Learn more about Nutanix capabilities, industry best practices, and techniques to incorporate into your cybersecurity defense strategies for preventing and recovering from ransomware when using a private cloud built on Nutanix.
Nutanix Vulnerability Disclosure Process
At Nutanix, we take the security, integrity and privacy of our products seriously. We are committed to supporting the valuable work that researchers and partners provide to help improve the security of our products and our environments.If you think that you may have found a security vulnerability that affects Nutanix or our customers, we encourage you to learn about our Vulnerability Disclosure Process and submit your findings at hackerone.com/nutanix
How to contact Nutanix about other security related issues
Please send a GPG encrypted email using the public key below to the Nutanix Security Engineering team at email@example.com. All non-security related correspondence (using the GPG key below?) will be discarded. If any of the encryption keys used for firstname.lastname@example.org happen to be revoked, there will be a revocation notice along with relevant information about the new keys on this page.'
Fingerprint: 991B AB35 18CF 64E3 ABF5 6AF7 30C5 0EA4 9AA0 DAB7