Top Data Storage Security Trends in 2022

Whether data is stored on-premises or in the cloud, it must be safeguarded. Those storage resources contain the organizational crown jewels — the data, intellectual property, and customer records that are the lifeblood of the business. Storage security, therefore, is a vital and ongoing concern. 

Here are some of the top trends in storage security:  

1. Blended Storage 

Blended storage is not only more common — it is becoming the norm. 

“With hybrid cloud becoming the de facto mode of operation for most enterprises today, IT infrastructure teams are challenged with the task of ensuring security for these blended storage environments,” said Steve Pruchniewski, director of product marketing at Komprise.

“IT pros need to understand how to secure not just NAS and SAN storage, but also objects, such as Amazon S3 and Azure Blob, and they must consider how these technologies interact.” 

With Azure, for example, a company could tier files to Azure Blob and then enable NFS access to that storage in the cloud. It is important for companies to be aware that with new ways to access data, storage security must be broadened. Those migrating file data to object storage also need to ensure they are configuring permissions correctly — often the security entities, or users and groups, may not line up one for one from on-premises Active Directory to the security entities in the cloud, said Pruchniewski. 

2. Edge Storage 

A major trend in storage security involves data at the edge. Many companies need to analyze customer data at their edge sites instead of sending it to the cloud.

Additionally, there are over 50 billion Internet of Things (IoT) devices in circulation. This all means there is more data at the edge than anywhere else. With this increase in data, companies must find solutions to keep and protect it. 

“Edge data can be particularly at risk, due to physical security limitations at these smaller sites and because encrypting data can be expensive and difficult to manage,” said Bruce Kornfeld, chief marketing and product officer at StorMagic.

“Implementing encryption on all storage devices and applications at the edge and utilizing centralized key management solutions are essential to addressing these challenges, as edge computing is the future of data processing.” 

3. SaaS Security 

It can be the Wild West out there. No matter how IT tries to stay in control, developers and line of business heads might have downloaded software-as-a-service (SaaS) applications. 

“SaaS acquisition is becoming more decentralized, and companies drastically underestimate the number of SaaS applications being used by employees,” said Lior Yaari, co-founder and CEO of Grip Security

It can be very hard to prevent employees taking advantage of SaaS to get their job done. This means a company’s SaaS acquisition and consumption policies need to take into account the employees who will purchase and use both sanctioned and unsanctioned SaaS applications. 

SaleBestseller No. 1
Acer Aspire 3 A315-24P-R7VH Slim Laptop | 15.6" Full HD IPS Display | AMD Ryzen 3 7320U Quad-Core Processor | AMD Radeon Graphics | 8GB LPDDR5 | 128GB NVMe SSD | Wi-Fi 6 | Windows 11 Home in S Mode
  • Purposeful Design: Travel with ease and look great...
  • Ready-to-Go Performance: The Aspire 3 is...
  • Visibly Stunning: Experience sharp details and...
  • Internal Specifications: 8GB LPDDR5 Onboard...
  • The HD front-facing camera uses Acer’s TNR...
Bestseller No. 2
HP Newest 14" Ultral Light Laptop for Students and Business, Intel Quad-Core N4120, 8GB RAM, 192GB Storage(64GB eMMC+128GB Micro SD), 1 Year Office 365, Webcam, HDMI, WiFi, USB-A&C, Win 11 S
  • 【14" HD Display】14.0-inch diagonal, HD (1366 x...
  • 【Processor & Graphics】Intel Celeron N4120, 4...
  • 【RAM & Storage】8GB high-bandwidth DDR4 Memory...
  • 【Ports】1 x USB 3.1 Type-C ports, 2 x USB 3.1...
  • 【Windows 11 Home in S mode】You may switch to...

Last update on 2024-04-05 / Affiliate links / Images from Amazon Product Advertising API

Because the SaaS universe is always expanding, security teams need a framework that provides continuous monitoring for any new SaaS usage, with the ability to centrally control access for every user and their associated storage. 

4. Kubernetes Storage 

The deployment of Kubernetes is growing rapidly. But the more it is deployed, the more the related security and storage requirements have to be figured out.

For example, CloudStrike cloud security researchers discovered a vulnerability dubbed “cr8escape,” in the Kubernetes container engine CRI-O. And a new Veritas Technologies study revealed that even though many organizations are embracing containerization, businesses are missing the opportunity to deliver rapid protection to these at-risk data sets, by failing to extend data protection from their traditional workloads out across their containerized environments. The study found that only 33% of companies that have deployed Kubernetes so far have the tools in place to protect against data-loss incidents, such as ransomware. 

“Kubernetes is easy for organizations to deploy and quickly improves affordability, flexibility, and scalability — it’s no wonder so many are embracing containerization,” said Anthony Cusimano, solutions evangelist at Veritas.

“But because deployment is so simple, organizations can easily surge ahead faster with their Kubernetes implementation than their Kubernetes protection. Suddenly, they’ve found themselves with two-thirds of their mission-critical Kubernetes environments completely unprotected from data loss. Kubernetes has become the Achilles heel in organizations’ ransomware defense strategies.”

5. Connecting to Storage  

As well as protecting storage at rest, organizations need to provide protection for when it is being transmitted, migrated, uploaded, or downloaded. VPNs can often be a weak point.

Authenticating a user to a network through a VPN to provide access is becoming obsolete as workers work remotely and are not connected to the company network. User expectations are also changing, and they expect to be able to access any application from any device anywhere in the world. Thus, many organizations are replacing them with cloud-based secure web gateways.

New
Naclud Laptops, 15 Inch Laptop, Laptop Computer with 128GB ROM 4GB RAM, Intel N4000 Processor(Up to 2.6GHz), 2.4G/5G WiFi, BT5.0, Type C, USB3.2, Mini-HDMI, 53200mWh Long Battery Life
  • EFFICIENT PERFORMANCE: Equipped with 4GB...
  • Powerful configuration: Equipped with the Intel...
  • LIGHTWEIGHT AND ADVANCED - The slim case weighs...
  • Multifunctional interface: fast connection with...
  • Worry-free customer service: from date of...
New
HP - Victus 15.6" Full HD 144Hz Gaming Laptop - Intel Core i5-13420H - 8GB Memory - NVIDIA GeForce RTX 3050-512GB SSD - Performance Blue (Renewed)
  • Powered by an Intel Core i5 13th Gen 13420H 1.5GHz...
  • Equipped with an NVIDIA GeForce RTX 3050 6GB GDDR6...
  • Includes 8GB of DDR4-3200 RAM for smooth...
  • Features a spacious 512GB Solid State Drive for...
  • Boasts a vibrant 15.6" FHD IPS Micro-Edge...
New
HP EliteBook 850 G8 15.6" FHD Laptop Computer – Intel Core i5-11th Gen. up to 4.40GHz – 16GB DDR4 RAM – 512GB NVMe SSD – USB C – Thunderbolt – Webcam – Windows 11 Pro – 3 Yr Warranty – Notebook PC
  • Processor - Powered by 11 Gen i5-1145G7 Processor...
  • Memory and Storage - Equipped with 16GB of...
  • FHD Display - 15.6 inch (1920 x 1080) FHD display,...
  • FEATURES - Intel Iris Xe Graphics – Audio by...
  • Convenience & Warranty: 2 x Thunderbolt 4 with...

Last update on 2024-04-05 / Affiliate links / Images from Amazon Product Advertising API

“Identity-based access is replacing network-based access, eliminating the need for VPNs in the modern enterprise network,” said Yaari with Grip Security.

“Solving the access problem through identity management is the best approach, especially in the age of the cloud and SaaS.”  

The post Top Data Storage Security Trends in 2022 appeared first on Enterprise Storage Forum.

Original Post>