Stay in Business or Go Bankrupt: Where is Your Data Security Strategy Leading You? Credit: metamorworks Integrating modern data protection into the normal cycle of business is one of the best things you can do for your organization. But where do you start? That is the question. This article aims to provide you with a practical framework to improve your enterprise data protection. Start off by doing a data protection assessment of all your company’s data sources. You should profile all of your data. Each dataset brings a different value to the company. Before you make storage and protection decisions, you must know which category each piece falls into – and the value level it either provides or could cost the business. You need to figure out what to protect and how to protect it. This analysis should span across both primary and secondary storage. On the primary storage front, you’d be smart to do an analysis of the data, determine what data needs to be encrypted and what doesn’t, and figure out how the protection needs to keep your company in compliance, especially if your company is in a regulated market. On the secondary storage front, you need to figure out what to do from a replication/snapshot perspective for disaster recovery and business continuity. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Data security must go hand-in-hand with cyber resilience. Data needs to be air-gapped, including logical air gapping and immutable snapshot technologies. Logical air gapping creates a gap between the source storage and the immutable snapshots, while remote air gapping sends data to a remote system. Then you need the capability to create a fenced forensic environment (an isolated network). The fenced forensic environment provides a safe location to provide forensic analysis of backup datasets to identify a copy of the data that is free from malware or ransomware and can be safely restored – this copy is often referred to by storage and backup administrators as “a known good copy.” Immutable snapshots allow for rapid recovery from cyberattacks and ensure that the copies of the data cannot be altered, deleted, or edited in any way. This provides assurance of the integrity of the data. At the same time, you should use a system that can accelerate the recovery time to a matter of minutes, not hours or days. Together, immutable snapshots, air gapping, a fenced forensic environment, and rapid recovery time bring a much-needed new level of enterprise-grade cyber resilience to an organization. Stan Wysocki, President at Mark III Systems, a North American IT solution provider, noted: “What I’m most excited about is providing our customers a comprehensive storage-based ransomware solution that combines air-gapped immutable snapshots with an automated fenced-in network to determine safe recovery points, and then delivering near-instantaneous recovery.” Because modern data protection improves testing, you should determine how to use snapshots, replicas, and backup for DevOps and software developers, while still keeping control. To maintain control, you need to delineate all of your processes. You also need to know how to handle compliance, especially with archived data. When a security incident happens, it is recommended to look at it holistically. The following are some simple steps to keep in mind: Make sure the primary storage is clean.Pinpoint a known good copy of the data and your backup datasets, which is frankly easier said than done, but it’s important. Set up a fenced forensic environment.Do a recovery into that fenced network for your analysis of the data so you can identify the “known good copy.”Make sure there is no ransomware or malware on the data before you execute your final recovery to your production servers and storage infrastructure.Recover the data.Then continue the process for all your appropriate datasets. Since a company’s datasets have differing levels of value, many turn to scalable data protection to protect their most valuable assets at the appropriate level, which keeps storage more affordable. Because properly protecting and backing up data falls under operating expenses (OPEX), businesses must always be mindful of costs. The value of data just in the enterprise space is trillions of dollars, and you cannot allow it to fall into the wrong hands or allow an attack on it to cripple the business. It’s no wonder why the World Economic Forum named cybersecurity as one of their top five priorities. The right data protection and cyber resilience can mean the difference between staying in business and going bankrupt. It all starts with making storage a part of your corporate cybersecurity strategy. For more information, visit Infinidat here. Related content brandpost Leading IT Analyst Firm GigaOm Recognizes Infinidat as the Industry Leader in Ransomware Protection for Block Storage According to GigaOm, Infinidat distinguishes itself for its modern, software-defined storage architecture, securing enterprise storage with a strategic, long-term approach, broad and deep functionality, and high quality of innovation. By Sapna Capoor, Director of Global Communications at Infinidat Sep 21, 2022 5 mins Security brandpost Enterprise Storage Solution Provider of Choice: The Case Studies In these case studies, five very different types of companies sought and achieved similar outcomes for their enterprise storage operations: improved speed, performance, reliability, and cost efficiency. By Eric Herzog, CMO, Infinidat Sep 13, 2022 6 mins Data Management brandpost 3 Ways to Make Storage a Strategic Asset for Your Organization (Not Just an IT Cost) Storage has emerged in 2022 as a strategic asset that the C-suite, not just the CIO, can no longer overlook. Here are three practical ways to equip yourself for a constructive conversation. By Eric Herzog, CMO at Infinidat Sep 07, 2022 7 mins Data Management brandpost IT Issues that Need Cleaning Up: Herzog’s Dirty Dozen Herzog’s Dirty Dozen represent the challenges that keep IT leaders up at night. Here are 12 sound strategies to solve each item on the list. By Eric Herzog, CMO, Infinidat Aug 31, 2022 9 mins IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe