Nutanix AHV and Rubrik’s Layered Security – The Key to System Resilience and Efficiency

Protecting critical infrastructure from cyber threats and ensuring business continuity in the face of disasters is a top priority for organizations today. Luckily, Nutanix AHV, a modern, secure virtualization platform that powers and enhances virtual machines (VMs), can help. Rubrik’s integrated solutions fortify AHV environments against ransomware attacks and enable efficient disaster recovery. By leveraging features like immutable backups, anomaly detection and on-demand cloud-based disaster recovery, organizations can enhance their cyber resilience and minimize the impact of disruptive incidents.

A Simple and Secure Path to VM Management

Nutanix AHV is simple to use and secure by design. The platform works through a centralized control plane, where AHV is integrated into a single application programming interface (API). This eradicates a complicated setup on the customer side. By maintaining constant management and a virtualization layer, Nutanix AHV allows organizations to fulfill mission objectives.

Nutanix AHV features several built-in security features, such as micro-segmentation, data insights, audit trails, ransomware protection and data age analytics.

Nutanix features:

  • Built-in, self-healing abilities protect against disk failure, node failure and more
  • A vulnerability patch summary automatically alerts users about susceptibility risks and anomalies that need to be addressed
  • A life cycle manager provides readmittance testing and deployment testing
  • More than one copy of backup data, ensuring that users do not lose valuable information
  • Multi-site replication including to and from the public cloud.

Securing data in Nutanix AHV requires more than just the basic perimeter defenses, but a multi-layered strategy. With Rubrik’s data protection abilities, which include immutable backups, automatic encryption and logical air-gapping, agencies and organizations can recover information within minutes and resume mission objectives in the event of a breach.

Securing Data with Rubrik’s Rapid Recovery Abilities

Rubrik, a security cloud solution provider that keeps your data resilient, enables the near-instant recovery of virtual machines and data within the Nutanix AHV environment. Rubrik provides multiple recovery options within AHV, such as file-level recovery, live mount, export, mount virtual disks and downloadable virtual disk files. Through Rubrik, businesses can recover files from older hypervisors into newer AHV environments without having older hypervisors online. Once granted access to the AHV environment, Rubrik automatically discovers and integrates protocols and base level policies for VMs. Rubrik’s recovery process restores data in minutes, regardless of VM size. As VMs get larger and larger, frequently hitting 50 terabytes, this speedy and precise response empowers organization’s incident response plans to be swift and efficient. After scanning the meta data, users are granted file level recovery after anomaly detection, allowing users oversight on affected data.

As the data that organizations manage grows exponentially, data security becomes critical to business functions. Rubrik offers comprehensive data security, continuously monitoring and remediating data risks within the network.

Through Rubrik, businesses can recover files from older hypervisors into newer AHV environments without having older hypervisors online. Once granted access to the AHV environment, Rubrik automatically discovers and integrates protocols and base level policies for VMs.Rubrik’s recovery process restores data in minutes, regardless of VM size. As VMs get larger and larger, frequently hitting 50 terabytes, this speedy and precise response empowers organization’s incident response plans to be swift and efficient.After scanning the meta data, users are granted file level recovery after anomaly detection, allowing users oversight on affected data.

Rubrik also provides constant monitoring for backups. Typically, businesses do not regulate data backlogs, which increases the likelihood that they miss attackers that sit in the system environment for a few days before collecting data. With Rubrik’s threat monitoring and hunting, organizations can search through backups and detect when an anomaly entered the environment. Through Nutanix and Rubrik’s integration, IT teams can reduce complexity, gain oversight, cut down on operational costs and improve resiliency and efficiency.

Automation: The Key to a Proactive Incident Response

Modern cyber threats require a proactive approach to incident response. With automation and orchestration, facilitated by the combined capabilities of Nutanix and Rubrik, organizations can detect, respond to and recover from cyber incidents more efficiently.

Rubrik has a built-in anomaly detection, which searches protected data for strange behavior, such as mass deletion or encryption. As the volume of data on a network increases, organizations often have sensitive data they are not actively monitoring or even know sensitive data maybe exposed. Rubrik clusters are always scanning protected data for anomalies, sensitive data, and known IOC’s allowing customers to select resolution options, such as isolating compromised VMs, or the ability to restore product systems from last known good copies.

Readiness impacts recovery time, and recovery time impacts organization operations. Nutanix AHV’s recovery organization authorizes IT teams to organize VMs into a set of templates, which can be used to create blueprints and launch application recovery. Nutanix also provides organizations with the flexibility to apply policy to each workload, taking control of network security and BC/DR policy with VM level granularity. By allowing organizations to map out their application owners, Nutanix AHV enables businesses to move from a reactive to a proactive security posture, minimizing the impact of attacks and ensuring swift recovery.

Nutanix and Rubrik’s integration creates a powerful security and operational synergy, empowering organizations with the tools they need for network safety and, if necessary, a swift and comprehensive restoration of critical systems, empowering organizations to resume business missions. Nutanix AHV enables organizations to reduce complexity, improve security and achieve a higher level of resilience and operational efficiency.

To learn more about how Nutanix AHV and Rubrik’s integration delivers streamlined data protection, rapid recovery and robust incident response capabilities, watch our webinar, Fortifying AHV: Cyber Recovery and Incident Response with Nutanix and Rubrik.


Harnessing the Power of Cloud Technology

During the pandemic, government employees shifted to remote work, and the demand for digital services skyrocketed. To meet those needs, agencies turned to the cloud. The experience gave them a taste of how essential the technology is to modernization efforts. In a recent survey of FCW readers, 87% of respondents agreed with the statement that cloud technology is a foundation for modernization at their agencies. The shift to cloud-based systems often requires a corresponding shift in budgets, employee skill sets and IT management techniques. When asked what steps would enable broader use of cloud technology at their agencies, 79% of FCW respondents said revamping their approach to managing a mix of on-premises and cloud-based systems. One solution is hybrid environments, which blend in-house legacy systems with cloud services, while multi-cloud environments are spread across many cloud platforms and providers. Hybrid environments will likely be the reality for most agencies. In a recent NASCIO survey, 89% of respondents said hybrid cloud was their ideal cloud state. Learn how your agency can determine an optimal cloud strategy in Carahsoft’s Innovation in Government® report.

 

Cloud’s Unprecedented Capacity for Innovation

“To make data-driven decisions, an agency needs to be able to access its data without concern for capacity constraints based on recent storage and compute contracts. Public cloud services can offer unprecedented scale and speed, and a cloud provider like Google can help government ingest data, and compute as necessary to answer complex analytics questions in real time. Some of our customers have stored tens of petabytes of data in Google Cloud’s serverless, cost-effective multi-cloud data warehouse, BigQuery. Analysts decide what questions they should ask and BigQuery will determine how much computing is necessary to consume it on demand – all without having to manage or configure the underlying infrastructure and services.”

Read more insights from Google’s Head of Customer Engineering for Federal Civilian Agencies, Andy Murphy.

 

Why Cloud is the Best Path for Modernization

“Accommodating demands to boost engagement while enabling remote collaboration is a complex challenge. At Microsoft, we think about collaboration as an operating model of people, places and processes, and we’re developing capabilities based on the recognition that each dimension has its own nuances, strengths and weaknesses. For example, when cloud technology is combined with the zero trust-based security approach required by the executive order, it facilitates collaboration among government employees by granting access and participation based on identity, physical location and/or the device they’re using.”

Read more insights from Microsoft Federal’s CTO, Jason Payne.

 

Maximizing Mission Success with the Cloud

IIG FCW Cloud Tech August Blog Embedded Image 2022“Most agencies operate hybrid environments that combine on-premises systems with cloud platforms and services. However, there are challenges associated with that approach. Hybrid environments require the ability to manage a diverse set of technologies, tools and operating models and to integrate workloads, applications and services across clouds and on-premises systems. A hybrid cloud environment also changes the traditional security boundary and introduces new vulnerabilities related to the nature of off-premises managed services and the unique attributes of cloud, which include ephemeral services and API-driven, software-defined everything. Fortunately, advanced cloud-based cybersecurity solutions are helping agencies move to zero trust architectures by shifting security services from primary data centers to edge locations to enable rapid analysis and a stronger security posture.”

Read more insights from Peraton’s Vice President of Cloud and Application Services, Gary Wang, and Cloud Architect and Expert on Public Cloud Products for the U.S. Public Sector, Bob Ferrari.

 

How to Build an Open Hybrid Cloud Ecosystem

“When agencies have a strong cloud environment, they can leverage open source solutions to achieve key modernization goals, such as improving digital services and making better use of data. That’s because open source is at the heart of all innovation. For the past 20-plus years, open source has been where leading technologists first experiment with new ideas that often become enterprise products. Companies like Red Hat and cloud providers such as AWS, Microsoft and Google begin new projects by working upstream in the open source community and making broadly shared contributions to the Linux Foundation, the Apache Software Foundation and the Cloud Native Computing Foundation. Red Hat Enterprise Linux, for one, is the world’s leading enterprise Linux platform that is fully built on open source software. The open source community is also contributing to agencies’ ability to comply with the Executive Order on Improving the Nation’s Cybersecurity and the government’s zero trust security initiatives.”

Read more insights from Red Hat’s North America Cloud GTM Lead, Tres Vance.

 

Robust Databases for Modern App Development

“Cloud computing has the ability to scale on demand to support modern application development and meet user demands quickly in a secure environment. That’s why we created Atlas for Government, an independent environment of our flagship cloud product MongoDB Atlas. Atlas for Government allows federal, state and local governments to build and iterate faster using a modern database-as-a-service platform. Our innovative approach gives agencies the versatility they need to modernize legacy applications and support the unique requirements and missions of the U.S. government — in a fully managed and secure environment.”

Read more insights from MongoDB’s Sales Director, Jennifer Hayes.

 

Adopting Zero Trust Data Security in the Cloud

“On the National Association of State CIOs’ 2022 list of its members’ top priorities, cybersecurity is in the first slot, followed by citizen experience. Those two go hand in hand. When a school is hacked and its data stolen, that school will likely be forced to close for days. When a department of corrections is hit with a ransomware attack, it will be in lockdown. And when a public health department’s systems are breached, it will be unable to provide vital services. Those are real-world examples of impacts that are happening across the country, and they illustrate why government agencies can’t wait until tomorrow to address these vulnerabilities. CIOs, chief security officers and IT directors at all levels of government know they need to do something today because they are vulnerable every minute until they do. At Rubrik, we focus on simplifying the protection of data in the cloud while keeping the citizen experience up and running.”

Read more insights from Rubrik’s Vice President and Head of State, Local Government and Education, Jared Vichengrad.

 

Three Key Goals for Modern IT Environments

“To take full advantage of cloud-based technological advances, agencies must address their legacy IT. In fiscal 2022 to date, the federal government has spent roughly $83 billion on IT, as reported on ITDashboard.gov. A third, or roughly $34 billion, has been spent on the operation and maintenance of legacy IT systems. The rising cost of maintaining legacy IT crowds out investments in newer cloud-based systems that can better serve citizens and federal workers. Mission-critical legacy applications, technologies and services also have many other dependencies that make modernization difficult. Those dependencies exist in the source code and runtime platforms, leveraging specific databases and using data in proprietary formats. Additionally, agencies have unique processes to manage these applications or services and specialized employees. Simply ripping and replacing mission-critical legacy systems is not an option, so successfully modernizing legacy IT requires addressing those issues.”

Read more insights from Micro Focus Government Solution’s Public-Sector CTO, Kevin Hansen.

 

A Proactive, Automated Approach to Security

“First, cloud dramatically reduces the time it takes to go from the conception of an idea to production. There are no data center build-outs, no equipment purchases, no months-long planning cycles. With cloud, new technologies can be tested almost instantly. Second, cloud providers offer a nearly infinite selection of tools and applications that are readily available on demand. Third, it may not be universally true that cloud costs less, but when it’s managed right, it absolutely should cost less than on-premises systems. Although cloud technology presents agencies with a tremendous opportunity, trying to manage the extended enterprise as it expands into and across the cloud will require a proactive approach to monitoring and security.”

Read more insights from Oracle’s Director of Solution Engineering, James Donlon.

 

Data Protection in Hybrid Cloud Environments

“Colonial Pipeline’s situation is something of an anomaly because one study showed that 96% of companies with a trusted backup and disaster recovery plan were able to survive ransomware attacks. However, only 31% of organizations test their disaster recovery plans, which is crucial to ensure that agencies understand the steps involved and can respond effectively in a crisis. Therefore, agencies should choose data protection solutions that include the ability to conduct automated disaster recovery rehearsals on a regular basis. The key to any disaster recovery solution is automation. Without automation, a timely wide-scale recovery is not achievable. Agencies should also be aware that many commercial solutions were born in the enterprise data center and run on architectures that do not support autonomous solutions that scale up or down based on the client’s demand.”

Read more insights from Veritas’s Director of Sales Engineering for Public Sector, Mike Malaret.

 

Providing a True Mac Experience in the Cloud

“People enjoy the Mac experience and are using more and more macOS-based tools, but they often don’t have remote access to Mac hardware for their jobs. As agencies continue to provide support for remote workers, they must consider how to provide access to Macs for the employees who rely on them for development, design or general office use. Some IT teams set up a physical Mac in a data center and create a network to attach to it, but creating remote access to a machine that’s far away makes it hard to fix problems when they arise. Instead, MacStadium has developed purpose-built technologies that create cloud-based Mac desktops. Cloud Access delivers high-performance remote desktop experiences from the MacStadium cloud to any device. And this year, we are adding Orka Workspaces, which enables high-performance desktop access to cloud-hosted macOS resources via a browser from any workstation or device. Those scalable, flexible technologies can be pushed out on demand to achieve a true Mac experience.”

Read more insights from MacStadium’s Senior Vice President and CTO, Chris Chapman.

 

Download the full Innovation in Government® report for more insights from these cloud thought leaders and additional industry research from FCW.

The Ongoing Quest for Cybersecurity

 

Government agencies were already under pressure to modernize their cybersecurity strategies before the pandemic hit, and as workplaces closed and government employees struggled to access data and systems from makeshift home offices, the cybersecurity risks grew. The use of virtual private networks in the U.S. increased to match the early spike in COVID-19 cases, rising 124% in the two weeks from March 8 to March 22, 2020, according to Statista. Around the same time, the Cybersecurity and Infrastructure Security Agency (CISA) issued an alert titled “Enterprise VPN Security,” which offered both warnings and guidance on how to handle the surge in usage. With so many employees logging in remotely, agencies found that they had to shift their focus from securing a well-defined perimeter to securing the data that fuels government operations. In a recent survey of FCW readers, protecting data topped the list of cybersecurity priorities, with 75% of respondents citing it. In response to such concerns, CISA released its Ransomware Guide in September 2020. And in May, President Joe Biden mandated that agencies adopt zero trust in his Executive Order on Improving the Nation’s Cybersecurity, and the National Security Agency released a paper a few months ahead of that mandate titled “Embracing a Zero Trust Security Model.” Read the latest insights from industry thought leaders in Carahsoft’s Innovation in Government® report on cybersecurity.

 

The Future of Cybersecurity is Autonomous

“Analysts have too much atomic data and not enough context about that data. When they don’t have the full picture, they can’t take appropriate action. Re-creating each attack by hand takes painstaking care. And though analysts often relish this challenge, there’s simply not the time to do so for every presented case. Forward-thinking organizations are using artificial intelligence/machine learning (AI/ML) capabilities to fortify user endpoints and server workloads across an array of operating systems. These automations are designed to monitor the growing number of attack vectors in real time and present the full context of an attack in an easy-to-understand view that’s modeled after a kill chain.”

Read more insights from SentinelOne’s COO, Nick Warner.

 

Tailoring Zero Trust to Individual Users

“Zero trust is an important construct for helping agencies protect their infrastructure in today’s cybersecurity landscape. It focuses on accrediting individuals and their access to government resources. Agencies should make those decisions about access based on a comprehensive understanding of users. Security policies that treat all users as equally risky can be restrictive. Such policies set the bar high and hamper employees’ ability to work, or they set the bar low, which defeats the purpose of having security. Instead, agencies should evaluate users on an individual basis by taking the time to understand what employees do and how they do it — what’s normal behavior and what’s not. Then they can assess the risk of an individual based on that context.”

Read more insights from Forcepoint’s President of Global Governments and Critical Infrastructure, Sean Berg.

 

Modernizing Security for a Mobile Workforce

“Securing data and apps begins with positively identifying the user. In government, agencies have used multifactor authentication and all kinds of certificates, but those are simple pass/fail security checks. Once users are allowed to cross the security barrier, they often have wide-ranging access to government resources. This means adversaries and malicious (or careless) insiders passing the security checks receive free rein as well. Government needs to move to a continuous authentication model, which leads to better security and a better user experience. It involves seamlessly authenticating users every step of the way — when they touch the keyboard or scroll through an app on a screen. That activity, down to the microscopic vibrations in a person’s fingertip, can be sensed and understood so that IT administrators can answer the question: Is this really the authenticated user, or is it somebody else?”

Read more insights from BlackBerry’s Chief Evangelist, Brian Robison.

 

The Dangers that Lurk in Mobile Apps

“Government employees are increasingly reliant on mobile applications to do their jobs. But without formal monitoring programs in place, agencies might be unaware of the risks inherent in commercial and government-built apps. As a result, few agencies are investing resources and time to address a serious problem. The average mobile device has 60 to 80 apps, representing a huge potential for vulnerabilities at agencies whose employees are using those devices for work. Thousands of apps could be tracking employees or intercepting data. NowSecure founder Andrew Hoog has said mobile apps are the ultimate surveillance tool, given the mix of personal and mission activities in one space.”

Read more insights from NowSecure’s Chief Mobility Officer, Brian Reed.

 

Why Data is a Critical Cybersecurity Tool

“Once agencies have gathered their data in a scalable, flexible platform, they can apply artificial intelligence to derive insights from the data. AI speeds analysis and is particularly effective when agencies move from signature-based to behavior-based threat detection. A signature-based approach is good for detecting threats we already know about, but a behavior-based AI approach can adapt to new threats by looking for anomalies such as changes in the behavior of a server or endpoint device. AI also helps with investigations by reconstructing the sequence of events that happened during an intrusion, which fuels agencies’ ability to prevent future attacks. With AI, agencies can start to apply more sophisticated algorithms in their hunt for vulnerabilities and cyber threats.”

Read more insights from Cloudera’s Principal Solutions Engineer and Cybersecurity SME Lead, Carolyn Duby.

 

IIG FCW Cybersecurity Blog Embedded Image 2021Zero Trust Data Management Foils Ransomware Attacks

“Agencies must ensure recoverability because none of these protections matter if they can’t recover data and systems that run their critical missions and operations. Agencies need to gather and protect data at the edges of their networks, in their data centers and across different clouds. And regardless of where agencies decide to store that data, they need to be able to access it instantly. Recoverability service-level agreements of minutes and hours are possible and delivered today across the whole of government and the Defense Department. Gone are the days of weeks and months to get back online.”

Read more insights from Rubrik’s Public-Sector CTO, Jeffrey Phelan.

 

Reclaiming Control over Complex IT Environments

“When employees were sitting in a government office behind a firewall, IT administrators had a clearly defined perimeter to protect. Now IT administrators are still focused on protecting the agency’s mission and assets, but the responsibility has become more difficult because they’ve lost some visibility and control over the infrastructure. In response, many organizations are moving toward strategies based on zero trust, which requires validating users and devices before they connect to government systems, or least privilege, which involves only giving employees access to the resources and applications they need to perform their jobs. Zero trust and least privilege require continuous monitoring and a risk-based approach to adding or removing authorizations.”

Read more insights from SolarWind’s Group Vice President of Product, Brandon Shopp.

 

The Role of Authentication in Data Protection

“Users who need to access low-risk applications and data — for example, publicly available product information — can use an authentication method such as one-time password tokens. But if that same user wants to access higher-value data such as corporate finance records, the required level of authentication should increase, perhaps requiring public-key infrastructure (PKI) authentication with a smartcard. The key is to manage those activities via one pane of glass or one platform that supports the entire risk-based and continuous authentication process. In the past, we’ve been able to base decisions on where users are located — for example, whether they’re accessing data from within the network or remotely via VPN — but that is no longer enough. New technology tools enable agencies to gain a deeper understanding of users’ online behavior so they can make more informed decisions about authentication.”

Read more insights from Thales TCT’s Vice President of Product Management, Bill Becker.

 

Verification and Validation to Enhance Zero Trust

“Networking teams rely on standard configurations to maintain the security policy. These standard configurations dictate connectivity and traffic flows to ensure users can access appropriate resources while preventing unauthorized access. The idea of a standard configuration seems simple, but maintaining it is extremely difficult. Validating configurations is clearly mission critical, but monitoring and validating network behavior are even more telling and help ensure that policies are not inadvertently being circumvented and that there is no unintended connectivity.”

Read more insights from Forward Networks’s Technical Solutions Architect, Kevin Kuhls.

 

Extending Zero Trust Down to the File Level

“A software-defined perimeter integrates proven, standards-based security tools to create the ideal foundation for zero trust. When used together, those two approaches give agencies the granularity to customize their security protocols. For example, the IT team could allow USB mice but not USB thumb drives that can store data, and they could block potentially unwanted applications that anti-malware engines might not identify as malicious, such as bitcoin-mining or file-sharing apps. Zero trust is a mindset rather than a specific group of tools. The National Institute of Standards and Technology’s Special Publication 800-207 on zero trust architecture advocates taking a holistic approach to authenticating devices and users and extending that attitude to agency assets, services and workflows.”

Read more insights from OPSWAT’s Senior Director of Government Sales, Michael Hylton.

 

Download the full Innovation in Government® report for more insights from these government cybersecurity leaders and additional industry research from FCW.