 The cybersecurity landscape has changed dramatically over the past 24 to 36 months. Rapid cloud migration has created a new layer of security defense, sure, but that doesn't mean CSOs can relax. In many respects, it further complicates or at least changes the CSOs scope of responsibilities. In particular, the threat surface has expanded and that creates more seams and CSOs have to make sure their teams pick up where the hyperscaler clouds leave off. Application developers have become a critical execution point for cyber assurance. Shift left is the kind of new buzz phrase for devs, but organizations still have to shield right, meaning the operational teams must continue to partner with SecOps to make sure infrastructure is resilient. So it's no wonder that an ETR's latest survey of nearly 1500 CIOs and IT buyers that business technology executives cite security as their number one priority, well ahead of other critical technology initiatives, including collaboration software, cloud computing, and analytics rounding out the top four. But budgets are under pressure and CSOs have to prioritize. It's not like they have an open checkbook. They have to contend with other key initiatives like those just mentioned to secure the funding. And what about zero trust? Can you go out and buy zero trust or is it a framework, a mindset in a series of best practices applied to create a security consciousness throughout the organization? Can you implement zero trust? In other words, if a machine or human is not explicitly allowed access, then access is denied. Can you implement that policy without constricting organizational agility? The question is, what's the most practical way to apply that premise and what role does infrastructure play as the enforcer? How does automation play in the equation? The fact is that today's approach to cyber resilience can't be an either or, it has to be an and conversation, meaning you have to ensure data protection while at the same time advancing the mission of the organization with as little friction as possible. And don't even talk to me about the edge. That's really going to keep you up at night. Hello and welcome to this special cube presentation of Blueprint for Trusted Infrastructure made possible by Dell Technologies. In this program, we explore the critical role that Trusted Infrastructure plays in cybersecurity strategies, how organizations should think about the infrastructure side of the cybersecurity equation and how Dell specifically approaches securing infrastructure for your business. We'll dig into what it means to transform and evolve toward a modern security infrastructure that's both trusted and agile. First up are Pete Gere and Steve Keniston. They're both senior cybersecurity consultants at Dell Technologies. And they're going to talk about the company's philosophy and approach to Trusted Infrastructure. And then we're going to speak to Parasar Codati, who's a senior consultant for storage at Dell Technologies to understand where and how storage plays in this Trusted Infrastructure world. And then finally, Rob Emsley, who heads product marketing for data protection and cybersecurity. He's going to take a deeper dive with Rob into data protection and explain how it has become a critical component of a comprehensive cybersecurity strategy. Okay, let's get started. Pete Gere, Steve Keniston, welcome to theCUBE. Thanks for coming into the Marlboro Studios today. Great to be here, Dave. Thanks, Dave. Good to see you. Great to see you guys. Pete, start by talking about the security landscape. You heard my little rap up front. What are you seeing? I thought you wrapped it up really well and you touched on all the key points, right? Technology is ubiquitous today. It's everywhere. It's no longer confined to a monolithic data center, it lives at the edge, it lives in front of us, it lives in our pockets and smartphones. Along with that is data. And as you said, organizations are managing sometimes 10 to 20 times the amount of data that they were just five years ago. And along with that, cyber crime has become a very profitable enterprise. In fact, it's been more than 10 years since the NSA chief actually called cyber crime the biggest transfer of wealth in history. That was 10 years ago. And we've seen nothing but accelerating cyber crime and really sophistication of how those attacks are perpetrated. And so the new security landscape is really more of an evolution. We're finally seeing security catch up with all of the technology adoption, all the build out, the work from home and work from anywhere that we've seen over the last couple of years. We're finally seeing organizations and really it goes beyond the IT directors. It's a board level discussion today. Securities become a board level discussion. Yeah, I think that's true as well. It's like it used to be that security was, okay, the SecOps team, you're responsible for security. Now you've got the developers are involved, the business lines are involved. It's part of onboarding for most companies. You know, Steve, this concept of zero trust it was kind of a buzzword before the pandemic. And I feel like I've often said it's now become a mandate, but it's still fuzzy to a lot of people. How do you guys think about zero trust? What does it mean to you? How does it fit? Yeah, I thought, again, I thought your opening was fantastic and this whole lead into what is zero trust. It had been a buzzword for a long time and now ever since the federal government came out with their implementation or desired to drive zero trust a lot more people are taking a lot more seriously because I don't think they've seen the government do this. But ultimately, let's see, ultimately it's just like you said, right? If you don't have trust to those particular devices, applications or data, you can't get at it. The question is, and you phrase it perfectly, can you implement that as well as allow the business to be as agile as it needs to be in order to be competitive? Cause we're seeing with your whole notion around DevOps and the ability to kind of build, make, deploy, build, make, deploy, right? They still need that functionality, but it also needs to be trusted. It needs to be secure and things can't get away from you. Yeah, so it's interesting. We attended every reinforce since 2019 and the narrative there is, hey, everything in the cloud is great. And this narrative around, oh, security's a big problem. It doesn't help the industry. The fact is that the big hyperscalers, they're not strapped for talent, but CISOs are. They don't have the capabilities to really apply all these best practices. They're playing whack-a-mole. So they look to companies like yours to take your R&D and bake it into security products and solutions. So what are the critical aspects of the so-called Dell trusted infrastructure that we should be thinking about? Yeah, well, Dell trusted infrastructure for us is a way for us to describe the work that we do through design development and even delivery of our IT system. So Dell trusted infrastructure includes our storage, it includes our servers, our networking, our data protection, our hyperconverged, everything that infrastructure always has been. It's just that today, customers consume that infrastructure at the edge as a service in a multi-cloud environment. I mean, I view the cloud as really a way for organizations to become more agile and to become more flexible and also to control costs. I don't think organizations move to the cloud or move to a multi-cloud environment to enhance security. So I don't see cloud computing as a panacea for security. I see it as another attack surface and another aspect in front that organizations and security organizations and departments have to manage. It's part of their infrastructure today, whether it's in their data center in a cloud or at the edge. I mean, I think it's a huge point because a lot of people think, oh, data's in the cloud. I'm good. It's like Steve, we've talked about, oh, why do I have to back up my data? It's in the cloud. Well, you might have to recover it some day. So I don't know if you have anything to add to that or any additional thoughts on it. No, I mean, I think like what Pete was saying, when it comes to all these new vectors for attack surfaces, people did choose the cloud in order to be more agile and more flexible and all that did was open up to the CISOs who need to pay attention to now, okay, where can I possibly be attacked? I need to be thinking about, is that secure? And part of that is Dell now also understands and thinks about as we're building solutions, is it a trusted development life cycle? So we have our own trusted development life cycle. How many times in the past did you used to hear about vendors saying you got to patch your software because of this? We think about what changes to our software and what implementations and what enhancements we deliver can actually cause from a security perspective and make sure we don't give up or have security become a whole just in order to implement a feature. We got to think about those things. And as Pete alluded to our secure supply chain. So all the way through, knowing what you're going to get when you actually receive it is going to be secure and not be tampered with becomes vitally important. And Pete and I were talking earlier, when you have tens of thousands of devices that need to be delivered, whether it be storage or laptops or PCs or whatever it is, you want to know that those devices can be trusted. Okay guys, maybe Pete, you could talk about how Dell thinks about its framework and its philosophy of cybersecurity. And then specifically what Dell's advantages are relative to the competition. Yeah, definitely Dave, thank you. So we've talked a lot about Dell as a technology provider, but one thing Dell also is, is a partner in this larger ecosystem. We realize that security, whether it's a zero trust paradigm or any other kind of security environment is an ecosystem with a lot of different vendors. So we look at three areas. One is protecting data in systems. We know that it starts with and ends with data. That helps organizations combat threats across their entire infrastructure. And what it means is Dell's embedding security features consistently across our portfolios of storage, servers, networking. The second is enhancing cyber resiliency. Over the last decade, a lot of the funding and spending has been in protecting or trying to prevent cyber threats, not necessarily in responding to and recovering from threats. We call that resiliency. Organizations need to build resiliency across their organization. So not only can they withstand a threat, but they can respond, recover and continue with their operations. And the third is overcoming security complexity. Security is hard. It's more difficult because of the things we've talked about, about distributed data, distributed technology and attack surfaces everywhere. And so we're enabling organizations to scale confidently, to continue their business, but know that all of the IT decisions that they're making have these intrinsic security features and are built and delivered in a consistent security. So those are kind of the three pillars. Maybe we could end on what you guys see as the key differentiators that people should know about the Dell brings to the table. Maybe each of you could take a shot at that. Yeah, I think first of all, from a holistic portfolio perspective, right? The secure supply chain and the secure development lifecycle permeate through everything Dell does when building things. So we build things with security in mind all the way from, as Pete mentioned, from creation to delivery. We want to make sure you have that secure device or asset. That permeates everything from servers, networking storage, data protection through hyperconverged through everything. That to me is really a key asset because that means you understand when you receive something, it's a trusted piece of your infrastructure. I think the other core component to think about and Pete mentioned as Dell being a partner for making sure you can deliver these things is that even though that's part of our framework, these pillars are our framework of how we want to deliver security. It's also important to understand that we are partners and that you don't need to rip and replace, but as you start to put in new components, you can be assured that the components that you're replacing as you're evolving, as you're growing, as you're moving to the cloud, as you're moving to more on-prem type services or whatever that your environment is secure. I think those are two key things. Got it. Okay, Pete, bring us home. Yeah, I think one of the big advantages of Dell is our scope and our scale. We're a large technology vendor that's been around for decades and we develop and sell almost every piece of technology. We also know that organizations might make different decisions and so we have a large services organization with a lot of experienced services people that can help customers along their security journey depending on whatever type of infrastructure or solutions that they're looking at. The other thing we do is make it very easy to consume our technology whether that's traditional on-premise in a multi-cloud environment or as a service. And so the best of breed technology can be consumed in any variety of fashion and know that you're getting that consistent, secure infrastructure that Dell provides. Well, and Dell's got the top supply chain not only in the tech business but probably any business and so you can actually take your dog food and allow other people your champagne, sorry, and allow other people to share best practices with your customers. All right, guys, thanks so much for coming on theCUBE. Appreciate it. Okay, keep it right there after the short break. We'll be back to drill into the storage domain. You're watching a blueprint for trusted infrastructure on theCUBE, the leader in enterprise and emerging tech coverage. Be right back. Concern over cyber attacks is now the norm for organizations of all sizes. The impact of these attacks can be operationally crippling, expensive and have long-term ramifications. Organizations have accepted the reality of not if, but when from boardrooms to IT departments and are now moving to increase their cybersecurity preparedness. They know that security transformation is foundational to digital transformation. And while no one can do it alone, Dell Technologies can help you fortify with modern security. Modern security is built on three pillars. Protect your data and systems by modernizing your security approach with intrinsic features and hardware and processes from a provider with a holistic presence across the entire IT ecosystem. Enhance your cyber resiliency by understanding your current level of resiliency for defending your data and preparing for business continuity and availability in the face of attacks. Overcome security complexity by simplifying and automating your security operations to enable scale, insights and extend resources through service partnerships. From advanced capabilities that intelligently scale, a holistic presence throughout IT and decades as a leading global technology provider will stop at nothing to help keep you secure. Okay, we're back digging into trusted infrastructure with Parasar Kodati. He's a senior consultant for product marketing and storage of Dell Technologies. Parasar, welcome to theCUBE, good to see you. Great to be with you, Dave. Yeah, coming from Hyderabad, awesome. So I really appreciate you coming on the program. Let's start with talking about your point of view on what cybersecurity resilience means to Dell generally, but storage specifically. Yeah, so for something like storage, we are talking about the data layer, Dave. And if you look at cybersecurity, it's all about securing your data applications and infrastructure. It has been a very mature field at the network and application layers. And there are a lot of great technologies, right? From enabling zero trust, advanced authentications, identity management systems and so on. And in fact, with the advent of the use of artificial intelligence and machine learning, really these detection tools for cybersecurity have really evolved in the network and the application spaces. So for storage, what it means is how can you bring them to the data layer, right? How can you bring in other principles of zero trust to the data layer? How can you leverage artificial intelligence and machine learning to look at access patterns and make intelligent decisions about maybe an indicator of compromise and identify them ahead of time? Just like how it's happening in other applications. And when it comes to cyber resilience, it's basically a strategy which assumes that a threat is imminent and it's a good assumption with the severity and the frequency of the attacks that are happening. And the question is, how do we quantify the infrastructure in this great infrastructure to withstand those attacks and have a response plan where we can recover the data and make sure the business continuity is not affected? So that's really cybersecurity and cyber resiliency and storage layer. And of course, there are technologies like, you know, network isolation, immutability and all these principles need to be applied at the storage level as well. Let me have a follow-up on that, if I may. The intelligence that you talked about, that AI and machine learning, is that do you build that into the infrastructure or is that sort of a separate software module that points at various infrastructure components? How does that work? Both, Dave. Right at the data storage level, we have come with various data characteristics depending on the nature of data. We developed a lot of signals to see what could be a good indicator of a compromise. And there are also additional applications like Cloud IQ is the best example, which is like an infrastructure-wide health monitoring system for Dell infrastructure. And now we have elevated that to include cybersecurity as well. So these signals are being gathered at Cloud IQ level and other applications as well so that we can make those decisions about compromise and we can either cascade that intelligence and alert stream upstream for security teams so that they can take actions in platforms like the sign systems, XTR systems and so on. But when it comes to which layer of the intelligences, it has to be at every layer where it makes sense where we have the information to make a decision. And being closest to the data, we have, we are basically monitoring the various patterns of data access who is accessing, are they crossing across any geo-fencing? Is there any mass deletion that is happening or mass encryption that is happening? And we are able to protect those patterns and flag them as indicators of compromise in allowing automated response, manual control and so on for IT units. Yeah, thank you for that explanation. So at Dell Technologies World, we were there in May, it was one of the first live shows that we did in the spring. Certainly one of the largest. And I interviewed Shannon Champion and the huge takeaway from the storage side was the degree to which you guys emphasize security within the operating systems. I mean, really, I mean, PowerMax made more than half, I think of the features were security related, but also the rest of the portfolio. So can you talk about the security aspects of the Dell storage portfolio specifically? Yeah, yeah. So when it comes to data security and broadly data availability, right in the context of cyber resiliency, Dell storage, these elements have been at the core of our core strength for the portfolio and the source of differentiation for the storage portfolio. With almost decades of collective experience of building highly resilient architectures for mission-critical data, something like PowerMaxism, which is the most secure storage platform for high-end enterprises. And now with the increased focus on cybersecurity, we are extending those core technologies of high availability in adding modern detection systems, modern data isolation techniques to offer a comprehensive solution to the customer so that they don't have to piece together multiple things to ensure data security or data resiliency, but a well-designed and well-architected solution by design is delivered to them to ensure cyber protection at the data layer. Got it. We were talking earlier to Steve Keniston in peak year about this notion of Dell trusted infrastructure. How does storage fit into that as a component of that sort of overall theme? Yeah, and let me say this, if you could adjust, because a lot of people might be skeptical that I can actually have security and at the same time, not constrict my organizational agility that's not an or, it's an and. How do you actually do that? If you could address both of those, that would be great. Definitely. So for Dell trusted infrastructure, cyber resiliency is a key component of that. And just as I mentioned, air gap isolation, it really started with power protect cyber recovery. That was a solution more than three years ago we launched and that was first in the industry, which paved way to kind of data isolation being a core element of data management and for data infrastructure. And since then we have implemented these technologies within different storage platforms as well. So the customers have the flexibility depending on their data landscape, they can approach, they can do the right data isolation architecture, right? Either natively from the storage platform or consolidate things into the backup platform and isolate from there. And the other key thing we focus in trusted infrastructure, Dell trusted infrastructure is the goal of simplifying security for the customers. So one good example here is being able to respond to these cyber threats or indicators of compromise is one thing, but an IT security team may not be looking at the dashboard of the storage systems constantly, right? Storage administration admins may be looking at it. So how can we build this intelligence and provide this upstream platforms so that they have a single pane of glass to understand security landscape across applications, across networks, firewalls, as well as storage infrastructure and compute infrastructure. So that's one of the key ways where how we are helping simplify the kind of the ability to respond, ability to detect and respond these threats in real time for security teams. And you mentioned about zero trust and how it's a balance of not kind of restricting users or put heavy burden on multi-factor authentication and so on. And this really starts with, what we are doing is provide all the tools when it comes to advanced authentication, supporting external identity management systems, multi-factor authentication, encryption, all these things are intrinsically built into these platforms. Now the question is, the customers are actually one of the key steps is to identify what are the most critical parts of their business or what are the applications that the most critical business operations depend on and similarly identify mission critical data where part of your response plan where it cannot be compromised where you need to have a way to recover. Once you do this identification, then the level of security can be really determined by security teams, by the infrastructure teams. And another intelligence that gives a lot of flexibility for even developers to do this is, today we have APIs that, so you can not only track these alerts at the data infrastructure level, but you can use our APIs to take concrete actions like blocking a certain user or increasing the level of authentication based on the threat level that has been perceived at the application layer or at the network layer. So there is a lot of flexibility that is built into this by design so that depending on the criticality of the data, criticality of the application, number of users affected, these decisions have to be made from time to time. And it's, as you mentioned, it's a balance, right? And sometimes, if an organization had a recent attack, the level of awareness is very high against cyber attacks. So for a time, these settings may be a bit difficult to deal with, but then it's a decision that has to be made by security teams as well. Got it. So you're surfacing what may be hidden KPIs that are buried inside, for instance, the storage system through APIs upstream into a dashboard so that somebody that dig into the storage tunnel, extract that data and then somehow populate that dashboard. You're saying you're automating that workflow. That's a great example and you may have others, but is that the correct understanding? Absolutely. And it's a two-way integration. Let's say an attack has been detected at a completely different layer, right? In the application layer or at a firewall, we can respond to those as well. So it's a two-way integration. We can cascade things up, as well as respond to threats that have been detected elsewhere through the API. That's great. We need a trust API for power scale is the best example for that. Excellent. So thank you. Appreciate that. Give us the last word, put a ball on this and bring this segment home, please. Absolutely. So at Dell, a storage portfolio using advanced data isolation with air gap, having machine learning based algorithms to detect indicators of compromise and having recovery mechanisms with granular snapshots, being able to recover data and restore applications to maintain business continuity is what we deliver to customers. And these are areas where a lot of innovation is happening, a lot of product focus, as well as if you look at the professional services all the way from engineering to professional services, the way we build these systems, the way we configure and architect these systems, cybersecurity and protection is a key focus for all these activities. And Dell.com slash securities is where you can learn a lot about these initiatives. That's great. Thank you. At the recent Reinforce event in Boston, we heard a lot from AWS about detection and response and DevOps and machine learning and some really cool stuff. We heard a little bit about ransomware, but I'm glad you brought up air gaps because we heard virtually nothing in the keynotes about air gaps. That's an example of where the CISO has to pick up from where the cloud leaves off as it was in front. And so number one and number two, we didn't hear a ton about how the cloud is making the life of the CISO simpler. And that's really, my takeaway is in part anyway, your job and companies like Dell. So Parasar, I really appreciate the insights. Thank you for coming on theCUBE. Thank you very much, Dave. It's always great to be in these conversations. All right, keep it right there. We'll be right back with Rob Emsley to talk about data protection strategies and what's in the Dell portfolio. You're watching theCUBE. Data is the currency of the global economy. It has value to your organization and cyber criminals. In the age of ransomware attacks, companies need secure and resilient IT infrastructure to safeguard their data from aggressive cyber attacks. As part of the Dell technologies infrastructure portfolio, power store and PowerMax combine storage innovation with advanced security that adheres to stringent government regulations and corporate compliance requirements. Security starts with multi-factor authentication enabling only authorized admins to access your system using assigned roles. Tamper proof audit logs, track system usage and changes so IT admins can identify suspicious activity and act. With snapshot policies, you can quickly automate the protection and recovery process for your data. PowerMax secure snapshots cannot be deleted by any user prior to the retention time expiration. Dell technologies also make sure your data at rest stays safe with PowerStore and PowerMax. Data encryption protects your flash drive media from unauthorized access if it's removed from the data center while adhering to stringent FIPS 140-2 security requirements. Cloud IQ brings together predictive analytics, anomaly detection and machine learning with proactive policy-based security assessments, monitoring and alerting. The result? Intelligent insights that help you maintain the security health status of your storage environment. And if a security breach does occur, PowerProtect Cyber Recovery isolates critical data, identifies suspicious activity and accelerates data recovery. Using the automated data copy feature, unchangeable data is duplicated in a secure digital vault. Then an operational air gap isolates the vault from the production and backup environments. Architected with security in mind, Dell EMC PowerStore and PowerMax provide storage innovation so your data is always available and always secure, wherever and whenever you need it. Welcome back to a blueprint for trusted infrastructure. We're here with Rob Emsley, who's the director of product marketing for data protection and cybersecurity. Rob, good to see you, new role? Yeah, good to be back, Dave, good to see you. Yeah, it's been a while since we chatted last and one of the changes in my world is that I've expanded my responsibilities beyond data protection marketing to also focus on cybersecurity marketing, specifically for our infrastructure solutions group. So certainly that's something that really has driven us to come and have this conversation with you today. So data protection obviously has become an increasingly important component of the cybersecurity space. I don't think necessarily of traditional backup and recovery as security. To me, it's an adjacency. I know some companies have said, oh yeah, now we're a security company that are kind of chasing the valuation bubble. Dell's interesting because you have data protection in the form of backup and recovery and data management, but you also have security, direct security capabilities. So you're sort of bringing those two worlds together and it sounds like your responsibility is to connect those dots, is that right? Absolutely, yeah. I mean, I think that the reality is that security is a multi-layer discipline. I think the days of thinking that it's one or another technology that you can use or process that you can use to make your organization secure are long gone. I mean, certainly you're actually correct. If you think about the backup and recovery space, I mean, people have been doing that for years. You know, certainly backup and recovery is all about the recovery. It's all about getting yourself back up and running when bad things happen. And one of the realities, unfortunately, today is that one of the worst things that can happen is cyber attacks. You know, ransomware, malware are all things that are top of mind for all organizations today. And that's why you see a lot of technology and a lot of innovation going into the backup and recovery space because if you have a copy, a good copy of your data, then that is really the first place you go to recover from a cyber attack. And that's why it's so important. The reality is, is that unfortunately, the cyber criminals keep on getting smarter. I don't know how it happens. But one of the things that is happening is that the days of them just going after your production data are no longer the only challenge that you have. They go after your backup data as well. So over the last half a decade, Dell Technologies with its backup and recovery portfolio has introduced the concept of isolated cyber recovery volts. And that is really the, you know, we've had many conversations about that over the years and that's really a big tenant of what we do in the data protection portfolio. So this idea of cyber security resilience, that definition is evolving. What does it mean to you? Yeah, I think the analyst team over at Gartner, they wrote a very insightful paper called, you will be hacked, embrace the breach. And the whole basis of this analysis is so much money's been spent on prevention is that what's at a balance is the amount of budget that companies have spent on cyber resilience. And cyber resilience is based upon the premise that you will be hacked, you have to embrace that fact and be ready and prepared to bring yourself back into business. You know, and that's really where cyber resiliency is very, very different than cyber security and prevention. You know, and I think that balance of get your security disciplines well-funded, get your defenses as good as you can get them but make sure that if the inevitable happens and you find yourself compromised that you have a great recovery plan and certainly a great recovery plan is really the basis of any good solid data protection backup from recovery philosophy. So if I had to do a SWOT analysis, we don't have to do the WOT but let's focus on the S. What would you say are Dell's strengths in this, you know, cyber security space as it relates to data protection? One is we've been doing it a long time. You know, we talk a lot about Dell's data protection being proven and modern. You know, certainly the experience that we've had over literally three decades of providing enterprise scale data protection solutions to our customers has really allowed us to have a lot of insight into what works and what doesn't. As I mentioned to you, one of the unique differentiators of our solution is the cyber recovery vaulting solution that we introduced a little over five years ago, five, six years. Power up attack cyber recovery is something which has become a unique capability for customers to adopt on top of their investment in Dell technology data protection. You know, the unique elements of our solution are already threefold and we call them the three eyes. It's isolation, it's immutability and it's intelligence. And the isolation part is really so important because you need to reduce the attack surface of your good known copies of data. You need to put it in a location that the bad actors can't get to it. And that really is the essence of a cyber recovery vault. Interestingly enough, you're starting to see the market throw out that word from many other places, but really it comes down to having a real discipline that you don't allow the security of your cyber recovery vault to be compromised insofar as allowing it to be controlled from outside of the vault, allowing it to be controlled by your backup application. Our cyber recovery vaulting technology is independent of the backup infrastructure. It uses it, but it controls its own security. And that is so, so important. It's like having a vault that the only way to open it is from the inside. You know, and think about that if you think about, you know, vaults in banks or vaults in your home. Normally, you have a keypad on the outside. Think of our cyber recovery vault as having its security controlled from inside of the vault. So nobody can get in, nothing can get in unless it's already in. And if it's already in, then it's trusted. Exactly, yeah. Exactly. So isolation is the key. And then you mentioned immutability as the second piece. Yeah, so immutability is also something which has been around for a long time. People talk about backup immutability or immutable backup copies. So immutability is just the additional technology that allows the data that's inside of the vault to be unchangeable. You know, but again, that immutability, you know, your mileage varies. You know, when you look across the different offers that are out there in the market, especially in the backup industry, you make a very valid point earlier that the backup vendors in the market seemed to be security washing their marketing messages. I mean, everybody is leaning into the ever present danger of cybersecurity. Not a bad thing, but the reality is, is that you have to have the technology to back it up, you know, quite literally. Yeah, yeah, no pun intended. And then actually pun intended. Now, what about the intelligence piece of it? That's AI, ML, where does that fit? For sure. So the intelligence piece is delivered by a solution called CyberSense. And CyberSense for us is what really gives you the confidence that what you have in your cyber recovery vault is a good, clean copy of data. So it's looking at the backup copies that get driven into the cyber vault. And it's looking for anomalies. So it's not looking for signatures of malware. You know, that's what your antivirus software does. That's what your endpoint protection software does. That's on the prevention side of the equation. But what we're looking for is we're looking to ensure that the data that you need when all hell breaks loose is good. And that when you get a request to restore and recover your business, you go, right, let's go and do it. And you don't have any concern that what you have in the vault has been compromised. So CyberSense is really a unique analytic solution in the market based upon the fact that it isn't looking at cursory indicators of malware infection or ransomware introduction. It's doing full content analytics, looking at has the data in any way changed? Has it suddenly become encrypted? Has it suddenly become different to how it was in the previous scan? So that anomaly detection is very, very different. It's looking for like different characteristics that really are an indicator that something is going on. And of course, if it sees it, you immediately get flagged. But the good news is that you always have in the vault the previous copy of good known data, which now becomes your restore point. So we're talking to Rob Emsley about how data protection fits into what Dell calls DTI Dell trusted infrastructure. And I want to come back Rob to this notion of and not or because I think a lot of people are skeptical like how can I have great security and not introduce friction into my organization? Is that an automation play? How does Dell tackle that problem? I mean, I think a lot of it is across our infrastructure is security has to be built in. I mean, intrinsic security within our servers, within our storage devices, within our elements of our backup infrastructure. I mean, security, multi-factor authentication, elements that make the overall infrastructure secure. We have capabilities that allow us to identify whether or not configurations have changed. We'll probably be talking about that a little bit more to you later in the segment. But the essence is security is not a bolt on. It has to be part of the overall infrastructure and that's so true, certainly in the data protection space. Give us the bottom line on how you see Dell's key differentiators. Maybe you could talk about, Dell of course always talks about its portfolio, but why should customers lead in to Dell in this whole cyber resilient space? Staying on the data protection space, as I mentioned, the work we've been doing to introduce this cyber resiliency solution for data protection is in our opinion, as good as it gets. You know, you've spoken to a number of our best customers, whether it be Bob Bender from Founders Federal or more recently at Dell Technologies World, you spoke to Tony Bryson from the town of Gilbert. And these are customers that we've had for many years that have implemented cyber recovery vaults and at the end of the day, they can now sleep at night. You know, that's really the peace of mind that they have is that the insurance that a data protection from Dell's cyber recovery vault, a power protect cyber recovery solution gives them, you know, really allows them to, you know, just have the assurance that they don't have to pay a ransom. If they have an insider threat issue and, you know, all the way down to data deletion, is they know that what's in the cyber recovery vault is good and ready for them to recover from? Great, well, Rob, congratulations on the new scope of responsibility. I like how, you know, your organization is expanding as the threat surface is expanding. As we said, data protection becoming an adjacency to security, not security in and of itself, a key component of a comprehensive security strategy. Rob Emsley, thank you for coming back in theCUBE. Good to see you again. You too, Dave, thanks. All right, in a moment, I'll be back to wrap up a blueprint for trusted infrastructure. You're watching theCUBE. Every day, it seems there's a new headline about the devastating financial impacts or trust that's lost due to ransomware or other sophisticated cyber attacks. But with our help, Dell Technologies' customers are taking action by becoming more cyber resilient and deterring attacks so they can greet students daily with a smile. They're ensuring that a range of essential government services remain available 24-7 to citizens wherever they're needed. From swiftly dispatching public safety personnel or sending an inspector to sign off on a homeowner's dream, to protecting, restoring and sustaining our precious natural resources for future generations. With ever-changing cyber attacks targeting organizations in every industry, our cyber resiliency solutions are right on the money, providing the security and controls you need. We help customers protect and isolate critical data from ransomware and other cyber threats, delivering the highest data integrity to keep your doors open, and ensuring that hospitals and healthcare providers have access to the data they need so patients get life-saving treatment without fail. If a cyber incident does occur, our intelligence, analytics, and responsive team are in a class by themselves, helping you reliably recover your data and applications so you can quickly get your organization back up and running. With Dell Technologies behind you, you can stay ahead of cyber crime, safeguarding your business and your customer's vital information. Learn more about how Dell Technologies' cyber resiliency solutions can provide true peace of mind for you. The adversary is highly capable, motivated and well-equipped, and is not standing still. Your job is to partner with technology vendors and increase the cost of the bad guys getting to your data so that their ROI is reduced and they go elsewhere. The growing issues around cybersecurity will continue to drive forward thinking and cyber resilience. We heard today that it is actually possible to achieve infrastructure security while at the same time minimizing friction to enable organizations to move quickly in their digital transformations. A zero-trust framework must include vendor R&D and innovation that builds security, designs it into infrastructure products and services from the start, not as a bolt-on, but as a fundamental ingredient of the cloud, hybrid cloud, private cloud to edge operational model. The bottom line is if you can't trust your infrastructure, your security posture is weakened. Remember, this program is available on demand in its entirety at thecube.net and the individual interviews are also available and you can go to Dell's security solutions landing page for more information. Go to dell.com slash security solutions. This is Dave Vellante of theCUBE. Thanks for watching a blueprint for trusted infrastructure made possible by Dell. We'll see you next time.