Skip to Content
52:55 Webセミナー

Telecom Networks Are Being Targeted by Hackers! How can you prepare for and mitigate this type of attack?

Pure has a simple-plus-unique combination of fast restore and “immutability plus” that can help even in the event of admin credential compromise. REGISTER NOW
本 Web セミナーが配信された日 2022/01/26
最初の 5 分間はどなたでもご視聴可能です。5 分後に表示される簡単なフォームにご記入いただくことで、最後までご覧になれます。
  • 通信
  • ランサムウェア

Andrew Miller

Lead Principal Technologist, Pure Storage

Hackers are increasingly looking at large telecom networks as part of their shift to “big game hunting” -- targeting larger, more revenue-rich organizations. In fact, the LightBasin hacking group infiltrated as many as 13 telecom networks by targeting many telecommunications-specific systems.

This pressure has put carrier IT departments on the front line of defense — but how can you prepare for this type of attack, much less mitigate it? What happens if an attacker compromises administrative credentials (e.g. Active Directory, storage systems, data backups)? 

Join this session, led by Pure’s Andrew Miller, to learn about these topics and more:

  • The Ransomware Landscape
    • An in-depth anatomy of an attack and explanation of new attack vectors, including admin credential compromise. We’ll stay away from FUD, but life is sometimes scary.
  • Defense in Depth
    • It’s critical and easy in theory. So why are people still paying ransoms? (Clue: Complexity)
  • Solutions
    • We’ll explore what you can do in the event of an attack, both in general and with a focus on Pure’s capabilities on FlashArray and FlashBlade.
    • Pure has a simple-plus-unique combination of fast restore and “immutability plus” that can help even in the event of admin credential compromise.

REGISTER NOW

続けて視聴される方へ
ご視聴いただきありがとうございます。下記のフォームにご記入いただくことで、最後までご覧になれます。
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
このブラウザは現在サポートされていません。

古いブラウザには、セキュリティ・リスクが存在する場合があります。ピュア・ストレージの Web サイトをより快適にご利用いただけるよう、最新のブラウザにアップデートしてください。