Security and Compliance Are Everyone’s Business
Imagine you’re a storage administrator in an all-hands meeting, and your executive team wants to discuss the company’s vulnerability to data security breaches. What do you do?
- Tense up. You may be asked to provide solutions to problems you aren’t prepared to tackle.
- Listen and feel engaged. You’re knowledgeable about the topic and can contribute suggestions that the leadership team will appreciate.
- Recline in your chair and let your mind wander. You manage storage, so this conversation shouldn’t concern you anyway.
Storage admins are a valuable ally in every company’s fight for increased security and compliance. In today’s security climate, IT and security teams need to collaborate with and inform one another, using tools that increase visibility into data and security events alike. However, limited resources or the challenges of stitching together disparate tools can create roadblocks and add unnecessary complexity to the process.
From a storage admin’s perspective, in the race to more megabits per second (MBPS) and input/output operations per second (IOPS), no one wins if security is compromised in exchange for faster speeds. Increasing storage performance won’t bring real value to your company if you’re harboring dark data and in turn, exposing personally identifiable information (PII), intellectual property or compliance violations into the public domain. It’s important to remember that faster technology isn’t necessarily more intelligent.
To resolve this disconnect, storage and IT teams need to get proactive about security and compliance. Below are a few ways storage admins can use data-aware technology to empower their colleagues and protect sensitive data:
- Identify where your sensitive data lives – create a virtual map of files containing personally identifiable information, intellectual property, or other confidential data.
- Prevent risk exposure before a file is moved, archived or shared. Ask in regards to every file: Do you really want to move this, or does this file contain sensitive data, or should access to it be limited to a specific audience?
- Locate “lost” files inadvertently or maliciously moved or deleted, and reverse damage caused by human error.
- Promote the understanding that action without thought is a recipe for disaster.
Join a DataGravity demo to learn how data-aware storage can change your approach to IT.1 Like