Hackers are increasingly looking at large telecom networks as part of their shift to “big game hunting” -- targeting larger, more revenue-rich organisations. In fact, the LightBasin hacking group infiltrated as many as 13 telecom networks by targeting many telecommunications-specific systems.
This pressure has put carrier IT departments on the front line of defense — but how can you prepare for this type of attack, much less mitigate it? What happens if an attacker compromises administrative credentials (e.g. Active Directory, storage systems, data backups)?
Join this session, led by Pure’s Andrew Miller, to learn about these topics and more:
The Ransomware Landscape
An in-depth anatomy of an attack and explanation of new attack vectors, including admin credential compromise. We’ll stay away from FUD, but life is sometimes scary.
Defense in Depth
It’s critical and easy in theory. So why are people still paying ransoms? (Clue: Complexity)
Solutions
Let’s talk. Book a 1:1 meeting with one of our experts to discuss your specific needs.
Have a question or comment about Pure products or certifications? We’re here to help.
Schedule a live demo and see for yourself how Pure can help transform your data into powerful outcomes.
Call Sales: 833-371-7873
Media: pr@purestorage.com
Pure Storage HQ
650 Castro St #400
Mountain View, CA 94041
800-379-7873 (general info)