Welcome!

@CloudExpo Authors: Kevin Benedict, Zakia Bouachraoui, Elizabeth White, Maria C. Horton, Liz McMillan

Related Topics: @CloudExpo, Microservices Expo

@CloudExpo: Article

Managing Data in the Cloud By @Tarmin101 | @CloudExpo [#Cloud]

Organizations are considering the options available to transition from storage environments into public, private & hybrid clouds

A Data-Centric Approach to Managing Data in the Cloud

Thinking about venturing into the cloud? Where would you start? What you should absolutely not do is approach your transition to the cloud the same way you planned your traditional storage. You should start with understanding the value of your data; take a ‘data centric' approach.

With the promise of improving business efficiencies and reducing overall storage costs, organizations are considering the many options available to transition from traditional storage environments into public, private and hybrid clouds. While bring your own device (BYOD) and mobility initiatives through cloud services continue to rise, modern organizations need to manage costs and provide secure data access to the right person at the right time to satisfy geographically dispersed workforces and improve business agility.

Rather than starting with storage and then defining how your data needs to fit, start with data, and then define what the storage needs to look like based on that data. Using this modern approach, which is embodied by data defined storage solutions, is a great way to plan your transition to the cloud, as it encourages your organization to better prioritize - re-thinking data requirements first and then creating a storage infrastructure based on the data.

Private or Hybrid - the Value of Data
The value of data changes over the course of its lifecycle. The following descriptions provide a simplified view of two types of data:

Active data needs to be quickly accessed and is generally frequently used for collaboration throughout the enterprise.

Data that is infrequently or rarely accessed still necessitates secure retention and protection due to internal or external governance regulations and compliance.

By taking a data centric approach, an organization can create unified pools of storage based on the value of data. Active storage pools might reside on-premise through a private cloud, while most or all of the inactive data can be pushed to public cloud storage; this results in the creation of hybrid solutions, which are both cost-effective and efficient. Multiple storage pools could be created, which are based on performance, protection and frequency of data access.

To further reduce TCO, data centric solutions can provide intelligent pool-to-pool tiering based on the value of data over its lifecycle, and distributed object deduplication and compression - reducing capacity requirements within virtualized storage pools. The beauty of a data centric approach is that, no matter how many different storage pools are created, all data repositories can be unified into globally distributed data stores - whether on premise or in the cloud - and are exposed through a single global namespace for easy access and collaboration.

Data Accessibility
When an organization is considering a cloud storage option, it needs to ensure seamless access to existing data. It is important to keep in mind that most vendors support one or more compatible APIs for cloud provisioning and integration with existing applications, but this does not provide access to data that already exists on file servers or NAS devices. As a result, a file gateway (often obtained by a third party) is typically needed to allow existing file-based workflows to continue to operate. Data capture software may be required to find suitable files and move them to the object store. To ensure relevant files can be found in response to corporate investigations, litigation or regulatory inquiries, a separate e-Discovery solution may need to be added to the stack as well.

Conversely, data centric solutions simplify this convoluted, complex web of systems and meet all of these requirements within a single software application. The multiple access and protocol support breaks down barriers for the growing mobile workforce - easing the journey to the cloud and adding significant value and flexibility for a geographically dispersed organization.

Data Security Strategy
As organizations plan their transition to the cloud, data risk concerns can become compounded, which is often cited as the number one concern. CIOs are always accountable for meeting regulatory and compliance mandates related to data retention, which could result in hefty financial penalties, legal litigation or loss of reputation if not properly managed. Also, with the addition of third-party file sharing services, BYOD in the workplace and a growing mobile workforce, they need to minimize the corporate risks associated with these newer initiatives. As employees are given new responsibilities or leave the organization, access privileges need to be reviewed, updated, suspended or removed. How will this be managed when the administration of file sharing groups is no longer within the control of the corporate information technology team?

As more and more employees interact with business information in the cloud through personal devices, organizations must look for comprehensive cloud solutions that facilitate data collaboration, and address the needs for enterprise-wide data security and privacy related to mobility across storage, servers and smart devices.

Selecting a data centric approach allows organizations to integrate their cloud environments with their existing security models to deliver identity-centric compliance and data security, even across the native ‘sync-n-share' feature. Sync-n-share allows enterprise-scale file sharing and collaboration for all mobile users. Individual user and team accounts can be created for secure access from anywhere and any device.

Through this integration, all data access can be authenticated, audited and monitored via a transparent data security solution that leverages existing organizational policies. It provides end-to-end data protection, both inside and outside of the data center, including managing unauthorized access and inadvertent or malicious modification or deletion across all storage, servers, infrastructures and smart devices, transparently and non-disruptively to end user workflow. By deploying technologies that seamlessly integrate with enterprise-wide security models set by the organization's own IT administrator, CIOs can rest assured that their internal policies will remain intact even if their data resides in the cloud.

By using data defined storage solutions, which employ a data centric approach to managing data in the cloud, organizations can create more comprehensive, flexible cloud storage solutions that will help reduce costs, meet compliance mandates and support worry-free data accessibility and security.

More Stories By Shahbaz Ali

Shahbaz Ali is the President and Chief Executive Officer of Tarmin, a leading global provider of data defined storage solutions for enterprise infrastructure, storage and data management. A seasoned entrepreneur with a history of successful ventures, he has more than 20 years' experience creating world-class software driven solutions for enterprise clients. Ali holds a BSC (Hons) in Software Engineering from London Southbank University and has completed a PhD course of study in Software Requirements Engineering from the prestigious Open University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in multiple vertical markets. Our delegate profiles can be located in our show prospectus.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform eliminates the need to build an in-house platform or developing any specialized compute distribution capabilities. The platform significantly simplifies the deployment of containerized apps anywhere. Organizations can now achieve their desired levels of reliability, availability and performance with any combination of public cloud environments through a developer-friendly SaaS offering. From deploying ...
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secures more than 4,000 modern applications for its Enterprise customers around the world.