article thumbnail

Modern Storage Meets Cyber Resilience: The Rubrik and Pure Storage Solution Architecture for Unstructured Data

Pure Storage

Pure Storage and Rubrik are expanding their partnership to offer a holistic and secure reference architecture that tackles the challenges of managing and securing unstructured data at scale. Unstructured data is highly susceptible to ransomware attacks due to its volume, critical nature, and often insufficient protection.

article thumbnail

Disaster Recovery (DR) Architecture on AWS, Part I: Strategies for Recovery in the Cloud

AWS Disaster Recovery

Architecture of the DR strategies. Backup and restore DR architecture. Pilot light DR architecture. Warm standby DR architecture. Multi-site active/active DR architecture. Disaster events pose a threat to your workload availability, but by using AWS Cloud services you can mitigate or remove these threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Overcoming observed challenges when adopting a zero trust architecture

Citrix

More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept … The post Overcoming observed challenges when adopting a zero trust architecture first appeared on Citrix Blogs.

article thumbnail

How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability

Citrix

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent authentication bypass vulnerability in multiple versions of Atlassian Confluence app (versions prior to 2.7.38 and 3.0.5).

article thumbnail

Leveraging Large Language Models for STRIDE Threat Modeling—A Scalable and Modular Approach to Secure PoCs and Agile Projects

Pure Storage

Applying STRIDE Step 1: Initiating the STRIDE Session The session began by initiating an automated dialogue with Threat Model Mentor , which first asked for a high-level description of the system architecture. This description allowed the system to form a preliminary understanding of the major components, data flows, and interactions.

article thumbnail

Journey to Adopt Cloud-Native Architecture Series: #3 – Improved Resilience and Standardized Observability

AWS Disaster Recovery

In this blog, we talk about architecture patterns to improve system resiliency, why observability matters, and how to build a holistic observability solution. We used AWS Backup to simplify backup and cross-Region copying of Amazon EC2, Amazon Elastic Block Store (Amazon EBS) , and Amazon RDS to mitigate business continuity risks.

article thumbnail

Implementing Multi-Region Disaster Recovery Using Event-Driven Architecture

AWS Disaster Recovery

In this blog post, we share a reference architecture that uses a multi-Region active/passive strategy to implement a hot standby strategy for disaster recovery (DR). DR also mitigates the impact of disaster events and improves resiliency, which keeps Service Level Agreements high with minimum impact on business continuity.