Recent Content
Azure Local now works with FlashArray
A little bit of catch up here, but Azure Local is now fully GA with support for on-premises FlashArray. That means you can easily expand your current environment with FA external storage, or start a net new deployment. And yes, you can use an existing FlashArray to do it. Azure Local is shaping up to be a good VMware alternative as well as a strong solution for those needing soverign clouds, as Microsoft has a lot of support for regulatory frameworks and in-country data centers. You can learn more about it in the blog and feel free to post any questions here. We also have a webinar coming up on May 21, 9:00am PT, 12:00pm ET, so you can learn more about it.163Views0likes0CommentsClaude Mythos: The Next Frontier of Autonomous Cyber Intelligence
Model Performance and Capabilities Claude Mythos represents a significant performance leap for Anthropic, reportedly beating their current best Opus model by a large margin. This kind of improvement hasn't been seen since OpenAI released their reasoning model O1 in September 2024. Key performance metrics include: Coding ability: 77% on SWE-Bench Pro (compared to Opus at 53%) Terminal usage: Substantial improvements in the model's ability to use terminal commands General purpose: Despite the cybersecurity focus in marketing, Mythos is a general-purpose LLM like other Claude models Cybersecurity Focus and Access Restrictions Anthropic has positioned Mythos around cybersecurity concerns, emphasizing AI as a potential national security risk - similar to OpenAI's approach with GPT-2 in 2019. However, the model is not cybersecurity-specific but rather a general-purpose AI. Limited Release Strategy: Anthropic has restricted access to select partners, most of whom are investors in the company: Microsoft (Series C and G investor) NVIDIA (Series G) JP Morgan (conventional loan, May 2025) Google (Series C and E, plus convertible debt) Amazon (Series D and E) Cisco (Series E) Market Implications and Competitive Advantages This restricted access creates what the video calls "privatization of tokens," giving certain companies advantages in: Cybersecurity: Finding vulnerabilities (benefiting companies like Cisco, Palo Alto) Legal services: Discovering legal loopholes and litigation strategies Finance and software development: Enhanced capabilities across various domains The core issue isn't cybersecurity itself, but rather the rapid improvement in AI capabilities outpacing society's ability to adapt. Infrastructure and Pricing Infrastructure Dependencies: Despite committing $50 billion to data centers in Texas and New York, Anthropic still relies on partners (Amazon, Google, Microsoft) for training and inference. Pricing Structure: Mythos will cost $125 per million output tokens Available through cloud APIs (Amazon Bedrock, Google Cloud Vertex, Microsoft Foundry) Unlikely to be included in subsidized Pro and Max plans Comparable to OpenAI's GPT-4 Pro at $180 per million tokens Business Strategy and Market Position IPO Positioning: The Mythos release strategically positions Anthropic for a potential IPO, with the company recently surpassing OpenAI by achieving $30 billion in annualized run rate (ARR) - though this is run rate rather than the more conservative annual recurring revenue metric. Adoption Challenges: The rapid advancement creates both excitement and concern, highlighting the growing divide between companies that adopt AI quickly and those that don't. The key is matching the right level of AI intelligence to appropriate tasks rather than using premium models for basic workflows. Future Outlook Based on historical patterns (like DeepSeek R1 catching up to OpenAI's O1 within 5 months), the performance gap created by Mythos will likely be bridged by competitors relatively quickly. The real competitive advantage lies in how quickly companies can adopt and properly allocate AI intelligence to solve complex problems.190Views1like0CommentsDid anyone attend RSA 2026?
Everpure exhibited and attended at RSA 2026, the biggest annual gathering of cyber security and cyber security professional and companies. Besides an booth, we presented and sponsored several activities. Let us know if you attended and share what your observed with the community. Here are key trends noted by Everpure at the RSA 2026 conference: The RSA 2026 Narrative RSA 2026 signaled a significant shift in the industry’s mindset, moving away from reactive defense toward a proactive business configuration that leverages "active" systems to sense, pivot, and self-correct. Agentic AI: We are officially in an "AI vs. AI" war. RSAC 2026 highlighted that adversaries now have the upper hand, leveraging Agentic AI to expose vulnerabilities that have remained undiscovered by humans for 10+ years. Because human-led defense cannot keep pace with machine-speed exploits, the focus has shifted from "human-in-the-loop" to "human-on-the-loop." This model relies on autonomous, self-healing systems to isolate threats and restore environments in real-time, allowing humans to act as strategic governors of AI insights rather than manual controllers of the recovery process. In addition, identity security must deal with emerging polymorphic social engineering attacks. MTTA: JPMorgan introduced Mean Time to Adapt, prioritizing real-time posture reconfiguration over static recovery (RTO) to neutralize active threats. Data Integrity: Bruce Schneier identified a "resilience gap" from silent AI corruption, making integrity checks a mandatory prerequisite for trustworthy recovery. Quantum Readiness: Resilience now requires migrating to Post-Quantum Cryptography (PQC) to shield long-lived data from "Harvest Now, Decrypt Later" tactics. Defense to Disruption: "Active Defense" aims to increase attacker costs and efforts. Future Threats: Panels warned of "Harvest Now, Decrypt Later" quantum risks and polymorphic social engineering, while honoring quantum networking breakthroughs.Data Intelligence and Cyber Resilience
Over the next few months you will be hearing more about data intelligence from Everpure. What is it? How is it relevant to cyber resilience? Data intelligence is the practice of transforming raw data into actionable insights through automated discovery, classification, and metadata analysis. In the modern threat landscape, it is the essential bridge between simple "backup" and true Active Resilience. Without intelligence, resilience is blind. Data intelligence provides the "who, what, and where" of your digital estate, allowing you to: Prioritize Recovery: Identify mission-critical applications and sensitive PII to ensure the most vital services are restored first. Accelerate Detection: Use AI-driven behavioral analysis to spot "silent" corruption or unauthorized access at the storage layer. Ensure Clean Restoration: Precisely tag compromised data to prevent re-infecting environments during recovery. By unifying data security with intelligence, organizations move from being passive targets to Active Defenders, ensuring operational survivability even in the face of sophisticated agentic attacks.Why Cyber Resilience Requires Recovery Not Just Backups: CISO and Field Perspectives
15 Minutes---Webinar from Everpure's Rick Orloff, CISO, and Scott Taylor, Director of Cyber Resilience Field Solution Architects on Cyber Recovery Strategy Resilience isn't just prevention—it’s about the "Minimum Viable Business." At RSAC 2026, Everpure’s Rick Orloff and Scott Taylor explained why recovery fails without understanding dependencies. Prioritize critical data and cross-functional collaboration to minimize revenue disruption. Stop treating backup as the goal; make rapid, strategic recovery your mission. Link to WebinarEverpure Protect - Tools for Network Configuration
A key workflow item, especially when building Isolated Recovery Environments (IRE), Clean Rooms, test or production Disaster Recovery, or any other environment personality, is to reconfigure the network. Doing so automatically and per a plan is important to an automated, fast, and predictable workflow. We have built Everpure Protect Tools, which is a lightweight tool, registered with VMtools within a guest, that allows us to automate network configuration changes, per the individual Recovery Plan. Included in the download is a Powershell script for Windows, or a Shell script for Linux/Unix, which registered our tool with VMtools to perform the changes. The scripts can be loaded and ran manually in each guest, or distributed and executed as part of a workflow such as Microsoft MCM/SCCM. Everpure Protect Tools Once deployed, network changes on a per-VM or per-Recovery Plan basis will be automatically performed based upon the unique settings in the Recovery Plan being executed.Zero Trust in Practice: What Actually Breaks in Real Environments
Most Zero Trust discussions sound great on paper—but implementation tells a different story. From recent hybrid deployments, here’s what actually breaks: Identity gaps Service accounts without MFA Legacy apps bypassing Conditional Access Device trust issues -Non-compliant endpoints still accessing critical apps -BYOD without proper posture checks Network assumptions Internal traffic still implicitly trusted Flat VLANs enabling lateral movement What worked well: Enforcing Conditional Access (device + user risk) ZTNA replacing VPN for application-level access -Micro-segmentation (Fortinet / host-based controls) Key takeaway: Zero Trust is not a product—it’s a continuous enforcement model across identity, device, and network layers.747Views2likes0CommentsAsk Us Everything About Storage for Databases!
💬 Get ready for our March 2026 edition of Ask Us Everything, this Thursday, March 19th at 9 AM Pacific. This month is all about Storage for Databases! If you have a burning question, feel free to ask it here early and we'll add it to the list to answer tomorrow. Or if we can't get it answered live, our Everpure experts can follow up here. Anthony Nocentino, rarsenault-pure & dpoorman are the experts answering your questions during the conversation and on the community. See you this Thursday! (Oh, and if you haven't registered yet, there's still time!) Or, check out these great self-serve resources: Solutions Page: https://www.purestorage.com/solutions/databases.html Blogs: https://blog.purestorage.com/perspectives/sql-server-2025-mission-critical-workloads/ https://blog.purestorage.com/solutions/data-platform-oracle-ai-database-26ai/ https://blog.purestorage.com/purely-technical/using-t-sql-snapshot-backup-multi-array-database-snapshots/ https://blog.purestorage.com/products/exploring-modern-data-storage-challenges-and-changes/627Views1like0CommentsProxmox VE
Hi all Hope you're all having a great day. We have several customers going down the Proxmox VE road. One of my colleagues was put onto https://github.com/kolesa-team/pve-purestorage-plugin as a possible solution (as using Pure behind Proxmox (using the native Proxmox release) is not a particularly Pure-like experience. Could someone from Pure comment on the plugin's validity/supportability?1.7KViews5likes7Commentsvasa certs - can they just be removed?
Can someone shed some light on this as it seems overly complex (or at least the docs weave an incorrect thread). Just trying to make sense of whether the VASA certs are or aren't needed for anything other than vVols. As we never got around to actually attempting vVols and they are deprecated anyhow going foward, can they be pruned from the appliances? This page which is referenced from the alerts they spam out way, way too early Alert 220 - VASA Certificates Expiration Alert seems to imply they can be removed, but steps 1-3 show renewing them on the linked page Resetting the VASA Certificates with purecert. thanksSolved2KViews0likes5Comments