Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Networking
    • The Edge
    • Virtualization
    • Converged Infrastructure
  • Data Security ▼
    • Backup & Recovery
    • Cybersecurity
    • Application Security
  • Cloud ▼
    • Private Cloud
    • Public Cloud
    • Hybrid Cloud
  • Storage ▼
    • Software Defined Storage
    • Object Storage
    • Physical Storage
  • DevOps ▼
    • Analytics
    • Applications
    • Open Source

Infinidat: Backup Is Boring. Until It Saves Your Job!

Truth in IT
05/09/2025
11
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data and we are here in the Infinidat booth at RSAC 2025. It is a big show, lots going on. Of course everything is about cyber. So we're going to talk to Eric Herzog here. You all know Eric. Hi Eric. How are you doing? Great to see you, man. All right. And Bill, who actually knows everything. I think I do, but thanks. Nice to see you. Yeah. Good to talk to you. So RSA is about security. Infinidat comes out of the storage background. Can one of you just quickly explain to me what we're talking about here when we're talking cyber resilience with a storage solution? What we've done is embed inside of our technology the next generation of data protection. And that next generation protection is all about being cyber led, both cyber resilience. And since the question is not if you'll be attacked, it's when and how often, which means eventually they're going to get through how you execute on cyber recovery. So the cyber resilience trying to help ameliorate the threat windows, but then cyber recovery assuming they get in. So we do both of those things and we embedded that through software into our storage systems. So you are trying to basically get out the message here that storage is evolving at the high end, and you guys are at the high end into something that is now about data and data protection and cybersecurity. You're adding more and more value at that at those levels of IT management. Well, think about it this way. Enterprise cyber storage needs to be part of every company's cybersecurity strategy. And usually it's left out. So essentially what you're doing is you're going on vacation. You didn't just unlock the windows, you opened them. You opened your front door. You opened your garage door. You put out social media, I'm gone for two weeks. Come steal my stuff. And a big sign right on your front lawn. Come steal everything you want. 90% of enterprise data is sitting on enterprise storage, and usually it's not covered by cyber. All right, Bill, what did he just say in technical terms? So really what he said is, you know, when you think about needing to protect the data, you have to do it in a way that integrates into the rest of the security ecosystem. It has to be able to be triggered from other events and other areas that storage doesn't know about. And we automate and orchestrate that entire process from any part of the storage ecosystem that they may want to protect the data. Just because you schedule something doesn't mean you're protecting it at the right time. So by being able to do that dynamically, what I like to call the speed of compute, you now have the ability to be very proactive in how you protect the data, but that's only the first stage of it. You have to then be able to validate the data. Because if you have unvalidated data, you don't know what you might have to recover from. So we have that part of that end to end orchestration allows you to go through a data validation process. So should you become prone to a cyber event, you now know the state of your data. You know exactly what's good. You know exactly what might be compromised. And if you have compromised data, you know exactly where it came from. So you can either find other copies of it that are clean or hand that to your forensic people in order for them to further investigate exactly what's going on. But the whole idea here is being recovery ready from a cyber event perspective. You guys are being very good about not talking about storage geeky stuff because it's a security show. But can you just tell me a little bit on the storage side? We're talking basically kind of snapshots, right, that we got. So but these are special. How's that? Well you know everybody talks about immutability. And immutability is the key component to making sure the data is secure. Now where we really differ is is we guarantee immutability. And how do we do that. We have no backdoors to our immutability aspect. You cannot, you know, have the lawyer sign a piece of paper or you know, your, your IT director, your VP of IT or anybody like that, sign a piece of paper authorizing any immutable copy of the data to be removed, modified, deleted, etc.. So we guarantee that immutability without that you really have vulnerability. We know today every part portion of the IT infrastructure where you can log in or get access to something as a vulnerability perspective point, and we completely eliminate that. So that's where we really feel we have a differentiated offering from an immutable snapshot. So so very immutable. Triggered at the time that there's a security alert or awareness. So you've got an instant point to go back and recovery on. Uh, tell me a little bit from just the perspective of the security conference here, 20 some thousand people, security wise, what did they need to know about securing the entire IT stack, not just looking at things from a firewall, intrusion detection, that sort of stuff. Well, that gets down to enterprise storage needs to be part of a comprehensive cybersecurity strategy. You need to have the edge. You have the server farms. You need to have the application level. You need to have the networks right. A lot of the network guys have also embedded cyber in their networks. We are the guys that embed cyber in the storage seamlessly and seamlessly integrate with the SIM package, the Soar package, if they have a security operation center so they sense a threat, we automatically start exercising things on storage, trying to help reduce the threat window. And if there is an attack, we guarantee the RTO. We guarantee the recovery time of one minute or less, no matter how big the data set size is on primary and when on a purpose built backup plans, plants which work as all the big backup vendors, we guarantee. 20 minutes or less, we recovered 25.5PB of a Veeam Backup repository. A couple of months ago. Live. Because I'm a crazy guy. We don't record any of our demos. And we recovered it in 12 minutes. 12 minutes is a pretty fast time to cover petabytes. And put it all back in. I'll give you that. Yeah. So if you guys want. We don't have a ton of time here. If you looked at the show and you looked at all the themes that are going on. First, what is sort of the biggest theme that sticks out for you that's happening in cybersecurity today? And second, what would sort of be your advice back to that crowd about what they should look at first? So one of the big things is automation. Automate, automate, automate. When you don't have things automated, you create a gap that can be attacked. You've now created a threat vector that they can go in. So what we've done from a storage perspective is solve that. We integrate with other data center wide cybersecurity software packages or a SoC. So when they see something, we automatically take action. There's no gap. There's no text, no phone call, no email, no this, no that, no pager. It's we just start going. And basically our technical advisors and our professional services team will work with the end user. And they say here's what I want to do. These are res I want done this way, these two res that way. And then it's all automated. So if there's a TAC it's all automated and there is no human intervention to slow things down and you're closing all gaps. Getting it done. And you. Yeah, I think as you asking the question, I was looking around the, you know, the room and you know, so much of this focus not only on prevention and automating that prevention, it really comes down to the fact that the what they're ultimately after is the data. And that data really lives on one spot, right? The enterprise, the enterprise family jewels and the enterprise data center. So really, if prevention did everything that it needed to, we wouldn't have to talk about this. Cyber storage, I really think is that next element, right where people are really realizing that no matter what they do around the perimeter of the network. Ultimately, they have to have as robust a system in protecting and validating the data where it lives versus just trying to prevent it from happening in the first place. I almost hear a gantlet being thrown there saying, the rest of the show next year doesn't need to be here. If everyone looks at the enterprise infrastructure stack and bakes in security at that lowest level, but. Well, I think I think it's going to I think it's going to alter a little bit. And I think people are starting to realize that. And the industry is realizing that, you know, you have to go, you know, that's kind of right beyond the beyond the perimeter. We have to look at where the data really lives. And being that last line of defense that you can absolutely depend on in order to recover your business. Awesome, awesome. Any last words, Eric? You always have words. Any last words? Tell it to our cameras. Come visit us at Infinidat and take a look at our cyber and next generation data protection pages. All right, take care, guys.
Mike Matchett of Small World Big Data visits Infinidat to learn how they’re embedding cyber resilience directly into enterprise storage. With cyberattacks seen as inevitable, Infinidat focuses on both resilience—reducing threat windows—and recovery, validating clean data and orchestrating fast restores. Their platform integrates with security ecosystems to detect threats in real-time and defend the last line of digital defense: storage. If your perimeter falls, your data shouldn’t. And with Infinidat, it doesn’t.
Categories:
  • » Technology Communities » Data Security » Backup & Recovery
  • » Small World Big Data
  • » Technology Communities » Data Security » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cybersecurity
  • infinidat
  • cyber
  • resilience
  • storage
  • security
  • data
  • protection
  • ransomware
  • recovery
  • enterprise
  • storage
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Infinidat: Backup Is Boring. Until It Saves Your Job!

            Upcoming Spotlight Events

            • May
              20

              Taming the Hacker Storm: Your Framework for Defeating Cybercriminals and Malware

              05/20/2025
              More events

              Upcoming 360 View Events

              • May
                22

                360View: AI Powered Innovation in the Enterprise

                05/22/2025
                • Jun
                  18

                  360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                  06/18/2025
                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/2025
                    More events

                    Upcoming Partner Events

                    • May
                      29

                      Dispelling Misconceptions Surrounding API Security

                      05/29/2025
                      More events
                      Truth in IT
                      • Advertise
                      • About Us
                      • Terms of Service
                      • Privacy Policy
                      • Contact Us
                      • Be Our Guest
                      • Preference Management
                      Desktop version
                      Standard version