Data Protection and Privacy: 12 Ways to Protect User Data

文章推薦指數: 80 %
投票人數:10人

Another important distinction between privacy and protection is who is typically in control. For privacy, users can often control how much of their data is ... 日本語DeutschFrançais Blog Partners Events News Support TryNow Products› ←Back CloudianProducts  HyperStoreObjectStorage HyperFileNASStorage HyperIQObservability&Analytics HyperCareManagedService HyperBalanceLoadBalancer ProductSpecifications TheObjectStorage Buyer’sGuide Technical/financialbenefits;howtoevaluateforyourenvironment. GetGuide TheObjectStorage Buyer’sGuide Technical/financialbenefits;howtoevaluateforyourenvironment. GetGuide HyperIQObservability&Analytics Watch2-minIntro EvaluatorGroupWebinar SkillsShortage?EasetheStorageManagementBurden. WatchOn-Demand ScalingObjectStoragewithAdaptiveDataManagement GetWhitePaper TheObjectStorage Buyer’sGuide Technical/financialbenefits;howtoevaluateforyourenvironment. GetGuide Solutions› ←Back Solutions  DataProtection DataLakehouse RansomwareProtection Kubernetes FileCollaboration DataStorageSecurity   PublicCloudStorage SovereignPrivateCloud DataLifecycleManagement FileServices Office365Backup CloudianConsumptionModel Industries  FederalGovernment State&LocalGovernment FinancialServices Manufacturing Media&Entertainment Education Healthcare LifeSciences CloudServiceProvider 2021EnterpriseRansomwareVictimsReport Don’tBeaVictim TrendingTopic:On-PremS3forDataAnalytics WatchWebinar Ransomware2021:AConversationwithVeeamCISOGilVega HearHisThoughts HowaPrivateCloudAddressestheKubernetesStorageChallenge FreeWhitePaper HowtoExpandStorageforMicrosoftTeamswithCloudianandStorageMadeEasy Watch3-minVideo DataSecurity&Compliance:3?sEveryCIOShouldAsk AsktheRight??s ObjectStorageTechnicalGuideforMulti-Cloud Free40-pageeGuide 5ThingsEveryMSPShouldKnowAboutSovereignCloud GetFreeeBook TCOReport:NASFileTiering LearnhowobjectstoragecandramaticallyreduceTier1storagecosts GetTCOAnalysis SatelliteApplicationCatapultDeploysCloudianforScalableStorage ReplacesconventionalNAS,saves75% ReadTheirStory On-DemandWebinar Veeam&Cloudian:Office365Backup–It’sEssential WatchNow Blog:HowtoGrowYourStorageandNotYourCAPEXSpend Payasyougrow,startingat1.3cents/GB/month ReadtheBlog WhytheFBICan’tStopCybercrimeandHowYouCan RegisterNow 8ReasonstoChooseCloudianforState&LocalGovernmentData Get8Reasons CloudianHyperStoreSEC17a-4CohassetAssessmentReport ReadtheAssessment HybridCloudforManufacturers LearnMore Tape:DoesItMeasureUp? GetFreeeBook CustomerTestimonial:UniversityofLeicester HearfromMark PublicHealthEngland:ResilientITInfrastructureforanUncertainTime WatchOn-Demand HowtoAccelerateGenomicsDataAnalysisPipelinesby10X HearfromWeka HowMSPsCanBuildProfitableRevenueStreamswithStorageServices GetIDC’sTake Alliances› ←Back TechnologyPartners  AWS Commvault Cribl Greenplum HPE KastenbyVeeam Lenovo Microsoft   RedHat Rubrik Splunk Veeam Veritas Vertica VMware Weka ViewAll> GetScalableStorageOn-PremforAWSOutposts HearfromAWS LockRansomwareOutwithCommvault&Cloudian WatchNow CriblStreamwithCloudianHyperStoreS3DataLake LearnMore WhyObjectStorageisBestforAdvancedAnalyticsAppsinGreenplum ExploreSolution CustomerVideo:NTTCommunications HearfromNTT HowtoStoreKastenBackupstoCloudian WatchDemo Klik.SolutionsDeliversWorld-ClassBackup-as-a-ServicewithLenovo&Cloudian WhyTheyChoseUs ModernizeSQLServerwithS3DataLake FindOutHow HowtoRunCloudianonOpenShiftasaContainer WatchDemo Backup/ArchivetoCloudianwithRubrikNASCloudDirect ExploreSolution Splunk,ClearShark,andCloudiandiscussFederalIndustryStorageTrends WatchNow Ransomware2021:AConversationwithVeeamCISOGilVega HearfromGil ModernizeYourEnterpriseArchiveStoragewithCloudianandVeritas ReadAboutIt UnifiedAnalyticsDataLakePlatformwithVerticaandCloudianHyperStore FindOutHow VMwareCloudProviders:Getstartedincloudstorage,free. GetStarted Weka+Cloudian:High-Performance,Exabyte-ScalableStorageforAI/ML ReadAboutIt Customers› ←Back Customers  FinancialServices Government Healthcare HigherEducation   Manufacturing Media&Entertainment Retail ServiceProviders VideoSurveillance/DigitalEvidence CloudianEnablesLeadingSwissFinancialInstitutiontoRetainandAnalyzeMoreBigData ReadCaseStudy IndonesianFinancialServicesCompanyReplacesNASWithCloudian ReadCaseStudy StateofCaliforniaSelectsStorage-as-a-ServiceOfferingPoweredbyCloudian LearnWhy CloudianProvidesUtahStateAgencieswithRubrik-CompatibleBackupTarget,CutsCostsby75Percent ReadCaseStudy PublicHealthEngland:ResilientITInfrastructureforanUncertainTime WatchOn-Demand AustralianGenomicSequencingLeaderAcceleratesResearchwithCloudian Learnmore SwissEducationNon-ProfitAchievesScaleandFlexibilityofPublicCloudOn-PremwithCloudian GettheDetails UniversityofLeicesterAdoptsCloudianS3CompatibleStorageandCommvaultforBackup ReadCaseStudy LeadingGermanPaperCompanyMeetsGrowingDataBackupNeedswithCloudian ReadCaseStudy VoxMediaAutomatesArchiveProcesstoAccelerateWorkflowby10X LearnMore WGBHBostonBuildsaHybridCloudActiveArchiveWithCloudianHyperStore ReadCaseStudy LargeGermanRetailerConsolidatesPrimaryandSecondaryStoragetoCloudian ReadCaseStudy HowaSovereignCloudProviderSucceedsinCloudStorageServices ViewOn-Demand ITServiceProviderDrivesBusinessGrowthwithCloudian-basedOffering ReadCaseStudy CalcasieuParishSheriffDeploysHybridCloudforDigitalEvidenceData ReadHow MontebelloBusLinesMobileVideoSurveillancewithCloudianObjectStorage ReadCaseStudy Resources› ←Back Resources  CaseStudies Datasheets Demos&Videos On-DemandWebinars Reports SolutionBriefs TCOCalculator Whitepapers StorageGuides  DataBackup&Archive DataLake DataProtection DataSecurity DisasterRecovery HealthDataManagement HybridIT KubernetesStorage RansomwareDataRecovery SplunkArchitecture VMwareStorage ViewAll> RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide Company› ←Back Company  AboutUs Careers LeadershipTeam PressReleases   Customers IntheNews Training&Education Awards CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews Blog Partners Events News Support 日本語DeutschFrançais TryNow DataProtectionandPrivacy:12WaystoProtectUserData DataProtectionGuides DataProtectionandPrivacy:12WaystoProtectUserData Thetermsdataprotectionanddataprivacyareoftenusedinterchangeably,butthereisanimportantdifferencebetweenthetwo.Dataprivacydefineswhohasaccesstodata,whiledataprotectionprovidestoolsandpoliciestoactuallyrestrictaccesstothedata.Complianceregulationshelpensurethatuser’sprivacyrequestsarecarriedoutbycompanies,andcompaniesareresponsibletotakemeasurestoprotectprivateuserdata. Dataprotectionandprivacyistypicallyappliedtopersonalhealthinformation(PHI)andpersonallyidentifiableinformation(PII).Itplaysavitalroleinbusinessoperations,development,andfinances.Byprotectingdata,companiescanpreventdatabreaches,damagetoreputation,andcanbettermeetregulatoryrequirements. Dataprotectionsolutionsrelyontechnologiessuchasdatalossprevention(DLP),storagewithbuilt-indataprotection,firewalls,encryption,andendpointprotection.   Inthisarticle: WhatIsDataProtectionPrivacyandWhyIsitImportant? WhatAreDataProtectionPrinciples? WhatIsDataPrivacyandWhyIsitImportant? WhatAreDataProtectionRegulations? DataProtectionvsDataPrivacy 12DataProtectionTechnologiesandPracticestoProtectYourData BestPracticesforEnsuringDataPrivacy InventoryYourData MinimizeDataCollection BeOpenwithYourUsers DataProtectionTrends DataPortability MobileDataProtection Ransomware CopyDataManagement(CDM) DisasterRecoveryasaService DataProtectionandPrivacywithCloudianHyperStore   WhatIsDataProtectionandWhyIsItImportant? Dataprotectionisasetofstrategiesandprocessesyoucanusetosecuretheprivacy,availability,andintegrityofyourdata.Itissometimesalsocalleddatasecurity. Adataprotectionstrategyisvitalforanyorganizationthatcollects,handles,orstoressensitivedata.Asuccessfulstrategycanhelppreventdataloss,theft,orcorruptionandcanhelpminimizedamagecausedintheeventofabreachordisaster. WhatAreDataProtectionPrinciples? Dataprotectionprincipleshelpprotectdataandmakeitavailableunderanycircumstances.Itcoversoperationaldatabackupandbusinesscontinuity/disasterrecovery(BCDR)andinvolvesimplementingaspectsofdatamanagementanddataavailability. Herearekeydatamanagementaspectsrelevanttodataprotection: Dataavailability—ensuringuserscanaccessandusethedatarequiredtoperformbusinessevenwhenthisdataislostordamaged. Datalifecyclemanagement—involvesautomatingthetransmissionofcriticaldatatoofflineandonlinestorage. Informationlifecyclemanagement—involvesthevaluation,cataloging,andprotectionofinformationassetsfromvarioussources,includingfacilityoutagesanddisruptions,applicationandusererrors,machinefailure,andmalwareandvirusattacks. Relatedcontent:Readourguidetodataprotectionprinciples WhatIsDataPrivacyandWhyIsitImportant? Dataprivacyisaguidelineforhowdatashouldbecollectedorhandled,basedonitssensitivityandimportance.Dataprivacyistypicallyappliedtopersonalhealthinformation(PHI)andpersonallyidentifiableinformation(PII).Thisincludesfinancialinformation,medicalrecords,socialsecurityorIDnumbers,names,birthdates,andcontactinformation. Dataprivacyconcernsapplytoallsensitiveinformationthatorganizationshandle,includingthatofcustomers,shareholders,andemployees.Often,thisinformationplaysavitalroleinbusinessoperations,development,andfinances. Dataprivacyhelpsensurethatsensitivedataisonlyaccessibletoapprovedparties.Itpreventscriminalsfrombeingabletomaliciouslyusedataandhelpsensurethatorganizationsmeetregulatoryrequirements. WhatAreDataProtectionRegulations? Dataprotectionregulationsgovernhowcertaindatatypesarecollected,transmitted,andused.Personaldataincludesvarioustypesofinformation,includingnames,photos,emailaddresses,bankaccountdetails,IPaddressesofpersonalcomputers,andbiometricdata. Dataprotectionandprivacyregulationsvarybetweencountries,states,andindustries.Forexample,ChinahascreatedadataprivacylawthatwentintoeffectonJune1,2017,andtheEuropeanUnion’s(EU)GeneralDataProtectionRegulation(GDPR)wentintoeffectduring2018.Non-compliancemayresultinreputationdamagesandmonetaryfines,dependingontheviolationasinstructedbyeachlawandgoverningentity. Compliancewithonesetofregulationsdoesnotguaranteecompliancewithalllaws.Additionally,eachlawcontainsnumerousclausesthatmayapplytoonecasebutnotanother,andallregulationsaresubjecttochanges.Thislevelofcomplexitymakesitdifficulttoimplementcomplianceconsistentlyandappropriately. Learnmoreinourdetailedguidesto: Dataprotectionregulations GDPRdataprotection DataProtectionvsDataPrivacy Althoughbothdataprotectionandprivacyareimportantandthetwooftencometogether,thesetermsdonotrepresentthesamething. Oneaddressespolicies,theothermechanisms Dataprivacyisfocusedondefiningwhohasaccesstodatawhiledataprotectionfocusesonapplyingthoserestrictions.Dataprivacydefinesthepoliciesthatdataprotectiontoolsandprocessesemploy. Creatingdataprivacyguidelinesdoesnotensurethatunauthorizedusersdon’thaveaccess.Likewise,youcanrestrictaccesswithdataprotectionswhilestillleavingsensitivedatavulnerable.Bothareneededtoensurethatdataremainssecure. Userscontrolprivacy,companiesensureprotection Anotherimportantdistinctionbetweenprivacyandprotectioniswhoistypicallyincontrol.Forprivacy,userscanoftencontrolhowmuchoftheirdataissharedandwithwhom.Forprotection,itisuptothecompanieshandlingdatatoensurethatitremainsprivate.Complianceregulationsreflectthisdifferenceandarecreatedtohelpensurethatusers’privacyrequestsareenactedbycompanies. Learnmoreinourdetailedguidesto: Dataprotectionpolicy Dataprotectionstrategy 12DataProtectionTechnologiesandPracticestoProtectYourData Whenitcomestoprotectingyourdata,therearemanystorageandmanagementoptionsyoucanchoosefrom.Solutionscanhelpyourestrictaccess,monitoractivity,andrespondtothreats.Herearesomeofthemostcommonlyusedpracticesandtechnologies: Datadiscovery—afirststepindataprotection,thisinvolvesdiscoveringwhichdatasetsexistintheorganization,whichofthemarebusinesscriticalandwhichcontainssensitivedatathatmightbesubjecttocomplianceregulations. Datalossprevention(DLP)—asetofstrategiesandtoolsthatyoucanusetopreventdatafrombeingstolen,lost,oraccidentallydeleted.Datalosspreventionsolutionsoftenincludeseveraltoolstoprotectagainstandrecoverfromdataloss. Storagewithbuilt-indataprotection—modernstorageequipmentprovidesbuilt-indiskclusteringandredundancy.Forexample,Cloudian’sHyperstoreprovidesupto14ninesofdurability,lowcostenablingstorageoflargevolumesofdata,andfastaccessforminimalRTO/RPO.Learnmoreinourguidetosecuredatastorage. Backup—createscopiesofdataandstoresthemseparately,makingitpossibletorestorethedatalaterincaseoflossormodification.Backupsareacriticalstrategyforensuringbusinesscontinuitywhenoriginaldataislost,destroyed,ordamaged,eitheraccidentallyormaliciously.Learnmoreinourguidetodataavailability. Snapshots—asnapshotissimilartoabackup,butitisacompleteimageofaprotectedsystem,includingdataandsystemfiles.Asnapshotcanbeusedtorestoreanentiresystemtoaspecificpointintime. Replication—atechniqueforcopyingdataonanongoingbasisfromaprotectedsystemtoanotherlocation.Thisprovidesaliving,up-to-datecopyofthedata,allowingnotonlyrecoverybutalsoimmediatefailovertothecopyiftheprimarysystemgoesdown. Firewalls—utilitiesthatenableyoutomonitorandfilternetworktraffic.Youcanusefirewallstoensurethatonlyauthorizedusersareallowedtoaccessortransferdata. Authenticationandauthorization—controlsthathelpyouverifycredentialsandassurethatuserprivilegesareappliedcorrectly.Thesemeasuresaretypicallyusedaspartofanidentityandaccessmanagement(IAM)solutionandincombinationwithrole-basedaccesscontrols(RBAC). Encryption—altersdatacontentaccordingtoanalgorithmthatcanonlybereversedwiththerightencryptionkey.Encryptionprotectsyourdatafromunauthorizedaccessevenifdataisstolenbymakingitunreadable.Learnmoreinguidetodataencryption. Endpointprotection—protectsgatewaystoyournetwork,includingports,routers,andconnecteddevices.Endpointprotectionsoftwaretypicallyenablesyoutomonitoryournetworkperimeterandtofiltertrafficasneeded. Dataerasure—limitsliabilitybydeletingdatathatisnolongerneeded.Thiscanbedoneafterdataisprocessedandanalyzedorperiodicallywhendataisnolongerrelevant.Erasingunnecessarydataisarequirementofmanycomplianceregulations,suchasGDPR.FormoreinformationaboutGDPR,checkoutourguide:GDPRDataProtection. Disasterrecovery—asetofpracticesandtechnologiesthatdeterminehowanorganizationdealswithadisaster,suchasacyberattack,naturaldisaster,orlarge-scaleequipmentfailure.Thedisasterrecoveryprocesstypicallyinvolvessettinguparemotedisasterrecoverysitewithcopiesofprotectedsystems,andswitchingoperationstothosesystemsincaseofdisaster.   Relatedcontent:Readourguidetocontinuousdataprotection CriticalBestPracticesforEnsuringDataPrivacy Creatingpoliciesfordataprivacycanbechallengingbutit’snotimpossible.Thefollowingbestpracticescanhelpyouensurethatthepoliciesyoucreateareaseffectiveaspossible. InventoryYourData Partofensuringdataprivacyisunderstandingwhatdatayouhave,howitishandled,andwhereitisstored.Yourpoliciesshoulddefinehowthisinformationiscollectedandactedupon.Forexample,youneedtodefinehowfrequentlydataisscannedforandhowitisclassifiedoncelocated. Yourprivacypoliciesshouldclearlyoutlinewhatprotectionsareneededforyourvariousdataprivacylevels.Policiesshouldalsoincludeprocessesforauditingprotectionstoensurethatsolutionsareappliedcorrectly. Relatedcontent:Readourguidetodataprotectionimpactassessment MinimizeDataCollection Ensurethatyourpoliciesdictatethatonlynecessarydataiscollected.Ifyoucollectmorethanwhatyouneed,youincreaseyourliabilityandcancreateanundueburdenonyoursecurityteams.Minimizingyourdatacollectioncanalsohelpyousaveonbandwidthandstorage. Onewayofachievingthisistouse“verifynotstore”frameworks.Thesesystemsusethird-partydatatoverifyusersandeliminatetheneedtostoreortransferuserdatatoyoursystems. BeOpenwithYourUsers Manyusersareawareofprivacyconcernsandarelikelytoappreciatetransparencywhenitcomestohowyou’reusingandstoringdata.Reflectingthis,GDPRhasmadeuserconsentakeyaspectofdatauseandcollection. Youcanbesuretoincludeusersandtheirconsentinyourprocessesbydesigningprivacyconcernsintoyourinterfaces.Forexample,havingclearusernotificationsoutliningwhendataiscollectedandwhy.Youshouldalsoincludeoptionsforuserstomodifyoropt-outofdatacollection. DataProtectionTrends Herearesomeimportanttrendsdrivingtheevolutionofdataprotection. DataPortabilityandDataSovereignty DataportabilityisanimportantrequirementformanymodernITorganizations.Itmeanstheabilitytomovedatabetweendifferentenvironmentsandsoftwareapplications.Veryoften,dataportabilitymeanstheabilitytomovedatabetweenon-premisesdatacentersandthepubliccloud,andbetweendifferentcloudproviders. Dataportabilityalsohaslegalimplications—whendataisstoredindifferentcountries,itissubjecttodifferentlawsandregulations.Thisisknownasdatasovereignty. Relatedcontent:ReadourguidetoDatasovereignty Traditionally,datawasnotportableanditrequiredhugeeffortstomigratelargedatasetstoanotherenvironment.Clouddatamigrationwasalsoextremelydifficult,intheearlydaysofcloudcomputing.Newtechnicalmethodsaredevelopingtomakemigrationeasier,andthusmakedatamoreportable. Arelatedissueisportabilityofdatawithinclouds.Cloudserviceproviderstendtohaveproprietarydataformats,templates,andstorageengines.Thismakesitdifficulttomovedatafromonecloudtoanother,andcreatesvendorlockin.Increasingly,organizationsarelookingforstandardizedwaysofstoringandmanagingdata,tomakeitportableacrossclouds. Learnmoreinourdetailedguidesabout: Dataprotectioninthecloud Office365dataprotection MobileDataProtection Mobiledeviceprotectionreferstomeasuresdesignedtoprotectsensitiveinformationstoredonlaptops,smartphones,tablets,wearablesandotherportabledevices.Afundamentalaspectofmobiledevicesecurityispreventingunauthorizedusersfromaccessingyourcorporatenetwork.InthemodernITenvironment,thisisacriticalaspectofnetworksecurity. Therearemanymobiledatasecuritytools,designedtoprotectmobiledevicesanddatabyidentifyingthreats,creatingbackups,andpreventingthreatsontheendpointfromreachingthecorporatenetwork.ITstaffusemobiledatasecuritysoftwaretoenablesecuremobileaccesstonetworksandsystems. Commoncapabilitiesofmobiledatasecuritysolutionsinclude: Enforcingcommunicationviasecurechannels Performingstrongidentityverificationtoensuredevicesarenotcompromised Limitingtheuseofthird-partysoftwareandbrowsingtounsafewebsites Encryptingdataonthedevicetoprotectagainstdevicecompromiseandtheft Performregularauditsofendpointstodiscoverthreatsandsecurityissues Monitoringforthreatsonthedevice Settingupsecuregatewaysthatcanallowremotedevicestoconnectsecurelytothenetwork Ransomware Ransomwareisarisingcybersecuritythreat,whichisatopsecuritypriorityforalmostallorganizations.Ransomwareisatypeofmalwarethatencryptsuserdataanddemandsaransominordertoreleaseit.Newtypesofransomwaresendthedatatoattackersbeforeencryptingit,allowingtheattackerstoextorttheorganization,threateningtomakeitssensitiveinformationpublic. Backupsareaneffectivedefenseagainstransomware—ifanorganizationhasarecentcopyofitsdata,itcanrestoreitandregainaccesstothedata.However,ransomwarecanspreadacrossanetworkoveralongperiodoftime,withoutencryptingfilesyet.Atthisstageransomwarecaninfectanyconnectedsystem,includingbackups.Whenransomwarespreadstobackups,itis“gameover”fordataprotectionstrategies,becauseitbecomesimpossibletorestoretheencrypteddata. Therearemultiplestrategiesforpreventingransomwareandinparticular,preventingitfromspreadingtobackups: Thesimpleststrategyistousetheold3-2-1backuprule,keepingthreecopiesofthedataontwostoragemedia,oneofwhichisoffpremises. Securityvendorshaveadvancedtechnologiesthatcandetectransomwareatitsearlystages,orintheworstcase,blockencryptionprocessesastheybegin. Storagevendorsareofferingimmutablestorage,whichensuresthatdatacannotbemodifiedafteritisstored.LearnhowCloudiansecurestoragecanhelpprotectyourbackupsfromransomware. Relatedcontent:Readourguidetoransomwaredatarecovery CopyDataManagement(CDM) Largeorganizationshavemultipledatasetsstoredindifferentlocations,andmanyofthemmayduplicatedatabetweenthem. Duplicatedatacreatesmultipleproblems—itincreasesstoragecosts,createsinconsistenciesandoperationalissues,andcanalsoresultinsecurityandcompliancechallenges.Typically,notallcopiesofthedatawillbesecuredinthesameway.Itisnousesecuringadatasetandensuringitiscompliant,whenthedataisduplicatedinanotherunknownlocation. CDMisatypeofsolutionthatdetectsduplicatedataandhelpsmanageit,comparingsimilardataandallowingadministratorstodeleteunusedcopies. DisasterRecoveryasaService Disasterrecoveryasaservice(DRaaS)isamanagedservicethatgivesanorganizationacloud-basedremotedisasterrecoverysite. Traditionally,settingupasecondarydatacenterwasextremelycomplexandinvolvedmassivecosts,andwasonlyrelevantforlargeenterprises.WithDRaaS,anysizeorganizationcanreplicateitslocalsystemstothecloud,andeasilyrestoreoperationsincaseofadisaster. DRaaSservicesleveragepubliccloudinfrastructure,makingitpossibletostoremultiplecopiesofinfrastructureanddataacrossmultiplegeographicallocations,toincreaseresiliency. DataProtectionandPrivacywithCloudianHyperStore Dataprotectionrequirespowerfulstoragetechnology.Cloudian’sstorageappliancesareeasytodeployanduse,letyoustorePetabyte-scaledataandaccessitinstantly.Cloudiansupportshigh-speedbackupandrestorewithparalleldatatransfer(18TBperhourwriteswith16nodes). Cloudianprovidesdurabilityandavailabilityforyourdata.HyperStorecanbackupandarchiveyourdata,providingyouwithhighlyavailableversionstorestoreintimesofneed. InHyperStore,storageoccursbehindthefirewall,youcanconfiguregeoboundariesfordataaccess,anddefinepoliciesfordatasyncbetweenuserdevices.HyperStoregivesyouthepowerofcloud-basedfilesharinginanon-premisedevice,andthecontroltoprotectyourdatainanycloudenvironment. LearnmoreaboutdataprotectionwithCloudian. LearnMoreAboutDataProtectionandPrivacy Dataprotectionandprivacyisabroadtopic.Asuccessfuldataprotectionprocedurecanpreventdataloss,orcorruptionandreducedamagecausedintheeventofabreach.Dataprivacymethodsensurethatsensitivedataisaccessibleonlytoapprovedparties. There’salotmoretolearnaboutdataprotectionandprivacy.Tocontinueyourresearch,takealookattherestofourblogsonthistopic: KeepingUpwithDataProtectionRegulations Thewidespreadusageofpersonalandsensitivedata,hasraisedthesignificanceofprotectingthisdatafromloss,andcorruption.GlobalauthoritieshavesteppedinwithregulatorycompliancelikeGeneralDataProtectionRegulation(GDPR). TheGDPRemphasizesthepersonaldatarightsofEUresidents,includingtherighttochange,access,erase,ortransfertheirdata.Personaldatareferstoanyinformationthatrelatestoanindividual.Thisincludesnames,physicaltraits,addresses,racialorethniccharacteristics,andbiometricdatalikeDNAandfingerprints. Youcanlearnmoreaboutdataprotectionregulationsinourarticle: KeepingUpwithDataProtectionRegulations   DataAvailability:EnsuringtheContinuedFunctioningofBusinessOperations Businessesrelyondatatodeliverservicesandproductstotheircustomers.Tokeeptheirdataavailableatalltimes,companiesneedtokeeptheITinfrastructureactiveeveninthecaseofadisaster.Thisstateofguaranteedaccesstodataisknownasdataavailability. Thisarticlereviewsthebasicsofdataavailabilityanditschallenges,andofferstechniquestomaintainahighlevelofdataavailability. Readmore:DataAvailability:EnsuringtheContinuedFunctioningofBusinessOperations   HowYouCanMaintainSecureDataStorage Organizationsusuallystoresensitivedataontheircomputers,servers,andonthecloud.Withoutaproperdatasecuritypolicy,sensitiveinformationcanfallintothehandsofattackers,enablingthemtogainaccesstoyournetwork,andexposethepersonalinformationofcustomersandemployees. Thisarticleintroducestheconceptofdatasecurityandthedifferenttoolsandmethodsyoucanusetoprotectyourdataandpreventadisaster. Readmore:HowYouCanMaintainSecureDataStorage   DataEncryption:AnIntroduction Dataencryptionisaprocessofconvertingdataintoencodedinformation,calledciphertext.Theencodedinformationcanonlybedecodedwithauniquedecryptionkey.Youcangeneratethekeyeitheratthetimeofencryptionorbeforehand. Encryptionensurestheintegrityofdatabyprotectingitfromunauthorizedmodification.Encryptionreducestheriskofaccessingdatafromuntrustworthysourcesbyverifyingdata’ssource. Readmore:DataEncryption:AnIntroduction ContinuousDataProtection ContinuousDataProtectionisamethodforbackingupdataeverytimeachangeismade.A continuousdataprotectionsystemmaintainsarecordofalldatachangesandenablesyoutorestoreasystemtoanypreviouspointintime. Thistypeofbackupsolvestheproblemoflosingdatacreatedbetweentwoscheduledbackups.Italsoprovidesprotectionagainstattackslikeransomwareormalware,aswellasaccidentaldeletionofdata. Readmore:ContinuousDataProtection GDPRDataProtection TheGDPRisalegalstandardthatprotectsthepersonaldataofEuropeanUnioncitizens.AnycompanythatprocessesandstorespersonaldataofEUcitizens,evenifitisnotphysicallylocatedintheEU,mustapplytotheGDPRrules. TherearetwomainrolesintheGDPR:theGDPRDataProcessorisanentitythatholdsorprocessesthistypeofdataonbehalfofanotherorganization,andaGDPRDataControllerthatcollectsorprocessespersonaldataforitsownpurposes. Readmore:GDPRDataProtection S3ObjectLock—ProtectingDataforRansomwareThreatsandCompliance AmazonS3ObjectLockstoresobjectsusingawrite-once-read-many(WORM)model.ObjectLockpreventsobjectversiondeletionduringauser-definedretentionperiod.ImmutableS3objectsareprotectedusingobject,orbucket-levelconfigurationofWORMandretentionattributes. Thisfunctionalityprovidesbothdataprotection,includingextraprotectionagainstaccidentalormaliciousdeletionaswellasransomwareandregulatorycompliance. Readmore:S3ObjectLock—ProtectingDataforRansomwareThreatsandCompliance Office365DataProtection.ItisEssential. Thecloud-basedsubscriptionofOffice365enablesemployeestoworkanywhere,anytimewithouttheneedtohosttheirowncontentandemails.However,thesefilesarenotalwaysprotectedfromfailure,disaster,orattack.Organizationscanachievethisbybackingupdatainsecureandreliablestorage,on-premorinthecloud. Readmore:Office365DataProtection.ItisEssential SeeOurAdditionalGuidesonKeyDataProtectionTopics: Wehaveauthoredin-depthguidesonseveralotherdataprotectiontopicsthatcanalsobeusefulasyouexploretheworldofdatabackup.Alsorefertothecompleteguidetodatabreaches. DataBackupGuide Databackupiscriticaltoensureorganizationscanrecoverfromvarioustypesofdatalosses.Learnhowtosuccessfullyimplementdatabackuptechniques. Seetoparticlesinourdatabackupguide: DataArchivesandWhyYouNeedThem BackupCloudStorage:EnsuringBusinessContinuity BackupStorage:CloudvsOn-Premises   EndpointSecurity AuthoredbyCynet Threatactorsoftenleverageendpointstogainunauthorizedaccessandlaunchvariousattacks.Endpointsecurityprovidesthevisibilityneededtodetectandrespondtoendpointthreats. Seetoparticlesinourendpointsecurityguide: CloudEndpointProtection:ProtectingYourWeakestLink EPPSecurity:Prevention,DetectionandResponseatYourFingertips EndpointSecurityVPN:SecuringRemoteAccess   DataClassification AuthoredbySatori Learnhoworganizationsclassifylargescaledatasetsinordertobettersecureandprotecttheirmostsensitiveandvaluabledata.  DataClassification:Compliance,Concepts,and4BestPractices DataClassificationPolicy:Benefits,Examples,andTechniques DataClassificationTypes:Criteria,Levels,Methods,andMore GetStartedWithCloudianToday RequestaDemo Joina30minutedemowithaCloudianexpert. SignUp DownloadaFreeTrial TryCloudianinyourshop.RunonanyVM,evenyourlaptop. TryNow Pricing ReceiveaCloudianquoteandseehowmuchyoucansave. Pricing Pricing  ContactUs 



請為這篇文章評分?