{"id":18820,"date":"2021-07-12T23:39:47","date_gmt":"2021-07-12T23:39:47","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18820"},"modified":"2021-07-12T23:44:29","modified_gmt":"2021-07-12T23:44:29","slug":"startup-sees-file-system-as-key-to-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/","title":{"rendered":"Startup Sees File System as Key to Security"},"content":{"rendered":"<p>While many cybersecurity vendors approach <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a> from the perspective of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\">microsegmentation<\/a>, shrinking the network as much as possible, one startup thinks security needs to be as close to the data as possible and is thus focused on data storage.<\/p>\n<p>Maryland-based RackTop Systems boasts a Department of Defense (DoD) pedigree, giving its founders a vantage point into the challenges that high-security environments face. CEO Eric Bednash and CTO Jonathan Halstuch hail from defense, intelligence and financial backgrounds, which gave them the idea that became RackTop.<\/p>\n<p>Two years after they raised $15 million in funding, they find themselves in the sweet spot of the cybersecurity market, thanks to high-profile cyber and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> attacks like <a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-breach-underscores-vulnerability-of-it-management-tools\/\">Kaseya<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">Colonial Pipeline<\/a>\u00a0 and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\">SolarWinds<\/a>.<\/p>\n<h2>Secure file server stops attacks<\/h2>\n<p>RackTop&#8217;s approach is pretty simple: Replace a Linux or Windows file server with RackTop&#8217;s BrickStor SP secure file server, which uses behavioral technology to shut down threats as soon as unusual behavior is detected.<\/p>\n<p>&#8220;The best way to protect data is to deliver it almost as a storage system, get it as close as possible to the data,&#8221; Halstuch told <em>eSecurity Planet<\/em>.<\/p>\n<p>&#8220;With microsegmentation, you&#8217;re just making a smaller perimeter,&#8221; he said. &#8220;By focusing on the data, the problem becomes easier and more affordable to solve.&#8221;<\/p>\n<p>That approach lets the company keep critical services running and even prevent data from being stolen, the first target in many ransomware attacks. Being so close to the storage also lets RackTop preserve an &#8220;immutable backup&#8221; so data can be rolled back quickly in event of a ransomware attack.<\/p>\n<p>While others are focused on recovering from attacks, &#8220;we&#8217;re focused on stopping the attack,&#8221; Halstuch said.<\/p>\n<h2>Affordability and performance<\/h2>\n<p>RackTop&#8217;s technology is delivered as a virtual machine or appliance, and is affordable enough that even some small businesses like medical offices are among the company&#8217;s roughly 200 customers. Halstuch said the technology is comparable to or cheaper than NetApp, with the added benefit of built-in security.<\/p>\n<p>BrickStor works with primary storage systems, online archives in the cloud, at the edge, or in the data center. It supports file, block and object storage, works with AWS and Azure, encrypts data at rest and in motion, and offers compliance and metadata intelligence. It integrates with <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\">SOAR<\/a> systems for log analysis. And thanks to RAM caching, compression and deduplication, it does all that with high performance and scalability, a critical feature for many customers with high data security needs. Not surprisingly, RackTop has a number of customers in sensitive areas like government, finance and healthcare.<\/p>\n<p>By sitting so close to the data, Halstuch notes that &#8220;less trusted equipment can sit on top of it and you don&#8217;t have to share the keys with the cloud.&#8221;<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fd081a5e6-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fd081a5e6\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fd081a5e6\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fd081a5e6\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fd081a5e6\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fd081a5e6\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fd081a5e6\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>While many cybersecurity vendors approach zero trust from the perspective of microsegmentation, shrinking the network as much as possible, one startup thinks security needs to be as close to the data as possible and is thus focused on data storage. Maryland-based RackTop Systems boasts a Department of Defense (DoD) pedigree, giving its founders a vantage [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":18821,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,28046],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[383,454,391,31777],"class_list":["post-18820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-ueba","b2b_audience-awareness-and-consideration","b2b_product-encryption-data-loss-prevention","b2b_product-network-attached-storage-nas","b2b_product-security-appliances","b2b_product-ueba"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Startup Sees File System as Key to Security | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"RackTop Systems has built a secure file system that can replace a Windows or Linux file server and offer powerful behavioral security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Startup Sees File System as Key to Security | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"RackTop Systems has built a secure file system that can replace a Windows or Linux file server and offer powerful behavioral security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-12T23:39:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T23:44:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1190\" \/>\n\t<meta property=\"og:image:height\" content=\"825\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Startup Sees File System as Key to Security\",\"datePublished\":\"2021-07-12T23:39:47+00:00\",\"dateModified\":\"2021-07-12T23:44:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\"},\"wordCount\":465,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"UEBA\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\",\"name\":\"Startup Sees File System as Key to Security | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png\",\"datePublished\":\"2021-07-12T23:39:47+00:00\",\"dateModified\":\"2021-07-12T23:44:29+00:00\",\"description\":\"RackTop Systems has built a secure file system that can replace a Windows or Linux file server and offer powerful behavioral security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png\",\"width\":1190,\"height\":825,\"caption\":\"RackTop BrickStor UBA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Startup Sees File System as Key to Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Startup Sees File System as Key to Security | eSecurity Planet","description":"RackTop Systems has built a secure file system that can replace a Windows or Linux file server and offer powerful behavioral security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/","og_locale":"en_US","og_type":"article","og_title":"Startup Sees File System as Key to Security | eSecurity Planet","og_description":"RackTop Systems has built a secure file system that can replace a Windows or Linux file server and offer powerful behavioral security.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/","og_site_name":"eSecurity Planet","article_published_time":"2021-07-12T23:39:47+00:00","article_modified_time":"2021-07-12T23:44:29+00:00","og_image":[{"width":1190,"height":825,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Startup Sees File System as Key to Security","datePublished":"2021-07-12T23:39:47+00:00","dateModified":"2021-07-12T23:44:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/"},"wordCount":465,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png","keywords":["cloud security","cybersecurity","UEBA"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/","url":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/","name":"Startup Sees File System as Key to Security | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png","datePublished":"2021-07-12T23:39:47+00:00","dateModified":"2021-07-12T23:44:29+00:00","description":"RackTop Systems has built a secure file system that can replace a Windows or Linux file server and offer powerful behavioral security.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/BrickStor-UBA.png","width":1190,"height":825,"caption":"RackTop BrickStor UBA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/startup-sees-file-system-as-key-to-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Startup Sees File System as Key to Security"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18820"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18820"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18820\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18821"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18820"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18820"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18820"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}