SlideShare a Scribd company logo
1 of 23
Three Reasons Storage Security is Failing
and How to Fix It
Learn three storage security fixes:
1. Encryption
2. Security
3. Reporting
For audio playback and Q&A go to: http://bit.ly/3SecurityFail
OurSpeakers
Jonathan Halstuch,
CTO of RackTop Systems
George Crump,
Founder and Lead Analyst
of Storage Switzerland
Hot Topics: Storage Security and Data Privacy
New Pressures
● GDPR
● Facebook/Cambridge
● Open Amazon S3
Buckets
Storage Security
● Encryption
● Access Control
● Access Analysis
Data Privacy
● Security
● Protection
● Data Management
Storage Security and Data Privacy is Broken
● Typically at the final data resting point
● Secondary Storage, Object Storage, Tape
● Primary Storage has almost NO:
○ Encryption
○ Access Control
○ Data Management
The Bottom-Up Approach: Storage Security and
Privacy Today
Security and Privacy
are Reactive
● Add software to encrypt data on
primary storage
● Add data protection software
● Add data management
Reactive
Security and
Privacy Are
Complex and
Fragile
● Encrypting data requires creating a new
file system of volume
○ Old data has to be copied in
● Data management requires adding
secondary software with limited
integration
● Access control and auditing requires third
party software that scans storage
systems
● All of these add-ons impact performance
Top Down: Fixing Storage Security and Data Privacy
● Encryption is inline
○ Always-on and starts on day 1
● Better data protection features
○ Leads to fewer “super-user” accounts
and better access control
● Built-in reporting and auditing
○ Proactive search for attacks
Security Has to Start
with Primary Storage
● Data Management needs to be built in
○ More than a cache needs to move data across
systems
● Has to be granular
○ File by file required to “Right to be Forgotten”
● Needs to support cloud as a destination
○ Limits exposure
○ Cuts costs
○ Must be encrypted
Privacy Has to Start with Primary Storage
Still Has to Act
Like Primary
Storage
● Has to deliver primary storage
performance
○ Take full advantage of flash
● Has to have primary storage
features
○ Snapshots, replication, data
protection
○ Multi-protocol - file and block
© Copyright RackTop Systems Inc. 2015-2018.
Data Storage
& Management
Cyber Security
Compliance
“The Perfect Storm”
© Copyright RackTop Systems Inc. 2015-2018.
Data Storage
& Management
Cyber Security
Compliance
• Security by design
• Single pane-of-glass management
• Policy based data storage and management
• Multiple layers of encryption
• Report on data risk and exposure
• Track user behavior and detect anomalies
• Transparent data movement to other arrays and the cloud
Introducing BrickStor
Data Storage + Security + Compliance in a Single Platform
© Copyright RackTop Systems Inc. 2015-2018.
BrickStor Appliance Configurations
•All Flash or Hybrid Systems
•Unified Storage NFS, SMB, AFP, iSCSI
•Up to 1.4TB of RAM (cache) per node
•Up to 4 x 10Gbe, 25Gbe, 40Gbe or 100*Gbe
•Starting at 24TB+ for Hybrid; 2.4TB+ for all flash
•Scale to more than 4 Petabytes per node cluster
•Starting at 2U of rack space
•Secure Supply Chain - 100% assembled in the US,
including flashing hard drive firmware and enclosures; TAA
compliant
*100Gbe shipping in summer 2018
© Copyright RackTop Systems Inc. 2015-2018.
Compliance Out of the Box
• Address Multiple Regulations and Policies
• NIST 800-171/GDPR/SOX/FINRA/SEC/HIPPA
• Policy Driven Microservices –
• Snapshots, HSM, Retention, Storage Settings, Encryption
• Eliminate dependency on Users and Admins – Automate
• Real Time interactive reporting and Static reporting
• Manage Least Privileged Access Easily
• Host based Access and Role Based Access Controls
• Complete activity and audit reporting
© Copyright RackTop Systems Inc. 2015-2018.
Compliance Out of the Box
© Copyright RackTop Systems Inc. 2015-2018.
Transparent Data Movement (TDM)
© Copyright RackTop Systems Inc. 2015-2018.
An Elegant Solution to a Complex Problem
•Consolidated Platform Reduces Cost and Increases
Security
•Security by design
○ Access Controls
○ Encryption
○ User Behavior
•Out of the box compliance
○ Policy driven services
○ Canned reports
•Reduce the overall burden on IT
Thank you!
Storage Switzerland
http://www.storageswiss.com
georgeacrump@storageswiss.com
StorageSwiss on Twitter:
http://twitter.com/storageswiss
StorageSwiss on YouTube:
http://www.youtube.com/user/storageswiss
RackTop Systems
http://www.racktopsystems.com
info@racktopsystems.com
RackTop Systems on Twitter:
https://twitter.com/racktop
RackTop Systems on Facebook:
https://www.facebook.com/RackTop
Three Reasons Storage Security is Failing
and How to Fix It
For complete audio and Q&A please register for the On Demand Version:
http://bit.ly/3SecurityFail

More Related Content

What's hot

Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebBoyd Neil
 
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...Prasadu Peddi
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Spiceworks
 
Secure Document Collaboration with Alfresco
Secure Document Collaboration with AlfrescoSecure Document Collaboration with Alfresco
Secure Document Collaboration with AlfrescoZia Consulting
 
Your only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward OgdenYour only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward Ogdenowaspsuffolk
 
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...Ragnar Heil
 
Monitoring Network Function Virtualization Infrastructure (NFVI) with Zenoss
Monitoring Network Function Virtualization Infrastructure (NFVI) with ZenossMonitoring Network Function Virtualization Infrastructure (NFVI) with Zenoss
Monitoring Network Function Virtualization Infrastructure (NFVI) with ZenossRazak Mohammed Ali
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Prasadu Peddi
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp nyprekubatortto
 
Presentatie_PatentWorkflow
Presentatie_PatentWorkflowPresentatie_PatentWorkflow
Presentatie_PatentWorkflowAnne Le Turnier
 

What's hot (10)

Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
 
Secure Document Collaboration with Alfresco
Secure Document Collaboration with AlfrescoSecure Document Collaboration with Alfresco
Secure Document Collaboration with Alfresco
 
Your only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward OgdenYour only as strong as your weakest link – Edward Ogden
Your only as strong as your weakest link – Edward Ogden
 
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
 
Monitoring Network Function Virtualization Infrastructure (NFVI) with Zenoss
Monitoring Network Function Virtualization Infrastructure (NFVI) with ZenossMonitoring Network Function Virtualization Infrastructure (NFVI) with Zenoss
Monitoring Network Function Virtualization Infrastructure (NFVI) with Zenoss
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
 
Presentatie_PatentWorkflow
Presentatie_PatentWorkflowPresentatie_PatentWorkflow
Presentatie_PatentWorkflow
 

Similar to Webinar: Three Reasons Storage Security is Failing and How to Fix It

Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...
Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...
Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...Storage Switzerland
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid ITWebinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid ITStorage Switzerland
 
Webinar: Three Reasons Why NAS is No Good for AI and Machine Learning
Webinar: Three Reasons Why NAS is No Good for AI and Machine LearningWebinar: Three Reasons Why NAS is No Good for AI and Machine Learning
Webinar: Three Reasons Why NAS is No Good for AI and Machine LearningStorage Switzerland
 
Distributed Database Architecture for GDPR
Distributed Database Architecture for GDPRDistributed Database Architecture for GDPR
Distributed Database Architecture for GDPRYugabyte
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRStorage Switzerland
 
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCOCloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCOStorage Switzerland
 
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemWebinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemStorage Switzerland
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageStorage Switzerland
 
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareWebinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareStorage Switzerland
 
Webinar: 3 Steps to Controlling the Secondary Storage Deluge
Webinar: 3 Steps to Controlling the Secondary Storage DelugeWebinar: 3 Steps to Controlling the Secondary Storage Deluge
Webinar: 3 Steps to Controlling the Secondary Storage DelugeStorage Switzerland
 
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...Jimmy Guerrero
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsStorage Switzerland
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADERocket Software
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
 
How to Implement Snowflake Security Best Practices with Panther
How to Implement Snowflake Security Best Practices with PantherHow to Implement Snowflake Security Best Practices with Panther
How to Implement Snowflake Security Best Practices with PantherPanther Labs
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxEncrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxNeo4j
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityPrecisely
 

Similar to Webinar: Three Reasons Storage Security is Failing and How to Fix It (20)

Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...
Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...
Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomw...
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid ITWebinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
 
Webinar: Three Reasons Why NAS is No Good for AI and Machine Learning
Webinar: Three Reasons Why NAS is No Good for AI and Machine LearningWebinar: Three Reasons Why NAS is No Good for AI and Machine Learning
Webinar: Three Reasons Why NAS is No Good for AI and Machine Learning
 
Distributed Database Architecture for GDPR
Distributed Database Architecture for GDPRDistributed Database Architecture for GDPR
Distributed Database Architecture for GDPR
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPR
 
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCOCloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
 
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemWebinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
 
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareWebinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare
 
Webinar: 3 Steps to Controlling the Secondary Storage Deluge
Webinar: 3 Steps to Controlling the Secondary Storage DelugeWebinar: 3 Steps to Controlling the Secondary Storage Deluge
Webinar: 3 Steps to Controlling the Secondary Storage Deluge
 
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
How to Implement Snowflake Security Best Practices with Panther
How to Implement Snowflake Security Best Practices with PantherHow to Implement Snowflake Security Best Practices with Panther
How to Implement Snowflake Security Best Practices with Panther
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxEncrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 

More from Storage Switzerland

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Storage Switzerland
 
Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeStorage Switzerland
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigStorage Switzerland
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Storage Switzerland
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudStorage Switzerland
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIStorage Switzerland
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Storage Switzerland
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Storage Switzerland
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthStorage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Storage Switzerland
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesStorage Switzerland
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureStorage Switzerland
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsStorage Switzerland
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Storage Switzerland
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownStorage Switzerland
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosStorage Switzerland
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data MadnessStorage Switzerland
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Storage Switzerland
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Storage Switzerland
 

More from Storage Switzerland (20)

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
 
Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Webinar: Three Reasons Storage Security is Failing and How to Fix It

  • 1. Three Reasons Storage Security is Failing and How to Fix It Learn three storage security fixes: 1. Encryption 2. Security 3. Reporting For audio playback and Q&A go to: http://bit.ly/3SecurityFail
  • 2. OurSpeakers Jonathan Halstuch, CTO of RackTop Systems George Crump, Founder and Lead Analyst of Storage Switzerland
  • 3. Hot Topics: Storage Security and Data Privacy
  • 4. New Pressures ● GDPR ● Facebook/Cambridge ● Open Amazon S3 Buckets
  • 5. Storage Security ● Encryption ● Access Control ● Access Analysis
  • 6. Data Privacy ● Security ● Protection ● Data Management
  • 7. Storage Security and Data Privacy is Broken
  • 8. ● Typically at the final data resting point ● Secondary Storage, Object Storage, Tape ● Primary Storage has almost NO: ○ Encryption ○ Access Control ○ Data Management The Bottom-Up Approach: Storage Security and Privacy Today
  • 9. Security and Privacy are Reactive ● Add software to encrypt data on primary storage ● Add data protection software ● Add data management
  • 10. Reactive Security and Privacy Are Complex and Fragile ● Encrypting data requires creating a new file system of volume ○ Old data has to be copied in ● Data management requires adding secondary software with limited integration ● Access control and auditing requires third party software that scans storage systems ● All of these add-ons impact performance
  • 11. Top Down: Fixing Storage Security and Data Privacy
  • 12. ● Encryption is inline ○ Always-on and starts on day 1 ● Better data protection features ○ Leads to fewer “super-user” accounts and better access control ● Built-in reporting and auditing ○ Proactive search for attacks Security Has to Start with Primary Storage
  • 13. ● Data Management needs to be built in ○ More than a cache needs to move data across systems ● Has to be granular ○ File by file required to “Right to be Forgotten” ● Needs to support cloud as a destination ○ Limits exposure ○ Cuts costs ○ Must be encrypted Privacy Has to Start with Primary Storage
  • 14. Still Has to Act Like Primary Storage ● Has to deliver primary storage performance ○ Take full advantage of flash ● Has to have primary storage features ○ Snapshots, replication, data protection ○ Multi-protocol - file and block
  • 15. © Copyright RackTop Systems Inc. 2015-2018. Data Storage & Management Cyber Security Compliance “The Perfect Storm”
  • 16. © Copyright RackTop Systems Inc. 2015-2018. Data Storage & Management Cyber Security Compliance • Security by design • Single pane-of-glass management • Policy based data storage and management • Multiple layers of encryption • Report on data risk and exposure • Track user behavior and detect anomalies • Transparent data movement to other arrays and the cloud Introducing BrickStor Data Storage + Security + Compliance in a Single Platform
  • 17. © Copyright RackTop Systems Inc. 2015-2018. BrickStor Appliance Configurations •All Flash or Hybrid Systems •Unified Storage NFS, SMB, AFP, iSCSI •Up to 1.4TB of RAM (cache) per node •Up to 4 x 10Gbe, 25Gbe, 40Gbe or 100*Gbe •Starting at 24TB+ for Hybrid; 2.4TB+ for all flash •Scale to more than 4 Petabytes per node cluster •Starting at 2U of rack space •Secure Supply Chain - 100% assembled in the US, including flashing hard drive firmware and enclosures; TAA compliant *100Gbe shipping in summer 2018
  • 18. © Copyright RackTop Systems Inc. 2015-2018. Compliance Out of the Box • Address Multiple Regulations and Policies • NIST 800-171/GDPR/SOX/FINRA/SEC/HIPPA • Policy Driven Microservices – • Snapshots, HSM, Retention, Storage Settings, Encryption • Eliminate dependency on Users and Admins – Automate • Real Time interactive reporting and Static reporting • Manage Least Privileged Access Easily • Host based Access and Role Based Access Controls • Complete activity and audit reporting
  • 19. © Copyright RackTop Systems Inc. 2015-2018. Compliance Out of the Box
  • 20. © Copyright RackTop Systems Inc. 2015-2018. Transparent Data Movement (TDM)
  • 21. © Copyright RackTop Systems Inc. 2015-2018. An Elegant Solution to a Complex Problem •Consolidated Platform Reduces Cost and Increases Security •Security by design ○ Access Controls ○ Encryption ○ User Behavior •Out of the box compliance ○ Policy driven services ○ Canned reports •Reduce the overall burden on IT
  • 22. Thank you! Storage Switzerland http://www.storageswiss.com georgeacrump@storageswiss.com StorageSwiss on Twitter: http://twitter.com/storageswiss StorageSwiss on YouTube: http://www.youtube.com/user/storageswiss RackTop Systems http://www.racktopsystems.com info@racktopsystems.com RackTop Systems on Twitter: https://twitter.com/racktop RackTop Systems on Facebook: https://www.facebook.com/RackTop
  • 23. Three Reasons Storage Security is Failing and How to Fix It For complete audio and Q&A please register for the On Demand Version: http://bit.ly/3SecurityFail