Wednesday,27 November, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

CommVault Predicts an Increased Desire for Endpoint Protection, Analytics and Pressure on IT to Calm the BYOA Storm in 2015

Published Dec 15, 2014

Author: Steven Luong, Endpoint and Applications Expert, CommVault

In a few short weeks, 2015 will be upon is. There’s much to look forward to in the New Year, including a desire for endpoint protection that goes above and beyond protection inside your organization’s four walls, an increased emphasis on analytics and pressure to calm the growing BYOA storm.

Here is a look at three predictions we have for 2015:

1. Sophisticated security breaches will increasingly target laptops and mobile devices as points of attack, driving the need for advanced security and data loss prevention techniques.

Technologies that offer advanced data protection, access and search capabilities while addressing challenges associated with compliance, eDiscovery and information governance will be paramount in 2015. These technologies and features help increase end-user productivity by providing unparalleled access to protected content that users can search, sync and share without compromising security. In 2015, it will be commonplace for enterprises to demand solutions that allow pertinent data to be wiped remotely should a corporate device wind up lost or stolen, helping ensure the data housed on the device is secure no matter where the physical device ends up.

For example, a physician’s laptop and cell phone that contained data on roughly 1,000 patients was recently stolen in an armed robbery. Ensuring the patient data was backed up and remote wipe capabilities that could erase pertinent information from the stolen systems was enabled would have been a benefit, but hindsight is 20/20.

2. Analytics and reporting will grow in importance.
As companies look to fully realize the value of all the efforts they put into their data management strategies, analytics and reporting will have an increased importance. As such, people will become much more strategic in their data management efforts, focusing on deciding what types of data to store where and for how long to keep it.

In short, analytics play a key role in making informed decisions to help achieve operational excellence. Analytics can help shine a light on several aspects of the data management lifecycle, including:

Dark data: Unstructured data growth has forced IT leaders to rethink their data management strategies. The “dark data” you’re paying to store, protect and manage isn’t always being efficiently utilized to improve the value of your business, but analytics can help. By using analytics to determine what critical data may be just out of view, you’ll be able to optimize your capacity management, search more efficiently and eliminate personal storage files.
Archiving: Moving data from primary to secondary storage helps optimize storage space while enabling you to retain and find relevant data – but how do you decide what data moves, what gets archived and what gets deleted? Analytics can help you determine what data should be kept, where and for how long.

3. There will be continued pressure on IT to calm the Bring Your Own Application storm.

The widespread adoption of consumer applications brings many benefits to users in their personal lives. Users often want to have the same ease of use and productivity benefits in their professional lives, and as such, are bringing some applications into the workplace (i.e. Dropbox for file sharing, Evernote for productivity, etc.). Enterprises must now find a way to monitor and manage the growing number of apps in order to control costs, mitigate risk and ensure privacy.

While the proliferation of apps in the workplace can be convenient at times, in 2015, enterprises must find ways to protect and secure the data, including:

Offering user-friendly IT sanctioned alternatives to unsecure applications;
Consolidating and backing up data regardless of where it came from; and,
Providing self-service access to protected data.

Gartner predicts that by 2017, more than 268 billion mobile apps will be downloaded worldwide. Due to the proliferation of apps in the workplace, adopting best practices and appropriate software in 2015 to monitor and manage these apps is a must for most businesses.

In 2015, we predict that all eyes will be on endpoint protection, analytics and keeping BYOA under control.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks