Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Roger Strukhoff

Related Topics: @CloudExpo, Microservices Expo

@CloudExpo: Article

Managing Data in the Cloud By @Tarmin101 | @CloudExpo [#Cloud]

Organizations are considering the options available to transition from storage environments into public, private & hybrid clouds

A Data-Centric Approach to Managing Data in the Cloud

Thinking about venturing into the cloud? Where would you start? What you should absolutely not do is approach your transition to the cloud the same way you planned your traditional storage. You should start with understanding the value of your data; take a ‘data centric' approach.

With the promise of improving business efficiencies and reducing overall storage costs, organizations are considering the many options available to transition from traditional storage environments into public, private and hybrid clouds. While bring your own device (BYOD) and mobility initiatives through cloud services continue to rise, modern organizations need to manage costs and provide secure data access to the right person at the right time to satisfy geographically dispersed workforces and improve business agility.

Rather than starting with storage and then defining how your data needs to fit, start with data, and then define what the storage needs to look like based on that data. Using this modern approach, which is embodied by data defined storage solutions, is a great way to plan your transition to the cloud, as it encourages your organization to better prioritize - re-thinking data requirements first and then creating a storage infrastructure based on the data.

Private or Hybrid - the Value of Data
The value of data changes over the course of its lifecycle. The following descriptions provide a simplified view of two types of data:

Active data needs to be quickly accessed and is generally frequently used for collaboration throughout the enterprise.

Data that is infrequently or rarely accessed still necessitates secure retention and protection due to internal or external governance regulations and compliance.

By taking a data centric approach, an organization can create unified pools of storage based on the value of data. Active storage pools might reside on-premise through a private cloud, while most or all of the inactive data can be pushed to public cloud storage; this results in the creation of hybrid solutions, which are both cost-effective and efficient. Multiple storage pools could be created, which are based on performance, protection and frequency of data access.

To further reduce TCO, data centric solutions can provide intelligent pool-to-pool tiering based on the value of data over its lifecycle, and distributed object deduplication and compression - reducing capacity requirements within virtualized storage pools. The beauty of a data centric approach is that, no matter how many different storage pools are created, all data repositories can be unified into globally distributed data stores - whether on premise or in the cloud - and are exposed through a single global namespace for easy access and collaboration.

Data Accessibility
When an organization is considering a cloud storage option, it needs to ensure seamless access to existing data. It is important to keep in mind that most vendors support one or more compatible APIs for cloud provisioning and integration with existing applications, but this does not provide access to data that already exists on file servers or NAS devices. As a result, a file gateway (often obtained by a third party) is typically needed to allow existing file-based workflows to continue to operate. Data capture software may be required to find suitable files and move them to the object store. To ensure relevant files can be found in response to corporate investigations, litigation or regulatory inquiries, a separate e-Discovery solution may need to be added to the stack as well.

Conversely, data centric solutions simplify this convoluted, complex web of systems and meet all of these requirements within a single software application. The multiple access and protocol support breaks down barriers for the growing mobile workforce - easing the journey to the cloud and adding significant value and flexibility for a geographically dispersed organization.

Data Security Strategy
As organizations plan their transition to the cloud, data risk concerns can become compounded, which is often cited as the number one concern. CIOs are always accountable for meeting regulatory and compliance mandates related to data retention, which could result in hefty financial penalties, legal litigation or loss of reputation if not properly managed. Also, with the addition of third-party file sharing services, BYOD in the workplace and a growing mobile workforce, they need to minimize the corporate risks associated with these newer initiatives. As employees are given new responsibilities or leave the organization, access privileges need to be reviewed, updated, suspended or removed. How will this be managed when the administration of file sharing groups is no longer within the control of the corporate information technology team?

As more and more employees interact with business information in the cloud through personal devices, organizations must look for comprehensive cloud solutions that facilitate data collaboration, and address the needs for enterprise-wide data security and privacy related to mobility across storage, servers and smart devices.

Selecting a data centric approach allows organizations to integrate their cloud environments with their existing security models to deliver identity-centric compliance and data security, even across the native ‘sync-n-share' feature. Sync-n-share allows enterprise-scale file sharing and collaboration for all mobile users. Individual user and team accounts can be created for secure access from anywhere and any device.

Through this integration, all data access can be authenticated, audited and monitored via a transparent data security solution that leverages existing organizational policies. It provides end-to-end data protection, both inside and outside of the data center, including managing unauthorized access and inadvertent or malicious modification or deletion across all storage, servers, infrastructures and smart devices, transparently and non-disruptively to end user workflow. By deploying technologies that seamlessly integrate with enterprise-wide security models set by the organization's own IT administrator, CIOs can rest assured that their internal policies will remain intact even if their data resides in the cloud.

By using data defined storage solutions, which employ a data centric approach to managing data in the cloud, organizations can create more comprehensive, flexible cloud storage solutions that will help reduce costs, meet compliance mandates and support worry-free data accessibility and security.

More Stories By Shahbaz Ali

Shahbaz Ali is the President and Chief Executive Officer of Tarmin, a leading global provider of data defined storage solutions for enterprise infrastructure, storage and data management. A seasoned entrepreneur with a history of successful ventures, he has more than 20 years' experience creating world-class software driven solutions for enterprise clients. Ali holds a BSC (Hons) in Software Engineering from London Southbank University and has completed a PhD course of study in Software Requirements Engineering from the prestigious Open University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
The precious oil is extracted from the seeds of prickly pear cactus plant. After taking out the seeds from the fruits, they are adequately dried and then cold pressed to obtain the oil. Indeed, the prickly seed oil is quite expensive. Well, that is understandable when you consider the fact that the seeds are really tiny and each seed contain only about 5% of oil in it at most, plus the seeds are usually handpicked from the fruits. This means it will take tons of these seeds to produce just one bottle of the oil for commercial purpose. But from its medical properties to its culinary importance, skin lightening, moisturizing, and protection abilities, down to its extraordinary hair care properties, prickly seed oil has got lots of excellent rewards for anyone who pays the price.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.