Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Nutanix: European IT Challenges: Sovereignty, Security & Cloud

Nutanix
03/28/2026
19
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • European cybersecurity regulations create operational complexity with each country requiring separate certifications, increasing costs and administrative burden for cross-border service providers despite some equivalence frameworks.
  • France trails Northern Europe in cloud adoption and cybersecurity maturity, with 60% of small companies failing within 24 months of successful cyberattacks, creating significant opportunities for managed service providers.
  • Nutanix's hyper-converged infrastructure enables maximum flexibility for hybrid cloud deployments, allowing customers to seamlessly manage workloads across on-premises, private cloud, and public cloud environments as requirements evolve.
  • Terminal equipment accounts for 80% of carbon footprint in French IT operations, driving focus on equipment lifecycle management with 14,000+ devices annually refurbished, resold, or recycled through circular economy programs.

Cybersecurity Certification Complexity Across Europe

The interview opens with a discussion of the fragmented cybersecurity landscape across European countries. Each nation maintains its own cybersecurity agency and certification requirements, creating significant operational complexity for service providers working across borders. While some equivalence frameworks exist between certain countries like France and Germany, the lack of unified certification standards results in duplicated efforts and increased costs for companies seeking to operate pan-European services. This regulatory fragmentation particularly impacts government contracting, where local certifications are often mandatory prerequisites for engagement.

France's Digital Transformation and Security Gaps

France lags behind Northern European countries in cloud adoption and cybersecurity maturity, particularly among small and medium-sized enterprises. The speaker highlights a stark statistic: 60% of small French companies that experience successful cyberattacks go out of business within 24 months. This vulnerability creates significant market opportunities for managed service providers who can help customers secure their data, networks, and infrastructure while guiding them through hybrid cloud architecture decisions. The focus is on the mid-market segment—companies with 50 to 5,000 employees—who need guidance on what to keep on-premises versus what to migrate to private or public cloud environments.

Sustainable Data Center Operations and Equipment Lifecycle

The discussion concludes with insights into environmental sustainability practices in the French data center market. Because France derives most of its energy from nuclear power, energy consumption represents a relatively small portion of the carbon footprint. Instead, water consumption and terminal equipment account for 80% of carbon emissions. The company has implemented water-free cooling systems in its 14 French data centers and operates a comprehensive equipment lifecycle program, collecting over 14,000 customer devices annually. Approximately one-third are refurbished for reuse, one-third are resold, and one-third are properly recycled, positioning the company ahead of competitors in circular economy practices.

Chapters

0:00 - European Cybersecurity Fragmentation
1:35 - France's Cloud Adoption Gap
3:09 - Mid-Market Customer Needs
4:42 - Nutanix Deployment Flexibility
5:57 - Sustainable Data Center Operations

Key Quotes

2:04 "In France, 60% of the small companies that get attacked get out of business within 24 months after the attack, if the attack was successful."
4:42 "At the beginning of the process, the customer was not sure of what he wanted. It often happens. Or they think they know what they want, and when you start going through different scenarios with them, I know, actually, this sounds good."
5:28 "So we wanted a technology that allows us to manage that very smoothly wherever the infrastructure is located. So Nutanix came on top of the list to achieve that."
6:09 "What's interesting in our industry is that 80% of the carbon consumption, carbon footprint, comes from terminals. Data centers, very small for us because in France, most of our energy comes from nuclear."
Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • Data Protection
  • Compliance & Governance
  • Customer Story
  • Interview
  • European cybersecurity regulations
  • Cloud adoption in France
  • Hybrid cloud architecture
  • Managed service providers
  • Hyper-converged infrastructure
  • Data center sustainability
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Nutanix: European IT Challenges: Sovereignty, Security & Cloud

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version