Friday, February 27, 2015

5 Topmost Data Protection Trends In 2015

 Due to the recent high-profile hacks across the world, data protection is the buzzword in the technology industry. In the data center level, there are three main data protection domains which will be in highest focus throughout 2015 – data loss prevention (DLP), storage system recovery and data security. Let's take a look at the major data protection trends in all these domains and beyond them too:
Hacking, cyber security, data protection, data protection trends,  data protection trends in 2015, data center,  data loss prevention (DLP), storage system recovery, data security, Big Data, surveillance community, drones


1. Data Loss Prevention: 

Data loss prevention means protecting data from getting lost. Cloud is a vital option in this architecture which is chiefly dependent on backup and recovery services. Cloud has grown a lot from early times when backup vendors used new code to backup applications and the cloud was being treated as just another target by the cyber criminals.

Backup and recovery trends: The speed of backup, rapid recovery and application optimisation are important components on a whole. Performance improvements have also made cloud services more powerful and there are several vendors which specialise in protecting and recovering data sets in the cloud.

File syncing and sharing: This facility is not limited to mobile files but mobile data is definitely a strong driving force in developing and managing repositories. Edge data protection mimics mobile content to a central repository for improved control, compliance and faster recovery. Edge protection is an emerging trend in data protection.

Cloud-based data protection: This kind of data protection grows along with IT sector's credibility and enhanced WAN acceleration. Cloud backup is a very simple operation and it's quite advanced too to create a virtual data center in the cloud by copying virtual server images and production data. There are several products which are optimised for virtualisation of the cloud.

2. Big Data: 

Big Data is growing more important in context of personalisation of advertising which is expected to expand further in 2015. Big Data allows availability of a wider range of data collected across smartphones, apps, social networking and connected devices for targeted advertising campaigns. Though Big Data developments can be highly beneficial to the society, there is also necessity to minimise the risks associated with the use of Big Data. There are certain cautions which need to be taken to use Big Data like limiting collection and retention of data, maintaining transparency, carrying out privacy impact assessments etc.

3. Surveillance society: 

Evolution of CCTV surveillance includes new and more intrusive tools. Some of the tools are Automatic Number Plate Recognition (ANPR), body worn video (BWV) and unmanned aerial systems (UAS). Special observation is being conducted into civilian use of drones as specific licensing or registration need to be introduced and data protection laws need to change urgently.

4. Storage system recovery: 

Data storage needs to be protected at the best and it's one more important data protection trend in 2015. The newer RAID architectures take advantage of flash's high performance and they avoid standard RAID overhead and wear on SSDs. There are RAID alternatives like XtremlO Data Protection which uses wide striping and N+2 architecture. There is another alternatives called Pure Storage and Violin Memory.

5. Data security: 

For consumer-level security the biggest concerns are privacy issues and identity theft. These issues are categorised under data center security. Stored data is always increasing and security measures are always finding threats from hackers. The recent Sony hack brought careless password usage into the limelight which is actually a common problem among the user community. Hence two-factor authentication is a growing trend now. The main technique is to check passwords against IP addresses and the most secure options are when a combination is created of password with physical objects and biometrics. Encryption trends are also on continuous growth which mostly occur around stronger data-at-rest encryption in the cloud as well as on the premise. The two-factor encryption keys are mostly recommended. Encryption control is also getting automated which means human intervention will no more be required in this architecture. 

No comments:

Post a Comment