How Cybersecurity affects Storage Infrastructure Part 2

By Yudi Wiradarma, Enterprise Sales Director, NetApp Indonesia

 

 

In the final installment of this two-part mini-series on cybersecurity, we discuss the correlation between cybersecurity and storage infrastructure. 

1.jpg

A significant portion of IT budgets is used for storage. Data retention and archival, authentication and authorization, data loss prevention, and privacy regulations all demand appropriate security technologies within storage solutions that provide both transparency and accountability. Organizations need to ensure that their storage infrastructure is able to collect and store cybersecurity-related information as well as to analyze data to drive actionable intelligence. This is so that companies have the ability to quickly recover from cyber attacks and perform disaster recovery. 

 

Here are three key points that you should look out for when including cybersecurity as part of your decision making for storage:

  • Open

Cybersecurity demands a highly dynamic environment. New tools and techniques are constantly emerging and organizations need to adopt these as quickly as possible. However, proprietary software and file systems increase costs and prevent agencies from using their data however they want. The best approach is to be open – being able to store the data as quickly and efficiently as possible and having access to it using any available protocol. Having an open approach will allow organizations to use the data in unique ways. And this will lead to new discoveries for the entire industry.

 

  • Flexible

It is important to have a balance between being open and being flexible. Once data is stored in a non-proprietary format, agencies can begin to create highly dynamic environments. This means they can non-disruptively add or remove performance and capacity to meet the requirements of the mission. All this is possible in an open and flexible environment. Organizations need enough flexibility and capacity to handle data volume, velocity and complexity.

 

  • Using Best of Breed Components

At the end of the day, technology providers want to offer customers the best of breed solutions to solve their cybersecurity challenges. To do this, look for companies that partner with other companies at every layer of the stack to provide an infrastructure that can securely handle any workload, no matter the shape or size.

 

Cybersecurity threats will continue to increase along with business challenges and competition. As such, organizations and government agencies need to constantly find a balance between the need to allow access to their data with the need to protect data from external threats.