Ransomware Protection & Recoverability For Cloud-Native Applications

Logo
Presented by

Ben Morrison, Solutions Architect, Trilio

About this talk

Cyberattacks are on the rise. From retail to hotels and even schools, these attacks are painfully impacting organizations around the globe no matter the size or industry. One recent ransomware attack led to the complete shutdown of the major U.S. gasoline pipeline that delivers 45% of the fuel to the entire east coast. Enterprises and smaller organizations alike understand the damage caused by ransomware and have created various strategies to mitigate the impact and facilitate data recovery. However, these attacks have become smarter, more specialized and more detrimental over the years and organizations need to have a more strategic approach to protecting their data. Tune into this webinar to learn: - The importance of a comprehensive approach to ransomware protection that aligns with industry best practices. - The cloud-native application challenge and a discussion about points of attack. - How Trilio is aligning its technology to the National Institute of Standards and Technology (NIST) Cybersecurity Framework in order to minimize ransomware attacks within an organization by providing features across: 1) Identification and protection, 2) Detection and mitigation, and 3) Recoverability

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (16)
Subscribers (733)
Trilio is a leader in cloud-native data protection for Kubernetes, OpenStack and Red Hat Virtualization environments. Customers in telecom, defense, automotive and financial services leverage TrilioVault to recover from disasters, protect against ransomware, migrate workloads, move workloads to new infrastructure and migrate to new software distributions. We're here to help you take full advantage of cloud-native architecture, safe in the knowledge that your data is secure, backed-up and agile. Stay tuned for more educational content on Cloud-native Innovation, Application Mobility, Data Protection, Disaster Recovery, Ransomware Protection, Kubernetes, Containers and more.