B2B Tech Talk with Ingram Micro
B2B Tech Talk with Ingram Micro

Episode · 3 weeks ago

Challenges of Cloud Storage Security and Protection Plans with Jeremy Snow

ABOUT THIS EPISODE

Cloud infrastructure is highly sought after today and widely considered the next step in data management. However, like any software solution, it comes with vulnerabilities. 

Veritas is on the cusp of bringing cybersecurity solutions to businesses of all sizes and strives to fill the gaps in cloud storage protection. 

Shelby Skrhak speaks with Jeremy Snow, system engineer at Veritas, about: 

  • Why cloud data is challenging to protect
  • Fallacies about cloud data storage
  • What Veritas brings to the table 

To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk 

Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify,Apple Podcasts or Stitcher. Or tune in on our website.

You're listening to B two, B tech talk with Ingram Micro, the place to learn about new technology and technological advances before they become mainstream. This podcast is sponsored by Ingram Micro's imagine next. It's not about the destination, it's about going someplace you never thought possible. Go to imagine next, DOT INGRAM MICRO DOT com to find out more. Let's get into it. Welcome to B two B tech talk with Ingram micro. I'm your host, shall be Scare Hawk, and our guest today is Jeremy Snow, system engineer for Veritas. Jeremy, welcome. Thank you, shelby. Thank you for having me. Excellent. Well, today we're focusing on the cloud offerings from Veritas. But first, Jeremy, tell us about Veritas and in your role there. Sure. Well, let's talk about Veritas for a second. You know, a lot of people know us and we've been around for about thirty plus years when it comes to data protection. A lot of people just know us for data protection, but we're really sort of a larger scope. We fall into three categories called API, availability, protection and insights, but we're really a data management companies. So not only do we protect data, but we give you analytics about that information, including with technologies and features where you're able to actually have high availability for some of those critical applications. So we have quite a large portfolio and a lot of success over the thirty plus years. So yeah, I mean Veritas is known for data protection and backup solutions, but you know, I understand the last few years they've really expanded their focus on cloud and cloud capabilities. I guess if you could expand a little bit on that. What does that mean? How, how and why are the focuses moving to cloud? Yeah, well, there's a lot of convenience now as far as cloud goes. We're seeing a lot of our customers where they really want to focus on the projects they have and the applications they're trying to develop, versus actually having to maintain and manage some of these data centers. So we're seeing a lot of our customers where they really want to just give that give that workload to some one else and be able to have that access.

I mean you also look at when covid happened, the pandemic, where a lot of people were restricted to going into the data centers, and so they had these restrictions where they needed to start building some of their infrastructure, but they just didn't have the access to it. And so, you know, having a quicker return time as far as building your infrastructure and the backbone to what you need for your applications and then, of course, just, you know, not having to manage that and being able to focus on your actual projects. These are big convenience and it's the vigility that basically, if you do need to expand, if, let's just say, you're running out of storage, you're running out of, you know, some type of computer infrastructure, you don't have to wait to go and put it in a p O, you know, and wait for that hardware to come into the data center, wait for someone to install it and deploy it. You have with a click of the button, essentially, you're able to actually get that infrastructure and move forward with your project then. So there's no bottlenecks when it comes to your data center itself. And so yeah, I mean, and plus there's a lot of added features and functionalities that you'll get, services that you can actually add on to your infrastructure, and so it's just it's very convenient. Obviously. Yeah, well, you know, we know that the world operates on the cloud or multi cloud, hybrid cloud. But UH, so do those bad actors. So for those that are underwear, I guess, why is cloud data or storage so challenging to protect? Yeah, I mean you brought up a good point. I mean the bad actors right. So, I mean, obviously, you know, cloud is something that is very convenient and nice to have. You know a lot of customers are using, you know, bucket storage, blobs storage, yes, three buckets. But of course you're gonna have people there that want to disrupt that and it could come from another factors. It could be ransomware, obviously, is the big hot topic. Um, you see sometimes in certain cases they try to do a man in the middle attack from on Prem into the cloud if it's not encrypted, so they'll try and get in between there to corrupt that data. Then you have obviously them directly going in and trying to get gain access to that storage in the cloud as well, because once they contain access to that storage, you know, as will probably talk about further, if there's no proper...

...protection plan in place, they basically hold ransom that data and the customer either decided to pay it or sacrifices the loss of that information. So, unfortunately, you know, with great technology and you know these improvements, we're going to have people in there to try to take advantage of that and obviously the customer, you know, unfortunately, might have to pay in the end if they don't have some type of protection plan in place. And just to clarify, the man in the middle, what do you mean by that? Essentially just the data in transit. If any information is being sent, let's say locally from a data center into the cloud, Um, they might try to sort of, you know, in transit, try and grab some of that. You know, they try to sort of interfere with that communication in between the cloud and you know, they might try to either pay that data or corrupt it when it gets to the cloud. And again, just another strategy of being able to ransomware and try to obtain some of that information. Well. So when we look at cloud data and storage, there's a lot to protect there and I think that there's maybe some some assumptions of what is safe, what is not safe, what is protected what is not protected. So I guess what would you say are some of the biggest fallacies about cloud data or storage? Yeah, and you know, we can talk as a whole and I can give you some examples. Most people feel that once your data is, let's say in the cloud, it is protected, and you know, it depends what your definition of protection is. Realistically, there's a level of redundancy towards that data. So if a couple of disks fail or, let's say, even a data center fails, usually there's at least another copy in a close data center. But that's really where it kind of stops, and that's what people don't understand, is that your data at that point, I mean, it doesn't stop anything from accidental deletions. Um, we see this quite commonly, that whoever does have access, whose hands are into that storage, they could delete it either intentionally or accidentally. And then, of course, earlier what we spoke about is ransomware as well. So, for whatever reason, if they get ahold of this copy of this data, um at that point you, if you don't have another copy of it to recover...

...from, you know, you, as we said before, you either pay that ransom and hopefully get that data back or you just, you know, forfeit that information, and hopefully it's not personal information that could damage your company's reputation, which is also another associated cost, right. So you know, it's a tricky game and so, you know, other conversations, a lot of big conversations I'm having, is around office six. You know, that's another set of data that's, you know, running in in the cloud that people think that it's protected and it's really not. So accidental deletions of emails and intentional deletions of the emails and you know, we see quite commonly ransomware getting ahold of these accounts and holding these emails, which has critical information, business information again, which I would have a huge impact on the company. So all this information is not protected, it's just has a certain level of redundancy in the back end. So you definitely need a protection plan in place if you want to make sure that you don't become a victim to, let's say, ransomware or, as we set other possible scenarios of deletion, accidental or not accidental. Well, so then, tell us about various cloud solutions and how they work. Yeah, absolutely. So. You know, early we spoke about it where, you know, we have a very large portfolio of solutions, you know, and it could be anywhere from obviously what we're you know, we're very well known for his data protection to solutions that will help keep your critical applications running almost at zero downtime. I would say probably almost every single one of our solutions has some type of tie into cloud, whether it just be a storage target, let's say, for archival data, or more in depth, let's say if we look at our backup solutions. A lot of our solutions are in the marketplace and some of those top vendors you know, and so you can deploy them from their ami either templates that are residing in the marketplace, so you can run a whole infrastructure. So Veritas idea is that, you know, we adopted cloud and at least storage targets. I want to say it's almost been over ten years now. Once cloud became available, we started doing that little incremental being able to access cloud storage and so a customer, what I love about this is there's a great story where a cuss Smer can slowly adapt cloud as comfortable as they want to...

...get. So we see a lot of our customers where they want to start moving some of their data to the cloud, and of course you can do this with encrypted or not encrypted, but eventually they might want to start moving some of the workloads to the clouds. So our solutions help move some of those physical or virtual machines into the cloud. Eventually you can actually run a whole back up our lit for example, our net backup protection plan. We can run this all up in the cloud and it's fully automated where if workloads start to increase, it'll start expanding the resources to match those workloads. So we're really sort of adapting to what we're seeing our customers go. So if a customer wants to be on Prem on physical appliances, that's great. We offer that. But if they actually want to go fully deployed in the cloud and have multi cloud as well, so different vendors and mixing their workloads, we support that as well. So there's a wide spectrum of where we fit Um, as I said, and it can be as small as just accessing it as a storage target or it can be a full deployment in the cloud. And again we have most of our solutions where a lot of our solutions are in the marketplace and some of these major cloud cloud vendors. You know, for a company that's maybe thinking, Oh, I'm too small I'm not a target. That's you know, that's not going to happen to me. You know, what would you say to them? Yeah, you mean as far as, example, is maybe a customer feeling they're they're too small for the cloud, right. Well, too small cloud and too small to be to be cyber attacked. Oh, and that's a great question. You know, and and that's a very common idea as well. where, you know, we've seen public high schools get attacked with ransomware. So ransomware, obviously they'll focus on a lot of large organizations, hopefully to get a bigger bang for their buck, but we've seen it as small and granular as high schools and trying to keep some of that information as ransom. So wherever they can penetrate and gain any of that access to that information, they're gonna look everywhere. So it could be the smallest company and you know, and some of these smaller companies right, that could mean, you know, the base of the tilting point of success or failure of that company, which is unfortunate. So everyone, we've everything as far as small, medium business to enterprise level...

...being attacked by ransomware and that's why we also offer you know, if we talk about let's say, some of our protection solutions like net backups, our enterprise grade, but we also backup exact, which is our, you know, SMB commercial business protection software, and this has ransomware resilience built into it, with cloud storage, storage targets to immutable storage as well. I mean, obviously ransomware is hitting from all sizes of different organizations well, and I'm glad you brought that up because, yeah, the an SMB thinking I'm too small to be attacked, but also an smb thinking, you know what, there's probably not a solution for me. So you're saying that very toes offers those options from SMB up up to the enterprise level. Right, exactly. We don't want to leave, you know, any type of size of organization out and everyone needs that level of protection. And you know, as we said, you know, net backup being for an enterprise grade, it might be too large for, let's say, some of the small organizations, and this is where other solutions like backup exact come into place. You know, it's a smaller footprint and obviously a lot easier to grow in a smaller business and you don't necessarily need that large enterprise footprint for your protection plan. But absolutely so. We do offer both. You know, whether you're a small, a very small organization just starting out, or you're a very large organization up into the pet of bites of data. Um, we support it all. And then why Veritas? What? What does Veritas do better than its competitors? And why would a company want to trust their, you know, their backup solutions to Veritas? It's a great question. I mean, I guess this is something I could talk about for a long time, just as far as you know. Why Trust us? You know, earlier we spoke about it. We've been around for thirty plus years and obviously we're not going anywhere because we've had so much success. Um, you look at some of the statistics, we're working with eighty seven percent of the fortunate companies, so the big banks, the Telco's globally across the world. These companies trust us because we offer a solid solution both you know what you're very looking for,...

...availability protection or insights. Um, we have a play there. And so what I love about Veritas as well, if we're looking from a protection plan perspective, we're really looking at what the customer needs and we realize that everyone. There's not like a one size fits all. So if it's, you know, hardware appliances with our software you need, fantastic. If you just want to use our software, yeah, we can do that as well. You want to run in the cloud in a containerized form. So we really look at the customers needs and see where they're trending to and we offer that. We don't want to force them down one one lane and say, you know, you have to buy our appliances. No, you don't. But that's the great part, is that we build our appliances around intrusion detection systems, making sure that you can't run any outside processes. When you hear things like air gap solutions, these are the things we want to be able to offer everything to the customer and they get to make that final decision. You know how how far they want to go, as far as they want to stick with that or sort of go into the cloud. But why stick with Veritas? Is Because, again, like I said, we're very agile. Will offer you exactly to what you need and what you require and at the same time, we've had a lot of success doing it. And you know, maybe I'm biased, but I feel that we really have that we have that connection with our customers where we're truly trying to solve that customer's problem and their challenges, and it's a passion of ours to be able to do that and make sure that they don't fall into something like ransomware, because this is the end game, is to make sure that we limit this or completely abolish it at some point. Right right. Well, as we start to wrap up our episode, we as that's our guests. The same final question and that's where do you see technology going in the next year? I know that's broad, but uh, if if you're to get your your crystal ball out, what would you say is gonna is gonna Happen in the next year? Yeah, I mean, you know, there's so many moving pieces going on right it seems like we're, I'm hoping, coming out of the tail end of this pandemic, you know, and so where that might go, Um, I still feel that we're working in this sort of remote environment. So I still think you're going to see a large adoption to cloud and that expending tremendously. At the same time, you know, I still see that hybrid...

...cloud environment still being utilized I still think a lot of customers want their own data centers as well and have control over that, but also, for certain applications, being able to run that in the clouds. So I think that will continue to move forward a hybrid cloud environment and a mixed bag, depending on, you know, if that applications fit better for on Prem or in the cloud. And it's sort of a little plug for us. We also have, you know, some analytics that help you make decisions on that, whether it's cost advantageous to keep it on prem or keep it in the cloud as well. And these are a lot of questions and decisions that have to be made. So definitely, I think where I see it going is still that mixed model, for sure. So for our listeners who wanted to follow up or find more about what we talked about today, how can they reach out? Yeah, so, I mean obviously we have our our website or landing page verites dot com, but I mean, if people want to reach out to me directly, it's you know, I'm happy to take any emails or called, but you can reach out to me at Jeremy Dot snow at Veritas Dot Com, and then, you know, if I'm not the person to talk to. All definitely direct you towards your local resource, but definitely these are different areas where you can reach out and get more information, for sure. Excellent. Well, Jeremy, I appreciate the time today. Thanks so much for joining me great thank you very much. He'll be for having me and it's always a pleasure being here and having these conversations and thank you listeners, for tuning in and subscribing to B two B tech talk with Ingram micro. If you like this episode or have a question, please join the discussion on twitter with the Hashtag B two B Tech Talk. Until next time, I'm shelby scare talk. You've been listening to B two B tech talk with Ingram micro. This episode was sponsored by Ingram Micro's imagine next. B Two B tech talk is a joint production with sweet fish media and Ingram micro. Ingram micro production handled by Laura Burton and Christine Fan. To not miss an episode, subscribe today on your favorite podcast platform.

In-Stream Audio Search

NEW

Search across all episodes within this podcast

Episodes (445)