Data Protection: The Good, The Bad and The Ugly
Jun29

Data Protection: The Good, The Bad and The Ugly

’The Good, The Bad and The Ugly’ was Clint Eastwood’ last and best spaghetti western, and it’s also a very popular description of the cybersecurity industry, to which I will now shamelessly expropriate to describe the findings from EMC’s new global enterprise backup survey, ‘Are You Protected?’. Similar to virtually every other security study I see, the survey reports improvements in some areas, some problems in other areas, and the usual plug for new solutions that will make you more secure, less vulnerable or more likely fall somewhere in between. The survey results are very topical, said Peter Smails, VP, Marketing, Core Technologies, EMC. It also gives the company, which will soon become part of Dell, an opportunity “to talk about everything we’re doing to address those challenges.” While I found it interesting that this conversation was held with EMC, and not RSA, it’s security business, Smails told IT Trends & Analysis who better to address data protection than the company that stores most of that data. The key findings of the survey of IT decision makers at 2,200 organizations included: -incidents of traditional data loss and disruption are down since 2014, but new challenges mean 13% more businesses experienced loss overall; -over half of businesses fail to protect data in the cloud despite more than 80% indicating they will rely on SaaS-based business applications; -36% have lost data in the last year as the result of a security breach; -73% are not very confident they can protect flash storage environments; and, -the average cost of data loss is more than $914,000. People are getting smarter about data protection, said Smails, but they continue to experience data loss. “You need to be vigilant. The world is evolving quickly.” According to a new RSA survey, 75% of survey respondents have a significant cybersecurity risk exposure, and nearly half characterized essential Incident Response (IR) capabilities as ‘ad hoc’ or ‘non-existent’. “We need to change the way we are thinking about security, to focus on more than just prevention – to develop a strategy that emphasizes detection and response,” stated RSA President Amit Yoran. As noted in Sea Of Alarms, one of cybersecurity’s biggest problems isn’t finding a problem, but rather finding and dealing with the most pressing problem. According to a recent survey, nearly 74% of those surveyed reported that security events/alerts are simply ignored because their teams can’t keep up with the suffocating volume. Then there was the new ‘new’ study I just received which identified complext IT security as a growing problem. According to security vendor IS Decisions’ survey of 250 US organizations, on average each employee loses 21.88...

Read More

The Road to Data Mobility…

Storage hardware vendors like to refer to themselves as software companies. While it is true that most of them write storage software that runs on off-the-shelf hardware, most of them require that you buy their hardware to get their storage software. EMC, one of the first to claim to be a software, has evolved into a real software company. Other than the obvious software properties, like Networker or Vipr, an increasing percentage of its storage solutions are available as software. To read the complete article, CLICK HERE NOTE: This column was originally published in the Storage Switzerland Weekly...

Read More

The barriers to being mobile-first

Mobility strategies are riddled with challenges as companies look to balance the end user experience with a productive environment. ESG research casts some light on the challenges businesses are facing and provides a perspective on potential opportunities to align with the top goals of decision makers and security teams. This video blog explores the barriers that organizations face in becoming a mobile-first business: To read the complete article, CLICK...

Read More

Flash Forward, London: refreshing purpose and content

The recent — and inaugural — Flash Forward conference in London was significant for being a non-vendor specific, storage-focused event. There’s precious few of this species left and we have not had a new one in a while. This one was substantial enough to have attracted a good number and mix of sponsors and speakers (from organizations both large and small), and yet intimate enough that everyone could have real conversations and get their questions answered. The need for this type of event is clear; while there was a period when excitement and indeed innovation in storage and data management was waning (we could argue the dates but let’s say it peaked 5-10 years ago), what is abundantly clear of late is that storage — aka data, aka information, aka the ability to get anything done in IT — is categorically center stage. To read the complete article, CLICK...

Read More

Networking education: leave your comfort zone

Breadth makes more sense than depth in today’s IT environment. If you’re a network engineer looking to advance your career through certifications, self-study, or going back for a degree, you might wonder whether to go for breadth or depth in knowledge. In this age, network engineers should focus on adding expertise outside of their core networking skills. Corporate environments are changing with SDN, the increasing importance of network security, and networking’s growing role as the glue to connect modern container applications. Being isolated in a networking only silo may no longer work. You’ve heard of full-stack developers. Why not be a full-stack infrastructure professional? To read the complete article, CLICK...

Read More