Let\u2019s say you have a very nice home with upscale furniture, a \u2018connected\u2019 digital ecosystem and the most important assets \u2013 your significant other, kids and a dog.With me so far?And smart you \u2013 for having invested in a modern alarm system for deterring invaders, an advanced firewall, malware protection etc. for defending the \u2018connected\u2019 things and have inculcated best practices in your family (and dog) to watch for suspicious activity and strangers and report the same.Whew! That sounds like a lot doesn\u2019t it?Let\u2019s make things a little more interesting. Let\u2019s say you had two houses \u2013 the second being a mirror image of the first (minus another family as I am not advocating polygamy) And then something unimaginable happens \u2013 let say you have the power to clone your primary residence into your second, third, 100th \u00a0\u201cbackup\u201d house periodically - daily, weekly, monthly based on preference and over a period of time you become the czar of many houses. AppleBut why would you do it \u2013 good question? In the event of an emergency, in a flash you can migrate to any of the backup houses.What emergency? \u00a0For instance, lets\u2019 say you had major water damage or termite infestation or worse still your house got ransacked and you lost everything. Instead of dealing with contractors, insurance, migraines \u2013\u00a0you move to a backup and life continues seamlessly.Yes, the cost of maintaining these backup houses is an important consideration . But there is another important aspect that you may very easily miss in this ownership frenzy. How about the security of each of these backup houses? #OhNo. Because now you must deal with protecting not just the assets in your \u2018living\u2019 property but all these backup houses since they have all the same assets as the primary, right?Now let\u2019s turn our sights to the hybrid enterprise data center.Just over a decade ago, when the data center was still ruled by hardware \u2013 monolithic entities like app servers, routers, firewalls \u2013 you may have had a good grasp of the inventory. Where and what \u2013\u00a0you probably had labels on the physical boxes, as well as tags on your operations console, to uniquely identify them. And yes, you probably had a disaster recovery site with a mirror image to take over in the event of an outage.Recall \u2013 this is analogous to the picture we drew earlier of you \u2013 the house owner \u2013 with one or two houses to protect \u2013 and a reasonable handle on how to do it. But then something happened over the past seven or eight years called SDDC or Software Defined Data Center \u2013 where software started taking over from the hardware monolithic platforms.Nothing wrong with that \u2013 it drove costs down, stimulated innovation and you had reusable general purpose hardware that could house any virtual function - app servers, routers, firewalls . And with increasing density of virtual machines (extending to containers today) on the same hardware \u2013 you were having it all.But along with this flexibility came the ability that the Enterprise admin never had in the hardware dominated world. That is #Snapshotting. Simply put \u2013 it was the unique action to literally take a snapshot of your entire virtual ecosystem and preserve it in a backup. And when there was a need to roll back\u00a0to a previously backed up image, it was a quick action and done.\u00a0(If you asked why - remember\u00a0#WannaCry\u00a0which encrypted your systems and held you hostage for ransom? If you could thumb your nose to the attacker and quickly go back to a safe version...that alone is a very good reason.)So far so good.But there were two transformations that accelerated the frequency and use of #Snapshotting 1. The costs of storage \u2013 both on-prem and especially in the cloud \u2013 started to plummet and 2. The frequency of attacks (or equivalently an admin error) started to increase. So you started doing #snapshotting more often than before. Maybe weekly to daily to hourly!Again, going back to the homeowner analogy \u2013 this is you increasing your real estate footprint from 2 to 10,20 \u20261000 houses \u2013 likewise hundreds of thousands backups.And therein lies the problem. While the best of breed security solutions \u2013 network, VM, hypervisor \u2013 all \u00a0\u2018protect\u2019 these live images, that\u2019s where the action is and interest is. But, it\u2019s another story for the backed-up snapshots that present an ever-increasing danger, since they have potent information that an attacker (or an admin asleep at the wheel) could use to compromise your enterprise. And this risk surface only increases all the time as more snapshots are added continually.To exacerbate, these images can be everywhere \u2013 on-prem, in the cloud \u2026.Is that enough to wake you up and say \u2018Oh #$@#\u201d. If so, \u00a0#MissionAccomplished. Not so fast. We haven\u2019t even started talking about what you can and should do today about this.The answer \u2013 actually\u00a0 ThinkstockIdentify risk in your hybrid cloud\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Take remediation action across hybrid cloudUpdate proactive processes in hybrid cloudEach of these topics deserves a separate blog \u00a0and we will cover them individually in the future.