Page 15 - Data Security Edition 2022
P. 15
Data Will Be Treated
As a First-Class
Citizen in the Future
Matthew Oostveen
VP & CTO, Asia Pacific & Japan,
Pure Storage
Pure Storage has been at the and in most countries, sanctions Another good practice is to select a
forefront of delivering modern from regulatory authorities. robust data encryption protocol.
d a t a e x p e r i e n c e w h i l e Therefore, all organizations should Establish what kind of data
empowering businesses to run create a comprehensive strategy encryption to employ and where —
t h e i r o p e r a t i o n s i n a n for data security. on-premises, or in the cloud, etc.
automated, storage-as-a- Best Data Security Practices Data Security Implementation
service model across multiple A security or incident response Challenges
clouds. The company helps framework explains how to detect, Identifying where data resides and
organizations use data while respond to, and recover from ensuring its protection is probably
minimizing the expense and incidents. It will help to identify the t h e b i g g e s t c h a l l e n g e
complexity of infrastructure data, such as personal or sensitive organizations face. Several
management behind it. Here, data, that requires more stringent companies have adopted a multi-
Matthew Oostveen brings to light security protocols. cloud or hybrid cloud strategy, with
the role of data security in this A framework will also help define some of their data residing on-
rapidly growing industry and policies regarding what data is premises and some residing in the
how Pure Storage is leading the collected and why. There are cloud, sometimes in a public cloud.
charge. Data Security Predictions for
several reasons to document the Indian & Global Markets
Need for a Robust Data Security what and the why of data
Strategy collection. Regulators may require T h e fi r s t t h i n g w e n e e d t o
Most organizations view their data that such policies are spelled out a c k n o w l e d g e i s t h a t
cybercriminals will continue to
as one of their most valuable w h e n d a t a c o m e s f r o m innovate and evolve. As bad actors
assets after their employees. Data consumers. There may be even study the threats that encourage
breaches may result in downtime more stringent requirements for targets to pay the ransom quickly,
for operations, ransom payments, detailing collection policies. they may adopt attacks that cause
even more damage when -
March 2022