The manager: High inflation paves the way for profit lifting


This is how companies should act to prevent data loss

Published: 6 September 2022, 10:03 Updated: 12 September 2022, 09:55Data is binary. This also applies to the issue of unauthorized intrusion into one’s IT environment. Either you have already been exposed to it – or you will be. That is the principle you have to work and act according to. According to many profiles in IT security, this is an accepted truth, which by extension raises business-critical questions: how do you keep your data, which drives your business to grow, both secure and accessible? It is easy to perceive data storage solutions as a fairly self-contained solution in an IT environment – ​​a box with a disk that itself handles data protection in a secure manner. In fact, modern IT solutions consist of a multitude of layers with dependencies that start all the way out at the point where you expose your service to your customers and end at the very storage solution where the data is stored. – Having your company’s service available quickly and easily, around the clock, is usually a necessity – if you don’t keep up, customers will choose someone else. That kind of availability, however, requires access to the information for the service to have several layers of security, availability and recovery solutions in order to function, with a clear strategy for handling incidents, says Mikael Edwardsson, Enterprise Architect at HPE. Mikael explains that one of the most important measures companies can take is to carry out analyzes of various risk scenarios that can happen in their particular environment, in order to design ready-made routines that employees can follow. – A secure architecture, based on a Zero Trust principle, is only the first front line – it does everything to prevent unauthorized access attempts or malicious code from entering. The second is to continuously keep your environment up-to-date so you avoid any vulnerabilities. If something were to get in, the next line of defense would actually be the human factor, employees who can detect that something is not right with the help of, for example, their tools. Should the threat get past even this and actually execute, then it is instead about how to prevent further spread, clean up and recover as quickly and controlled as possible. Manual and automatic recovery processes So how do you do it? Based on continuously tested routines, hopefully the answer to the question is in the spine. In an acute situation, it must be clear in which order of priority things need to happen in order to get back to a normal situation as quickly as possible. – A storage architecture needs to offer both availability, security and functions around fast recovery. In some cases, this includes fully automatic restoration of mission-critical services, regardless of the situation. Here, HPE Storage is an incredibly strong fundamental foundation in an IT environment that has these functions built in and included in our storage platforms to easily fit into the total IT environment you have for your business. The supplier has a responsibility However, the technology cannot stand completely on its own two feet. It is important to keep track of all layers in your IT environment to be able to easily get back to normal after an incident. – Practice, practice, practice. How to protect data and how to restore? How do you categorize and prioritize? What are the processes to follow when restoring? Do you have clear operational processes around your entire IT environment? There is superb technology and functionality, but in practice it is no better than the person and process behind it. This does not fall solely on the customer entirely. The supplier has a responsibility here, says Mikael. Keeping up to date with the development of IT systems and hardware and how these should be purchased, traditionally purchased or as a service, is almost impossible for companies that do not have this as their core business. Therefore, suppliers need to ask the right questions and be responsive, to ensure that the customer receives the products that best match their storage solution needs. The supplier must constructively challenge and question for the better. – Not everyone is used to ordering such services or products and sometimes does not know exactly what they really need. By asking questions and making a detailed analysis of what the customer really needs, we as a supplier can offer a solution that may look different than what was initially requested. With the right questions, a request to buy 100 servers for a need can result in a solution with only 1 server in the end, which has happened in a dialogue with a customer. It’s much better for all parties, concludes Mikael. Read more about HPE Storage HPE Storage The article is produced by Brand Studio in collaboration with HPE and not an article by Dagens industri

Click to rate this post!
[Total: 0 Average: 0]
Next Post

Concert of Asian powers in Samarkand. Xi may meet with Putin

The summit will be held on September 15-16 in Samarkand, Uzbekistan. It will be attended, among others, by the leaders of China, Russia, India, Iran, Turkey, Saudi Arabia and the countries of Central Asia. The Shanghai Cooperation Organization (SCO) is an agreement for security and development in the region, established […]
Concert of Asian powers in Samarkand.  Xi may meet with Putin

Subscribe US Now