Defending Against the Widening Threat Landscape With Racktop BrickStor SP

Despite smaller businesses believing they are not significant targets for ransomware attacks, they are increasingly vulnerable with 62% of information security incidents targeting the top 2.1% of businesses, according to public records. RackTop’s BrickStor SP (Security Platform) provides easy and automatic cyberstorage solutions for SMBs and large organizations alike, not only encrypting data and creating a rolling snapshot of every file but also providing high-speed monitoring for unusual activity to detect data modifications such as those in ransomware attacks. BrickStor SP’s scalability makes it a fitting solution for any businesses, regardless of their size or net growth. This Gestalt IT Tech Note, sponsored by RackTop, gives Jody Lemoine’s perspective.


Active Defense Against Ransomware With RackTop Systems’ BrickStor SP

RackTop Systems’ BrickStor SP is an active cyberstorage solution safeguarding data assets against cybersecurity breaches. The software leverages a zero-trust architecture built on continuous validation before access grant. BrickStor SP’s data-centric zero-trust principle analyzes every user interaction for potential security alerts and provides real-time detection and quick response and recovery against threats such as insider theft and ransomware attacks through built-in encryption, policy-based key rotation and auditing, and user and entity behavior analysis. This article by Gerard Kavelines, sponsored by RackTop, explores BrickStor from the perspective of a network security expert.


RackTop BrickStor – Protecting Data Against Ransomware

Data storage and security solutions provider, RackTop Systems, has introduced its BrickStor Security Platform (SP) that is designed to cover both insider and external threats to prevent ransomware attacks that have become prevalent in recent months. Karen Lopes explores their Data-Centric Zero Trust Policy approach in this sponsored article. It evaluates user behavior, account permissions, file activity, metadata about files and the user, and other features to protect unstructured data for SMB and NFS file shares, thereby enabling speedy detection and lock-out that saves money and time for the resumption of normal operations. The platform also identifies user behavior anomalies with User and Entity Behavior Analysis and, once detected, stops all access by that user that was the weak point.


Identity-Centric and Data-Centric Security With RackTop BrickStor

RackTop Systems’ BrickStor is a comprehensive cyberstorage solution that helps organizations secure their digital assets from ransomware attacks with an identity-centric and data-centric approach. This sponsored article by Chris Grundemann explores the system’s zero trust architectures for the effective authorization of subject and resource ensuring only approved access is granted. BrickStor’s active security platform uniquely intersects identity and data-centric security with encryption, policy-based key rotation, auditing, and UEBA and SOAR capabilities to begin securing data from day one, over unstructured data.


Hardware Still Has to Matter

Ned Bellavance took a special interest in Alastair’s Cooke point of view at the most recent Intel Tech Field Day Showcase where he focused on the relevance to hardware today. People tend to think of cloud as an abstracting hardware, but Ned believes quite the opposite. He says that we should embrace the public cloud so the more and varied hardware will now be closer to the consumer to help them transform their application. For more from Ned about the Intel Showcase, visit the Gestalt IT website.


The Perfect Configuration Gives You the Edge

Melissa Palmer writes on the Gestalt IT site about the latest Intel Tech Field Day Showcase! She goes into detail on a route to the perfect configuration that is set on building the optimized sum of gains extracted out of all the components that make it. Intel brings their performance and several other critical features to this architecture! Check out more from Melissa on the Gestalt IT website!


Compute Express Link – Enabling Your Next-Gen Data Center

Max Mortillaro attended the most recent Gestalt IT Showcase with Intel and now gives his thoughts on their latest technology; Compute Express Link. CXL has been on Max’s radar since early 2019 and it continues to impress him with the merging of their generation data center. He is most excited about the CXL specification that is supported for Type 3 devices, particularly storage-class memory. Take a look on the Gestalt IT website for more from Max.


CXL Will Be Truly Composable Infrastructure

Writing on behalf of Gestalt IT, Chris Hayner talks about Intel’s newest technology; Compute Express Link (CXL). He goes into detail on this next gen technology that is intended to connect computer resources in the datacenter together. Check out Chris’ thoughts on a promised composable infrastructure from Intel’s CXL.


Progress Flowmon Is a Triple Threat for Network Traffic Monitoring

John Herbert sat on the delegate panel at the most recent Progress Tech Field Day Showcase. In his post he talks about how Progress’ Flowman offers visibility into data flows, network security, and application performance all in one platform. Check out John’s thoughts, at the Gestalt IT website, on how these tasks require parallel infrastructures so that Flowman is absolutely positioned as a triple threat in the monitoring space.


Monitoring Secure Networks With Flowmon & WhatsUp Gold

Jason Gintert, a Tech Field Day Showcase delegate panelist, discusses how Progress’s acquisition of Ipswich and Kemp provides network monitoring, performance monitoring, and network detection and response solutions all under one umbrella. Check out more of his thoughts on the Gestalt IT website.


Pure Gold: Progress WhatsUp Gold – Network Monitoring for a New Generation

At Progress’s Tech Field Day Showcase, Girard Kavelines, discusses on the Gestalt IT website how Progress’s WhatsUp Gold has set the bar for network monitoring and by providing complete visibility of infrastructure. Beyond monitoring capabilities, WhatsUp Gold provides a proactive solution to maximizing dependency and customization. Girard also details Flowmon, which Progress demoed at their Field Day Showcase. Flowmon’s network monitoring and usage reports allows for a more effective approach to remediating problems before they arise. Read more on the Gestalt IT website.


Progress: The WhatsUp Gold and Flowmon Integration

Pete Welcher was part of the virtual delegate panel at the most recent Progress Tech Field Day Showcase this past July. Writing on the Gestalt IT website, Pete talks about how Progress deep dove into their two new products; WhatsUp Gold and Flowmon, both of which have now integrated with one another and appear to be tying in SNMP data where relevant! Take a look at Pete’s thoughts on these new Progress advancements!