Subscribe

Cyberattacks continue to threaten data

By Suzanne Franco, Surveys Editorial Project Manager at ITWeb.
Johannesburg, 30 Jan 2018
Protect data wherever it resides.
Protect data wherever it resides.

Adequate protection is needed wherever data resides within an organisation and applies to all areas across the business.

There are compliance requirements around data protection that business must be cognisant of around capturing, processing and storing.

On this note, ITWeb and Puleng Technologies, in partnership with Dell EMC, is conducting an online Data Protection Survey during January to understand the data protection strategies within South African organisations.

"As the ICT landscape and the datacentre transform, and with new regulations such as PoPI being more relevant than ever, this survey's objective is to monitor the maturity and readiness of the local data protection market against these changes," says Mark Baatjies, Executive Account Manager at Puleng Technolgies.

Can you guarantee recovery of a critical system?

Baatjies says the reality is that ICT budgets are flat, at best, and shrinking in general.

"The ability to consolidate and manage integration between data protection and other layers of IT, and having global visibility of the entire data protection estate and KPIs, is invaluable in the new reality of digital transformation," he says.

"Considering that business is innovating and bringing new services to the market faster than ever before through agile methodologies, a simplified and modernised data protection strategy enables the business to adopt new applications and move to the cloud (or beyond) knowing that its data is secure and recoverable."

Maximise backup solutions

"Business should strive for higher than 95% backup success rate."

According to Baatjies, backup solutions are expensive (relatively speaking), so he advises that maximising on their output is imperative.

"Data protection costs can be managed better by having a central repository, single vendor strategy, integrated appliances (pre-built, pre-configured), and cloud tiering for Long Term Retention (LTR)," he says.

He adds that it is also beneficial to use products that can be deployed everywhere, i.e., on-premise, in the cloud, etc.

Protection required wherever data resides

"Protect any workload wherever it resides, i.e., mobile, edge, datacentre, cloud. With the proliferation of security breaches such as ransomware, recovery of a critical system must be guaranteed," Baatjies concludes.

Complete the survey here and you can win a Dell EMC UltraSharp 34" Curved Monitor

Share