The move by the storage industry to embrace new technologies to prevent cybersecurity attacks against data started years ago when NetApp invented read-only data snapshots, and then added SnapLock for data that could be held for legal purposes, said John Woodall, vice president of solutions architecture West at General Datatech, a Dallas-based solution provider.īut as attacks became more sophisticated, the storage industry has now been thrust into the middle of security, Woodall told CRN. That has led to a surge in storage vendors adding air gapping of data to keep it disconnected from the network, or introducing immutable storage that prevents data from being deleted or overwritten without authorization. The likelihood is high that an attacker will find a way to access a business’ data, whether to hold that data ransom or steal it to sell to others. Many, if not most, storage vendors are emphasizing the security they offer to data stored using their technology. But the biggest change going on in the storage industry is addressing the need for cybersecurity. The reason is simple: The base functions and features of storage are defined by the software, with hardware, typically industry-standard server hardware, serving primarily as the base on which to run the software.īecause of this, vendors are able to add new services that would be more difficult with a hardware focus. That has seen the storage industry move from a focus on hardware to software, particularly software-defined storage. While the storage industry continues to advance the performance and capacity of its offerings, these offerings are less likely dependent on speeds and feeds or revolve around issues with throughput, bandwidth or capacity.įor businesses today, concerns about technical specifications have given way to questions about business outcomes, including a focus on service-level agreements, whether the offering connects easily to the cloud, whether the data can be migrated between the cloud and on-premises systems and whether the data is secure from attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |