Backup and Recovery Tip: Stop Scripting Snapshots

Symantec NetBackup Appliance 5230 Impenetrable at “Capture the Flag” event

May 8, 2015

In August 2014, Symantec hosted the “Capture the Flag” event at the Black Hat 2014 conference and proved their Symantec NetBackup Appliance 5230 was impenetrable after 17,000+ hacking attempts.

As experts in Symantec NetBackup Appliance, Dewpoint is uniquely positioned to provide strategic and actionable insights for enterprises.

The Black Hat conference, one of the top cybersecurity industry events, attracts some of the world’s best “hacking” experts. For more than 16 years, Black Hat has provided attendees with the latest in information security research, development, and trends in a strictly vendor-neutral environment.

As a leading global threat intelligence and actionable cybersecurity, Symantec organized and hosted their “Capture the Flag” event. With all the newsworthy security breaches in the past year, Symantec developed staged scenarios to challenge and put event participants in hackers’ shoes. In the “Capture the Flag” model, flags are buried in various spots throughout the environment. Participants – acting as “hackers” – must collect the flags to progress and score points. As they collect flags, the simulated “hack” environment becomes more challenging and complex.

Results of the “Capture the Flag” at the Black Hat 2014

Despite 170,000+ hacking attempts, the Symantec NetBackup 5230 Appliance proved to be impenetrable because not a single hacker successfully penetrated the system to capture the flag and win the grand prize.

“This achievement demonstrates to our customers that the NetBackup 5230 Appliance backs up business critical data and protects it as securely as if it were primary data, with no additional licenses or fees required,” says Lee Kass, sales specialist at Symantec.

Why Symantec Created “Capture the Flag”

As fun – and probably frustrating for participants unable to hack the Symantec NetBackup 5230 at Black Hat 2014 – these simulated security/attack scenarios provide enterprises and security experts on cybercriminals. Benefits include:

  • Walking in hacker’s footsteps to understand motivations
  • Understand the five stages of a cyberattack: Reconnaissance, Incursion, Discovery, Capture and Exfiltration
  • Develop and practice offensive skills to aid in defense
  • Apply knowledge and experience to real-world problems

Dewpoint Experts: People Who Deliver

Dewpoint understands that security and its alignment with business in the dynamic digital world. Through our high-level security assessment and security program development methodology, our clients can achieve exceptional value and peace of mind by aligning their security policies and solutions with strategic business needs.

Combined with our partnership and expertise with Symantec NetBackup Appliance, Dewpoint can assess your business-critical backup needs as well as maintain the integrity of world-class security.

Symantec NBU 7.6 with V-Ray Technology delivers the performance, automation, and manageability necessary to protect virtualized deployments at scale. If you are interested in learning more about Symantec NBU 7.6, and its other great capabilities, click the button below to request a consultation with Dewpoint. 

Backup and Recovery Tip: Stop Scripting Snapshots