Hackers are increasingly looking at large telecom networks as part of their shift to “big game hunting” -- targeting larger, more revenue-rich organizations. In fact, the LightBasin hacking group infiltrated as many as 13 telecom networks by targeting many telecommunications-specific systems.
This pressure has put carrier IT departments on the front line of defense — but how can you prepare for this type of attack, much less mitigate it? What happens if an attacker compromises administrative credentials (e.g. Active Directory, storage systems, data backups)?
Join this session, led by Pure’s Andrew Miller, to learn about these topics and more:
The Ransomware Landscape
An in-depth anatomy of an attack and explanation of new attack vectors, including admin credential compromise. We’ll stay away from FUD, but life is sometimes scary.
Defense in Depth
It’s critical and easy in theory. So why are people still paying ransoms? (Clue: Complexity)
Solutions
¿Tiene alguna pregunta o comentario sobre los productos o las certificaciones de Pure? Estamos aquí para ayudarle.
Programe una demostración en vivo y vea personalmente cómo Pure puede ayudarle a convertir sus datos en unos resultados potentes.
Llámenos al: +34 51 889 8963
Medios de comunicación: pr@purestorage.com
Castellana 81
28046 Madrid
Oficinas Pure: 1415 y 1417 (planta 14)