Recent Discussions
- 800Views0likes5Comments
Zero Trust in Practice: What Actually Breaks in Real Environments
Most Zero Trust discussions sound great on paper—but implementation tells a different story. From recent hybrid deployments, here’s what actually breaks: Identity gaps Service accounts without MFA Legacy apps bypassing Conditional Access Device trust issues -Non-compliant endpoints still accessing critical apps -BYOD without proper posture checks Network assumptions Internal traffic still implicitly trusted Flat VLANs enabling lateral movement What worked well: Enforcing Conditional Access (device + user risk) ZTNA replacing VPN for application-level access -Micro-segmentation (Fortinet / host-based controls) Key takeaway: Zero Trust is not a product—it’s a continuous enforcement model across identity, device, and network layers.saravananp1 month agoDay Hiker II700Views2likes0CommentsEverpure Protect - Tools for Network Configuration
A key workflow item, especially when building Isolated Recovery Environments (IRE), Clean Rooms, test or production Disaster Recovery, or any other environment personality, is to reconfigure the network. Doing so automatically and per a plan is important to an automated, fast, and predictable workflow. We have built Everpure Protect Tools, which is a lightweight tool, registered with VMtools within a guest, that allows us to automate network configuration changes, per the individual Recovery Plan. Included in the download is a Powershell script for Windows, or a Shell script for Linux/Unix, which registered our tool with VMtools to perform the changes. The scripts can be loaded and ran manually in each guest, or distributed and executed as part of a workflow such as Microsoft MCM/SCCM. Everpure Protect Tools Once deployed, network changes on a per-VM or per-Recovery Plan basis will be automatically performed based upon the unique settings in the Recovery Plan being executed.405Views1like0CommentsPure Protect //Community Edition - Now Available!
We are excited to release Pure Protect //Community Edition! Now available in the Pure1 Catalog, Community Edition provides Pure1 users with the ability to use and test Pure Protect quickly and easily. Community Edition today includes a fully featured release of Pure Protect, limited to 5 TiB of protected VM's, and provides community support through this forum! When you are ready to move up to Premium Edition, you gain full 24x7 phone support from Pure Storage, as well as the ability to protect more than 5 TiB of VM's. To start with Community Edition, Log in to Pure1, under Marketplace choose Catalog, and then the Pure Protect catalog offering. We look forward to hearing from you and how you are using Pure Protect //Community Edition! - Chad MonteithChadMonteith8 months agoDay Hiker II300Views0likes0CommentsPure Protect - Network and Firewall Requirements
An important topic with deploying Pure Protect, both Premium and Community Editions, is what ports and network settings are required for it to work? We maintain a page answering all of those questions in the Pure1 Support portal! Within the Pure Protect Quick Start documentation, which is great information to review prior to a deployment, we include a page "Network Firewall Requirements." This details outbound communications to Pure1, to vCenter and ESXi, to AWS if used, and between sites when using VMware to VMware workflows. Log in with your Pure1 Customer credentials, and reach out with any questions! - Chad MonteithChadMonteith8 months agoDay Hiker II260Views0likes0CommentsMFA Downgrade Attacks: Good to know.
Short article on MFA downgrade attacks; provides the basics on what it is and how to defend. Good to know for considering your own policies and processes when folks lose devices. https://www.scworld.com/perspective/why-mfa-downgrade-attacks-could-be-the-next-ai-security-crisis200Views0likes1CommentData retention & deletion policies
It’s a little unsettling when we don’t know exactly what’s happening with our personal data. Do you think companies are doing enough to make us feel confident about their data practices, or do you feel like they could do more? Ever wonder what really happens to your data once you hit "delete"? This blog takes a deep dive into data retention and deletion policies, exploring how companies are balancing compliance and your privacy.165Views0likes0Comments