Crump: Data protection challenges in a mobile world

Crump: Data protection challenges in a mobile world

Date: Apr 08, 2014

When an organization's users can access and manipulate data almost anywhere -- be it at the office, at home or at a local coffee shop -- administrators have their hands full ensuring that data remains safe and secure.

George Crump, president and founder of Storage Switzerland, told an audience at Storage Decisions that data protection challenges such as this are complex and need to be addressed by organizations.

"It's not just a devices issue. We're seeing resistance to enterprises adopting their own file sync and share strategy. … If you don't provide a file sync and share solution, [users] will do their own thing," said Crump. "And there are risks associated with that."

While a number of factors are at play, including the use of mobile devices to access corporate data and the rise of cloud storage and applications, Crump said data protection challenges surrounding the "data center everywhere" situation need to be resolved, such as ensuring responsibility over data kept with a cloud vendor.

"We're seeing people struggle with what to do now: 'My data is in the cloud -- is it their responsibility?'" said Crump, noting that in many cases, cloud storage service-level agreements are "pretty low-bar." Or even with a good SLA, the vendor's hardware may not be up to the customer's needs.

"They're basically, 'If we're not hung-over, and if we have time, we'll probably recover your data, maybe. That's the average SLA. So that's a real big issue," he said.

Crump noted that there is also the logistics of moving data from a cloud provider if necessary. He pointed to the collapse of Nirvanix, which was criticized for not offering enough notice to its customers before leaving the cloud storage market.

"They decided to go out of business and gave everyone about two weeks to get out. That's a lot of data all at once," said Crump.

View the next item in this Essential Guide: Tech Talk: W. Curtis Preston on endpoint backup or view the full guide: Conquer the unique challenges of remote and mobile backups

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: