Recent Content
Proxmox VE
Hi all Hope you're all having a great day. We have several customers going down the Proxmox VE road. One of my colleagues was put onto https://github.com/kolesa-team/pve-purestorage-plugin as a possible solution (as using Pure behind Proxmox (using the native Proxmox release) is not a particularly Pure-like experience. Could someone from Pure comment on the plugin's validity/supportability?451Views2likes3CommentsJoin us for Nutanix IT Unplugged with Isaac Slade
Our friends at Nutanix are sponsering a fun virtual event on Dec. 5 for IT Unplugged featuring a live performance by Isaac Slade, formerly of The Fray. You'll hear from both Nutanix and Pure about our new joint solution, along with some musical fun. Go here for more details and to register: https://event.nutanix.com/itunplugged-december2025?utm_source=PureStorage16Views0likes0CommentsRansomware attacks are NOT going away
Here is why ransomware attacks are persistent and unlikely to disappear: 1. High Profitability and Low Risk for Criminals Ransomware is fundamentally a business model for organized crime, and it is overwhelmingly successful and profitable. Low Barrier to Entry: The rise of Ransomware-as-a-Service (RaaS) means even novice criminals can purchase sophisticated malware and infrastructure. This franchise model ensures high attack volume regardless of law enforcement efforts. Guaranteed Revenue Stream: The evolution to multi-extortion (encrypting data and stealing it) ensures that victims are forced to pay—either to regain system access or to prevent catastrophic data leaks and regulatory fines. This dual leverage guarantees profit even if the victim has backups. Anonymity: The use of cryptocurrency for payments, coupled with geopolitical safe zones for many RaaS groups, keeps the risk of prosecution extremely low for the attackers. 2. Attackers Are Outpacing Traditional Defenses The tactics used by ransomware groups are specifically designed to neutralize traditional defense and recovery measures: Targeting the Supply Chain: Attackers are finding success by targeting trusted vendors and IT providers to compromise dozens of companies simultaneously, making defense exponentially harder for individual organizations. Attacking Backups: Modern ransomware campaigns specifically target accessible backups to delete them or malware-infect them, eliminating the victim’s recovery option and forcing them to pay the ransom. AI for Stealth and Speed: The adoption of AI is accelerating reconnaissance and stealth, dramatically compressing the time between network access and payload deployment. Attackers can move faster than human defenders can react. 3. Cyber Resilience is the New Standard The industry has shifted its mindset from trying to achieve absolute prevention (which is impossible) to guaranteeing resilience. This shift acknowledges the persistence of ransomware. The focus is now on ensuring organizations can: Anticipate and detect threats early (low MTTD). Withstand the attack without immediate operational collapse. Recover guaranteed clean data within minutes (low MTTR). Ransomware will not disappear until the criminal model becomes unprofitable, and current data shows that attackers are highly successful and rapidly adapting their strategies.Any movement on Active Cluster with NVMe /TCP?
The last update I can find is from 2 years ago was a "maybe 2025" post. Nothing in the AC FAQ that I can find. Is this going to happen or should we just explore other conectivity options at this point? Servers are UCS with internal FC switching for now, we would like to configure uniform access. Pretty sure VMware isn't going to officially support multiple connection types for the same LUN/device/volume, unless someone knows something different.76Views0likes3Commentsrelationship between clusters and host groups
Due to circumstances beyond my control, over time and several upgrades of vSphere, there is no longer any commonality between the clusters in vSphere and what I see as host groups in the FlashArrays. So, my question is - does the API figure things out one way or another OR is my assumption that in the ideal world the clusters of hosts in VMware should match the host group names and such in Pure land? Basically some folks played shell games and since the zoning allowed it, lots of things don't line up like I once had them. I am unsure of the best way to make them sane again. thanks!176Views1like8Comments🚨 Cyber Security Alert: 🚨 The Culture Clash That's Weakening Collaborative Defense
A cultural conflict between security and compliance/legal is severely slowing down the sharing of vital threat intelligence among security community, according to an interview with David Schwed, J.D., COO of SVRN. The bottleneck is not exactly tech, but risk aversion and bureaucracy that dilute timely alerts. The path forward involves using AI and privacy-enhancing technologies (like zero-knowledge proofs) to share security insights globally without ever revealing the underlying data. Ultimately, David's conclusion is that a collaborative defense requires a compliance shift: organizations must focus on more of a defensible decision-making process rather than avoiding all risk. Read the full article here: Collaborative Defense: How the Security and Compliance Clash Puts Defense at Risk ❓Question to the Community: What specific compliance or legal hurdles is your team facing when trying to share threat intelligence quickly, and do you see AI/privacy-enhancing tech as a viable solution for your organization? Click through to read the entire article above and let us know your thoughts around it in the comments below!14Views1like0CommentsMFA Downgrade Attacks: Good to know.
Short article on MFA downgrade attacks; provides the basics on what it is and how to defend. Good to know for considering your own policies and processes when folks lose devices. https://www.scworld.com/perspective/why-mfa-downgrade-attacks-could-be-the-next-ai-security-crisisPure Report Podcast - Nutanix and Pure
Join industry experts Don Poorman and Erin Stevens as we unpack the latest trends in virtualization strategies and why the timing is perfect for a new approach, and how Nutanix, with its AHV hypervisor, is well positioned with Pure to deliver a solution designed from the ground up for high-performance and enterprise scale. This episode explores the "what" and "how" of the jointly engineered Pure and Nutanix solution, detailing how Nutanix AHV hosts can leverage Pure FlashArray for shared storage, offering an apples-to-apples replacement for traditional setups. We'll cover the details around joint integrations, including the NVMe/TCP connection between Nutanix and Pure FlashArray, and how VMs are managed through Nutanix Prism for a granular vVols-like experience. Learn about the specific workloads and use cases this solution targets, particularly environments needing a balance of computing and networking, and those with high transactional database demands.
25Views1like0CommentsNVMe-TCP + VMware Design Questions
Q1: In a medium - large datacenter (ie anticipated growth to 500 hosts), would it be a problem to use large subnets (ie 2 x /23 or /22's) to place the initiators + target IPs? All our existing nvme-tcp deployments (which we're having great success with btw) use 2 x /24's, which provides more than enough capacity for the array + a decent sized cluster. But now we're entering into the realms of multiple flasharrays (ie 3 or 4 in a single site) and hundreds of hosts - we'll quickly exhaust a /24 range. Q2: In this site, where we have say 2 x FA-X's an 2 x FA-C's, is it valid to present datastores from all of these arrays over nvme-tcp to a single cluster? With each array / datastore cluster being accessed using the same initiators on the same layer 2's? At what point does it get silly and I need to draw a line and segregate environments? Q3: Is there a capacity limit to the number of client hosts I can have on an array / mapping storage to? (nvm - I think I found the answer to that - looks like it's 1000 nqn's on pretty much all X and C arrays)157Views1like4CommentsIntroducing Pure Storage Data Stream for AI Data Readiness
Cool news to share from Pure's presence at NVIDIA GTC this week - the announcement of a new solution - Pure Storage Data Stream - that accelerates data readiness by automating and speeding up the ingestion, transformation, and optimization of data for enterprise AI pipelines. "Data Stream is a GPU-centric AI-powered, integrated hardware and software stack built for data readiness to automate and accelerate the ingestion, transformation, and optimization of data for enterprise AI pipelines. It is a core component of Pure Storage Data Platform built for enterprise inference use cases, using the NVIDIA AI Data Platform reference design, a comprehensive, single-appliance, jointly engineered infrastructure stack tailored for AI inference via generative AI applications." Register for a preview here: https://www.pure.ai/data-stream.html Blog announcement: https://blog.purestorage.com/products/driving-the-future-of-ai-data-readiness-pure-storage-data-stream/84Views0likes0Comments