Insight

How enterprises can get a handle on data

Michel Nader, Dell EMC

Michel Nader, Regional Director, Data Protection Solutions, Middle East, Turkey and Africa (META Region), Dell EMC, shares insights on the critical strategies needed for protecting data.

Last year, we have seen a spate of ransomware attacks globally. Do you see this continuing in 2018? What do you think is still lacking among enterprises today that make them vulnerable to such attacks?

Workforces today are more global and mobile than ever before. Hence, a growing number of connected devices are being added to the attack surface every minute. On the other hand, the threat landscape is also continually evolving where cybercriminals are finding new and improved ways, such as botnets, Trojans, adware, and ransomware, to bypass traditional security measures and avoid detection. Whether it’s an individual, small business or a large enterprise, no one in the region is immune to a cyberattack. While the sophistication of threats rapidly increases, security teams struggle to explain and quantify the business implications of security incidents.

Threats evolve quickly and it is imperative that organisations implement a multi-faceted security approach that can effectively stop evolving threats. While there is no silver bullet for complete endpoint and data security protection, there are comprehensive solutions available today that can significantly help protect against threats and keep critical data secure. With these challenges continuing to impact our customers, Dell is more committed than ever to playing a significant role in creating a new paradigm for the industry.

Many organisations understand the need to minimise their business risk by protecting their information where it is stored but not when shared or used, which opens the door to the risk of disastrous and expensive breaches. To this end, we believe that it’s imperative that organisations design their security programme to implement a combination of solutions that address security awareness, enablement and protection among the workforce. If companies are going to keep their critical assets truly safe amid an ever-evolving threat landscape, they need clear protocols in place that are backed by a realistic understanding of employees’ day-to-day responsibilities, as well as technology that protects sensitive data wherever they go – whether at rest, in motion or in use.

How can organisations ensure end-to-end protection and rapid recovery of data from premise to the private and public cloud? How can Dell EMC help organisations in this aspect?

Data is the lifeblood of any company, no matter the size of the industry. And as the workforce evolves, data is being used everywhere, at all times, which leaves it vulnerable to new risks. Organisations need to bolster security strategies by investing in technologies that help integrate security components in all devices, products and applications to safeguard this important company asset.

Cloud protection needs to be an important part of any strategy. As more and more enterprises move their IT functions to the cloud, data backup and disaster recovery are #1 and #3 in a list of the top uses for cloud-based infrastructure-as-a-service (IaaS), according to a survey of IT professionals conducted by ESG Research. Whether applications are on-premises, extending to the cloud, have been moved to the cloud, or are born in the cloud, they require the same level of protection.

Irrespective of where the data lives, Dell EMC’s data protection capabilities address both traditional and emerging workloads in the cloud. Our cloud protection solutions cover disaster recovery to the cloud, expanded support for long term retention in the cloud and seamless and efficient backup of applications in the cloud. Dell EMC Protection Software offers unified data protection for the enterprise that centralises, automates, and accelerates backup and recovery across the entire IT environment. It includes a data protection-optimised cloud storage appliance with support that spans across on-premises, hybrid, and in-cloud environments

Over the past year, we’ve invested heavily in developing superior security solutions which protect critical business data wherever it travels, while also securing individual endpoints from today’s sophisticated threat landscape. From encryption and endpoint threat prevention to user authentication and compliance reporting, we are committed to delivering best of breed security solutions to unlock the speed, agility and innovation of today’s mobile workforce.

There is often a disconnect or misunderstanding when it comes to data recovery and backup strategies. How can this be addressed?

Cyber-attacks have become a common occurrence. Reports of companies that have experienced IT infrastructure security breaches are on the rise. Beyond the exposure of sensitive or confidential information, there is growing concern that these hacks can also lead to the destruction of business critical systems. The business impact of not being able to recover can be devastating and in some cases lead to bankruptcy. To mitigate the risk of hostile attacks, companies need to develop strategies to deal with this threat.

Destroying backup infrastructure is an emerging trend, because hackers think that neutering the backup system increases the likelihood of payment. Any system that is connected to the network is a potential target, including the backup system. Because cyber-attacks are becoming more sophisticated and devastating, organisations are considering new recovery strategies that represent the “last line of defense” for the lifeline of the organisation. Many are considering isolated environments that host business critical data that is sequestered from the production network. In fact, recent regulatory guidance and government warnings emphasise that backup and recovery are key components of a good cyber security strategy, preferably with a backup or recovery infrastructure that is segregated from other systems. While tape backups can provide this level of isolation, recovery takes too long and involves too much risk when the daily revenue or mission critical applications are at stake.

How can regulations such as GDPR impact regional firms? Do you see Middle East government implementing similar mandates?

GDPR may sound like another exhaustive red tape practice, but regardless data privacy and protection should concern all organisations. According to a Deloitte study, 80% of consumers ‘somewhat to strongly agree’ with the statement that they are more likely to buy a product from companies which they believe protect personal data. In that sense, data protection is no longer just a risk management issue, but has also become a business consideration. For certain organisations, guaranteeing their customers’ data privacy will even be the new unique selling point (USP).

 

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines