“The right data, at the right level, with the right people and the right use is very critical” – CRN
The recently launched Global Data Protection Index 2021 by Dell Technologies reveals that enterprises face several data protection challenges driven by the constant threat of ransomware and the consumption of emerging technologies, such as cloud native applications, Kubernetes containers and more. ‘artificial intelligence. It also highlights how organizations around the world are grappling with continued data growth and the heightened complexities of data protection. Mr. Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India, shares his perspective with CRN India:
- Please elaborate on the current data protection landscape in India?
Companies found themselves insufficiently equipped to handle large volumes of data, especially with different work models. The attack zone has now moved beyond the setting. Securities and vulnerabilities arise from anywhere. Currently, people are accessing corporate applications from their homes, from VPNs, and even from remote locations resulting in multiple exposures that must be addressed by an organization.
Businesses in India and globally face threats from external factors, especially cybercriminals who attack in various formats; they attack in groups, form consortia, and linger over your data center. The threat landscape has changed over the past 18 months. India has experienced a threefold increase in cyber incidents, to nearly 1.15 million according to the CERT India report. This shows that many of these threats come from external factors. Therefore, organizations need to take care of their data, manage security and data exchange between organizations, and pursue digital initiatives to deliver real value to their customers. As a result, India’s IT landscape has changed dramatically over the past 12 months to cope with these new threats.
- What are the main findings of the 2021 Global Data Protection Index?
Indian results of the 2021 Global Data Protection Index (GDPI) survey provide insight into the current security landscape, the threats facing businesses in India and the confidence of business leaders in the security of their data .
-We found that 66% of respondents in India (Global: 62%, APJ: 68%) are concerned that their existing data protection measures are not sufficient to deal with malware and ransomware threats, while 74% (Global: 74%, APJ: 72%) agree that they are increasingly exposed to data loss from cyber threats with the growth in the number of employees working from home
- 42% of respondents in India (world: 67%, APJ: 67%), are not convinced that all of their critical data can be recovered in the event of a destructive cyberattack or data loss
- 70% of respondents in India (world: 63%, APJ: 64%) believe that emerging technologies, such as cloud native applications, Kubernetes containers, artificial intelligence and machine learning, pose a risk to the data protection and lack of data protection. solutions for new technologies was one of the top three data protection challenges for organizations
- On average, globally, the cost of data loss in the past 12 months is almost four times higher for organizations using multiple data protection vendors compared to those using a single-vendor approach. This means that the value of the data itself has quadrupled, underscoring how essential it is for organizations to protect their data as it will be able to bounce back from a cyber attack, recover the crown jewels and maintain the activity. living. These are the few key findings of our report in the context of data security and protection.
- How well are companies handling incremental data growth?
Businesses are careful to manage data growth with the right architecture and technology. From the point of view of data deduplication, efficient technology has been introduced to reduce the amount of data by storing and eliminating the storage of similar data again. Also, not all data created is the same, so it is important to categorize the data. Companies need to have different Service Level Agreements (SLAs) to protect data from a sensitivity perspective. In this context, companies are building the right layers of infrastructure to ensure that their data remains protected, well stored, and accessible in real time.
They can also analyze data and gain actionable insights to make critical business decisions. The right data, at the right level, with the right people and the right uses, is essential. Businesses are preparing to manage and capitalize on this new wave of the data age. They see data as their âsecret sauceâ for growth. Being able to transform actionable insights from data can lead to new levels of differentiation to better serve their customers.
Overall, when it comes to managing data growth, organizations look for efficient architectures, appropriate levels of SLAs, the right access to technology, and intelligent management.
- How can a business benefit from adopting an access service approach today?
According to the report, 54% of businesses in India believe they are much more likely to seek out a vendor, who offers multiple offerings as a service, than to seek out multiple vendors to help them build robust IT. This means that organizations want to deal with fewer partners as it lowers their risk and gives them the ease of dealing with a single vendor to manage more services. In this context, it is important to note that most of these organizations have found that they should outsource their work to experts who can deliver results to them rather than learning the technology and handling a new form of material or equipment. software by themselves. Many organizations are considering an âoffer as a serviceâ for computing, networking, storage and backup. We also observed that they are looking at Dell Technologies’ offering of Infrastructure as a Service, as our services consume technology much more efficiently. Therefore, companies that can offer multiple offerings as a service model will certainly be more successful.
- Can you give other examples or cite a few case studies for our readers?
We’ve seen companies in industry verticals like BFSI, manufacturing, retail, and healthcare come under additional regulatory standards that affect data protection. There is a need for a precise technology to consume, store and protect their storage from the first instance of the development of their application. Safety is intrinsic; our security philosophy is that âsecurity must be built inâ. At Dell Technologies, we make sure we adhere to all the appropriate protocols to ensure data security. From secure development of the product lifecycle to delivering products with the highest level of security in-flight or at rest, between clouds, on-premises, off-premises, hybrids, and more.
I believe that the two dimensions of security are processes and people. Companies are increasingly aware of managing data with good governance so that there is no compromise. After all, you might have the right technology, but without the right processor or the right people to manage, you can run into problems. Therefore, adopting the best practice is as important as working with the IT and security teams. Also make sure your organization is properly qualified.
From a cybersecurity perspective, it’s essential to develop technology standards that can help you get out of a cyberattack in no time. Therefore, in India, we have seen companies invest more and more in security and deploy new services without fear.
- Finally, do you want to share a special message for our readers?
Keeping it simple, we need to be aware of our roles and responsibilities. The impact of any attack is much higher than the ransom. Everyone is responsible, not just the IT team. We need to ensure that the data transaction between entities is secure and that the people controlling the data are authorized. Hence, one has to be very careful about how they handle and process data.
In due course, technology will play an important role, and with that, there is a need for awareness to manage technology and processes.
If you have an interesting article / experience / case study to share, please contact us at [emailÂ protected]