There has no doubt been a change in the way we all look at protecting and securing our key data, with robust data protection, enhanced data security plans and increased governance to ensure compliance with ever-increasing regulatory requirements.
However, much of this is concentrated in our datacentre and our central data sets, which although critical, is not all of our data. One of the biggest changes we have seen in recent years in the world of “corporate IT” is the increasingly mobile nature of our daily operations, starting out from getting email to a Blackberry, to today been able to access all of our key business data and applications from pretty much anywhere at any time on a wide range of devices.
This shift of course has a huge impact on where our data lives, it’s no longer just in our datacentre, behind corporate firewalls and security, it lives out on those range of mobile devices, laptops, tablets and smartphones, which brings a set of quite unique challenges.
These challenges are not necessarily easy to fix, how do you ensure you are protecting that data on a wide range of different devices, how do you know where it is and what it contains?
That is the focus of this weeks podcast, as I’m joined by Yadin Porter De Leon of Druva to discuss the challenge of data that lives right on the edge of our network.
We look at the complexity of the problem and why it has too be much more than “backup” and why it’s critical we have full visibility of our data, regardless of where it sits in our business, be that in our datacentre or on a mobile device 1000’s of miles away.
We define what we mean by edge data, look at how it needs to be just as available and accessible as that in our datacentre.
Yadin shares with us how easy it is to suffer from a data breach with edge data, how the loss of a single device can lead to significant breach and all the impact that brings, especially if we don’t know what data may or may not have been on that device!
This leads on to investigating the subject of information management, which is the true goal for many of us, knowing where our data is, what it contains, who has and is accessing it, while ensuring we have it protected and can always find it, regardless of whether our end device is accessible or not.
We wrap up our edge data discussion by providing a little bit of listener homework, as we point you in the direction of the kind of questions you should be asking yourself as an organisation, so you can build a data protection policy for all of your data, not just that which is stored in your datacentre.
Yadin gives some great insight to something, which in my opinion, is a challenge that is often not giving the focus that it requires.
You can follow Yadin @porterdeleon on twitter.
Finally, I strongly recommend checking out the excellent In Tech We Trust podcast, where Yadin and the team explore a wide range of IT industry and business topics you can follow them on twitter @InTech_WeTrust or the website at intechwetrustpodcsat.com
Tech Interviews is packing its swimming trunks and heading off on its podcast summer holidays for a few weeks, but worry not, you can find all of our previous episodes here on the techstringy.com website as well as at podcast.techstringy.com and to make sure you don’t miss out on the new shows when we’re back, then why not subscribe in all the usual podcast places.
Have a great summer and thanks for listening.