Posts Tagged ‘cloud protection’

The Cloud Is the Perfect Vehicle for Data…and Data Protection

Brian Heckert

Principal Content Editor, Dell EMC
My first long-term exposure to technology was the typewriter. I still love that invention, which really sparked my interest in writing. For the past 20 years, I have worked in high tech as a content development specialist, marketing writer, and documentation editor. Prior to working in the software industry, I was a journalist, photographer, photo editor, and military fire fighter. After hours, I enjoy spending time with family, reading, and hiking in the mountains.

The end of cloud computing? Don’t hold your breath!

Recently I watched a video about how cloud computing has run its course. The headline—The End of Cloud Computing—grabbed my attention (that was the point, of course). But there’s just one thing: it’s not true!

The premise is that many of the future devices both large and small that we will depend on daily will need to collect real-world data in real time. That means lots of data real fast. For example, to operate safely, self-driving cars need information—and lots of it. While they’re maneuvering, self-driving cars gather incredible amounts on information—more than 1 GB per second—and use it quickly to ensure maximum safety for everyone on the road. The process requires sensors in the car to collect data about road conditions, make inferences about those conditions, and then act with extreme agility.

cloud data protection

The process of sensing, inferring, and then acting quickly and accurately makes a lot of sense for a self-driving vehicle when we consider that a wrong “decision” by the vehicle could cause an accident, resulting in damaged property, or worse, bodily injury to vehicle occupants or pedestrians. That means data needs to be onboard the vehicle, which becomes a “moving” data center.

But here’s the thing: not all data centers need to be moving. While an “onboard” data center makes sense for a self-driving car, there are vast amounts of information that reside comfortably in the cloud. And that isn’t going to change. These days most of our devices and how we use them depend on a data-gathering process that occurs centrally in the cloud. The device in use pings the cloud and then information in the cloud is returned. For example, when you do a Google search or use your favorite app, the cloud is the perfect vehicle from which to grab the necessary data.

And what about business-critical data? The cloud is the perfect vehicle for enterprise IT. In fact, today many organizations are given mandates to store a certain percentage of the business’s data in the cloud. Why? It’s economical and it’s safe—practical reasons that reduce TCO. These days, who doesn’t want to reduce TCO? (more…)

Cloud Adoption: Strategy vs. Reality

Vladimir Mandic

Chief Technology Officer & Distinguished Engineer Data Protection Cloud, Core Technologies Division, Dell EMC
Vladimir has been driving technical innovation and change within EMC for the past 10 years, first in the area of data protection software and, currently, in cloud technologies. Prior to that, he’s had rich industry experience as a solution integrator and in the service provider space. When not working on technology innovation, he may be difficult to locate due to his passion for world travel.

Latest posts by Vladimir Mandic (see all)

Myths About Migrating to the Cloud

Myth 1: Cloud Bursting
One of the original highly publicized use-cases for public cloud was bursting. The story made sense: as your demand for computecloud adoption-vlad increased, you would use the public cloud to increase the capacity of your private infrastructure. Like so many good stories, bursting didn’t really happen. In fact, bursting is one of the least common public cloud use cases.
Why did bursting not become more widespread? Enterprises are either keeping applications on-premises in newly designed IaaS private clouds or they are moving them to the public cloud. It’s an OR function, not an AND one. Furthermore, it almost always happens per-application. You evaluate your future application needs and decide where it makes more sense to run the application for those needs. Bursting across environments is just too complex.

Myth 2: Multi-Cloud
Most enterprises have neither a comprehensive hybrid cloud nor an end-to-end multi-cloud strategy that covers entire IT cloud comic-vladenvironments. Frequently there is a general desire for multi-cloud strategy to minimize the dependency on a single cloud provider. But that strategy turns out again to be a per-application choice rather than a centralized plan.
Organizations choose to run some applications in the private cloud and some in different public clouds. Every cloud has very different functionality, interfaces, and cost optimizations. And each time an application developer chooses an environment, it’s because that cloud was the optimal choice for that application. As a result, application mobility becomes a myth; it’s something desired, but very few are willing to settle for the smallest common denominator between different choices just to enable application mobility.
Even if customers wanted to and could move the application, it’s unlikely to happen. Moving large amounts of data between environments is challenging, inefficient, and costly. So, once the choice of a cloud provider is made, the application stays where it is, at least until the next tech refresh cycle when per-application considerations can be re-evaluated.

Cloud Adoption for Legacy Applications
While so much of the focus has been on creating new applications, enterprises are also migrating traditional workloads. So what are the stages of cloud adoption?

  • Step 1: Infrastructure as a Service. Treat the cloud like a typical infrastructure; in other words, think of servers and storage as you currently think of them. Applications are installed on top of the infrastructure. Because everything is relatively generic, the choice of a cloud provider is not too critical.
    But as applications start to move, a new way of thinking evolves; you start looking at the infrastructure as services instead of servers.
  • Step 2: Software as a Service. Some legacy applications are swapped for new ones that run as a service. In this case, you don’t care where your SaaS service runs as long as it’s reliable. The choice of a cloud provider is even less relevant; it’s about choice of the SaaS solution itself.
  • Step 3: Rewrite the Application. Some applications are redesigned to be cloud-native. In some cases, the cloud is an excuse to rewrite decades of old COBOL code that nobody understands. In other cases, features of the cloud enable an application to scale more, run faster, and deliver better services. Not all applications should be rewritten.

The Core Issue: Data. When thinking about moving the applications, what’s left is the actual data, and that is where company value truly resides. Some data moves with applications where it resides, but not all data is application structured. And that is the last challenge of cloud adoption—looking how data services can enable global, timely, and secure access to all data, whether it resides inside an application or outside of it.

The Role of IT
Just what is the role of the central IT organization, and is there a single strategy for IT? Not really.
The word “strategy” comes not from having a single plan that covers all applications, but from a comprehensive evaluation that should be done before choices are made and from having a unified set of services that ensure security, availability, and reliability of all those different environments.

Consider how IT organizations are evolving to become service brokers. For example, sometimes:

  • It makes sense to build a private cloud based on new converged (or hyper-converged) infrastructure.
  • It may go with the software-defined data center (SDDC), but that is more the case of when they have to deal with unknown external consumers instead of explicit requirements
  • IT organizations will broker services from public cloud providers such as AWS, Azure, GCE, or VirtuStreamThe alternative is so-called “shadow IT” where each application team attempts to manage their own applications without understanding the global impacts of their choices. In such scenarios, security is typically first to go and data protection follows closely.

I’ve written before how with move to public cloud, the responsibility of infrastructure availability shifts to the cloud provider. But that does not negate the need for a comprehensive data protection strategy.

You still need to protect your data on-premises or in the cloud from external threats such as ransomware or internally caused data corruption events (as the application is frequently the cause of corruption, not just infrastructure failures), or from the common (and sometimes embarrassing) “threat” of “I deleted the wrong data and I need it back.”

Companies weigh the costs and benefits of any investment. There are places where different types of infrastructure deliver the right answer. For IT to remain relevant, it needs to support different types of environments. IT’s future is in delivering better on-premises services, becoming a service broker, and ensuring that data is securely stored and protected.

Conclusion
The cloud is real and it is part of every IT team’s life. IT can be instrumental in the successful adoption of the cloud, as long as they approach it with calmness and reason—and an open mind. The goal isn’t to design the world’s greatest hybrid cloud architecture. It’s about choice and designing for application services instead of looking at servers and storage separately from the applications. There will be well-designed private clouds and public clouds that are better fits for specific applications. But the applications will dictate what works best for them; they will not accept a least-common denominator hybrid cloud.
In the end, hybrid cloud is not a goal in itself; it is a result of a well-executed strategy for applications and data.

Data Sovereignty in the Cloud

Mat Hamlin

Director of Products for Spanning by Dell EMC
Mat is the Director of Products for Spanning by Dell EMC. He is responsible for the overall direction and strategy for Spanning's suite of SaaS backup and recovery solutions. His career in technology spans five startups and two large organizations, all in Austin, TX. Mat started out in product support and training, then engineering leadership and for the past nine years has been focused on product management and product marketing. Prior to joining Spanning, Mat served as Sr. Product Manager for SailPoint Technologies and Sun Microsystems, contributing to their market-leading enterprise identity management solutions.

The requirement to comply with data protection and privacy laws, like the EU’s General Data Protection Regulation (GDRP) and Australia’s privacy laws, drive the need to evaluate where enterprise organizations are storing their data in cloud data centers. If your organization hosts your own data centers, this can be challenging if you are multinational, but it can be just as difficult when you rely on SaaS providers to manage your data since the control of your data destination is a bit out of your hands.

dp-compliance

If you’re using a SaaS application, such as Office 365 or Salesforce, and are backing up your data with a third-party backup provider, there are many factors to consider as you evaluate your data protection strategy. Understanding the regulations and requirements first and then considering how the providers handle your data are both important.

What privacy laws apply to my organization?
As you build a cloud and data protection strategy, start by evaluating the privacy laws that apply to your data and corporate policies, and compare that against your SaaS provider’s offering, including the primary data storage location and their replication strategy.

My strong suggestion is that you work directly with your audit, compliance and legal teams to ensure you fully understand the regulations that could be applied to you directly or indirectly through business relationships with organizations in other regions.

Generally, global privacy and data protection laws provide strong frameworks and mechanisms to transfer personal data to other countries and economic regions if required, but the regulations are typically strict and the penalties can be costly. As a result, many organizations decide to enforce data governance policies that ensure data remains within defined boundaries. (more…)

Why Do I Need Endpoint Protection?

David Tye

Product Marketing Manager
As a recent graduate from Sacramento State University I am able to take what I have learned in school and apply it to the high tech industry and the problems companies are facing today. I am a California native, die hard Green Bay Packers fan, and an outdoor enthusiast.

Latest posts by David Tye (see all)

When I was a kid my parents would always ask, “David, why do you need an Xbox?” or “Why do you need this new game?” As a kid, it was sometimes hard to come up with a valid reason why I needed a new game or gaming device. Now that I have made my transition from a college student to full-time IT professional, I am faced with new questions. Specifically, “Why do I need endpoint protection?” The answer to this question isn’t as complicated as you might think.
video gamer

Backing up your endpoints is something that every business, small or large, should be doing. There is a plethora of reasons why we need to protect our endpoints. Like all humans, we make mistakes. User error, although a mistake, can still be detrimental to a business. Accidental deletion of data is something that happens far too often. As users of desktops and laptops we are also susceptible to hardware failure. Most of a user’s data resides on a single hard drive, thus a hard drive failure can result in a catastrophic loss of data.

User errors and hard drive failure are not the only threats to the data that reside on your endpoints. Cybercrime, such as ransomware, has been on the rise this year. According to the FBI, $209 million dollars were paid in ransoms in Q1 2016, putting ransomware on course to become a $1+ billion industry by the end of 2016. It’s important to note that just because you pay the ransom does not necessarily mean you are guaranteed to get your data back! A hospital in Wichita, Kansas, learned this the hard way. (more…)

5 Reasons to Consider Cloud-Ready Storage

Nicos Vekiarides

Vice President of Cloud Technology
Former co-founder and CEO of TwinStrata, Nicos Vekiarides is now Vice President of Cloud Technology following the acquisition of TwinStrata by EMC. In his 20+ years of experience, Nicos has led teams focused on revolutionizing storage virtualization, data replication and cloud storage.

Latest posts by Nicos Vekiarides (see all)

With proclamations of 2016 as the year of all flash storage, you may be tempted to think flash drives are the main consideration when choosing a storage array. However, a storage array has a variety of attributes that influence the purchasing decision, including a trusted brand, interoperability, availability, copy services and many others.

Cloud-readiness, or the array’s native ability to attach to cloud/object storage, is an attribute of storage arrays that is gaining prominence as part of the selection criteria. This is for a good reason, as cloud storage can balance the continuous need for on-premises and off-premises storage capacity with economics that make it viable.

cloud-ready-june-16

If you are wondering whether cloud-readiness should be part of your selection criteria, consider the following: (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog