Hackers are increasingly looking at large telecom networks as part of their shift to “big game hunting” -- targeting larger, more revenue-rich organizations. In fact, the LightBasin hacking group infiltrated as many as 13 telecom networks by targeting many telecommunications-specific systems.
This pressure has put carrier IT departments on the front line of defense — but how can you prepare for this type of attack, much less mitigate it? What happens if an attacker compromises administrative credentials (e.g. Active Directory, storage systems, data backups)?
Join this session, led by Pure’s Andrew Miller, to learn about these topics and more:
The Ransomware Landscape
An in-depth anatomy of an attack and explanation of new attack vectors, including admin credential compromise. We’ll stay away from FUD, but life is sometimes scary.
Defense in Depth
It’s critical and easy in theory. So why are people still paying ransoms? (Clue: Complexity)
Solutions
Let’s talk. Book a 1:1 meeting with one of our experts to discuss your specific needs.
Have a question or comment about Pure products or certifications? We’re here to help.
Schedule a live demo and see for yourself how Pure can help transform your data into powerful outcomes.
Call Sales: 800-976-6494
Media: pr@purestorage.com
Pure Storage, Inc.
2555 Augustine Dr.
Santa Clara, CA 95054
800-379-7873 (general info)