Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1448,"date":"2023-10-24T03:19:11","date_gmt":"2023-10-24T03:19:11","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/"},"modified":"2023-10-24T03:19:11","modified_gmt":"2023-10-24T03:19:11","slug":"how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/","title":{"rendered":"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O’Brien on October 23, 2023 at 2:50 pm"},"content":{"rendered":"

Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and \u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and currency\u2014it\u2019s even described as a lifeblood.<\/p>\n

However, the most useful metaphor of all might be seeing data as a key. One that unlocks insights businesses can use to improve customer experience, reduce sales friction, and promote brand loyalty in a hypercompetitive landscape.<\/p>\n

Data is so vital, you might think that the adoption of technologies and processes that can help protect, monitor, and detect possible threats\u2014and also be able to recover it from catastrophic events\u2014would be a priority. But according to the latest Cisco Cybersecurity Readiness Index<\/a>, many companies believe they are falling woefully short of the mark. Consider these stats:<\/p>\n

Almost 60% of companies surveyed said they had experienced some kind of cybersecurity incident, such as a ransomware attack, in the last 12 months. The incidents cost at least US$100,000 for 71% of organizations affected, with 41% saying the overall cost was US$500,000 or more.
\nJust 15% of organizations globally deem themselves to have a mature level of preparedness to handle the security risks of a hybrid and multicloud world, while 47% of organizations fall in the formative category, the lowest level of preparedness.<\/p>\n

FlexPod cybersecure architecture<\/strong><\/h2>\n

To help our customers build and deploy a robust and secure infrastructure, Cisco and NetApp partnered to develop the FlexPod cybersecure architecture to protect<\/strong> <\/em>apps and data from unauthorized access, detect<\/strong> <\/em>threats early to keep data safe, and recover<\/strong> <\/em>data quickly to reduce downtime. Existing FlexPod customers can use this reference architecture to strengthen the security of their FlexPod infrastructures. New FlexPod customers can deploy a more secure solution immediately.<\/p>\n

This is the latest achievement that builds on the decade-plus success of Cisco and NetApp delivering compelling innovations for converged infrastructure<\/a>. This is a validated approach (see below) for deploying tightly integrated compute, networking, storage, and management technologies from Cisco\u202fand NetApp for hybrid and multicloud environments.<\/p>\n

The latest generation of FlexPod is powered by Cisco Unified Computing System (UCS) servers<\/a>, including the award-winning Cisco UCS X-Series Modular System<\/a>. The server is managed by Cisco Intersight<\/a>, which enables IT leaders to easily adapt to the unpredictable needs of modern applications. Combined with NetApp innovations, the FlexPod cybersecure architecture empowers organizations with a strong foundation to maintain the integrity, confidentiality, and availability of their apps and data, ensuring long-term success and resilience in an ever-changing cybersecurity landscape. This proactive approach is further defined by the three cybersecurity pillars of protect, detect, and recover. Here is a brief technical overview:<\/p>\n

Protect<\/strong><\/h3>\n

Applies a\u202fholistic approach to safeguarding\u202fsystems, management, data,\u202fand applications via a zero-trust model and architecture. This includes:<\/p>\n

Built-in security at the server hardware level (such as secure boot and anti-counterfeit protection) to prevent attackers from gaining access to the platform, installing malicious code, and exploiting data
\nHardening of devices, logic, and information\u2014including Cisco\u2019s industry-leading firewall protection
\nSecure microsegmentation across networks, servers, and storage into smaller, isolated zones to limit lateral movement of threats
\nMultifactor authentication to verify users and devices before granting access
\nThe power and flexibility of a SaaS operations platform to manage assets and users from anywhere
\nA validated FlexPod foundation with a growing portfolio of tested, documented, and secure solutions<\/p>\n

Detect<\/strong><\/h3>\n

Quickly detects, analyzes, and responds to threats, preventing loss and corruption of data via:<\/p>\n

Integration with security information and event management (SIEM) platforms like Splunk through the Intersight API for advanced incident analysis and response
\nEnd-to-end FlexPod security with threat visibility across the entire network, compute, and storage platforms through extended detection and response (XDR) technology
\nPreemptive risk mitigation through comprehensive analysis of telemetry data with immediate notification of potential security issues and infrastructure vulnerabilities
\nMachine learning to automatically discover, classify, catalog, and securely retain data and apps to simplify data governance
\nContinuity of service from first call to resolution from an architecture expert who is accountable for your case, no matter where the issue resides<\/p>\n

Recover<\/strong><\/h3>\n

Swiftly addresses data protection and recovery in the unlikely event of data breaches and ransomware attacks. User access is quickly blocked upon detecting anomalies, with detailed forensic analysis conducted for future prevention. With policy-based server profiles and data recovery capabilities, FlexPod can restore an environment in minutes to ensure a fast resumption of operations, mitigating the cost of downtime through:<\/p>\n

Stateless server architecture with policy-based profiles enabling rapid configuration of servers and restoration of virtual machines (VMs) to accelerate recovery and meet service level agreements
\nImmutable copies that can be used for secure data retention and as a logical air gap for quick recovery from ransomware
\nReduction of backup windows by combining space-efficient snapshot technology with block-based data replication<\/p>\n

\u00a0Cisco Validated Design for FlexPod<\/h2>\n

We are diligently working on our latest Cisco Validated Design (CVD), which will show customers how to confidently deploy a FlexPod cybersecure architecture for their specific environments. We stand behind every FlexPod solution with our experience, resources, and technical expertise to deliver full solution support to our customers. We are excited to be incorporating many technical design elements into this CVD, such as the following:<\/p>\n

Secure segmentation<\/strong><\/h3>\n

Enables segmentation by tenants (such as application tiers, business units, and managed services) through virtual routing and forwarding (VRF) and virtual LAN concepts within Cisco Nexus switches<\/a> and Cisco Unified Computing System (UCS) servers\u2014and further protection using Cisco Secure Firewall<\/a>. The goal is to provide better control and protection of external (\u201cnorth-south\u201d) traffic among tenants.<\/p>\n

Secure workload<\/strong><\/h3>\n

For additional protection of internal lateral traffic within a data center (\u201ceast-west\u201d traffic), the CVD will leverage workload security<\/a> through microsegmentation, proactive identification of security incidents using behavior analysis, and reduction of the attack surface by identifying software-related vulnerabilities.<\/p>\n

Secure analytics<\/strong><\/h3>\n

Addressing the concept that you can\u2019t protect what you can\u2019t see, the CVD will use analytical tools and concepts like NetFlow and logs at various points in the network to create a baseline to detect and root out anomalous actions.<\/p>\n

Ransomware protection<\/strong><\/h3>\n

Malicious security attacks via ransomware already cost companies billions of dollars a year to recover their data. Cisco and NetApp are planning to integrate our respective ransomware protection capabilities, which will be available through a joint external data representation (XDR) solution.<\/p>\n

Learn more at NetApp INSIGHT 2023<\/h2>\n

More information about the FlexPod cybersecurity architecture will be available at the NetApp INSIGHT 2023<\/a> event in Las Vegas. Featured sessions include:<\/p>\n

Simplify your infrastructure and ops with Cisco computeSimplify your infrastructure and ops with Cisco compute<\/a>
\n
Protect your apps and data with FlexPod security framework<\/a><\/p>\n

We hope to see you there.<\/p>\n

Read more about FlexPod and Cisco at NetApp INSIGHT<\/a>\u00a0<\/h2>\n
\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0FlexPod provides a secure IT infrastructure to protect apps and data from unauthorized access, detect threats early to keep data safe, and recover data quickly to eliminate downtime.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and \u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and currency\u2014it\u2019s even described as a lifeblood.<\/p>\n

However, the most useful metaphor of all might be seeing data as a key. One that unlocks insights businesses can use to improve customer experience, reduce sales friction, and promote brand loyalty in a hypercompetitive landscape.<\/p>\n

Data is so vital, you might think that the adoption of technologies and processes that can help protect, monitor, and detect possible threats\u2014and also be able to recover it from catastrophic events\u2014would be a priority. But according to the latest Cisco Cybersecurity Readiness Index<\/a>, many companies believe they are falling woefully short of the mark. Consider these stats:<\/p>\n

Almost 60% of companies surveyed said they had experienced some kind of cybersecurity incident, such as a ransomware attack, in the last 12 months. The incidents cost at least US$100,000 for 71% of organizations affected, with 41% saying the overall cost was US$500,000 or more.
\nJust 15% of organizations globally deem themselves to have a mature level of preparedness to handle the security risks of a hybrid and multicloud world, while 47% of organizations fall in the formative category, the lowest level of preparedness.<\/p>\n

FlexPod cybersecure architecture<\/strong><\/h2>\n

To help our customers build and deploy a robust and secure infrastructure, Cisco and NetApp partnered to develop the FlexPod cybersecure architecture to protect<\/strong> <\/em>apps and data from unauthorized access, detect<\/strong> <\/em>threats early to keep data safe, and recover<\/strong> <\/em>data quickly to reduce downtime. Existing FlexPod customers can use this reference architecture to strengthen the security of their FlexPod infrastructures. New FlexPod customers can deploy a more secure solution immediately.<\/p>\n

This is the latest achievement that builds on the decade-plus success of Cisco and NetApp delivering compelling innovations for converged infrastructure<\/a>. This is a validated approach (see below) for deploying tightly integrated compute, networking, storage, and management technologies from Cisco\u202fand NetApp for hybrid and multicloud environments.<\/p>\n

The latest generation of FlexPod is powered by Cisco Unified Computing System (UCS) servers<\/a>, including the award-winning Cisco UCS X-Series Modular System<\/a>. The server is managed by Cisco Intersight<\/a>, which enables IT leaders to easily adapt to the unpredictable needs of modern applications. Combined with NetApp innovations, the FlexPod cybersecure architecture empowers organizations with a strong foundation to maintain the integrity, confidentiality, and availability of their apps and data, ensuring long-term success and resilience in an ever-changing cybersecurity landscape. This proactive approach is further defined by the three cybersecurity pillars of protect, detect, and recover. Here is a brief technical overview:<\/p>\n

Protect<\/strong><\/h3>\n

Applies a\u202fholistic approach to safeguarding\u202fsystems, management, data,\u202fand applications via a zero-trust model and architecture. This includes:<\/p>\n

Built-in security at the server hardware level (such as secure boot and anti-counterfeit protection) to prevent attackers from gaining access to the platform, installing malicious code, and exploiting data
\nHardening of devices, logic, and information\u2014including Cisco\u2019s industry-leading firewall protection
\nSecure microsegmentation across networks, servers, and storage into smaller, isolated zones to limit lateral movement of threats
\nMultifactor authentication to verify users and devices before granting access
\nThe power and flexibility of a SaaS operations platform to manage assets and users from anywhere
\nA validated FlexPod foundation with a growing portfolio of tested, documented, and secure solutions<\/p>\n

Detect<\/strong><\/h3>\n

Quickly detects, analyzes, and responds to threats, preventing loss and corruption of data via:<\/p>\n

Integration with security information and event management (SIEM) platforms like Splunk through the Intersight API for advanced incident analysis and response
\nEnd-to-end FlexPod security with threat visibility across the entire network, compute, and storage platforms through extended detection and response (XDR) technology
\nPreemptive risk mitigation through comprehensive analysis of telemetry data with immediate notification of potential security issues and infrastructure vulnerabilities
\nMachine learning to automatically discover, classify, catalog, and securely retain data and apps to simplify data governance
\nContinuity of service from first call to resolution from an architecture expert who is accountable for your case, no matter where the issue resides<\/p>\n

Recover<\/strong><\/h3>\n

Swiftly addresses data protection and recovery in the unlikely event of data breaches and ransomware attacks. User access is quickly blocked upon detecting anomalies, with detailed forensic analysis conducted for future prevention. With policy-based server profiles and data recovery capabilities, FlexPod can restore an environment in minutes to ensure a fast resumption of operations, mitigating the cost of downtime through:<\/p>\n

Stateless server architecture with policy-based profiles enabling rapid configuration of servers and restoration of virtual machines (VMs) to accelerate recovery and meet service level agreements
\nImmutable copies that can be used for secure data retention and as a logical air gap for quick recovery from ransomware
\nReduction of backup windows by combining space-efficient snapshot technology with block-based data replication<\/p>\n

\u00a0Cisco Validated Design for FlexPod<\/h2>\n

We are diligently working on our latest Cisco Validated Design (CVD), which will show customers how to confidently deploy a FlexPod cybersecure architecture for their specific environments. We stand behind every FlexPod solution with our experience, resources, and technical expertise to deliver full solution support to our customers. We are excited to be incorporating many technical design elements into this CVD, such as the following:<\/p>\n

Secure segmentation<\/strong><\/h3>\n

Enables segmentation by tenants (such as application tiers, business units, and managed services) through virtual routing and forwarding (VRF) and virtual LAN concepts within Cisco Nexus switches<\/a> and Cisco Unified Computing System (UCS) servers\u2014and further protection using Cisco Secure Firewall<\/a>. The goal is to provide better control and protection of external (\u201cnorth-south\u201d) traffic among tenants.<\/p>\n

Secure workload<\/strong><\/h3>\n

For additional protection of internal lateral traffic within a data center (\u201ceast-west\u201d traffic), the CVD will leverage workload security<\/a> through microsegmentation, proactive identification of security incidents using behavior analysis, and reduction of the attack surface by identifying software-related vulnerabilities.<\/p>\n

Secure analytics<\/strong><\/h3>\n

Addressing the concept that you can\u2019t protect what you can\u2019t see, the CVD will use analytical tools and concepts like NetFlow and logs at various points in the network to create a baseline to detect and root out anomalous actions.<\/p>\n

Ransomware protection<\/strong><\/h3>\n

Malicious security attacks via ransomware already cost companies billions of dollars a year to recover their data. Cisco and NetApp are planning to integrate our respective ransomware protection capabilities, which will be available through a joint external data representation (XDR) solution.<\/p>\n

Learn more at NetApp INSIGHT 2023<\/h2>\n

More information about the FlexPod cybersecurity architecture will be available at the NetApp INSIGHT 2023<\/a> event in Las Vegas. Featured sessions include:<\/p>\n

Simplify your infrastructure and ops with Cisco computeSimplify your infrastructure and ops with Cisco compute<\/a>
\n
Protect your apps and data with FlexPod security framework<\/a><\/p>\n

We hope to see you there.<\/p>\n

Read more about FlexPod and Cisco at NetApp INSIGHT<\/a>\u00a0<\/h2>\n
\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0FlexPod provides a secure IT infrastructure to protect apps and data from unauthorized access, detect threats early to keep data safe, and recover data quickly to eliminate downtime.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1449,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nHow FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O'Brien on October 23, 2023 at 2:50 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O'Brien on October 23, 2023 at 2:50 pm\" \/>\n<meta property=\"og:description\" content=\"Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and \u2026 Read more on Cisco Blogs \u200b Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and currency\u2014it\u2019s even described as a lifeblood. However, the most useful metaphor of all might be seeing data as a key. One that unlocks insights businesses can use to improve customer experience, reduce sales friction, and promote brand loyalty in a hypercompetitive landscape. Data is so vital, you might think that the adoption of technologies and processes that can help protect, monitor, and detect possible threats\u2014and also be able to recover it from catastrophic events\u2014would be a priority. But according to the latest Cisco Cybersecurity Readiness Index, many companies believe they are falling woefully short of the mark. Consider these stats: Almost 60% of companies surveyed said they had experienced some kind of cybersecurity incident, such as a ransomware attack, in the last 12 months. The incidents cost at least US$100,000 for 71% of organizations affected, with 41% saying the overall cost was US$500,000 or more. Just 15% of organizations globally deem themselves to have a mature level of preparedness to handle the security risks of a hybrid and multicloud world, while 47% of organizations fall in the formative category, the lowest level of preparedness. FlexPod cybersecure architecture To help our customers build and deploy a robust and secure infrastructure, Cisco and NetApp partnered to develop the FlexPod cybersecure architecture to protect apps and data from unauthorized access, detect threats early to keep data safe, and recover data quickly to reduce downtime. Existing FlexPod customers can use this reference architecture to strengthen the security of their FlexPod infrastructures. New FlexPod customers can deploy a more secure solution immediately. This is the latest achievement that builds on the decade-plus success of Cisco and NetApp delivering compelling innovations for converged infrastructure. This is a validated approach (see below) for deploying tightly integrated compute, networking, storage, and management technologies from Cisco\u202fand NetApp for hybrid and multicloud environments. The latest generation of FlexPod is powered by Cisco Unified Computing System (UCS) servers, including the award-winning Cisco UCS X-Series Modular System. The server is managed by Cisco Intersight, which enables IT leaders to easily adapt to the unpredictable needs of modern applications. Combined with NetApp innovations, the FlexPod cybersecure architecture empowers organizations with a strong foundation to maintain the integrity, confidentiality, and availability of their apps and data, ensuring long-term success and resilience in an ever-changing cybersecurity landscape. This proactive approach is further defined by the three cybersecurity pillars of protect, detect, and recover. Here is a brief technical overview: Protect Applies a\u202fholistic approach to safeguarding\u202fsystems, management, data,\u202fand applications via a zero-trust model and architecture. This includes: Built-in security at the server hardware level (such as secure boot and anti-counterfeit protection) to prevent attackers from gaining access to the platform, installing malicious code, and exploiting data Hardening of devices, logic, and information\u2014including Cisco\u2019s industry-leading firewall protection Secure microsegmentation across networks, servers, and storage into smaller, isolated zones to limit lateral movement of threats Multifactor authentication to verify users and devices before granting access The power and flexibility of a SaaS operations platform to manage assets and users from anywhere A validated FlexPod foundation with a growing portfolio of tested, documented, and secure solutions Detect Quickly detects, analyzes, and responds to threats, preventing loss and corruption of data via: Integration with security information and event management (SIEM) platforms like Splunk through the Intersight API for advanced incident analysis and response End-to-end FlexPod security with threat visibility across the entire network, compute, and storage platforms through extended detection and response (XDR) technology Preemptive risk mitigation through comprehensive analysis of telemetry data with immediate notification of potential security issues and infrastructure vulnerabilities Machine learning to automatically discover, classify, catalog, and securely retain data and apps to simplify data governance Continuity of service from first call to resolution from an architecture expert who is accountable for your case, no matter where the issue resides Recover Swiftly addresses data protection and recovery in the unlikely event of data breaches and ransomware attacks. User access is quickly blocked upon detecting anomalies, with detailed forensic analysis conducted for future prevention. With policy-based server profiles and data recovery capabilities, FlexPod can restore an environment in minutes to ensure a fast resumption of operations, mitigating the cost of downtime through: Stateless server architecture with policy-based profiles enabling rapid configuration of servers and restoration of virtual machines (VMs) to accelerate recovery and meet service level agreements Immutable copies that can be used for secure data retention and as a logical air gap for quick recovery from ransomware Reduction of backup windows by combining space-efficient snapshot technology with block-based data replication \u00a0Cisco Validated Design for FlexPod We are diligently working on our latest Cisco Validated Design (CVD), which will show customers how to confidently deploy a FlexPod cybersecure architecture for their specific environments. We stand behind every FlexPod solution with our experience, resources, and technical expertise to deliver full solution support to our customers. We are excited to be incorporating many technical design elements into this CVD, such as the following: Secure segmentation Enables segmentation by tenants (such as application tiers, business units, and managed services) through virtual routing and forwarding (VRF) and virtual LAN concepts within Cisco Nexus switches and Cisco Unified Computing System (UCS) servers\u2014and further protection using Cisco Secure Firewall. The goal is to provide better control and protection of external (\u201cnorth-south\u201d) traffic among tenants. Secure workload For additional protection of internal lateral traffic within a data center (\u201ceast-west\u201d traffic), the CVD will leverage workload security through microsegmentation, proactive identification of security incidents using behavior analysis, and reduction of the attack surface by identifying software-related vulnerabilities. Secure analytics Addressing the concept that you can\u2019t protect what you can\u2019t see, the CVD will use analytical tools and concepts like NetFlow and logs at various points in the network to create a baseline to detect and root out anomalous actions. Ransomware protection Malicious security attacks via ransomware already cost companies billions of dollars a year to recover their data. Cisco and NetApp are planning to integrate our respective ransomware protection capabilities, which will be available through a joint external data representation (XDR) solution. Learn more at NetApp INSIGHT 2023 More information about the FlexPod cybersecurity architecture will be available at the NetApp INSIGHT 2023 event in Las Vegas. Featured sessions include: Simplify your infrastructure and ops with Cisco computeSimplify your infrastructure and ops with Cisco compute Protect your apps and data with FlexPod security framework We hope to see you there. Read more about FlexPod and Cisco at NetApp INSIGHT\u00a0 Share Share: \u00a0\u00a0FlexPod provides a secure IT infrastructure to protect apps and data from unauthorized access, detect threats early to keep data safe, and recover data quickly to eliminate downtime.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-24T03:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O’Brien on October 23, 2023 at 2:50 pm\",\"datePublished\":\"2023-10-24T03:19:11+00:00\",\"dateModified\":\"2023-10-24T03:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\"},\"wordCount\":1204,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\",\"name\":\"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O'Brien on October 23, 2023 at 2:50 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif\",\"datePublished\":\"2023-10-24T03:19:11+00:00\",\"dateModified\":\"2023-10-24T03:19:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O’Brien on October 23, 2023 at 2:50 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O'Brien on October 23, 2023 at 2:50 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/","og_locale":"en_US","og_type":"article","og_title":"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O'Brien on October 23, 2023 at 2:50 pm","og_description":"Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and \u2026 Read more on Cisco Blogs \u200b Leaders at most modern organizations would readily agree that data is critical to today\u2019s digital-first businesses. Maybe that\u2019s why there are so many metaphors about data with comparisons to oil and currency\u2014it\u2019s even described as a lifeblood. However, the most useful metaphor of all might be seeing data as a key. One that unlocks insights businesses can use to improve customer experience, reduce sales friction, and promote brand loyalty in a hypercompetitive landscape. Data is so vital, you might think that the adoption of technologies and processes that can help protect, monitor, and detect possible threats\u2014and also be able to recover it from catastrophic events\u2014would be a priority. But according to the latest Cisco Cybersecurity Readiness Index, many companies believe they are falling woefully short of the mark. Consider these stats: Almost 60% of companies surveyed said they had experienced some kind of cybersecurity incident, such as a ransomware attack, in the last 12 months. The incidents cost at least US$100,000 for 71% of organizations affected, with 41% saying the overall cost was US$500,000 or more. Just 15% of organizations globally deem themselves to have a mature level of preparedness to handle the security risks of a hybrid and multicloud world, while 47% of organizations fall in the formative category, the lowest level of preparedness. FlexPod cybersecure architecture To help our customers build and deploy a robust and secure infrastructure, Cisco and NetApp partnered to develop the FlexPod cybersecure architecture to protect apps and data from unauthorized access, detect threats early to keep data safe, and recover data quickly to reduce downtime. Existing FlexPod customers can use this reference architecture to strengthen the security of their FlexPod infrastructures. New FlexPod customers can deploy a more secure solution immediately. This is the latest achievement that builds on the decade-plus success of Cisco and NetApp delivering compelling innovations for converged infrastructure. This is a validated approach (see below) for deploying tightly integrated compute, networking, storage, and management technologies from Cisco\u202fand NetApp for hybrid and multicloud environments. The latest generation of FlexPod is powered by Cisco Unified Computing System (UCS) servers, including the award-winning Cisco UCS X-Series Modular System. The server is managed by Cisco Intersight, which enables IT leaders to easily adapt to the unpredictable needs of modern applications. Combined with NetApp innovations, the FlexPod cybersecure architecture empowers organizations with a strong foundation to maintain the integrity, confidentiality, and availability of their apps and data, ensuring long-term success and resilience in an ever-changing cybersecurity landscape. This proactive approach is further defined by the three cybersecurity pillars of protect, detect, and recover. Here is a brief technical overview: Protect Applies a\u202fholistic approach to safeguarding\u202fsystems, management, data,\u202fand applications via a zero-trust model and architecture. This includes: Built-in security at the server hardware level (such as secure boot and anti-counterfeit protection) to prevent attackers from gaining access to the platform, installing malicious code, and exploiting data Hardening of devices, logic, and information\u2014including Cisco\u2019s industry-leading firewall protection Secure microsegmentation across networks, servers, and storage into smaller, isolated zones to limit lateral movement of threats Multifactor authentication to verify users and devices before granting access The power and flexibility of a SaaS operations platform to manage assets and users from anywhere A validated FlexPod foundation with a growing portfolio of tested, documented, and secure solutions Detect Quickly detects, analyzes, and responds to threats, preventing loss and corruption of data via: Integration with security information and event management (SIEM) platforms like Splunk through the Intersight API for advanced incident analysis and response End-to-end FlexPod security with threat visibility across the entire network, compute, and storage platforms through extended detection and response (XDR) technology Preemptive risk mitigation through comprehensive analysis of telemetry data with immediate notification of potential security issues and infrastructure vulnerabilities Machine learning to automatically discover, classify, catalog, and securely retain data and apps to simplify data governance Continuity of service from first call to resolution from an architecture expert who is accountable for your case, no matter where the issue resides Recover Swiftly addresses data protection and recovery in the unlikely event of data breaches and ransomware attacks. User access is quickly blocked upon detecting anomalies, with detailed forensic analysis conducted for future prevention. With policy-based server profiles and data recovery capabilities, FlexPod can restore an environment in minutes to ensure a fast resumption of operations, mitigating the cost of downtime through: Stateless server architecture with policy-based profiles enabling rapid configuration of servers and restoration of virtual machines (VMs) to accelerate recovery and meet service level agreements Immutable copies that can be used for secure data retention and as a logical air gap for quick recovery from ransomware Reduction of backup windows by combining space-efficient snapshot technology with block-based data replication \u00a0Cisco Validated Design for FlexPod We are diligently working on our latest Cisco Validated Design (CVD), which will show customers how to confidently deploy a FlexPod cybersecure architecture for their specific environments. We stand behind every FlexPod solution with our experience, resources, and technical expertise to deliver full solution support to our customers. We are excited to be incorporating many technical design elements into this CVD, such as the following: Secure segmentation Enables segmentation by tenants (such as application tiers, business units, and managed services) through virtual routing and forwarding (VRF) and virtual LAN concepts within Cisco Nexus switches and Cisco Unified Computing System (UCS) servers\u2014and further protection using Cisco Secure Firewall. The goal is to provide better control and protection of external (\u201cnorth-south\u201d) traffic among tenants. Secure workload For additional protection of internal lateral traffic within a data center (\u201ceast-west\u201d traffic), the CVD will leverage workload security through microsegmentation, proactive identification of security incidents using behavior analysis, and reduction of the attack surface by identifying software-related vulnerabilities. Secure analytics Addressing the concept that you can\u2019t protect what you can\u2019t see, the CVD will use analytical tools and concepts like NetFlow and logs at various points in the network to create a baseline to detect and root out anomalous actions. Ransomware protection Malicious security attacks via ransomware already cost companies billions of dollars a year to recover their data. Cisco and NetApp are planning to integrate our respective ransomware protection capabilities, which will be available through a joint external data representation (XDR) solution. Learn more at NetApp INSIGHT 2023 More information about the FlexPod cybersecurity architecture will be available at the NetApp INSIGHT 2023 event in Las Vegas. Featured sessions include: Simplify your infrastructure and ops with Cisco computeSimplify your infrastructure and ops with Cisco compute Protect your apps and data with FlexPod security framework We hope to see you there. Read more about FlexPod and Cisco at NetApp INSIGHT\u00a0 Share Share: \u00a0\u00a0FlexPod provides a secure IT infrastructure to protect apps and data from unauthorized access, detect threats early to keep data safe, and recover data quickly to eliminate downtime.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/","og_site_name":"JHC","article_published_time":"2023-10-24T03:19:11+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/"},"author":{"name":"","@id":""},"headline":"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O’Brien on October 23, 2023 at 2:50 pm","datePublished":"2023-10-24T03:19:11+00:00","dateModified":"2023-10-24T03:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/"},"wordCount":1204,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/","url":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/","name":"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O'Brien on October 23, 2023 at 2:50 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif","datePublished":"2023-10-24T03:19:11+00:00","dateModified":"2023-10-24T03:19:11+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/10\/16406726-EPsisF.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/how-flexpod-cybersecure-architecture-helps-you-protect-detect-and-recover-your-precious-data-chris-obrien-on-october-23-2023-at-250-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"How FlexPod Cybersecure Architecture Helps You Protect, Detect, and Recover Your Precious Data\u202f Chris O’Brien on October 23, 2023 at 2:50 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1448"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1448\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1449"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}