670 –> 00:05:25.950
Jirah Cox: Assuming that that principle so yeah and for sure right I sympathize with.

54
00:05:27.090 –> 00:05:39.690
Jirah Cox: All of our flipped classroom cut sled customers that must just feel like they’re walking around with a target on their back all day long for sure right, you know where where most most ransomware these days is aimed at yeah extracting some sort of a.

55
00:05:41.460 –> 00:05:44.550
Jirah Cox: Money from the get the entity being attacked.

56
00:05:45.990 –> 00:05:53.070
Jirah Cox: Usually there’s a balance when you’re in that situation of trying to recover from it quietly without making a.

57
00:05:53.760 –> 00:06:03.240
Jirah Cox: Big deal but there’s so much potential yet for a very public failure right when it’s a city of county of state of right it’s it can be very hard to be a big challenge to hide that.

58
00:06:04.890 –> 00:06:10.260
Andy Whiteside: Well that’s the other party, when it does happen, not if but, when it does happen, and you know.

59
00:06:11.370 –> 00:06:17.550
Andy Whiteside: All your constituents are supposed to know about it because you’re there they’re your constituents there’s no hiding.

60
00:06:18.240 –> 00:06:20.310
Jirah Cox: that’s true yeah mandatory reporting could be I think do.

61
00:06:22.200 –> 00:06:29.160
Andy Whiteside: Harvey thoughts on just the general challenge that goes on on the sled side, above and beyond what our commercial.

62
00:06:29.490 –> 00:06:37.440
Harvey Green: yeah I mean, I think the the big one, is what you hit on the start with is you know so many different department so many different.

63
00:06:38.280 –> 00:06:58.500
Harvey Green: sets of needs, you know, down from potentially you know, a soup kitchen up all the way to 911 call centers and you know police evidence rooms and things like that those those have you know very differing sets of security that are needed.

64
00:06:59.610 –> 00:07:10.440
Harvey Green: So you definitely need a platform that can handle all of that and not put you in a situation where you’re also having to as an IT department.

65
00:07:11.190 –> 00:07:27.810
Harvey Green: handle 50 different departments 50 different ways on 50 different platforms, that would be both very expensive in terms of the actual dollars and hardware, but also, you know in in training and being able to support something that complex.

66
00:07:29.070 –> 00:07:36.870
Andy Whiteside: yeah and we’re going to talk about the prevent detection recovery now one thing to highlight, on the recovery side of this.

67
00:07:37.770 –> 00:07:49.950
Andy Whiteside: Know there’s life saving services that are involved in these organizations, they can’t play hardball and wait 2448 hours to restore everything they got to get it back up and going or people are dying.

68
00:07:50.460 –> 00:08:09.420
Harvey Green: yeah I mean again 911 call centers you and a lot of municipalities, you have different clinics or healthcare facilities as well that are under that umbrella too so yeah I mean you’ve got people’s health hanging in the balance so time is of the essence.

69
00:08:09.870 –> 00:08:15.990
Andy Whiteside: We think about you got people that might be needing critical care you got people whose toilets won’t flush magically can be that would be.

70
00:08:16.560 –> 00:08:18.090
Harvey Green: Right, I mean.

71
00:08:18.690 –> 00:08:19.890
Andy Whiteside: That was a joke your says laugh.

72
00:08:20.160 –> 00:08:22.020
Harvey Green: yeah no.

73
00:08:23.070 –> 00:08:25.050
Jirah Cox: No when it comes to flushing toilets man that’s not a joke that’s.

74
00:08:28.560 –> 00:08:36.300
Andy Whiteside: I forget what movie was and i’m gonna say this is gonna be really bad taste, but you know if it’s if it’s yellow leave a mellow if it’s a brown flush it down.

75
00:08:39.330 –> 00:08:40.320
Andy Whiteside: eyes are on you.

76
00:08:40.410 –> 00:08:44.220
Jirah Cox: Know that’s national lampoon that’s vacation.

77
00:08:45.060 –> 00:08:45.960
Andy Whiteside: Is it I don’t remember if.

78
00:08:46.200 –> 00:08:47.670
Jirah Cox: He goes to visit his brother yeah.

79
00:08:48.030 –> 00:08:50.820
Andy Whiteside: yeah I just I think about that every so often.

80
00:08:51.090 –> 00:08:53.940
Jirah Cox: that’s the value I bring here move your movie references yeah.

81
00:08:54.810 –> 00:09:05.760
Andy Whiteside: Alright, the next section, as I leave it to prevent, detect and recovery first section is prevents how his new tactics helping us prevents direct.

82
00:09:08.250 –> 00:09:13.770
Jirah Cox: So or yeah what how to use these techniques as part of your part of your spectrum right of prevention.

83
00:09:15.000 –> 00:09:26.700
Jirah Cox: I was in Texas secure platform secure, both in the development secure in the deploy ability secure in the ability to to self recover back to a secure state where you can define your security baselines.

84
00:09:28.890 –> 00:09:34.170
Jirah Cox: But beyond that right it’s not a product right it’s part of a security posture.

85
00:09:35.640 –> 00:09:47.550
Jirah Cox: So we could the article has out, you know strong password policies that both you know that’s both for users and for admins and for admin dashboards and privileged access, whether that’s if you have the humans, for it, you know.

86
00:09:49.290 –> 00:10:04.830
Jirah Cox: You know, sensitive password should be in an envelope in a in a break glass safe somewhere and all your daily driver admin access needs to be via you know multifactor login whether that’s, whatever your system as okta duo as your ad with you know authenticator Apps.

87
00:10:07.170 –> 00:10:14.640
Jirah Cox: For those break glass passwords you can either you know, put the password in a envelope in a safe or, if you have enough people for it.

88
00:10:16.050 –> 00:10:27.960
Jirah Cox: You know first customers that will be like you guys are team a yeller team B team a lot into the first half of the password team be as lead, into the back, half of the password right, so you got to get to people agreeing to login together.

89
00:10:29.520 –> 00:10:35.430
Jirah Cox: to accomplish that rest and out now, no one human can can get admin access to the system unmonitored.

90
00:10:37.800 –> 00:10:48.420
Jirah Cox: Block mauer spread with micro segmentation that one’s easy right nothing to install on a tedx HIV flow is right there you just simply turn on and define your your fencing policies of what shouldn’t shouldn’t talk to each other.

91
00:10:49.800 –> 00:11:08.670
Jirah Cox: Both, for you know whether that could be I can imagine that being all kinds of Apps in a like a county government sense of like accounting and payroll separated from like the GIs and mapping services separated from possibly things that might connect to you know power sewer water.

92
00:11:10.020 –> 00:11:21.540
Jirah Cox: Systems, you know, separate from united one systems right, I could, of course, by clusters for each of those or with flow, I can say they can all live on one cluster.

93
00:11:21.900 –> 00:11:32.220
Jirah Cox: But they can’t talk to each other whatsoever right, so that if there wasn’t a compromise that can limit or or slow the spread of those attackers laterally within the environment.

94
00:11:33.480 –> 00:11:37.410
Jirah Cox: And then, also for any easy environment right if i’m hosting desktops work from home.

95
00:11:38.460 –> 00:11:39.930
Jirah Cox: Any kind of citrix stuff like that.

96
00:11:41.040 –> 00:11:49.230
Jirah Cox: wrapping a firewall around every virtual machine to say you can only get to what you need to possibly even in an ad aware capacity right if Harvey logs in.

97
00:11:49.800 –> 00:12:00.630
Jirah Cox: And he needs to get to a GIs desktop he can only get to those things and can’t get to payroll or vice versa, if he works in payroll you can get to that and not get to like you know, no one systems so micro segmentation.

98
00:12:01.800 –> 00:12:13.590
Jirah Cox: Really, you know anywhere it’s possible to turn it on definitely use that and with flow, it can even tell you what your existing traffic patterns are so learn what your Apps talk to, and then write policies to lock those down.

99
00:12:15.570 –> 00:12:28.770
Jirah Cox: The third one here, I can certainly agree with right using maintain endpoint protection antivirus block malware I can’t say i’ve got strong opinions there i’m sure the Tigers got got much more recent experience consulting around what you probably need to use in your environment.

100
00:12:31.890 –> 00:12:32.370
Andy Whiteside: yeah.

101
00:12:33.180 –> 00:12:45.330
Harvey Green: We would definitely agree that you need to do that will we can talk through you know different options, depending on what else you need to do to just besides look for.

102
00:12:46.470 –> 00:12:50.040
Harvey Green: Look, for exposure points that have already been exposed right.

103
00:12:51.360 –> 00:12:53.610
Harvey Green: So yeah we can definitely help with that.

104
00:12:55.320 –> 00:13:02.670
Andy Whiteside: it’s a multi faceted front right you got your traditional AV you got a wii that we’re not a Vb you got the software that kind of looks at.

105
00:13:04.290 –> 00:13:12.000
Andy Whiteside: kind of artificial intelligence types of things you’ve got intrusion detection stuff from from many, many years back you’ve got.

106
00:13:13.860 –> 00:13:25.890
Andy Whiteside: It intrusion detection response you’ve got elements of network flow you got all those different endpoint protection and, by the way, when you talk to the integrity endpoint is the endpoint.

107
00:13:26.580 –> 00:13:34.170
Andy Whiteside: Is in the endpoint is also that virtual APP or desktop server sitting back in the clock back in the data Center, no matter where that data Center is.

108
00:13:34.440 –> 00:13:34.680
yeah.

109
00:13:36.510 –> 00:13:42.990
Jirah Cox: The next one here about you know employee training on cybersecurity right bit of an old drum to beat on.

110
00:13:43.620 –> 00:13:47.580
Jirah Cox: I actually was reading a discussion thread last week with a bunch of SIS admins.

111
00:13:48.090 –> 00:13:59.280
Jirah Cox: That we’re talking about you know they were actually able to successfully go to HR and talk about you know how like a three strike policy of you know if this employee keeps on getting finished successfully right.

112
00:14:00.330 –> 00:14:11.130
Jirah Cox: The the quantifiable risk that that happens to the business is greater than ever right, and they are actually able to start talking about policies around hey if we’ve been fished three times right or you fail the fishing tests three times.

113
00:14:12.690 –> 00:14:24.750
Jirah Cox: We can put a price tag on that employee having email access right like is it worth this employee being able to send receive email externally versus like I don’t know a $5 million ransomware.

114
00:14:26.220 –> 00:14:35.160
Jirah Cox: ransom, you know and and, that being a more actual policy nowadays, more than ever, right 10 years ago, you know phishing attempts were prevalent and.

115
00:14:35.670 –> 00:14:45.720
Jirah Cox: Policies had i’m going to say, less teeth right compared to now protecting the organization is taken much, much more seriously because failure has consequences right failure, has a price tag.

116
00:14:47.130 –> 00:15:02.430
Andy Whiteside: No yes and it’s in the news everybody sees that it costs money and and that it’s been enabled by my opinion heavily enabled by cryptocurrency and the ability to pay anonymously and walk away with the money that’s worth something somewhere else.

117
00:15:04.170 –> 00:15:07.410
Jirah Cox: yeah, so I think if you don’t have teeth behind your policies around you know.

118
00:15:08.700 –> 00:15:14.100
Jirah Cox: Those Those sort of test failures right it’s worth talking about you know how do we limit our exposure.

119
00:15:15.960 –> 00:15:16.710
Jirah Cox: To those attackers.

120
00:15:17.550 –> 00:15:33.930
Andy Whiteside: The next bullet here talks about the object storage that’s amenable to being changed once it’s been written we’ll talk about new tannic specific things here in a second but that’s obviously a clear place where we need to protect the company jewels.

121
00:15:34.530 –> 00:15:46.140
Jirah Cox: Totally I think it’s I think it’s I like that’s under prevention, it also has surface area under recovery as well, later on, but in this case hundred prevention and they can almost as is thinking about taking your backups.

122
00:15:47.490 –> 00:15:52.500
Jirah Cox: On the offense right, what do I do to protect those if the bad guy was right next to them on the network.

123
00:15:52.860 –> 00:15:59.370
Jirah Cox: Well okay great I can sleep tell the backups are that they are configured in such a way that they literally are not allowed to self delete right.

124
00:15:59.760 –> 00:16:11.880
Jirah Cox: Even with admin access even with you know to humans logging in from A and B team, or whatever I say like weren’t for compliance, you know, the only way to get rid of the state is to go in the data Center and physically take a sledgehammer to it.

125
00:16:13.410 –> 00:16:22.140
Jirah Cox: You know which, hopefully, if you’re vulnerable to that maybe maybe you don’t need to talk to it consultants right, and you can go get some some beefy guys the guard your data Center right.

126
00:16:23.460 –> 00:16:32.550
Andy Whiteside: The last bullet here in this section is critically analyze and scan patchwork of vectors in data centers to monitor and continuous updates.

127
00:16:32.910 –> 00:16:38.340
Andy Whiteside: In areas of suspected susceptible to attacks.

128
00:16:39.660 –> 00:16:40.740
Andy Whiteside: we’ve recently started.

129
00:16:41.820 –> 00:16:49.950
Andy Whiteside: You know intrusion protection, excuse me penetration test type stuff we’ve also started doing something that I think can be a huge hit over here where we’re going to be doing.

130
00:16:50.670 –> 00:17:03.060
Andy Whiteside: vdi type of assessments, assessing the security for security vulnerabilities and a lot of times it’s not you know code it’s not up to date it’s doors that have been left unlocked that you can’t justify why they’re unlocked.

131
00:17:05.070 –> 00:17:23.130
Harvey Green: yeah for sure, being able to go back through the firewall rules, for example, and you know know the history behind well why did we do this again and was that for a test or does that need to be there for production, you know, eight years after it was put in so.

132
00:17:24.150 –> 00:17:28.170
Harvey Green: definitely need to keep some sort of history.

133
00:17:29.310 –> 00:17:51.030
Harvey Green: And also notes about different security exceptions, you make because eventually those exceptions either need to be taken away or kind of designed around so that you know what’s there why it’s there and what you’re susceptible to than the end to prepare for future attacks.

134
00:17:52.050 –> 00:17:57.330
Andy Whiteside: When I like the the very first word in this one that says critically at other words.

135
00:17:57.870 –> 00:18:14.670
Andy Whiteside: Yes, the critical eye with a look at look at it like if you’re paying your networking company that sets up your network to do your penetration test or your vdi companies INTEGRA to do your vdi security test, you know what’s the what’s the likelihood you’re gonna get a straight answer.

136
00:18:15.300 –> 00:18:20.430
Harvey Green: that’s right it’s like if gyrus is do it, you just do it, and if Harvey says do what you.

137
00:18:21.510 –> 00:18:22.260
Harvey Green: know about that.

138
00:18:24.420 –> 00:18:34.530
Andy Whiteside: Well, in our case we’re specifically bringing in a third party to do these in encouraging them to find everything you can and it only make us all, better if you do that yeah.

139
00:18:34.650 –> 00:18:40.410
Harvey Green: Absolutely that’s that’s important to for a lot of different environment so that.

140
00:18:40.860 –> 00:18:52.050
Harvey Green: You don’t have to worry about you know one person’s feelings getting hurt by the next person or somebody having you know, an agenda they’re out to get somebody to have a third party they’re balanced their neutral.

141
00:18:52.590 –> 00:19:04.740
Harvey Green: They come in and their goal is to make sure you’re either secure or let you know how you’re not secure so that you can take care of it, the the emotional piece of it completely comes out of it.

142
00:19:06.060 –> 00:19:13.470
Andy Whiteside: So let’s let’s translate the things that we just talked about in terms of things you need to be thinking about to new tactics products and services.

143
00:19:14.280 –> 00:19:26.610
Andy Whiteside: gyro let’s hit the first one new tonics ios which stands for Acropolis operating system and prison management what what of those bullets do we fix with a ios and prison management.

144
00:19:27.780 –> 00:19:34.920
Jirah Cox: yeah so so you know this talks about how we, we take the listings right thing Government issued.

145
00:19:36.210 –> 00:19:48.840
Jirah Cox: guidelines on how to secure system we don’t give that to you as a document for a human, to read, we also write copy that is machine readable, so you can automate that right so right out of the box, you can simply say enter state compliance mode.

146
00:19:51.510 –> 00:19:59.940
Jirah Cox: that’s not just a one time event that’s also a defined baseline that if you were to go in and do something to like compromise system security say weekend.

147
00:20:00.360 –> 00:20:09.150
Jirah Cox: Key base ssh down to password ssh we will note that flag it and then re he’ll back to the baseline saying I got to turn that off and go back to key based ssh.

148
00:20:11.070 –> 00:20:15.780
Jirah Cox: And then you know for the management layer right even limiting sort of bad actor admins.

149
00:20:16.140 –> 00:20:30.720
Jirah Cox: Are back for rural based control around what of what is it gives a given roll out to do within the environment, so if i’m from the backup guy from the you know database guy I can say, I can only see the parts of prison that are pertinent to my job role.

150
00:20:35.130 –> 00:20:46.230
Andy Whiteside: And that’s a has a lot to do with the origins of new tannic which is this user friendly interface, but with control yes.

151
00:20:48.180 –> 00:20:48.420
yeah.

152
00:20:49.740 –> 00:21:02.370
Andy Whiteside: Alright, so the next one on here is new tonics hv which stands for Acropolis hypervisor and flow micro segmentation flow is not an acronym it’s a real word.

153
00:21:03.450 –> 00:21:16.650
Andy Whiteside: And I am specifically emphasizing the word Acropolis, when I said it before and saying in here now, I still run into people everyday that use Acropolis interchangeably between these two things, these two areas and that’s just not right.

154
00:21:19.170 –> 00:21:19.740
Jirah Cox: i’m.

155
00:21:21.510 –> 00:21:25.620
Jirah Cox: yeah I don’t I don’t bother correcting people too often about that.

156
00:21:26.910 –> 00:21:32.340
Jirah Cox: You know branding is kind of always just a little bit fluid right i’ll spend more time, focusing on the problem to solve.

157
00:21:32.820 –> 00:21:37.770
Jirah Cox: But but yeah and like including this one right where you know delivering micro segmentation.

158
00:21:38.280 –> 00:21:43.920
Jirah Cox: making it easy to apply to your workloads see what they’re doing lockdown what they can and can’t talk to.

159
00:21:44.280 –> 00:21:56.670
Jirah Cox: But nothing, nothing to install all the code, you need is there on the system from day one and all, all you have to do is just you know set your policies in place and and switching them from monitor mode to enforce mode that’s it so couldn’t be simpler.

160
00:22:00.390 –> 00:22:03.690
Andy Whiteside: rv i’ll let you comment, I was gonna jump in on something else but go ahead.

161
00:22:04.920 –> 00:22:17.010
Harvey Green: No just this is, these are I guess very important tenants here, you know we’re talking through prevention and as we get to the one you just highlighted being able to.

162
00:22:18.030 –> 00:22:22.560
Harvey Green: create a mutable backups the right ones read only mode.

163
00:22:23.610 –> 00:22:44.490
Harvey Green: That will again be a great prevention tool and as as direct talk through earlier when we talk about what you do after something happens that’s that’s also a very, very important tool is to be able to know what you actually can trust, on the other side of something happening right.

164
00:22:45.750 –> 00:22:52.560
Andy Whiteside: And the guy was the last one in the these sets of bullets is new tannic objects, where does that tie into what we talked about above.

165
00:22:54.270 –> 00:22:57.150
Jirah Cox: yeah so objects, is our our.

166
00:22:58.170 –> 00:23:07.170
Jirah Cox: s3 compliant object storage solution on top of mechanics so you can use a node you know, these days, you can use a node for like I don’t know it’s called 1820 different things right from.

167
00:23:07.470 –> 00:23:20.880
Jirah Cox: Running vmware to running containers to running file services SMB nfl objects is like one of those things you can use a node to do right and you say next node so better living through software so objects, is our software based solution for.

168
00:23:21.930 –> 00:23:31.140
Jirah Cox: for storing data it lends itself to being a backup target very readily right, it can scale to absolutely huge data sets right so.

169
00:23:31.560 –> 00:23:42.090
Jirah Cox: started whatever hundred terabytes grow to petabytes object isn’t going to blank right grow grow right along with you as well as, of course, the new tonics cluster below it right scale out it’s very, very.

170
00:23:43.650 –> 00:23:55.140
Jirah Cox: alive aligned to that use case but that’s all the technical you know whiz bang storage stuff the security side of that is the ability to make it one compliance a worm being you know right once read many.

171
00:23:56.190 –> 00:24:02.880
Jirah Cox: The software itself will literally not allow a deletion of data if that flag has been set so, then it has to age out.

172
00:24:03.300 –> 00:24:12.090
Jirah Cox: According to your policy, whether that’s you know one year through your seven year whatever it is, it delusion there’s simply not allowed before that threshold has been reached.

173
00:24:14.280 –> 00:24:24.930
Andy Whiteside: And that’s a no brainer in our world right it doesn’t matter we don’t have to put the stuff on tape and send it off study more we can stick it across the aisle or we can stick it across the aisle and across the world, and another data Center.

174
00:24:25.200 –> 00:24:26.580
Andy Whiteside: never change it.

175
00:24:29.940 –> 00:24:31.860
Andy Whiteside: Harvey any specifics around.

176
00:24:33.210 –> 00:24:34.380
Andy Whiteside: immutable storage.

177
00:24:35.310 –> 00:24:39.870
Harvey Green: Know again just making it so that you’ve got something that you can trust in the end.

178
00:24:41.010 –> 00:24:56.850
Harvey Green: Again, being able to replicate that wherever you need it to live, so that you don’t just have it all sitting in the same physical location and just being able to have something that you know, no matter what isn’t going to be.

179
00:24:57.900 –> 00:25:06.090
Harvey Green: Written to or changed based on something other some other threat making its way into your environment.

180
00:25:07.050 –> 00:25:07.350
Right.

181
00:25:09.000 –> 00:25:22.470
Andy Whiteside: So guys, let me, let me do this to you two guys if I So you can see my screen right yeah but for for effect if I were to say, this is the end of the blog we’ve accomplished a lot right there, yes.

182
00:25:23.460 –> 00:25:24.690
Harvey Green: Absolutely for sure.

183
00:25:25.260 –> 00:25:34.890
Andy Whiteside: These are the things we just talked about are the no brainers from new tactics to help solve the security challenge both sledding commercial.

184
00:25:36.480 –> 00:25:37.110
Jirah Cox: hundred percent yeah.

185
00:25:37.890 –> 00:25:41.190
Andy Whiteside: But now let’s move on to the next section detection right so we’ve done.

186
00:25:41.190 –> 00:25:43.530
Andy Whiteside: Prevention never detection now you thought you were done, though.

187
00:25:43.830 –> 00:25:47.400
Jirah Cox: For sure that was Andy stretching one blog post into three episodes.

188
00:25:48.780 –> 00:25:50.460
Jirah Cox: Which i’m totally down for whatever you want me.

189
00:25:50.790 –> 00:25:52.560
Andy Whiteside: Just because it’s valentine’s day right.

190
00:25:54.240 –> 00:25:56.250
Andy Whiteside: Alright, the next one is detection and i’m going to.

191
00:25:56.310 –> 00:26:13.320
Andy Whiteside: i’m going to read the four bullets, so you don’t have to do it again and then we’ll talk about where to tactics play so leverage layer seven threat detection tools like intrusion detection and prevention systems, I think I mentioned this earlier to identify super serious serious.

192
00:26:14.160 –> 00:26:16.500
Harvey Green: Serious so curious.

193
00:26:16.650 –> 00:26:17.010
Jirah Cox: Network.

194
00:26:17.640 –> 00:26:25.680
Andy Whiteside: that’s the one number to use a consolidated security information used to call it is to consolidate security information event management, a Sim.

195
00:26:26.220 –> 00:26:45.660
Andy Whiteside: solution with real time analytics analysis of security event logs and possible orchestration capabilities that’s number two number three employee network honey pots to augment detection number four leverage anomaly detection tools for resource usage and storage activity.

196
00:26:46.830 –> 00:26:59.070
Andy Whiteside: If I go down to where new tannic fits first one talks about new tannic Acropolis hypervisor HP and flow service insertion and chaining gyro help us understand where that helps solve the bullets above.

197
00:26:59.850 –> 00:27:04.890
Jirah Cox: yeah so you can you know with with service insertion right that’s a like an advanced feature of flow.

198
00:27:05.340 –> 00:27:16.110
Jirah Cox: Obviously you can do a quick allow or deny at a packet level closer to the virtual machine on the virtualized Nick, but if you want to get fancier than that, obviously, you know, maybe I want to always block.

199
00:27:16.980 –> 00:27:32.730
Jirah Cox: You know, tell them that that’s an easy one, I don’t need to spend cycles on like a virtualized firewall you know disrupting those packets, looking at the source, looking at at headers are doing like fancier like web web application firewall.

200
00:27:33.990 –> 00:27:35.250
Jirah Cox: analytics of that traffic.

201
00:27:36.480 –> 00:27:43.290
Jirah Cox: You know that’s easy right telling that disallowed to my web server maybe on actual 443 packets, I do want.

202
00:27:43.980 –> 00:27:53.220
Jirah Cox: You know, certain traffic patterns, or maybe all traffic redirect through smarter tooling right, I want, maybe virtualized firewalls to be allowed to decrypt that traffic.

203
00:27:53.610 –> 00:28:00.780
Jirah Cox: Look at who it’s from see what’s happening in their permit injection attacks so that’s that’s you know another great use case for.

204
00:28:01.590 –> 00:28:18.540
Jirah Cox: flow as part of a Microsoft solution to allow for even more advanced functionality right, so we can work with virtualize firewall vendors application firewalls to do more functionality give you more functionality and more security around your traffic in your workloads traffic flows.

205
00:28:20.850 –> 00:28:22.050
Andy Whiteside: rv comments.

206
00:28:23.280 –> 00:28:35.670
Harvey Green: I our reserve to the till you get to the last one, but i’m just i’m watching this picture build and I just want to make sure, at the end that everybody sees the picture we were building.

207
00:28:38.160 –> 00:28:52.320
Andy Whiteside: The the next bullet as to how new tannic solve these challenges is files files analytics new tannic prison OPS in X play and I can I can fathom what files driver What is all this stuff what is this stuff.

208
00:28:52.830 –> 00:28:53.640
Jirah Cox: yeah so.

209
00:28:55.230 –> 00:28:57.180
Jirah Cox: Some some really creative you know.

210
00:28:59.730 –> 00:29:14.790
Jirah Cox: Collaboration you’re right among among the services, the file files analytics watches the traffic on mechanics hosted file servers right so new text files being our software defined scale out nas offering right, so it can host your SMB shares your nfl shares.

211
00:29:15.840 –> 00:29:25.770
Jirah Cox: When data lives on those, then we can generate metadata around about your data right you’re storing whatever word documents pdfs family vacation videos whatever.

212
00:29:26.190 –> 00:29:32.520
Jirah Cox: We can watch who’s accessing those what does normal look like what do anomalies look like right so hey it’s 3am.

213
00:29:33.120 –> 00:29:42.240
Jirah Cox: And you know somebody logged in from an accounting desktop coming through these file shares that’s an anomaly right, we need to throw an alert about that that can then be acted on.

214
00:29:43.410 –> 00:29:55.830
Jirah Cox: So, you know that that’s not not normal behavior there and then prison OPS can do the same thing for virtual machines right, it will actually learn what does normal look like, for your vm and he was like memory consumption cpu consumption.

215
00:29:57.420 –> 00:30:01.530
Jirah Cox: And they can also alert for anomaly so without you as a human needing to define.

216
00:30:02.250 –> 00:30:13.200
Jirah Cox: X percentage of threshold or somebody megahertz of what is what the steady state look like it’ll just learn and baseline against your own behavior and then be able to alert to you based off of anomalies like that.

217
00:30:14.010 –> 00:30:22.500
Jirah Cox: And then, and then cross play is the it’s our like coolest automation platform, so you can have lots of we call them playbooks to find.

218
00:30:22.920 –> 00:30:28.890
Jirah Cox: A playbook is almost like if you’ve used like the the Web service if this than that it’s like you know all point and click.

219
00:30:29.490 –> 00:30:37.650
Jirah Cox: automation and chaining of like I want you to take this and do this and strip out this you know third word and email that to me and send me a slack message or teams, or whatever I want.

220
00:30:38.940 –> 00:30:48.810
Jirah Cox: I can use that for like time based triggers on demand triggers or in this case more critically alert based triggers So when I get an alert from the system about X is happening.

221
00:30:49.170 –> 00:31:00.330
Jirah Cox: Right, then I want you to do whatever so I you know you can say hey my critical web servers web traffic is up 10 X, in the last hour right is that worth as a human me checking on.

222
00:31:01.020 –> 00:31:13.140
Jirah Cox: I can get that as an email as a teams message slack message pager duty whatever whatever fits into your ecosystem, so it brings that that detection, all the way to your right to your front door.

223
00:31:14.880 –> 00:31:21.960
Andy Whiteside: So diver are these all things that are part of new techniques or things that new techniques enables that third parties come in and actually do.

224
00:31:22.710 –> 00:31:25.200
Jirah Cox: i’m going to say both.

225
00:31:25.530 –> 00:31:26.430
Jirah Cox: Okay, so that.

226
00:31:28.140 –> 00:31:39.720
Jirah Cox: We have a lot of the the code closer to the virtual machine close to the workload closer to the metal we’re not like the APP on your smartphone that alerts you about something, but we work with that APP yeah.

227
00:31:41.400 –> 00:31:45.300
Andy Whiteside: Alright Harvey yeah I can’t believe you’re excited about number three the way you seem to be but.

228
00:31:46.560 –> 00:31:49.140
Harvey Green: Not so you’re actually you were.

229
00:31:49.170 –> 00:31:56.730
Harvey Green: kind of hitting on my point just just a second ago before I got to it, but I, like all of this.

230
00:31:57.720 –> 00:32:11.580
Harvey Green: Well, to jeremy’s point not every single piece of it, but all of this, that we talked about so far, these are things that are built into the platform things you can use things that you can have you know day one of implementation.

231
00:32:12.810 –> 00:32:19.800
Harvey Green: So I guess for those so far that have listened to, where we’ve gotten so far, and you don’t have.

232
00:32:20.280 –> 00:32:38.460
Harvey Green: All of these tools in place and you’re wondering how in the world, you can get all of them, and you know the thinking that is 15 vendors is the answer on just being able to do this, out of just the mechanics platform that you have is I mean I think that’s a very big.

233
00:32:39.570 –> 00:32:56.250
Harvey Green: very big deal that can definitely change an organization security footprint really from day one just being able to plan this out and implement these pieces that you have access to, I think, will be a very, very good change and security posture.

234
00:32:56.940 –> 00:33:04.410
Andy Whiteside: mean here’s here’s one of my look at this, you can you can move everything to an is you know, one of the big cloud hyper scales, and you can get all this stuff.

235
00:33:05.400 –> 00:33:17.040
Andy Whiteside: But most of us can’t do that move everything so then we got to go to some colo we got to go to some partner, other than the public cloud we gotta do our own on data our own premises data Center.

236
00:33:17.940 –> 00:33:33.450
Andy Whiteside: Because of you, because of the universal layer of new tactics and all this, whether it’s public cloud colo private data Center private cloud all these things become doable and they become doable in the same way.

237
00:33:35.130 –> 00:33:35.460
Jirah Cox: Right.

238
00:33:38.190 –> 00:33:47.820
Andy Whiteside: And so the third bullet here is about a Sim a security information and event management system that can easily tie into all this and keep you from having to look.

239
00:33:48.540 –> 00:33:56.190
Andy Whiteside: Under every object to find stuff in a place, you can go look to find everything that’s being reported and try to make sense of it.

240
00:33:57.480 –> 00:34:04.560
Jirah Cox: yeah I mean I don’t want to oversimplify or unintentionally trigger any of my friends in security, who could.

241
00:34:05.010 –> 00:34:13.620
Jirah Cox: describe like what the same as doing it way better than I could, but like in my simplified view of the world it’s telling it’s a record of what happened.

242
00:34:14.070 –> 00:34:27.810
Jirah Cox: And what’s normal and what’s weird right and that, basically, is like one dimension of like a big data problem of like capture this fire hose of information look for outliers and anomalies hopefully intelligently alert about that.

243
00:34:29.730 –> 00:34:42.420
Jirah Cox: But at that base layer right as a big data problem in taxes, like uniquely suited to do that right, because we have the compute for the actual computation that has to occur, you know, in the form of a virtual machine and V cpus.

244
00:34:43.290 –> 00:34:53.610
Jirah Cox: But we are the performance but the performance storage right they have to capture the data be able to ingest it be able to analyze it be able to search on it when you when you search for like occurrences of events and so forth.

245
00:34:54.030 –> 00:35:03.000
Jirah Cox: Or we need to go review your log data but storing everything in a performant way forever is crazy expensive, and you know public cloud vendors would love you to do that.

246
00:35:04.530 –> 00:35:12.060
Jirah Cox: You know anything new tannic says hey we can do stuff like fancy all flash nodes for your ingest and whatever you want, like last 90 days, perhaps.

247
00:35:12.420 –> 00:35:19.140
Jirah Cox: But if you need to maintain years worth of logs here, we also have a great solution for that with stuff like our our object storage solution.

248
00:35:19.470 –> 00:35:33.210
Jirah Cox: which a lot of security vendors can say we will you know at the application level gracefully aged out data from the hot teardown of the cold tier keeping everything performance, secure and economical, you know, and you have full governance over all that data.

249
00:35:35.040 –> 00:35:38.250
Andy Whiteside: Right it’s a it’s a platform right.

250
00:35:38.640 –> 00:35:53.610
Andy Whiteside: stuff can tie tie into and watch a new 10 is going from Acropolis operating system running on top of asx to the evolution to Acropolis hypervisor and then all the things the services that have come along with it.

251
00:35:54.750 –> 00:36:01.110
Andy Whiteside: As you guys start to solve cloud like challenges that don’t have to be in the cloud it’s it’s been fun to watch.

252
00:36:03.570 –> 00:36:13.890
Andy Whiteside: Alright last section of this is recovery and the bullets go like this, create snapshot and replication plans replicate data to one or more locations, as part of.

253
00:36:14.220 –> 00:36:21.270
Andy Whiteside: Business continuity and disaster recovery i’ve never seen this acronym before but BC Dr putting those two together.

254
00:36:22.080 –> 00:36:25.320
Andy Whiteside: Because Everybody talks about them, as if they’re one in the same and they’re definitely not but.

255
00:36:25.800 –> 00:36:30.180
Andy Whiteside: If that’s what somebody is talking about let’s give them both and just given one acronym that’s interesting I like that.

256
00:36:31.140 –> 00:36:46.290
Andy Whiteside: Follow the 321 rule for backup at least three copies to backups one copy should be located off site that goes back to those days of waiting for the iron mountain guy to show up every day and did lots of that and handing the the box will tapes.

257
00:36:47.790 –> 00:36:53.280
Andy Whiteside: Sometimes check and see if they work, sometimes not use automation and frequently test your recovery right so.

258
00:36:53.610 –> 00:37:01.380
Andy Whiteside: I don’t know we I know we brought it up multiple times on this podcast i’m glad glad you got a business continuity well i’m glad you got to Dr plan.

259
00:37:01.710 –> 00:37:06.210
Andy Whiteside: i’m glad there’s some element of business continuity in your day to day how often do you test it.

260
00:37:06.960 –> 00:37:13.650
Andy Whiteside: You know if you’re doing business continuity right you’re you’re actually testing alive every day you’re doing it, the modern way, but the Dr side of it.

261
00:37:14.550 –> 00:37:24.720
Andy Whiteside: Being able to proactively test that without actually doing it and then actually doing a couple times a year, those are the challenges that can real consulting firms need to have for their for their customers.

262
00:37:27.030 –> 00:37:34.110
Andy Whiteside: The new tannic answers to this starts with number one new tactics ios gyro how is mechanics Acropolis operating system.

263
00:37:35.070 –> 00:37:38.070
Andy Whiteside: i’m going to try to translate that real quick so that’s the new tactics.

264
00:37:38.460 –> 00:37:49.740
Andy Whiteside: Acropolis operating system which is really the storage magic and all this, which if I try to dummy it down a little is really the V San piece of what makes new techniques new teams, I know.

265
00:37:50.550 –> 00:37:57.960
Andy Whiteside: I know you guys don’t necessarily like somebody calling me saying, because it’s way beyond that but that’s what Acropolis operating system means to me.

266
00:37:59.040 –> 00:38:06.480
Jirah Cox: it’s it’s solving the need for highly available storage right now scale up fashion kind of no matter what the workload is right, whether it’s.

267
00:38:07.020 –> 00:38:17.160
Jirah Cox: You know right to your point where we started as simple as a virtual machine or as fancy as containerized workloads block storage file storage object storage, you know.

268
00:38:18.510 –> 00:38:22.770
Jirah Cox: I think if if the world’s invent a new kind of storage i’m sure will evolve to support that do one day.

269
00:38:24.120 –> 00:38:24.390
Andy Whiteside: Right.

270
00:38:27.300 –> 00:38:27.690
Andy Whiteside: rb.

271
00:38:29.370 –> 00:38:38.760
Andy Whiteside: it’s fair to say that the Acropolis operating system portion of this is that’s the Foundation that’s the cornerstone for all that’s happened since, yes it.

272
00:38:38.820 –> 00:38:58.140
Harvey Green: Is the magic, it is the secret sauce is the differentiation, so this is what makes the big difference between attacks and and a lot of the other solutions out there that can do as much or be as wide ranging.

273
00:38:59.370 –> 00:39:02.400
Harvey Green: As far as the workloads cover that and attachments can be.

274
00:39:03.990 –> 00:39:08.100
Jirah Cox: In the place where we fit into like the 321 rules specifically right.

275
00:39:09.390 –> 00:39:19.350
Jirah Cox: You know, three copies of of data, I think one of those should probably be you know, a new tannic snapshot on the primary cluster right where it’s it’s.

276
00:39:20.310 –> 00:39:23.220
Jirah Cox: it’s immutable right can be changed after it’s created.

277
00:39:23.760 –> 00:39:39.030
Jirah Cox: And it’s going to be the on the spectrum of recovery, the quickest option right, obviously, if I have a site denial event, if I have a physical event, if the sprinklers go off in the data Center also pro tip don’t have sprinklers in your data Center but if that cabinet is physically down.

278
00:39:40.530 –> 00:39:50.760
Jirah Cox: Then I can’t use that snapshot right but short of a cluster denial event that snapshot to me the quickest way to get up and going, if I have a drop the table a human caused.

279
00:39:51.630 –> 00:40:00.480
Jirah Cox: event a vm deletion, you know some sort of a miss configuration right definitely have backups as well, but one keep one copy right and then.

280
00:40:00.870 –> 00:40:07.680
Jirah Cox: I like the way this article writes it in terms of like match your business recovery objectives, basically, you know profile your vm is right find the important stuff.

281
00:40:08.160 –> 00:40:13.800
Jirah Cox: keeps Nash snapshots of them on the primary cluster more often, they may be retained for longer.

282
00:40:14.430 –> 00:40:22.020
Jirah Cox: You know, you can take snapshots right there taking instantly they don’t cause stun they don’t cause, you know them slowdowns as you retain them.

283
00:40:22.650 –> 00:40:36.750
Jirah Cox: So keep those there right there built in, as part of the Platform, beyond that, of course, then yeah get into get into your yeah BC Dr I think it’s a great acronym for it right, because I don’t always have to fail over to recover.

284
00:40:38.310 –> 00:40:41.460
Jirah Cox: You know I just need to get the business up back up and running back as quick as possible.

285
00:40:42.570 –> 00:40:53.460
Jirah Cox: The automation right we have another blog post and we did an episode about it, to talk about using our leap right which is that are orchestrated vm recovery, you know with run books and and.

286
00:40:53.910 –> 00:41:01.980
Jirah Cox: Non impactful out of band testing right, I could have that test run every morning at three in the morning and then just email me with the Dr tests.

287
00:41:02.550 –> 00:41:10.470
Jirah Cox: Success results right, I can just go into work every day, knowing that my Dr plan was tested last night, while I slept and we passed the test right.

288
00:41:13.890 –> 00:41:16.800
Andy Whiteside: So let’s talk leap.

289
00:41:18.120 –> 00:41:19.740
Andy Whiteside: And what leap does.

290
00:41:20.760 –> 00:41:35.280
Andy Whiteside: Like leap when I first started understanding mechanics my first thought went to the er and how entertainers could offer up a cloud that included that it had new tactics in it and we could easily use that as a replication target.

291
00:41:36.780 –> 00:41:43.530
Andy Whiteside: that’s leap right that’s that’s what the new tannic cloud has become, which is this no brainer place to at least a year, Dr.

292
00:41:44.280 –> 00:41:51.930
Jirah Cox: yeah if you don’t if you’re a customer without a without a Dr site today and no desire to invest in one a you’re in great company and be.

293
00:41:52.140 –> 00:42:00.780
Jirah Cox: As an easy problem to solve, you know absolutely you can you can you know basically rent if that’s the right word, you can get a Dr as a service solution.

294
00:42:01.470 –> 00:42:17.670
Jirah Cox: Three new tonics through through the leap service that we offer if you, of course, if you have clusters in you know your your primary and secondary data centers leaps also the software, you can run on Prem to get the same outcome right about vm replication.

295
00:42:18.810 –> 00:42:21.540
Jirah Cox: run book recovery out of ban testing.

296
00:42:23.970 –> 00:42:25.920
Jirah Cox: That full automation for that for that stack.

297
00:42:28.290 –> 00:42:33.840
Andy Whiteside: or via any first hand, knowledge and experience, using using leap for the Dr side.

298
00:42:35.640 –> 00:42:46.230
Harvey Green: Not not me personally, as far as recovering from it, but helping customers at least get it in place, yes conversations about it absolutely.

299
00:42:47.550 –> 00:42:55.260
Harvey Green: Definitely again like Darren mentioned, if you if you’re a customer who does not have any sort of backup Dr site.

300
00:42:55.920 –> 00:43:04.320
Harvey Green: Today this is definitely a way for you to do it there’s an affordable way to do it and it’s pretty easy to implement and get going.

301
00:43:05.310 –> 00:43:18.990
Harvey Green: where you have you know nothing now this This allows you to both check the box, but check it in a way that you’re able to actually utilize test and be able to actually say something for.

302
00:43:20.100 –> 00:43:21.930
Harvey Green: Not just check the box.

303
00:43:22.440 –> 00:43:29.640
Jirah Cox: Right, I think you get full credit for that answer, however, setting it up that’s that’s the important part right like you don’t get extra points for actually suffering the outage.

304
00:43:29.730 –> 00:43:30.390
That makes you guys.

305
00:43:33.360 –> 00:43:43.080
Jirah Cox: Hopefully that’s that’s what we want for all everyone right is is, you have the production in place capability to recover you test it and never actually need to maybe do a full on full blown full smash recovery.

306
00:43:44.430 –> 00:43:55.470
Andy Whiteside: Well, for for me leap is that story that came full circle, but then also watching new tactics doing what they’re doing with the clusters on azure clusters on aws maybe clusters on tcp.

307
00:43:55.920 –> 00:44:12.780
Andy Whiteside: it’s those types of things building out redundancy, but for people who just need that Dr scenario check a few boxes pay a few bills nothing compared to pass on guard bill kind of thing, and now you got it covered and when you need to test it, you can.

308
00:44:12.930 –> 00:44:18.000
Jirah Cox: it’s one yeah soundgarden last in the past there right like.

309
00:44:18.300 –> 00:44:19.860
Jirah Cox: Right it’s recovery that doesn’t involve like.

310
00:44:20.220 –> 00:44:24.630
Jirah Cox: backing up a semi you know into the parking lot and hooking into the power grid right it’s.

311
00:44:24.750 –> 00:44:35.460
Jirah Cox: Right software defined recovery to target of your choice right so that can be your cluster to to new tannic that can be your cluster to.

312
00:44:36.120 –> 00:44:46.980
Jirah Cox: Your other cluster it communicated your cluster to public cloud right which where you can also just run at 10 X cluster right so it’s really you’re in control of what your recovery environment should look like.

313
00:44:48.330 –> 00:44:48.720
Andy Whiteside: I went.

314
00:44:50.400 –> 00:45:02.520
Andy Whiteside: Before this world existed, we just I just implemented vmware for the first, second time in a data Center and I went to sungar to do my Dr test for the new company, I was working for fortune 500 company and.

315
00:45:03.360 –> 00:45:13.470
Andy Whiteside: The servers they gave me were so old I couldn’t even install the os on the server is much less the hypervisor and all the os on top of it to rebuild the environment, I was literally there an hour.

316
00:45:14.250 –> 00:45:18.960
Andy Whiteside: There were people walking around from hurricane Katrina 10 years earlier still walking around the data Center.

317
00:45:20.160 –> 00:45:31.980
Andy Whiteside: I was there, an hour this stuff wouldn’t work I just left and went out to a club with my buddy like that was the Dr test and I got back in on Monday, my boss said how to go, I said fine that’s all we ever talked about.

318
00:45:35.910 –> 00:45:40.530
Jirah Cox: Okay, I mean we should probably had an unwritten step here of have a more rigorous Dr tests than that.

319
00:45:40.830 –> 00:45:41.670
Harvey Green: Just a little bit.

320
00:45:44.130 –> 00:45:48.690
Andy Whiteside: But my I think we were spending 10,000 a month or something for the junk I got when I got there.

321
00:45:49.350 –> 00:45:59.940
Andy Whiteside: I was leaving anyway, I was like this is this is insane we have these guys have no idea what they were just checking boxes, this is the same place to the business continuity side of that plan was you ever buy a laptop.

322
00:46:00.810 –> 00:46:13.500
Jirah Cox: I mean I can’t think of a better segue than to say that leap has a Dr test auditing features, it will tell you what it did during the test and give you a PDF that you can you can send to somebody that cares about habit Tesco.

323
00:46:15.210 –> 00:46:17.340
Jirah Cox: thanks for the thanks for the tip there anything else fantastic.

324
00:46:17.520 –> 00:46:31.470
Andy Whiteside: You know i’m not proud of everything’s happening not everything something’s not all right last one is new tactics mine for backup what does new tannic mind doing to help us with the recovery side of the objective here.

325
00:46:32.490 –> 00:46:40.290
Jirah Cox: yeah I mean, I think this calls it out right is is turnkey data backup and archiving right So if you if you.

326
00:46:41.160 –> 00:46:51.750
Jirah Cox: are adopting the tactics, but you should treat HIV you’re open to maybe any backup provider, you could you could talk to Harvey you talk to the tactics and say hey what’s The easiest way to just drop in.

327
00:46:52.890 –> 00:47:05.970
Jirah Cox: My new backup target software to get there, all that good stuff and mine is the package you know newt annex for storage, as well as our software partners for the backup provider and like agents, if you need them.

328
00:47:07.980 –> 00:47:15.360
Jirah Cox: All in one in one single cluster right so he’s probably going to use our our object storage under the covers and then.

329
00:47:16.050 –> 00:47:25.500
Jirah Cox: Things like our mind partners like vm haiku calm vault as the actual software that is going to pick up your data, whether it’s you know if you say i’ve got physical sequel over there.

330
00:47:26.310 –> 00:47:35.580
Jirah Cox: or i’ve got vm server here, whatever right mine is that you know kind of all in one one stop shop for both backup software and storage in one cluster.

331
00:47:36.270 –> 00:47:40.560
Andy Whiteside: Right, I know our team is using it were to work with haiku.

332
00:47:41.940 –> 00:47:47.310
Andy Whiteside: leverage in mind underneath the covers in haiku turns around and adds additional value on top of that.

333
00:47:47.850 –> 00:47:48.540
Jirah Cox: couldn’t be simpler.

334
00:47:50.310 –> 00:47:51.840
Andy Whiteside: have anything on the unconscious mind.

335
00:47:53.040 –> 00:48:08.220
Harvey Green: i’m just looking at the full strategy there and I can’t get this thought out of my hand, so you have to forgive me but snapshot back backup Dr, otherwise known as Oh, oh no and oh snap.

336
00:48:12.510 –> 00:48:13.470
Jirah Cox: it’s a spectrum.

337
00:48:13.890 –> 00:48:14.490
Harvey Green: It is.

338
00:48:18.330 –> 00:48:20.010
Andy Whiteside: Spectrum sorry.

339
00:48:21.660 –> 00:48:28.140
Andy Whiteside: All right, um so new tannic select last section talks about any kind of new tannic solutions key to security posture.

340
00:48:28.620 –> 00:48:34.470
Andy Whiteside: I can’t think of a better way to tie it together than to talk about what i’ve talked about it, multiple times on this call, and that is.

341
00:48:34.920 –> 00:48:48.660
Andy Whiteside: cloud enabled technologies are allowing us to solve a lot of these problems, new tannic is the cloud enabled technology that can be anywhere you needed to be that’s what’s been so awesome about watching tanks journey here.

342
00:48:50.040 –> 00:49:06.120
Harvey Green: yeah absolutely um you know we we find a lot of customers in sled and fed who are not we’ll just say, not as excited to go run all of their information to a public cloud, so this gives them a lot of.

343
00:49:06.900 –> 00:49:14.400
Harvey Green: A lot of the same functionality, but being able to do that and still host it where they want to host it so.

344
00:49:15.330 –> 00:49:28.200
Harvey Green: That that is definitely a big one you’ve got the states, we talked about earlier you’ve got a bunch of the do the type of proof products, some of the certifications that are listed here.

345
00:49:29.220 –> 00:49:44.580
Harvey Green: that these are definitely very, very important pieces for the new tonics platform that people can use and have you know what they know to be a trusted solution.

346
00:49:45.390 –> 00:50:04.530
Harvey Green: One that’s compliant with the standards that they need, and something that they will be able to actually use, and you know really be able to just trust it, you know you’ve got everything built into this platform and everything built into this system from you know, again we just went through.

347
00:50:05.580 –> 00:50:07.140
Harvey Green: Protection backup and.

348
00:50:08.160 –> 00:50:15.180
Harvey Green: Recovery so you’ve got everything that you need to make all of those pieces happen, the way that you need them to.

349
00:50:16.770 –> 00:50:22.800
Andy Whiteside: Well, you spoke up there, and you brought the acronym slid back up I had forgotten, we were talking about slid.

350
00:50:24.630 –> 00:50:25.260
Andy Whiteside: Universal.

351
00:50:25.350 –> 00:50:27.480
Harvey Green: Across is it is.

352
00:50:28.800 –> 00:50:35.700
Andy Whiteside: gyro anything else on the security posture that can be enabled through and the tactics platform.

353
00:50:38.940 –> 00:50:53.970
Jirah Cox: What I think I think the bow tie around the whole thing is we’ve talked about you know virtualization talk about storage management for all of that security as as part of the DNA of that whole every layer of that stack.

354
00:50:56.100 –> 00:51:00.540
Jirah Cox: Micro segmentation backups Dr replication.

355
00:51:02.190 –> 00:51:08.010
Jirah Cox: And when I you know if for no other reason I do those things within the new tonics flavored fashion.

356
00:51:08.850 –> 00:51:15.510
Jirah Cox: I can call one number for support and get a world class support experience for every single layer of that stack right, so how many.

357
00:51:16.080 –> 00:51:30.390
Jirah Cox: How many vendors that I just pull out that can’t be pointing fingers at one another, when I need to make this all work for my you know, perhaps you know more rigorous Dr event than we talked about earlier yeah so.

358
00:51:30.630 –> 00:51:30.930
So.

359
00:51:32.250 –> 00:51:35.580
Andy Whiteside: I said the word platform intentionally and you expanded upon it.

360
00:51:37.110 –> 00:51:45.030
Andy Whiteside: You know you got it you got to have a platform or two that you that are your bread and butter and then things you add to it can work with that platform.

361
00:51:48.810 –> 00:51:52.770
Andy Whiteside: Having having one place to you know one place to go get the things you need.

362
00:51:54.300 –> 00:52:02.850
Andy Whiteside: That you can have the right customer service and then add you know additional things to that, but having that one, you know that one reliable place.

363
00:52:03.570 –> 00:52:11.940
Jirah Cox: You are calling, with a question about one part of that stack but the rest i’m talking to you understand everything else that i’m using there right, and you know just.

364
00:52:12.660 –> 00:52:22.530
Jirah Cox: You know piling a bunch of products on top of each other and hoping it all works together, and you are kind of in maybe in partnership with integrity you become the integrator no no they’re already integrated right yeah.

365
00:52:24.120 –> 00:52:28.080
Andy Whiteside: Well, I think that has a lot to do with i’m listening to the outliers book from.

366
00:52:30.120 –> 00:52:31.290
Andy Whiteside: What let’s the outliers book.

367
00:52:32.760 –> 00:52:34.020
Jirah Cox: that’s quite all right.

368
00:52:34.380 –> 00:52:47.100
Andy Whiteside: yeah Malcolm gladwell and he talks about you know, sometimes it’s just having the right tools and skills at the right time, you know new tactics coming of age in this cloud platform world.

369
00:52:48.210 –> 00:52:51.210
Andy Whiteside: prevents them from having to bolt a bunch of ugly stuff together.

370
00:52:54.270 –> 00:53:14.760
Jirah Cox: I think it’s that I think I mean honestly I my Hats off to our honestly, you know our data engineers back in the day right, like you, tax day one saying what can we do with software defined storage, that we can snapshot replicate recover firm roll back to offer immutability on.

371
00:53:16.080 –> 00:53:17.760
Jirah Cox: The data.

372
00:53:20.190 –> 00:53:24.930
Jirah Cox: sounds trite rarely come from a reformed former storage or a seller.

373
00:53:26.130 –> 00:53:35.070
Jirah Cox: The data is kind of those important thing right it’s like why we’re all here it’s why the applications exist, like yeah virtualization is great recovering that was great you couldn’t do one part without the others.

374
00:53:35.550 –> 00:53:43.110
Jirah Cox: But the other day without data integrity with that data agility and the ability to do fun things with the data we wouldn’t have.

375
00:53:43.470 –> 00:53:50.730
Jirah Cox: We wouldn’t be a suitable platform for backups we wouldn’t be able we shouldn’t be trusted with your first instance of the data in the application itself.

376
00:53:51.060 –> 00:53:59.460
Jirah Cox: let alone the backups right we wouldn’t be able to do database automation like we came with era, without a crazy crazy smart data platform below all of it.

377
00:54:02.280 –> 00:54:14.220
Andy Whiteside: it’s the it’s the last piece is the engine and everything else can be bolted around a really fast strong and reliable engine, you can you can do a whole lot with that yes.

378
00:54:16.110 –> 00:54:19.590
Andy Whiteside: Well, gentlemen it’s 506 on valentine’s day i’m already in trouble.

379
00:54:22.020 –> 00:54:26.820
Andy Whiteside: If you noticed, I was doing a lot of texting during some of this I gotta go have a good night.

380
00:54:27.510 –> 00:54:28.080
Harvey Green: yeah sorry.

381
00:54:28.350 –> 00:54:31.680
Jirah Cox: y’all y’all are gonna be my excuse for tonight too Nice.