Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update 34 – Isn't the Internet Supposed to be Bombproof?

Kilian & Ryan dissect what could happen if a major data center went down, and how organizations leveraging cloud technology or solutions can prepare for business continuity.
Kilian Englert
1 min read
Last updated January 17, 2023

The FBI recently averted a potential attack on the AWS cloud – and in the process raised many questions about the stability and redundancy of “the cloud” and the technology built on it. While it’s easy to visualize redundancy in the on-prem storage world, who exactly controls these things in the cloud? How does the “shared responsibility” model split up this critical component? Is redundancy built into IaaS/PaaS offerings? Or must organizations or developers build it themselves?

Join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team live as they dissect what could happen if a major data center went down, and how organizations leveraging cloud technology or solutions can prepare for business continuity.

 

Articles referenced in this video:

Watch the customer Ransomware Detection PoC Teaser here.

👋To learn how else we can help, please visit Varonis Support. For other useful information, Varonis customers also get access to great educational content to help support them on their journey.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

compare-salesforce-user-permissions-with-ease
Compare Salesforce user permissions with ease
DatAdvantage Cloud now enables admins to compare two Salesforce users’ effective permissions side-by-side with a simple click of a button.
threat-update-72---what-is-saas-security-posture-management-(sspm)?
Threat Update 72 - What is SaaS Security Posture Management (SSPM)?
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
threat-update-69---what-is-secure-access-service-edge-(sase)?
Threat Update 69 - What is Secure Access Service Edge (SASE)?
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
threat-update-73---what-is-a-cloud-access-security-broker-(casb)?
Threat Update 73 - What is a Cloud Access Security Broker (CASB)?
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.