Sponsored Feature Enterprise multi-cloud migration is in full swing. As enterprises continue to simultaneously host more of their applications and workloads with different vendors spanning diverse on-premises and off-premises environments, this can create challenges.
How do organizations ensure cybersecurity and backup/recovery processes keep up with the move to multi-cloud? Additionally, how do they ensure that the data that is stored, accessed, and transferred between multiple clouds and on-premises data centers meets increasingly stringent data protection and regulatory requirements?
The challenge is to ensure consistent data management (protection, compliance, etc.) wherever the data is. This is necessary not only for traditional workloads such as VMs, Oracle, SQL, Exchange, and NAS, but also for new cloud-native applications such as Kubernetes containers, SaaS databases, and NoSQL.
Research suggests that IT staff are painfully aware of the predicament.
According to Instant Research, the complexity and security of data management is a growing concern for global IT decision makers. More than two-fifths (82%) of 1,000 respondents said their current data protection systems are unable to meet future business challenges. Additionally, 63% believed the emergence of cloud-native applications, Kubernetes containers, and SaaS workloads posed a risk to data protection, primarily because they lacked adequate tools to manage data protection. in so many different environments.
A security architecture as strong as its weakest link
An area of even greater concern for organizations is the ability to fend off persistent cyberattacks. Perhaps ironically, what might help IT decision makers feel better is a change in perspective. One that assumes that there is nothing an organization can do to prevent itself from being the victim of a cyberattack. A new perspective instead aims to ensure that they can recover quickly from any incident to minimize the fallout.
Colm Keegan, senior consultant at Dell Technologies, explains that any protection architecture is only as strong as its weakest link. A successful phishing incident, for example, can undo all investments made in perimeter security. Likewise, a dishonest employee can launch a devastating attack from inside the network, completely bypassing all permitted countermeasures.
“As a result, analyst firms like Gartner are emphasizing the need for organizations to t. This means investing in solutions designed to help you quickly recover your most critical applications and data following a cyberattack,” says he.
A good way to start down this path is to ask yourself, “How long will it take to recover my environment after a malicious attack? Do you rely exclusively on backup data for recovery and how much of your backup vulnerable to a cyberattack? he adds.
More guidance is being created to instill confidence in the ability of financial institutions to recover from cyberattacks. He recommends that organizations back up critical customer account data every night, either by managing their own data vault or by using a participating service provider to do so on their behalf. In either case, the data vault must be encrypted, immutable, and completely isolated from the institution’s infrastructure (including all backups).
Dell, for example, adheres to Sheltered Harbor standards by allowing organizations to securely replicate data into a production-isolated recovery vault. The vault can be stored on-premises or in the cloud.
Detect suspicious activity with Cyber Sense
PowerProtect Cyber Recovery also uses Cyber Sense machine learning (ML) algorithms to analyze backup data to validate its integrity. The software sends alerts to the Cyber Recovery Dashboard when suspicious behavior such as mass deletions, unauthorized encryption, or changes to user files, databases, and Active Directory or DNS settings, indicates that a ransomware attack could be in progress. It further compiles post-attack analysis and lists the latest known backup data sets to support fast recovery and minimize downtime.
“By running scans on these secure copies to ensure they are free of ransomware or malware, PowerProtect Cyber Recovery can ensure that data can be recovered in the event of a cyberattack,” says Keegan. “Additionally, there are operational workflows in Cyber Recovery that help simplify and automate the recovery process.”
The San Felipe Del Rio School District in Texas provides a powerful example of why organizations can consider deploying an isolated, isolated digital safe to protect their critical data. Following a disruptive ransomware attack, the school district chose to invest in PowerProtect Cyber Recovery.
While deploying its digital safe, the district was hit by another ransomware attack. However, this time, instead of taking weeks to recover their servers, they were able to recover their systems in just four hours with the protection and rapid recovery provided by the PowerProtect Cyber Recovery solution.
Protection for modern workloads
In addition to increasing cyber resilience, Keegan also believes companies need to ensure staff have the tools they need to properly meet the protection needs of modern workloads such as containers, SaaS and cloud infrastructure resources such as IaaS and PaaS. This means data protection software flexible enough to cover hybrid multi-cloud environments.
Keegan thinks it shouldn’t just add point solutions that try to fix data protection issues one problem at a time. Dell’s approach is to centralize all aspects of data protection under a single, unified platform.
PowerProtect Data Manager is optimized for physical, virtual and containerized workloads hosted across multiple on-premises and cloud platforms, providing long-term data retention and disaster recovery policies. The solution discovers the entire multicloud and hybrid cloud estate, from databases, Kubernetes containers, virtual machines, and conventional file system storage.
PowerProtect Data Manager has the ability to protect and recover Kubernetes workloads, including all metadata and persistent storage, across namespaces, and with application consistency for many next-generation cloud-native databases such as Cassandra, MongoDB, PostgreSQL and MySQL.
Automation Drives DevOps Acceleration
As the term “infrastructure” continues to evolve, now covering edge, core, and cloud, another critical capability for data protection is automation. Automation is essential for securing workloads such as virtual machines and Kubernetes containers distributed across multiple on-premises, single and multi-cloud environments precisely because they can be very difficult for services to track and monitor. IT and security professionals.
PowerProtect Data Manager provides self-service capabilities and integrated APIs through an intuitive GUI that helps DevOps teams consolidate data protection resources across development, test, and production workloads in multi-tenant environments. cloud, allowing them to “treat data protection infrastructure like code,” adds Keegan. .
“Developers can tag their Kubernetes workloads so that as they are deployed, the correct data protection policy is automatically configured as the container cluster is launched, eliminating thus the need for manual configuration,” he explained.
Keegan believes automation has now become an essential part of data protection. Without it, organizations that introduce new tools to manage workload will find themselves reliant on hands-on manual skills, which will always be expensive and in short supply. By merging cybersecurity and data protection functions into a single platform, companies can consolidate their operations and improve their IT departments’ ability to meet internal and customer SLAs, he added.
“It’s the only sustainable way for practitioners to manage data long-term. The proliferation of data and workloads in the multi-cloud is not something humans can keep up with,” he said. he declares.
Customers reward backup protection, deduplication and data vaults
A growing number of organizations are already using PowerProtect Data Manager to protect their information. One is Trustmark National Bank, headquartered in Mississippi, which chose Dell’s solution to protect systems and data in a large IT environment consisting of approximately 1,000 virtual machines running on VMware vSphere. Data protection is understandably a top priority for Trustmark, which has more than 2,800 associates in 180 locations and must store sensitive financial information about its customers in five states.
The bank also had to meet recovery time objectives (RTOs) for Tier 1 systems and data that require near real-time recovery, with 24-hour RTOs required for Tier 2 secondary data sets. Additionally, PowerProtect Data Manager’s deduplication features helped Trustmark reduce the footprint of a 250TB backup to 1TB.
Having implemented PowerProtect Data Manager, Trustmark is now considering how PowerProtect Cyber Recovery can help it further protect customer data and meet its regulatory obligations.
Organizations of all sizes face the challenges of protecting and securing their data and workloads. Persistent cyber threats, increasing data volumes, and new types of workloads make managing cybersecurity and data protection increasingly difficult.
This can directly hinder organizations’ ability to move forward more aggressively with their digital transformation goals.
Dell’s cyber-resilient multi-cloud data protection solutions can deliver the simplicity, automation and scalable performance IT teams need to protect any workload across edge, core and multi -cloud; giving organizations the confidence they need to advance their digital transformation initiatives knowing that their most critical data assets are secure, protected and available.
Sponsored by Dell.