Story image

Can virtualisation solve the data control problem?

21 Oct 15

Many enterprises are still struggling to control their critical data throughout backup as well as application development and testing processes, according to new IDC research commissioned by Actifio, the copy data virtualisation company.

In fact, the research shows that two-thirds of enterprises are failing to meet best practice standards for data control.

According to the research, the use of a copy data virtualisation platform limits the proliferation and availability of physical data copies, when data is both at rest and being moved or migrated between production and non-production environments, generations of hardware, data centres or cloud infrastructure.

Most importantly, copy data virtualisation decreases the number of targets available to those with harmful intent, Actifio says.

Keeping enterprise data both safe and accessible is a complex balancing act made all the more difficult by the geometric growth rate of production data.

When coupled with conventional data protection programmes and a siloed approach to copy data creation, the result is an unintended and uncontrolled proliferation of ‘rogue copies’ of sensitive data, according to the company.

This data is difficult to keep track of, let alone protect. Organisations and individual users dissatisfied with the responsiveness of infrastructure and operations can often lead to ‘shadow IT’ operations that contain such rogue copies.

Each added physical copy increases the ‘surface area of attack’ for this data, creating additional opportunities for the wrong people to get access to confidential or personally identifiable information of clients, says Actifio.

The problem still persists throughout the vast majority of enterprises, despite well publicised high-profile security breaches or data leaks, the company says.

In fact, the IDC research found the majority of enterprises fail to meet best practice standards for data control and few are likely to be consistent across the full spectrum of data security policies.

IDC found that 77% of surveyed organisations fail to mask sensitive data during the test/development phase, which significantly increases the threat of a data breach.

According to the analysts, a typical organisation holds 375 data copies, with each copy carrying sensitive information and therefore an increased risk of attack.

In terms of sectors, government performs best overall at implementing data control policies while the education sector is the weakest.

Within an organisation, the CIO is central to the implementation of data control/security policies - and policies are only applied on an ad-hoc basis 34% of the time.

“Our research clearly identified two major challenges faced by IT executives - the copy data proliferation problem and the copy data access problem,” says Phil Goodwin, IDC research director Storage Systems and Software.

“Copy data is costly, and introduces risk when it needs to be accessed. Organisations need solutions that can automate copy data management and subsequently reduce risk and cost in the enterprise and public sector environments; manual efforts are simply insufficient,” he says.

The enterprise copy data access problem is simply too large and broad for IT organisations to handle manually, IDC says.

By 2018, IDC estimates copy data will cost IT organisations $50.63 billion and currently consumes up to 60% of the IT storage hardware and infrastructure budget.

“The truth is most companies have no idea how many copies of a given data set are floating around in their infrastructure or in the cloud,” says Ash Ashutosh, Actifio CEO.

“If you don’t know how many copies you have you don’t know where they are, and if you don’t know where they are you can’t tell who has access to them,” he says.

The Actifio-commissioned white paper surveyed senior executives at 429 mid-to-large scale enterprises across five industry sectors - government, financial, education, healthcare and retail, and focused on current trends related to data access, management, masking, copy proliferation and tracking. 

TCS collaborates with Red Hat to build digital transformation solutions
“By leveraging TCS' technology skills to build more secure, intelligent and responsive solutions, we aim to deliver superior end-user experiences."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.
HPE promotes 'circular economy' for end-of-use tech
HPE is planning to show businesses worldwide that throwing old tech and assets into landfill is not the best option when it comes to end-of-use disposal.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
CSPs ‘not capable enough’ to meet 5G demands of end-users
A new study from Gartner produced some startling findings, including the lack of readiness of communications service providers (CSPs).
Oracle announces a new set of cloud-native managed services
"Developers should have the flexibility to build and deploy their applications anywhere they choose without the threat of cloud vendor lock-in.”
How AT&T aims to help businesses recover faster from a disaster
"Companies need to be able to recover and continue operations ASAP, without pulling resources from other places to get back up and running."