Story image

Can virtualisation solve the data control problem?

21 Oct 2015

Many enterprises are still struggling to control their critical data throughout backup as well as application development and testing processes, according to new IDC research commissioned by Actifio, the copy data virtualisation company.

In fact, the research shows that two-thirds of enterprises are failing to meet best practice standards for data control.

According to the research, the use of a copy data virtualisation platform limits the proliferation and availability of physical data copies, when data is both at rest and being moved or migrated between production and non-production environments, generations of hardware, data centres or cloud infrastructure.

Most importantly, copy data virtualisation decreases the number of targets available to those with harmful intent, Actifio says.

Keeping enterprise data both safe and accessible is a complex balancing act made all the more difficult by the geometric growth rate of production data.

When coupled with conventional data protection programmes and a siloed approach to copy data creation, the result is an unintended and uncontrolled proliferation of ‘rogue copies’ of sensitive data, according to the company.

This data is difficult to keep track of, let alone protect. Organisations and individual users dissatisfied with the responsiveness of infrastructure and operations can often lead to ‘shadow IT’ operations that contain such rogue copies.

Each added physical copy increases the ‘surface area of attack’ for this data, creating additional opportunities for the wrong people to get access to confidential or personally identifiable information of clients, says Actifio.

The problem still persists throughout the vast majority of enterprises, despite well publicised high-profile security breaches or data leaks, the company says.

In fact, the IDC research found the majority of enterprises fail to meet best practice standards for data control and few are likely to be consistent across the full spectrum of data security policies.

IDC found that 77% of surveyed organisations fail to mask sensitive data during the test/development phase, which significantly increases the threat of a data breach.

According to the analysts, a typical organisation holds 375 data copies, with each copy carrying sensitive information and therefore an increased risk of attack.

In terms of sectors, government performs best overall at implementing data control policies while the education sector is the weakest.

Within an organisation, the CIO is central to the implementation of data control/security policies - and policies are only applied on an ad-hoc basis 34% of the time.

“Our research clearly identified two major challenges faced by IT executives - the copy data proliferation problem and the copy data access problem,” says Phil Goodwin, IDC research director Storage Systems and Software.

“Copy data is costly, and introduces risk when it needs to be accessed. Organisations need solutions that can automate copy data management and subsequently reduce risk and cost in the enterprise and public sector environments; manual efforts are simply insufficient,” he says.

The enterprise copy data access problem is simply too large and broad for IT organisations to handle manually, IDC says.

By 2018, IDC estimates copy data will cost IT organisations $50.63 billion and currently consumes up to 60% of the IT storage hardware and infrastructure budget.

“The truth is most companies have no idea how many copies of a given data set are floating around in their infrastructure or in the cloud,” says Ash Ashutosh, Actifio CEO.

“If you don’t know how many copies you have you don’t know where they are, and if you don’t know where they are you can’t tell who has access to them,” he says.

The Actifio-commissioned white paper surveyed senior executives at 429 mid-to-large scale enterprises across five industry sectors - government, financial, education, healthcare and retail, and focused on current trends related to data access, management, masking, copy proliferation and tracking. 

Research reveals the state of AI in Australian businesses
While Australian organisations are concerned about the impact of AI on society, the research suggests Australian businesses could be doing more to minimise the potential risks.
AWS announces the general availability of AWS Ground Station
Once customers upload satellite commands and data through AWS Ground Station, they can supposedly download large amounts of data over the high-speed AWS Ground Station network.
Citrix to extend Workspace to Google Cloud
“In expanding our partnership with Citrix, we can better help these customers with their transformations by enabling them to access and run the applications their businesses depend on anywhere—simply, flexibly and securely.”
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
“First-of-its-kind” VR training platform launches in Oz
Curiious IQ is enabled for any VR device and can stream live to small groups or up to 50 or more headsets simultaneously.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."