![]() ![]() In this latest ONTAP release, we’ve made it easier for your organization to use data in more ways. NetApp is also introducing ONTAP enhancements that help you solve other storage challenges beyond ransomware and security. Increased flexibility across your hybrid cloud We’ve also created a template for BlueXP and System Manager that you can follow to confirm that you’ve turned on the relevant security capabilities to further protect your data. Simplified workflow for configuring a security profile Now additional verification steps are required before configuration changes can be made or data can be deleted. The ONTAP environment now includes increased support for management of access methods, which enhances multifactor authentication and makes your data even more secure. With Zero Trust, malicious actions by administrators can’t be hidden or deleted, making it easier for your organization to see activity that’s out-of-bounds. With this latest ONTAP release, you can increase your protection from insider threats by using Zero Trust principles in three new ways: It’s a core component of the industry-leading ONTAP portfolio for data security. NetApp is also leading the way in enabling customers like you to protect data by following the principles of a Zero Trust architecture-never trust and always verify. ![]() Hardened security for your ONTAP environment Set them up once, and they continue to protect your data. These recent enhancements are three more ways that NetApp has automated ransomware protection, making it even easier for you to deploy and to strengthen your cyber resilience. ![]() It’s a powerful level of protection to add to your storage environment. With this new ONTAP release, you can activate FPolicy with a single click from BlueXP or ONTAP System Manager. The NetApp FPolicy feature in ONTAP protects against 3,000 common ransomware extensions that are used for typical attacks. With just one click, you can now instantly enable automatic blocking of known malicious files. One-click defense against malicious files This protection is invaluable during a failover from a primary to a secondary. You can use it to immediately protect copies of your data on secondary storage, using the screening model that has already been created for your primary data.
0 Comments
Leave a Reply. |