Professional Documents
Culture Documents
4. If I get shortlisted, what should I carry in the Veritas Campus – My Own laptop,
charger, Bag, College ID card, Govt. approved photo ID, Covid -19 Vaccination certificate
etc.
5. Whom can I approach for any quires- you can reach out to your college POC for any
quires then then the POC will reach out to us.
Theme details and probable problem
statements
Protection of assets which reside in the cloud environment wherever they are located. The
data can be part application data which is hosted as a SaaS service, or it can be persisted as part
of storage maintained in cloud, or database instance which is running as PaaS service and
serving different applications. It can be at rest or in motion and managed internally by cloud
admins or third party.
Useful links –
https://www.veritas.com/information-center/data-protection-in-the-cloud
https://www.zscaler.com/resources/security-terms-glossary/what-is-cloud-data-protection
https://cloudian.com/guides/data-protection/data-protection-in-the-cloud-challenges-and-
best-practices
Q: What are different types one can look at protection of data in cloud ?
A: Data is critical and protection involves ensuring integrity, availability and accessibility. So one
can think on lines how will I ensure right people have access ? Authentication and identity,
access control. On the same line data is not leaked or exfiltrated , so encryption, secure
deletion, integrity checking, and data masking . Thirdly it is not accidental or intentionally
deleted by malwares, which requires making secondary copies on DR sites, data redundancy
and secure cybervault etc.
Backup and restore of applications without data loss Or minimal data loss
Q: Types of backups?
A: Full, Clone, differential, Incremental, Change block tracking(CBT), Snapshot or Redirect on write
Q: What kind of content need to be considered for restore from the application?
A: Application metadata, configurations, app/user data and application creds.
Initially K8s applications were simple and stateless. As complex enterprise applications for eg.
Databases need to persist data, K8s has evolved to support stateful applications.
It is imperative for Enterprise applications to be resilient to ransomware and malware.
So, the next step in the evolution is to provide a K8s native way to perform Data Protection.
Storage which is designed for use in a Cloud Native infrastructure like K8s. They display features
like Availability, Scalability, Durability, API based management, Storage Performance.
Cloud native is a new paradigm for developing and operating software applications, including
technology trends like cloud computing, containerization, serverless, and microservices. Cloud-
native storage is a storage technology designed for use in a cloud-native environment. A cloud-
native storage platform provides data management for stateful applications, and provides
solutions to ongoing data storage challenges in cloud-native environments based on
Kubernetes or other cloud native infrastructure.
Useful links -
https://github.com/cncf/tag-storage/blob/master/CNCF%20Storage%20Whitepaper%20V2.pdf
https://cloudian.com/blog/understanding-cloud-native-storage/#keycharacter
https://github.com/container-storage-interface/spec/blob/master/spec.md
Q: What is CSI?
A: “Container Storage Interface” (CSI) is an industry standard that will enable storage vendors
to develop a plugin once and have it work across a number of container orchestration (CO)
systems.
5. Ransomware Resiliency
The threat of ransomware attacks is a top concern for businesses of all types and sizes.
Ransomware attacks have become commonplace with cybercriminals continuously evolving
and creating new, more sophisticated ways to deliver attacks. With demands becoming
excessive and the risk of data loss increasing, an advanced multi-layered resiliency strategy is
needed to help ensure that your IT services are secure, resilient, and recoverable while
providing the smooth user experience that your end users expect. Businesses today have to
navigate economic crises, global pandemics, shifting regulations, malware and ransomware.
Ransomware is big business and attackers are relentless in their pursuit to develop new,
creative ways to infiltrate corporate networks and IT environments to seize data and hold it
hostage. The key is to be resilient and be able to restore your on-prem or hybrid infrastructure
quickly at scale. What’s worse, attackers are becoming increasingly sophisticated in their
tactics. They’re becoming more organized, continually evolving creative techniques to get past
even the most vigilant frontline security. You can’t escape the inevitable—it’s a really a matter
of when, not if.
Useful links –
https://www.veritas.com/content/dam/www/en_us/documents/white-
papers/WP_ransomware_resiliency_strategy_V1551.pdf
https://www.veritas.com/blogs/realize-ransomware-resilience-with-netbackup
6. Upselling in subscription based licensing model
Q: What is Cross-selling?
A: Cross-selling is the practice of encouraging customers to purchase related or complementary
products or services in addition to the item they are already buying. For example, a customer
who is purchasing a subscription to a software program might also be encouraged to purchase
additional training or support services. This can help to increase revenue for the company by
providing customers with more value and a better overall experience.
Q: What is upselling?
A: Upselling is the practice of encouraging customers to upgrade to a higher-priced subscription
or product. For example, a customer who is currently subscribed to a basic plan might be
encouraged to upgrade to a premium plan with additional features or benefits. This can also
help to increase revenue for the company and provide customers with more value.