bigdata-shallow

IT Innovators: Developing a Data Exit Strategy—What’s Your Next Move in the Cloud?

IT Innovators: Developing a Data Exit Strategy—What’s Your Next Move in the Cloud?

Cloud entry strategy has been top of mind in IT organizations for years. Now that the industry has reached a level of maturity—with multiple players and offerings—the need for an exit strategy has emerged. Fredrik Forslund is the director of cloud and data center erasure solutions at Blancco Technology Group, which provides thousands of organizations with secure data erasure solutions. He recently sat down for a Q&A with IT Innovators to discuss the importance of plotting your exit before entering the cloud; a topic he will elaborate on at the upcoming Data Storage Innovation Conference in June.

The most common event is simply that you have increased competition in the market and you want to change your service provider because you feel that you can get a better offering somewhere else. Another event is structural changes. For example, you might be acquiring companies or you might be acquired or divesting part of your company. And then there are geographical concerns. Specific nations might have legislation in place that says certain data cannot leave geographical boundaries, and if something changes in that sense, overnight or over a transition period, you might be forced to exit one cloud service provider and move to another in a different geographic location. I think we’re going to see more of that going forward.

Read Also:
Cloudera Partners with Docker, Inc. to Provide the First Commercially-Supported Secure Containers

What are the risks associated with moving data?

First of all, you need to make sure that the actual transmission of data is done in a secure way, usually some form of encryption is used for that transmission. When you have confirmed that data is securely operational in the new location, you must remember to take care of your previous location. That’s where data erasure often comes in as a mandatory requirement. Today, you have specific known malware that can penetrate networks and get access to different hosting environments. As an attack, the malware will start recovering previously left behind data that has just been deleted, which is not the same thing as securely erased.

You’ll find a number of different maturity levels when it comes to providers. Some providers design their infrastructure, their architecture, everything, with security as their number one priority. Other providers might be giving priority to the lowest possible price—they might have some level of security, but compared to others, they might have big differences. So you need to understand what you are after when you are looking for your preferred cloud service provider.

Read Also:
How Big Data Is Improving Health, Security, and Saving Money for Agencies

How can risks be managed?

It comes down to traditional management procedures.

 



Chief Analytics Officer Europe

25
Apr
2017
Chief Analytics Officer Europe

15% off with code 7WDCAO17

Read Also:
IBM Watson, FDA to explore blockchain for secure patient data exchange

Chief Analytics Officer Spring 2017

2
May
2017
Chief Analytics Officer Spring 2017

15% off with code MP15

Read Also:
Stepping Up Security for an Internet-of-Things World

Big Data and Analytics for Healthcare Philadelphia

17
May
2017
Big Data and Analytics for Healthcare Philadelphia

$200 off with code DATA200

Read Also:
What's the key to big data and AI being successful?

SMX London

23
May
2017
SMX London

10% off with code 7WDATASMX

Read Also:
How Big Data Is Improving Health, Security, and Saving Money for Agencies

Data Science Congress 2017

5
Jun
2017
Data Science Congress 2017

20% off with code 7wdata_DSC2017

Read Also:
Managing data across Agile, DevOps and IT Service Management

Leave a Reply

Your email address will not be published. Required fields are marked *