Traditional IT security methods are increasingly flawed and the volume and sophistication of threats continue to increase. According to NETSCOUT, one DDoS attack occurs every three seconds, and the Cybersecurity and Infrastructure Security Agency recently added 66 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, with new common vulnerabilities and exposures (CVEs) growing over 25% year-over-year in 2022. New security methods delivered at the edge of the network, closer to the customer, are emerging as a more effective method for combating the increase in security threats.  

Latest cybersecurity threats expose flaws in traditional security methods

Let’s consider two methods of security for customer data: firewalls and cloud storage. Firewalls are not well suited to protect against modern threats. They’re meant to protect IT infrastructure, servers, and databases. However, when companies only use this security method it’s like leaving the doors and windows of your home open, without motion detectors, alarms, or other safeguards.

Cloud-based storage, while protecting data from local (user-level) loss or destruction, is increasingly attractive to nefarious third parties. According to IBM’s Cost of a Data Breach Report, 45% of data breaches occurred in the cloud. Think about your data center firewall as a safe inside your home, where highly sensitive data is kept. It’s a singular line of defense that, if broken, can be extremely costly. In fact, the average data breach costs $4.3M. If network downtime is involved, it can cost you $9,000 per minute.

The value of edge security

Edge security encompasses a large area that includes more sophisticated barriers, like the gate to your community and alarms on your windows. If a threat is detected, you’re alerted in real-time and can deploy rules instantly at scale with higher accuracy. Edge security products are also more advanced, leveraging AI and other tools to react intelligently to threats. 

For example, edge security products are designed to identify and mitigate various types of attacks that target customer-specific systems and data, such as robust botnet attacks, zero-day threats, credential stuffing, CVEs, or Distributed Denial of Service (DDoS) attacks. It’s even possible to identify bots that attempt to mimic human interactions by leveraging AI/ML and traffic behavioral modeling. This level of security cannot be found outside the edge. 

Bombay Stock Exchange (BSE), India’s leading stock exchange, implemented edge security and now detects threats in real-time, deploys security rules in under 60 seconds and has cut infrastructure costs by more than 50%.

Users have come to expect data privacy everywhere they go. If their trust is lost, consider it a breakup. According to PCI Pal, 83% of consumers will stop spending with an organization immediately after a security breach–and over 21% of those consumers will never return. Edge security products add an additional layer of security, even on top of your cached content, and provide another layer of proven security for third-party SaaS/PaaS partners you depend on. 

Improve SecOps productivity by adding security at the edge

Integrating security operations into the edge also makes it possible to implement safe updates across global domains in minutes. Mature edge products allow you to A/B test or perform virtual patches for all changes by previewing modifications in an audit mode so the impact of the change can be understood before it is applied. Instead of deploying a change and then identifying an error, you can quickly validate or iterate until you see the desired impact, reducing overhead. This is especially important for zero-day exploits where you need to react quickly without jeopardizing business operations. 

Take action

Security attacks are increasing in frequency and could happen to your organization at any time–don’t wait to take action. Consider solutions that incorporate a variety of edge security components. First, protect your physical network using PCI DSS end-to-end encryption. You should also protect your data against Origin attacks using DDoS protection, Origin shield, and DNS Management. Finally, protect your applications with WAAP, Bot Management, and Layer 7 DDoS protection that also shields your APIs.  

Edgio, a leader in edge security, will examine your specific environment and tune our solution to meet your needs. Edgio manages all layers of traffic protection using access control, API security, rate limiters, advanced bot management, custom rules, and managed rules to ensure your security operations team can not only quickly react but also proactively take action against security threats. Learn more about Edgio

Security

Most people wouldn’t consider diving in a flimsy cage near an aggressive shark. After all, a strong cage is an essential part of that experience. When you know you’ll be swimming in chummed waters, the quality of the cage’s design and construction suddenly becomes crucial — and the open ocean is not the place to make your safety checks.

Enterprise data is no different. In a world full of cyber threats, running a business is difficult enough without taking unnecessary risks. Much like the diver’s cage, the IT infrastructure you choose can make a critical difference in data protection. How well-protected is your data? And how quickly can you restore things to normal should something go wrong? You need to answer these questions now, before your defenses are breached.

If your IT organization is like most, you’ve been accumulating data protection solutions over the years. Now you find yourself saddled with rigid, siloed infrastructure based on an equally rigid backup strategy. If it feels like inadequate protection, that’s because it is. You’re constantly stuck in maintenance mode, with disparate, multi-vendor backup and recovery systems that are complex and expensive to maintain. Multiple touch points of administration slow down production, and the costs of software licensing, disruptive upgrades, and capacity over-provisioning add up fast.

Hybrid cloud multiplies your challenges

As your organization leverages the cloud to grow your business, you start generating volumes of production data that must be efficiently protected as you scale. But protecting and managing apps and data in a hybrid cloud can prove even more complex and costly than legacy on-prem solutions. You need to deal with:

Growing cyberthreats. Ever-increasing ransomware attacks affect every industry. With data distributed across multiple locations on-premises and in the cloud, IT leaders need a solution to effectively protect their data against ransomware and malware threats.Siloed data. Data that is difficult to access increases cost and risk while lowering efficiency. With the proliferation of data infrastructure, data is increasingly likely to be siloed by location, owner, data type, management platform, and more. IDC finds that companies on average must manage and protect 14-20 different data silos. This level of complexity severely inhibits the innovation and business value that data offers — while increasing IT expense, risk of attack, and potential data loss. In response, IT leaders need platforms to unify data and eliminate siloed infrastructure.Inconsistent protection policies. Data protection across on-premises and cloud tends to be inconsistently enforced and complex to manage. Often, there are no common protection policies, creating a corresponding increase in risk for your data. IT leaders need a solution that unifies management across hybrid cloud.

Backup as a service solves many challenges

Agile, resilient data protection is key to always-on availability for data and applications in today’s dynamic hybrid cloud environments. While every organization has its own set of requirements, almost all focus on cost efficiency, simplicity, performance, scalability, and future-readiness when architecting a data protection strategy and evaluating new technologies. These days, you can solve for all these criteria with a pay-as-you-go, backup as a service solution.

Modern backup as a service solutions are designed to support today’s challenging IT environments by delivering five key benefits:

Simplicity. Simplicity should be at the top of your list for an as-a-service data protection offering. Traditional backup approaches are notorious for their complexity, requiring multiple backup tools to manage operations across hybrid cloud. This fragmented approach inhibits innovation because you must divert time and energy to configuring, initializing, and managing separate operating systems and establishing best practices.Consistent protection. You should be able to deploy your solution quickly and manage it simply via a single console. Global protection policy and automation help to ensure consistent protection for your on-prem and cloud workloads. Users can visualize multiple VMs, data stores, or cloud native workloads from a single dashboard; this allows execution of backup and recovery for operations and applies appropriate protection when required.Meeting RTO/RPO requirements. A modern backup and recovery service leverages consumption-based pricing and efficient data mobility to eliminate complexity and free customers from the day-to-day hassles and operational costs of backup infrastructure. And it’s flexible: customers should be able to restore instantly using snapshots or recover workloads rapidly on-premises and leverage the cloud for long-term, cost-effective data retention.High efficiency. Space-efficient backups deliver better storage economics as compared to alternate backup solutions. Your backup data should be stored in a compressed, de-duplicated format that helps to drive down the cost of long-term retention and reduce backup storage costs. Additional storage efficiency benefits include:Reduced network bandwidth costsEfficient data transfers and faster backup completion using only incremental changesFaster restores using only missing blocks from the cloud store for recoveryIncreased capacity with predictable costs and cloud scaleComprehensive data management. The most advanced backup as a service solutions integrate with comprehensive cloud data services offerings to orchestrate compute, provision storage resources, configure networking, and protect workloads with a unified experience. This creates a single, company-wide data management strategy that breaks down data silos and complexity with self-service agility and a cloud operational experience everywhere.

Protection against ransomware

For virtually every company, the question is not if, but when, a ransomware attack will occur. We’ve looked at this issue in detail, but the key takeaway is that IT leaders need a robust data protection solution to effectively counter this metastasizing threat.

Leading backup as a service solutions efficiently protect backup data from cyberattacks like ransomware by keeping data hidden from attackers. After all, ransomware can’t infect and encrypt what it cannot access. Your backup and recovery solution should be able to create backup stores which are not directly accessible by the operating system. It should also provide configurable backup data immutability to prevent a backup being deleted or modified before the designated retention date.

HPE leads on backup as a service

HPE Backup and Recovery Service delivers the simplicity of the cloud experience while seamlessly protecting on-prem and cloud-native workloads. The solution can meet any backup SLA and is managed from a single console. HPE Backup and Recovery Service sets up in minutes with no additional proxies, virtual appliances, media servers, or software. IT leaders can experience the benefits of HPE Backup and Recovery Service for themselves — including all features and support — with a 90-day free trial.

The bottom line

Data plays an increasingly important role in today’s modern enterprise. As organizations leverage the hybrid cloud to grow and innovate, the volume of data requiring protection continues to expand, and providing that protection becomes more complex and costly. When architecting a data protection strategy and evaluating new technologies, a modern backup as a service solution offers cost efficiency, simplicity, performance, scalability, and future-readiness.

____________________________________

About Ashwin Shetty

Ashwin Shetty is a Product Marketing Manager for HPE Storage. In this role, Ashwin is responsible for helping customers understand the value of modernizing data protection with HPE Backup and Recovery Service, HPE StoreOnce, HPE RMC, and HPE StoreEver Tape. Prior to joining HPE, Ashwin worked in the sales and marketing groups of Oracle and HCL.

Data Management, HPE, IT Leadership

IT analyst firm GigaOm is quick to point out that primary data is the first point of impact for ransomware attacks. This fact puts primary storage in the spotlight for every CIO to see, and it highlights how important ransomware protection is in an enterprise storage solution. When GigaOm released their “GigaOm Sonar Report for Block-based Primary Storage Ransomware Protection” recently, a clear leader emerged.

GigaOm named Infinidat as the industry leader in ransomware protection for block-based storage. Infinidat is a leading provider of enterprise storage solutions. According to GigaOm’s independent analysis, Infinidat distinguishes itself for its modern, software-defined storage architecture, securing enterprise storage with a strategic, long-term approach, broad and deep functionality, and high quality of innovation.

One of the top CMOs in the tech industry, Eric Herzog, is leading the marketing charge at Infinidat and had this to say about this recognition from GigaOm:

“Infinidat has taken the benefits of ransomware protection on enterprise block storage to the next level, including guaranteed immutable snapshot recovery in one minute or less, greater ease of use, and comprehensive cyber resilience.”

“Being recognized as the industry leader for combatting ransomware not only gives us enormous forward momentum as a solution provider of cyber storage resilience and modern data protection, but it also gives Infinidat a seat at the table to talk to large enterprises and service providers about what we can do to eliminate the threat of ransomware for them,” he added.

The GigaOm Sonar Report showcases the strength of Infinidat’s novel InfiniSafe cyber resilience technology embedded across all its platforms: InfiniBox®, InfiniBox™ SSA and InfiniGuard®. The report states:

“Infinidat offers a complete and balanced ransomware protection solution. InfiniSafe brings together the key foundational requirements essential for delivering comprehensive cyber-recovery capabilities with immutable snapshots, logical air-gapped protection, a fenced forensic network, and near-instantaneous recovery of backups of any repository size.”

Infinidat has delivered the industry’s first cyber storage guarantee for recovery on primary storage – the InfiniSafe® Cyber Storage guarantee.

The company recently extended cyber resilience to its InfiniBox and InfiniBox SSA II enterprise storage platforms with the InfiniSafe Reference Architecture, allowing Infinidat to provide its immutability snapshot guarantee and the recovery time of immutable snapshots at one minute or less. InfiniSafe was announced on the InfiniGuard modern data protection and cyber storage resilience platform in February this year.

The GigaOm Sonar Report recognizes the features and functionality of Infinidat’s cyber resilience technology: “InfiniGuard delivers solid cybersecurity features at no extra cost, allowing customers to quickly and securely restore data, even at scale, in case of an attack.”

Through near instantaneous cyber recovery, Infinidat helps organizations avoid having to pay the ransom, yet still retrieve their valuable enterprise data, uncompromised and intact. Think about how significant this really is, given how much of a threat ransomware is.

When ransomware takes data hostage, it can destroy backup copies of data, steal credentials, leak stolen information, and worse. It has caused businesses of all sizes to shut down operations overnight, so it is not unusual for a company to pay a large sum of money to restore their business. Infinidat’s solutions can put a stop to it.

It is an honor that GigaOm has recognized the technology leadership. The analyst community has been spot-on about how enterprises and service providers should strategize to not just take “baby steps” but actually take a quantum leap forward to address these cyberattacks.

In addition, GigaOm recognized Infinidat as a “Fast Mover,” one of only two vendors awarded that accolade. “Fast Movers” are expected to deliver on their solutions and technologies faster and with more features/functionality than other vendors known as “Forward Movers.” Infinidat has been rapidly delivering new technology, several guarantees, and new capabilities over the past 18 months, including the extension of new features and functions to InfiniSafe.

Max Mortillaro, Analyst at GigaOm, shared his perspective: “Primary data is the first point of impact for ransomware attacks, so it is critical for organizations to implement primary storage solutions that incorporate ransomware protection, such as Infinidat’s cyber resilience solutions.”

He went on to say, “Our new GigaOm Sonar Report on ransomware protection for block storage comes at a time when ransomware attacks have become so prevalent and such a persistent threat for all organizations across all industries. We have seen through our analysis how ransomware can cause significant damage to companies and government agencies.”

The time is right for Infinidat to step forward as a recognized industry leader for ransomware protection.

To download the full analyst report, click here.

To read more about Infinidat’s cyber resilience solutions, click here.

Security

Here’s the secret to creating a board presentation on cybersecurity, according to Victor Shadare, head of cybersecurity at the international publishing giant Condé Nast:

“The board doesn’t have time to look at detail as such. They want something that’s going to punch them in the face,” he said. Metrics that create a narrative and show how the business compares to competitors, the wider industry, and globally against all businesses give a clear picture that allows board members to set strategy.

Shadare, along with Orca Security advisory CISO Andy Ellis and Spire Security Vice President of Research Pete Lindstrom, will share cybersecurity metrics that matter as part of CSO’s Future of Cybersecurity Summit, taking place virtually July 19-20. The event, which focuses on elevating your organization’s protection strategy, will feature CSOs, CISOs, and security leaders and offer vital insights on the most pressing issues in security.

The event kicks off with a conversation with Blackstone CSO Adam Fletcher on confronting assumptions about SaaS security and adopting a shared responsibility model.

Brian Behlendorf, general manager of the Open Source Security Foundation, will explain a new effort backed by Amazon, Google, Microsoft and others to improve the security of open-source software. Later in the day, IDC Senior Research Analyst for DevOps Katie Norton will share tactics and research on incorporating security in the software development lifecycle.

Offering insight into modern cyberwarfare taking place between Russia and Ukraine will be Christopher Painter, former top cyber diplomat for the U.S. and now president of the GFCE Foundation Board, and Christopher Burgess, formerly of the CIA and now a CSO contributor. They will examine the potential effects of the invasion on critical infrastructure and what organizations can do to prepare for the threat.

Increasingly, CISOs are having to protect not only their companies but themselves, too. Legal experts will dissect the cybersecurity liability threats CISOs personally face as well offer practical tips for limiting exposure to litigation. Hear from Simon Fawell, a partner at Signature Litigation; Aravind Swaminathan, a partner at Orrick, Herrington & Sutcliffe; and Jack O’Meara, director and cyber litigation support lead at Guidehouse.

Pick up strategies for a creating a world-class cybersecurity center during an interactive workshop with Kathryn Knerler, MITRE Labs department manager and senior principal cybersecurity architect, and Ingrid Parker, manager of intelligence at Red Canary.

AAA National CISO Richard Latayan will lead a discussion on building resiliency into third-party relationships with Alex Attumalil, global CISO of Under Armour, and Ronald Banks, executive vice president and CISO of Texas Capital Bank.

Wrapping up the day, CN Assistant Vice-President and CISO Vaughn Hazen will share how to optimize investments in information security and the best ways to mitigate risk.

On July 20, the summit begins by tackling an issue facing many security leaders: burnout. Dr. Eva Selhub, an executive coach and resiliency expert, will advise on how to manage adversity and improve performance in the face of chaos. Later, she will answer questions in a live chat with attendees.

The day continues with Doug Fisher, SVP and CSO at Lenovo, who will share his strategies for strong security leadership. Mishu Rahman, head of cyber strategy, business risk, board governance and regulation at BNP Paribas, will discuss building agility to face emerging threats.

Sometimes the threats are close to home. Burgess returns along with Atlassian Chief Trust Officer Adrian Ludwig to examine insider threats and third-party risk.

One risk mitigation strategy is to move away from passwords to more secure protocols. FIDO Alliance Executive Director Andrew Shikiar will look at the passwordless future, including the use of passkeys as a sign-in alternative.

Throughout the summit, sponsors including Interos, LastPass and ManageEngine will offer thought leadership and solutions on subjects such as supply chain resilience, observability and risk; managing access for the modern workplace; and strategic legacy app modernization. Check out the full summit agenda here. The event is free to attend for qualified attendees. Don’t miss out – register today.

Agile Development, Data and Information Security, DevSecOps, IT Strategy, SaaS, Threat and Vulnerability Management