New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Organizations need to evolve their data management strategy

New York Tech Editorial Team by New York Tech Editorial Team
March 11, 2022
in Cybersecurity
0
Most employees believe backing up company data is not their problem
Share on FacebookShare on Twitter

IDC predicts that, over the next five years, more than 80% of the data collected by organizations will be unstructured data, and that will only continue to grow 40-50% per year for most enterprises.

effective data management strategy

With the sheer volume of unstructured data yet to be created and used in the years ahead, it’s safe to say that the way organizations manage their data will need to evolve.

IDC’s Research VP of Infrastructure Systems, Platforms and Technologies Group Eric Burgener authored an IDC Analyst Brief.

In the analyst brief, Burgener urges organizations to implement a comprehensive data management strategy to confront this increasing influx of data, noting that a data mobility engine provides the foundation for an effective data management strategy and can drive significant benefits for the hybrid multicloud enterprise.

“A good [data management] strategy takes into account not only the heterogeneity of storage in most enterprises, but also a number of other areas, including on-and off-premises deployment models, application availability, data integrity, security, compliance and regulatory needs, efficient resource utilization and the fact that more than 80% of the data created over the next five years will be unstructured (i.e., file and object-based),” writes Burgener.

Five main components of an effective data mobility engine

1. Vendor-neutral interoperability

The data mobility engine must focus on data, not systems, and be able to move data between different types of systems as well as cloud targets. Both file (NFS, SMB) and object (S3) access methods should be supported, preferably in a multiprotocol manner to support efficient capacity utilization when data must be shared across different types of applications.

2. Insights and intelligence

The data mobility engine must provide visibility into data metrics, access patterns, and usage activities that can provide the basis for classification, and this visibility must be comprehensive. It should also include AI-driven intelligence that can analyze these metrics to make policy recommendations that drive an effective data management strategy around storage location, data protection, security, compliance, migration and, ultimately, storage cost reduction. With more complete metrics, data residency can be managed to ensure that data is kept in the “best” location (given corporate objectives) and obsolete data is identified and deleted.

3. Orchestration and automation

With the complexity of today’s multilocation IT infrastructures, monitoring data usage and compliance and managing classification and data migration manually are risky propositions. Automation improves the speed and reliability of operations while improving administrative productivity, increasing the span of administrative control to lower costs.

4. Scan-optimize-copy capabilities

All of these operations must be comprehensive in nature. Scan provides the visibility around data and its usage, collecting the metrics needed to search and intelligently manage data. Delta differentials, compression, and other storage efficiency technologies maximize resource utilization when moving and storing data, allowing operations to be completed as quickly as possible. Copy includes replication capabilities, which can further assist in optimizing data migration to create the most effective data placement strategy.

5. Integrity enforcement

The data mobility engine must support data integrity during all operations. File and object-level verification must go beyond just TCP checksums to be able to catch and correct silent data corruption using “before” and “after” hash digest comparisons, chain of custody, and advanced integrity protection (regular inspection of destination content to detect possible changes conflicting with the source).

Executing on an effective data management strategy

While more companies are reassessing their unstructured data storage needs to keep up with the increasing amounts of human and machine-generated data, most enterprises are searching for a viable solution when it comes to executing on a comprehensive data management strategy, Burgener’s report reveals.

Over the last several years, more and more IT leaders come with concerns around data classification, data visibility, and organization-wide data accessibility, as well as how to handle aging data and the high costs that result from a fragmented data management strategy.

These IT decision-makers understand that the future is changing for their data—with many of them already storing petabytes of data that will continue to grow in the years ahead—but they’re hesitant to make changes to how that data is stored and protected. Their on-prem solution is a “comfort zone,” so to speak, and it’s intimidating to think about moving all of those assets to a new platform.

Finally, Burgener states in his report that “the benefits of an effective data management strategy include reduced IT costs, easier data sharing, better security, less legal exposure, and an improved ability to demonstrate governance and regulatory compliance.”

Credit: Source link

Previous Post

Consumers demand a digital banking experience with security at its foundation

Next Post

What is fueling the adoption of passwordless authentication?

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
The world’s worst kept secret and the truth behind passwordless technology

What is fueling the adoption of passwordless authentication?

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media