Data Backup Has Changed to Data Protection
Due to cybersecurity issues, according to Info-Tech Research Group
This is a Press Release edited by StorageNewsletter.com on December 16, 2022 at 2:00 pmData backup is no longer just about operational fallback; it’s also about cybersecurity and data protection.
Cybersecurity issues are increasingly becoming a significant risk to data and IT environments WW, placing stress on IT teams and also business owners concerned about their revenue stream.
As traditional methods of protecting information continuously change to meet emerging challenges, IT research and advisory firm Info-Tech Research Group, Inc. has published a new industry blueprint, Data Backup Moves Closer to Data Protection, to help businesses modernize their data protection strategy for the current and evolving climate.
Cybersecurity features are being included in backup tools to meet challenges, according to Info-Tech’s blueprint. (CNW Group/Info-Tech Research Group)
Backup has traditionally been in the operational domain of IT, while security teams have been responsible for threats to data from malicious attacks. As these attacks have become more sophisticated, backups have come under threat and vendors have had to incorporate new features into their software to address attacks and protect data.
With many backup and recovery companies referring to themselves as data protection platforms and with a list of new terminology and features representing a new paradigm in the backup world, staying on top of the new terms and features is complex. As well, repeated references to data security and data protection compliance make it difficult for IT teams to understand the impacts on the business and data protection strategy.
“There was a time when backing up data required separate premises-based infrastructure to ensure protection from data loss,” says Darryl Levesque, principal research advisor, Info-Tech Research Group. “However, things have changed with modern data centers today. It is time to stop thinking about backup and start thinking about data protection. Newer technologies are making backup redundant.“
Info-Tech’s blueprint explains that understanding where backup stops and data protection starts can be difficult as the products evolve. Although many vendors provide numerous additional product features, it can be challenging for an organization to determine which product is best for their environment or whether there is a need for a combination of products.
The firm recommends that technology leaders keep up and understand the changes in the backup marketplace, considering what the new features can offer in terms of additional functionality. It also stresses the importance of recognizing which of those functions suits the appropriate needs and then comparing the offerings of the different vendors to determine the best fit.
It recommends that the new features offered by backup vendors be used as additional tools in the data protection armory rather than replacements for existing tools such as endpoint protection or effective security practices.
Organizations should consider the following key data protection features:
- CDP: A data protection method that backups information as it changes, without schedules.
- Zero Trust Framework: Works on the principle of least privilege. Providers are leveraging the framework for backup and recovery.
- Air Gapping: Isolates one or several backups through various methods so malicious actors cannot access them.
- DR Orchestration: Provides a facility for automated, sequential recovery of systems after a disaster.
- Threat Prevention and Detection: Detects malware during backups and interrogates existing backups.
- All the Other Cloud: Enables support for Kubernetes, Office 365, Docker, Google Workspace, and others.
- Cloud to Cloud: Copying from one provider to another; often used for SaaS applications.
These new features can help mitigate data loss risk and enable an environment to failover much more efficiently in the event of a disaster. The cloud backup features provide enhanced confidence in the protection of offsite data. In general, the tasks that can be performed are not only enhanced but also expanded.