Security For Your Evolving Storage Strategy: From Preserve To Protect

Topics: Data Archive | Store and Protect Information | Cloud Backup

Download PDF

Concerns about data security, data privacy, and regulatory compliance have consistently been the leading inhibitor to enterprise investments in virtualization and use of public cloud infrastructures for enterprise storage solutions. Organizations should appreciate the value of having a common set of capabilities for preserving and protecting their portfolio of digital data.

In The Evolution of Digital Data Storage: Rolling With the Changes, the Aberdeen Group described how enterprise adoption rates for selected types of digital data storage are rapidly evolving, in terms of:

  • How storage is implemented - i.e.,on traditional servers, or on virtualized systems
  • Where storage is located - i.e., on-premises in enterprise datacenters and server rooms, in the infrastructure of various cloud service providers, or in a hybrid deployment model

  • What types of data are moving more quickly to the cloud - i.e., the different adoption rates for primary data (both structured, and unstructured), secondary data, backup and archive, and disaster recovery

Concerns about data security, data privacy, and regulatory compliance have consistently been the leading inhibitor to enterprise investments in virtualization and use of public cloud infrastructure for enterprise storage solutions.

The key takeaway was that as enterprise storage solutions continue to evolve and innovate - which they must, to keep up with the volume, performance, and convenience demanded by modern businesses and their reliance on digital data - this creates a strategic need to manage digital data lifecycles across a heterogeneous mix of data types, solution categories, and deployment models. In turn, this heterogeneity highlights the business value of working with strategic solution providers who offer a breadth of capabilities for managing digital data storage lifecycles in the reality of this ever-changing context.

Security for Your Evolving Enterprise Storage Strategy

As organizations move towards virtualization and the use of public cloud infrastructure for enterprise storage solutions, the top two inhibitors to investments in these initiatives have been notably consistent:

  • Concerns about data security, data privacy, and - regulatory compliance (in Aberdeen's benchmark research, 57% of all respondents)
  • Concerns about integration / migration / installed base / existing business processes
  • (36% of all respondents)

Security considerations for data storage in this ever-evolving environment can be extremely complex - a truism which can be especially appreciated by breaking down the generic terms "data storage" and "security" into more meaningful, addressable segments and components.

For example, most organizations are managing multiple types of digital data lifecycles, including:

  • Primary data - in both structured form (e.g., enterprise databases), and in a wide variety of unstructured forms (i.e., files)
  • Secondary data - e.g., tiered storage with less frequent access requirements
  • Backup / archive data
  • Disaster recovery

In addition, for each of these categories of enterprise data, "security" for enterprise data storage solutions actually involves a wide range of policies and technical controls, in areas such as: identity and access management; data security, and information Iifecyc/e management; encryption and key management; application / interface security; configuration management and change control; infrastructure and virtualization security; and threat and vulnerability management.

Click to Download Full Report

Related

Data Restoration
Data Restoration

Topics: Data Archive

You have the capacity to identify, restore, and deliver the data contained on your backup media efficiently using the Iron Mountain end-to-end data restoration services.