Data Protection and Privacy: 12 Ways to Protect User Data
文章推薦指數: 80 %
Another important distinction between privacy and protection is who is typically in control. For privacy, users can often control how much of their data is ... 日本語DeutschFrançais Blog Partners Events News Support TryNow Products› ←Back CloudianProducts HyperStoreObjectStorage HyperFileNASStorage HyperIQObservability&Analytics HyperCareManagedService HyperBalanceLoadBalancer ProductSpecifications TheObjectStorage Buyer’sGuide Technical/financialbenefits;howtoevaluateforyourenvironment. GetGuide TheObjectStorage Buyer’sGuide Technical/financialbenefits;howtoevaluateforyourenvironment. GetGuide HyperIQObservability&Analytics Watch2-minIntro EvaluatorGroupWebinar SkillsShortage?EasetheStorageManagementBurden. WatchOn-Demand ScalingObjectStoragewithAdaptiveDataManagement GetWhitePaper TheObjectStorage Buyer’sGuide Technical/financialbenefits;howtoevaluateforyourenvironment. GetGuide Solutions› ←Back Solutions DataProtection DataLakehouse RansomwareProtection Kubernetes FileCollaboration DataStorageSecurity PublicCloudStorage SovereignPrivateCloud DataLifecycleManagement FileServices Office365Backup CloudianConsumptionModel Industries FederalGovernment State&LocalGovernment FinancialServices Manufacturing Media&Entertainment Education Healthcare LifeSciences CloudServiceProvider 2021EnterpriseRansomwareVictimsReport Don’tBeaVictim TrendingTopic:On-PremS3forDataAnalytics WatchWebinar Ransomware2021:AConversationwithVeeamCISOGilVega HearHisThoughts HowaPrivateCloudAddressestheKubernetesStorageChallenge FreeWhitePaper HowtoExpandStorageforMicrosoftTeamswithCloudianandStorageMadeEasy Watch3-minVideo DataSecurity&Compliance:3?sEveryCIOShouldAsk AsktheRight??s ObjectStorageTechnicalGuideforMulti-Cloud Free40-pageeGuide 5ThingsEveryMSPShouldKnowAboutSovereignCloud GetFreeeBook TCOReport:NASFileTiering LearnhowobjectstoragecandramaticallyreduceTier1storagecosts GetTCOAnalysis SatelliteApplicationCatapultDeploysCloudianforScalableStorage ReplacesconventionalNAS,saves75% ReadTheirStory On-DemandWebinar Veeam&Cloudian:Office365Backup–It’sEssential WatchNow Blog:HowtoGrowYourStorageandNotYourCAPEXSpend Payasyougrow,startingat1.3cents/GB/month ReadtheBlog WhytheFBICan’tStopCybercrimeandHowYouCan RegisterNow 8ReasonstoChooseCloudianforState&LocalGovernmentData Get8Reasons CloudianHyperStoreSEC17a-4CohassetAssessmentReport ReadtheAssessment HybridCloudforManufacturers LearnMore Tape:DoesItMeasureUp? GetFreeeBook CustomerTestimonial:UniversityofLeicester HearfromMark PublicHealthEngland:ResilientITInfrastructureforanUncertainTime WatchOn-Demand HowtoAccelerateGenomicsDataAnalysisPipelinesby10X HearfromWeka HowMSPsCanBuildProfitableRevenueStreamswithStorageServices GetIDC’sTake Alliances› ←Back TechnologyPartners AWS Commvault Cribl Greenplum HPE KastenbyVeeam Lenovo Microsoft RedHat Rubrik Splunk Veeam Veritas Vertica VMware Weka ViewAll> GetScalableStorageOn-PremforAWSOutposts HearfromAWS LockRansomwareOutwithCommvault&Cloudian WatchNow CriblStreamwithCloudianHyperStoreS3DataLake LearnMore WhyObjectStorageisBestforAdvancedAnalyticsAppsinGreenplum ExploreSolution CustomerVideo:NTTCommunications HearfromNTT HowtoStoreKastenBackupstoCloudian WatchDemo Klik.SolutionsDeliversWorld-ClassBackup-as-a-ServicewithLenovo&Cloudian WhyTheyChoseUs ModernizeSQLServerwithS3DataLake FindOutHow HowtoRunCloudianonOpenShiftasaContainer WatchDemo Backup/ArchivetoCloudianwithRubrikNASCloudDirect ExploreSolution Splunk,ClearShark,andCloudiandiscussFederalIndustryStorageTrends WatchNow Ransomware2021:AConversationwithVeeamCISOGilVega HearfromGil ModernizeYourEnterpriseArchiveStoragewithCloudianandVeritas ReadAboutIt UnifiedAnalyticsDataLakePlatformwithVerticaandCloudianHyperStore FindOutHow VMwareCloudProviders:Getstartedincloudstorage,free. GetStarted Weka+Cloudian:High-Performance,Exabyte-ScalableStorageforAI/ML ReadAboutIt Customers› ←Back Customers FinancialServices Government Healthcare HigherEducation Manufacturing Media&Entertainment Retail ServiceProviders VideoSurveillance/DigitalEvidence CloudianEnablesLeadingSwissFinancialInstitutiontoRetainandAnalyzeMoreBigData ReadCaseStudy IndonesianFinancialServicesCompanyReplacesNASWithCloudian ReadCaseStudy StateofCaliforniaSelectsStorage-as-a-ServiceOfferingPoweredbyCloudian LearnWhy CloudianProvidesUtahStateAgencieswithRubrik-CompatibleBackupTarget,CutsCostsby75Percent ReadCaseStudy PublicHealthEngland:ResilientITInfrastructureforanUncertainTime WatchOn-Demand AustralianGenomicSequencingLeaderAcceleratesResearchwithCloudian Learnmore SwissEducationNon-ProfitAchievesScaleandFlexibilityofPublicCloudOn-PremwithCloudian GettheDetails UniversityofLeicesterAdoptsCloudianS3CompatibleStorageandCommvaultforBackup ReadCaseStudy LeadingGermanPaperCompanyMeetsGrowingDataBackupNeedswithCloudian ReadCaseStudy VoxMediaAutomatesArchiveProcesstoAccelerateWorkflowby10X LearnMore WGBHBostonBuildsaHybridCloudActiveArchiveWithCloudianHyperStore ReadCaseStudy LargeGermanRetailerConsolidatesPrimaryandSecondaryStoragetoCloudian ReadCaseStudy HowaSovereignCloudProviderSucceedsinCloudStorageServices ViewOn-Demand ITServiceProviderDrivesBusinessGrowthwithCloudian-basedOffering ReadCaseStudy CalcasieuParishSheriffDeploysHybridCloudforDigitalEvidenceData ReadHow MontebelloBusLinesMobileVideoSurveillancewithCloudianObjectStorage ReadCaseStudy Resources› ←Back Resources CaseStudies Datasheets Demos&Videos On-DemandWebinars Reports SolutionBriefs TCOCalculator Whitepapers StorageGuides DataBackup&Archive DataLake DataProtection DataSecurity DisasterRecovery HealthDataManagement HybridIT KubernetesStorage RansomwareDataRecovery SplunkArchitecture VMwareStorage ViewAll> RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide RansomwareProtectionBuyer’sGuide GetFreeGuide Company› ←Back Company AboutUs Careers LeadershipTeam PressReleases Customers IntheNews Training&Education Awards CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews CloudianNamedaGartnerPeerInsightsCustomers’ChoiceforDistributedFileSystemsandObjectStorage ReadReviews Blog Partners Events News Support 日本語DeutschFrançais TryNow DataProtectionandPrivacy:12WaystoProtectUserData DataProtectionGuides DataProtectionandPrivacy:12WaystoProtectUserData Thetermsdataprotectionanddataprivacyareoftenusedinterchangeably,butthereisanimportantdifferencebetweenthetwo.Dataprivacydefineswhohasaccesstodata,whiledataprotectionprovidestoolsandpoliciestoactuallyrestrictaccesstothedata.Complianceregulationshelpensurethatuser’sprivacyrequestsarecarriedoutbycompanies,andcompaniesareresponsibletotakemeasurestoprotectprivateuserdata. Dataprotectionandprivacyistypicallyappliedtopersonalhealthinformation(PHI)andpersonallyidentifiableinformation(PII).Itplaysavitalroleinbusinessoperations,development,andfinances.Byprotectingdata,companiescanpreventdatabreaches,damagetoreputation,andcanbettermeetregulatoryrequirements. Dataprotectionsolutionsrelyontechnologiessuchasdatalossprevention(DLP),storagewithbuilt-indataprotection,firewalls,encryption,andendpointprotection. Inthisarticle: WhatIsDataProtectionPrivacyandWhyIsitImportant? WhatAreDataProtectionPrinciples? WhatIsDataPrivacyandWhyIsitImportant? WhatAreDataProtectionRegulations? DataProtectionvsDataPrivacy 12DataProtectionTechnologiesandPracticestoProtectYourData BestPracticesforEnsuringDataPrivacy InventoryYourData MinimizeDataCollection BeOpenwithYourUsers DataProtectionTrends DataPortability MobileDataProtection Ransomware CopyDataManagement(CDM) DisasterRecoveryasaService DataProtectionandPrivacywithCloudianHyperStore WhatIsDataProtectionandWhyIsItImportant? Dataprotectionisasetofstrategiesandprocessesyoucanusetosecuretheprivacy,availability,andintegrityofyourdata.Itissometimesalsocalleddatasecurity. Adataprotectionstrategyisvitalforanyorganizationthatcollects,handles,orstoressensitivedata.Asuccessfulstrategycanhelppreventdataloss,theft,orcorruptionandcanhelpminimizedamagecausedintheeventofabreachordisaster. WhatAreDataProtectionPrinciples? Dataprotectionprincipleshelpprotectdataandmakeitavailableunderanycircumstances.Itcoversoperationaldatabackupandbusinesscontinuity/disasterrecovery(BCDR)andinvolvesimplementingaspectsofdatamanagementanddataavailability. Herearekeydatamanagementaspectsrelevanttodataprotection: Dataavailability—ensuringuserscanaccessandusethedatarequiredtoperformbusinessevenwhenthisdataislostordamaged. Datalifecyclemanagement—involvesautomatingthetransmissionofcriticaldatatoofflineandonlinestorage. Informationlifecyclemanagement—involvesthevaluation,cataloging,andprotectionofinformationassetsfromvarioussources,includingfacilityoutagesanddisruptions,applicationandusererrors,machinefailure,andmalwareandvirusattacks. Relatedcontent:Readourguidetodataprotectionprinciples WhatIsDataPrivacyandWhyIsitImportant? Dataprivacyisaguidelineforhowdatashouldbecollectedorhandled,basedonitssensitivityandimportance.Dataprivacyistypicallyappliedtopersonalhealthinformation(PHI)andpersonallyidentifiableinformation(PII).Thisincludesfinancialinformation,medicalrecords,socialsecurityorIDnumbers,names,birthdates,andcontactinformation. Dataprivacyconcernsapplytoallsensitiveinformationthatorganizationshandle,includingthatofcustomers,shareholders,andemployees.Often,thisinformationplaysavitalroleinbusinessoperations,development,andfinances. Dataprivacyhelpsensurethatsensitivedataisonlyaccessibletoapprovedparties.Itpreventscriminalsfrombeingabletomaliciouslyusedataandhelpsensurethatorganizationsmeetregulatoryrequirements. WhatAreDataProtectionRegulations? Dataprotectionregulationsgovernhowcertaindatatypesarecollected,transmitted,andused.Personaldataincludesvarioustypesofinformation,includingnames,photos,emailaddresses,bankaccountdetails,IPaddressesofpersonalcomputers,andbiometricdata. Dataprotectionandprivacyregulationsvarybetweencountries,states,andindustries.Forexample,ChinahascreatedadataprivacylawthatwentintoeffectonJune1,2017,andtheEuropeanUnion’s(EU)GeneralDataProtectionRegulation(GDPR)wentintoeffectduring2018.Non-compliancemayresultinreputationdamagesandmonetaryfines,dependingontheviolationasinstructedbyeachlawandgoverningentity. Compliancewithonesetofregulationsdoesnotguaranteecompliancewithalllaws.Additionally,eachlawcontainsnumerousclausesthatmayapplytoonecasebutnotanother,andallregulationsaresubjecttochanges.Thislevelofcomplexitymakesitdifficulttoimplementcomplianceconsistentlyandappropriately. Learnmoreinourdetailedguidesto: Dataprotectionregulations GDPRdataprotection DataProtectionvsDataPrivacy Althoughbothdataprotectionandprivacyareimportantandthetwooftencometogether,thesetermsdonotrepresentthesamething. Oneaddressespolicies,theothermechanisms Dataprivacyisfocusedondefiningwhohasaccesstodatawhiledataprotectionfocusesonapplyingthoserestrictions.Dataprivacydefinesthepoliciesthatdataprotectiontoolsandprocessesemploy. Creatingdataprivacyguidelinesdoesnotensurethatunauthorizedusersdon’thaveaccess.Likewise,youcanrestrictaccesswithdataprotectionswhilestillleavingsensitivedatavulnerable.Bothareneededtoensurethatdataremainssecure. Userscontrolprivacy,companiesensureprotection Anotherimportantdistinctionbetweenprivacyandprotectioniswhoistypicallyincontrol.Forprivacy,userscanoftencontrolhowmuchoftheirdataissharedandwithwhom.Forprotection,itisuptothecompanieshandlingdatatoensurethatitremainsprivate.Complianceregulationsreflectthisdifferenceandarecreatedtohelpensurethatusers’privacyrequestsareenactedbycompanies. Learnmoreinourdetailedguidesto: Dataprotectionpolicy Dataprotectionstrategy 12DataProtectionTechnologiesandPracticestoProtectYourData Whenitcomestoprotectingyourdata,therearemanystorageandmanagementoptionsyoucanchoosefrom.Solutionscanhelpyourestrictaccess,monitoractivity,andrespondtothreats.Herearesomeofthemostcommonlyusedpracticesandtechnologies: Datadiscovery—afirststepindataprotection,thisinvolvesdiscoveringwhichdatasetsexistintheorganization,whichofthemarebusinesscriticalandwhichcontainssensitivedatathatmightbesubjecttocomplianceregulations. Datalossprevention(DLP)—asetofstrategiesandtoolsthatyoucanusetopreventdatafrombeingstolen,lost,oraccidentallydeleted.Datalosspreventionsolutionsoftenincludeseveraltoolstoprotectagainstandrecoverfromdataloss. Storagewithbuilt-indataprotection—modernstorageequipmentprovidesbuilt-indiskclusteringandredundancy.Forexample,Cloudian’sHyperstoreprovidesupto14ninesofdurability,lowcostenablingstorageoflargevolumesofdata,andfastaccessforminimalRTO/RPO.Learnmoreinourguidetosecuredatastorage. Backup—createscopiesofdataandstoresthemseparately,makingitpossibletorestorethedatalaterincaseoflossormodification.Backupsareacriticalstrategyforensuringbusinesscontinuitywhenoriginaldataislost,destroyed,ordamaged,eitheraccidentallyormaliciously.Learnmoreinourguidetodataavailability. Snapshots—asnapshotissimilartoabackup,butitisacompleteimageofaprotectedsystem,includingdataandsystemfiles.Asnapshotcanbeusedtorestoreanentiresystemtoaspecificpointintime. Replication—atechniqueforcopyingdataonanongoingbasisfromaprotectedsystemtoanotherlocation.Thisprovidesaliving,up-to-datecopyofthedata,allowingnotonlyrecoverybutalsoimmediatefailovertothecopyiftheprimarysystemgoesdown. Firewalls—utilitiesthatenableyoutomonitorandfilternetworktraffic.Youcanusefirewallstoensurethatonlyauthorizedusersareallowedtoaccessortransferdata. Authenticationandauthorization—controlsthathelpyouverifycredentialsandassurethatuserprivilegesareappliedcorrectly.Thesemeasuresaretypicallyusedaspartofanidentityandaccessmanagement(IAM)solutionandincombinationwithrole-basedaccesscontrols(RBAC). Encryption—altersdatacontentaccordingtoanalgorithmthatcanonlybereversedwiththerightencryptionkey.Encryptionprotectsyourdatafromunauthorizedaccessevenifdataisstolenbymakingitunreadable.Learnmoreinguidetodataencryption. Endpointprotection—protectsgatewaystoyournetwork,includingports,routers,andconnecteddevices.Endpointprotectionsoftwaretypicallyenablesyoutomonitoryournetworkperimeterandtofiltertrafficasneeded. Dataerasure—limitsliabilitybydeletingdatathatisnolongerneeded.Thiscanbedoneafterdataisprocessedandanalyzedorperiodicallywhendataisnolongerrelevant.Erasingunnecessarydataisarequirementofmanycomplianceregulations,suchasGDPR.FormoreinformationaboutGDPR,checkoutourguide:GDPRDataProtection. Disasterrecovery—asetofpracticesandtechnologiesthatdeterminehowanorganizationdealswithadisaster,suchasacyberattack,naturaldisaster,orlarge-scaleequipmentfailure.Thedisasterrecoveryprocesstypicallyinvolvessettinguparemotedisasterrecoverysitewithcopiesofprotectedsystems,andswitchingoperationstothosesystemsincaseofdisaster. Relatedcontent:Readourguidetocontinuousdataprotection CriticalBestPracticesforEnsuringDataPrivacy Creatingpoliciesfordataprivacycanbechallengingbutit’snotimpossible.Thefollowingbestpracticescanhelpyouensurethatthepoliciesyoucreateareaseffectiveaspossible. InventoryYourData Partofensuringdataprivacyisunderstandingwhatdatayouhave,howitishandled,andwhereitisstored.Yourpoliciesshoulddefinehowthisinformationiscollectedandactedupon.Forexample,youneedtodefinehowfrequentlydataisscannedforandhowitisclassifiedoncelocated. Yourprivacypoliciesshouldclearlyoutlinewhatprotectionsareneededforyourvariousdataprivacylevels.Policiesshouldalsoincludeprocessesforauditingprotectionstoensurethatsolutionsareappliedcorrectly. Relatedcontent:Readourguidetodataprotectionimpactassessment MinimizeDataCollection Ensurethatyourpoliciesdictatethatonlynecessarydataiscollected.Ifyoucollectmorethanwhatyouneed,youincreaseyourliabilityandcancreateanundueburdenonyoursecurityteams.Minimizingyourdatacollectioncanalsohelpyousaveonbandwidthandstorage. Onewayofachievingthisistouse“verifynotstore”frameworks.Thesesystemsusethird-partydatatoverifyusersandeliminatetheneedtostoreortransferuserdatatoyoursystems. BeOpenwithYourUsers Manyusersareawareofprivacyconcernsandarelikelytoappreciatetransparencywhenitcomestohowyou’reusingandstoringdata.Reflectingthis,GDPRhasmadeuserconsentakeyaspectofdatauseandcollection. Youcanbesuretoincludeusersandtheirconsentinyourprocessesbydesigningprivacyconcernsintoyourinterfaces.Forexample,havingclearusernotificationsoutliningwhendataiscollectedandwhy.Youshouldalsoincludeoptionsforuserstomodifyoropt-outofdatacollection. DataProtectionTrends Herearesomeimportanttrendsdrivingtheevolutionofdataprotection. DataPortabilityandDataSovereignty DataportabilityisanimportantrequirementformanymodernITorganizations.Itmeanstheabilitytomovedatabetweendifferentenvironmentsandsoftwareapplications.Veryoften,dataportabilitymeanstheabilitytomovedatabetweenon-premisesdatacentersandthepubliccloud,andbetweendifferentcloudproviders. Dataportabilityalsohaslegalimplications—whendataisstoredindifferentcountries,itissubjecttodifferentlawsandregulations.Thisisknownasdatasovereignty. Relatedcontent:ReadourguidetoDatasovereignty Traditionally,datawasnotportableanditrequiredhugeeffortstomigratelargedatasetstoanotherenvironment.Clouddatamigrationwasalsoextremelydifficult,intheearlydaysofcloudcomputing.Newtechnicalmethodsaredevelopingtomakemigrationeasier,andthusmakedatamoreportable. Arelatedissueisportabilityofdatawithinclouds.Cloudserviceproviderstendtohaveproprietarydataformats,templates,andstorageengines.Thismakesitdifficulttomovedatafromonecloudtoanother,andcreatesvendorlockin.Increasingly,organizationsarelookingforstandardizedwaysofstoringandmanagingdata,tomakeitportableacrossclouds. Learnmoreinourdetailedguidesabout: Dataprotectioninthecloud Office365dataprotection MobileDataProtection Mobiledeviceprotectionreferstomeasuresdesignedtoprotectsensitiveinformationstoredonlaptops,smartphones,tablets,wearablesandotherportabledevices.Afundamentalaspectofmobiledevicesecurityispreventingunauthorizedusersfromaccessingyourcorporatenetwork.InthemodernITenvironment,thisisacriticalaspectofnetworksecurity. Therearemanymobiledatasecuritytools,designedtoprotectmobiledevicesanddatabyidentifyingthreats,creatingbackups,andpreventingthreatsontheendpointfromreachingthecorporatenetwork.ITstaffusemobiledatasecuritysoftwaretoenablesecuremobileaccesstonetworksandsystems. Commoncapabilitiesofmobiledatasecuritysolutionsinclude: Enforcingcommunicationviasecurechannels Performingstrongidentityverificationtoensuredevicesarenotcompromised Limitingtheuseofthird-partysoftwareandbrowsingtounsafewebsites Encryptingdataonthedevicetoprotectagainstdevicecompromiseandtheft Performregularauditsofendpointstodiscoverthreatsandsecurityissues Monitoringforthreatsonthedevice Settingupsecuregatewaysthatcanallowremotedevicestoconnectsecurelytothenetwork Ransomware Ransomwareisarisingcybersecuritythreat,whichisatopsecuritypriorityforalmostallorganizations.Ransomwareisatypeofmalwarethatencryptsuserdataanddemandsaransominordertoreleaseit.Newtypesofransomwaresendthedatatoattackersbeforeencryptingit,allowingtheattackerstoextorttheorganization,threateningtomakeitssensitiveinformationpublic. Backupsareaneffectivedefenseagainstransomware—ifanorganizationhasarecentcopyofitsdata,itcanrestoreitandregainaccesstothedata.However,ransomwarecanspreadacrossanetworkoveralongperiodoftime,withoutencryptingfilesyet.Atthisstageransomwarecaninfectanyconnectedsystem,includingbackups.Whenransomwarespreadstobackups,itis“gameover”fordataprotectionstrategies,becauseitbecomesimpossibletorestoretheencrypteddata. Therearemultiplestrategiesforpreventingransomwareandinparticular,preventingitfromspreadingtobackups: Thesimpleststrategyistousetheold3-2-1backuprule,keepingthreecopiesofthedataontwostoragemedia,oneofwhichisoffpremises. Securityvendorshaveadvancedtechnologiesthatcandetectransomwareatitsearlystages,orintheworstcase,blockencryptionprocessesastheybegin. Storagevendorsareofferingimmutablestorage,whichensuresthatdatacannotbemodifiedafteritisstored.LearnhowCloudiansecurestoragecanhelpprotectyourbackupsfromransomware. Relatedcontent:Readourguidetoransomwaredatarecovery CopyDataManagement(CDM) Largeorganizationshavemultipledatasetsstoredindifferentlocations,andmanyofthemmayduplicatedatabetweenthem. Duplicatedatacreatesmultipleproblems—itincreasesstoragecosts,createsinconsistenciesandoperationalissues,andcanalsoresultinsecurityandcompliancechallenges.Typically,notallcopiesofthedatawillbesecuredinthesameway.Itisnousesecuringadatasetandensuringitiscompliant,whenthedataisduplicatedinanotherunknownlocation. CDMisatypeofsolutionthatdetectsduplicatedataandhelpsmanageit,comparingsimilardataandallowingadministratorstodeleteunusedcopies. DisasterRecoveryasaService Disasterrecoveryasaservice(DRaaS)isamanagedservicethatgivesanorganizationacloud-basedremotedisasterrecoverysite. Traditionally,settingupasecondarydatacenterwasextremelycomplexandinvolvedmassivecosts,andwasonlyrelevantforlargeenterprises.WithDRaaS,anysizeorganizationcanreplicateitslocalsystemstothecloud,andeasilyrestoreoperationsincaseofadisaster. DRaaSservicesleveragepubliccloudinfrastructure,makingitpossibletostoremultiplecopiesofinfrastructureanddataacrossmultiplegeographicallocations,toincreaseresiliency. DataProtectionandPrivacywithCloudianHyperStore Dataprotectionrequirespowerfulstoragetechnology.Cloudian’sstorageappliancesareeasytodeployanduse,letyoustorePetabyte-scaledataandaccessitinstantly.Cloudiansupportshigh-speedbackupandrestorewithparalleldatatransfer(18TBperhourwriteswith16nodes). Cloudianprovidesdurabilityandavailabilityforyourdata.HyperStorecanbackupandarchiveyourdata,providingyouwithhighlyavailableversionstorestoreintimesofneed. InHyperStore,storageoccursbehindthefirewall,youcanconfiguregeoboundariesfordataaccess,anddefinepoliciesfordatasyncbetweenuserdevices.HyperStoregivesyouthepowerofcloud-basedfilesharinginanon-premisedevice,andthecontroltoprotectyourdatainanycloudenvironment. LearnmoreaboutdataprotectionwithCloudian. LearnMoreAboutDataProtectionandPrivacy Dataprotectionandprivacyisabroadtopic.Asuccessfuldataprotectionprocedurecanpreventdataloss,orcorruptionandreducedamagecausedintheeventofabreach.Dataprivacymethodsensurethatsensitivedataisaccessibleonlytoapprovedparties. There’salotmoretolearnaboutdataprotectionandprivacy.Tocontinueyourresearch,takealookattherestofourblogsonthistopic: KeepingUpwithDataProtectionRegulations Thewidespreadusageofpersonalandsensitivedata,hasraisedthesignificanceofprotectingthisdatafromloss,andcorruption.GlobalauthoritieshavesteppedinwithregulatorycompliancelikeGeneralDataProtectionRegulation(GDPR). TheGDPRemphasizesthepersonaldatarightsofEUresidents,includingtherighttochange,access,erase,ortransfertheirdata.Personaldatareferstoanyinformationthatrelatestoanindividual.Thisincludesnames,physicaltraits,addresses,racialorethniccharacteristics,andbiometricdatalikeDNAandfingerprints. Youcanlearnmoreaboutdataprotectionregulationsinourarticle: KeepingUpwithDataProtectionRegulations DataAvailability:EnsuringtheContinuedFunctioningofBusinessOperations Businessesrelyondatatodeliverservicesandproductstotheircustomers.Tokeeptheirdataavailableatalltimes,companiesneedtokeeptheITinfrastructureactiveeveninthecaseofadisaster.Thisstateofguaranteedaccesstodataisknownasdataavailability. Thisarticlereviewsthebasicsofdataavailabilityanditschallenges,andofferstechniquestomaintainahighlevelofdataavailability. Readmore:DataAvailability:EnsuringtheContinuedFunctioningofBusinessOperations HowYouCanMaintainSecureDataStorage Organizationsusuallystoresensitivedataontheircomputers,servers,andonthecloud.Withoutaproperdatasecuritypolicy,sensitiveinformationcanfallintothehandsofattackers,enablingthemtogainaccesstoyournetwork,andexposethepersonalinformationofcustomersandemployees. Thisarticleintroducestheconceptofdatasecurityandthedifferenttoolsandmethodsyoucanusetoprotectyourdataandpreventadisaster. Readmore:HowYouCanMaintainSecureDataStorage DataEncryption:AnIntroduction Dataencryptionisaprocessofconvertingdataintoencodedinformation,calledciphertext.Theencodedinformationcanonlybedecodedwithauniquedecryptionkey.Youcangeneratethekeyeitheratthetimeofencryptionorbeforehand. Encryptionensurestheintegrityofdatabyprotectingitfromunauthorizedmodification.Encryptionreducestheriskofaccessingdatafromuntrustworthysourcesbyverifyingdata’ssource. Readmore:DataEncryption:AnIntroduction ContinuousDataProtection ContinuousDataProtectionisamethodforbackingupdataeverytimeachangeismade.A continuousdataprotectionsystemmaintainsarecordofalldatachangesandenablesyoutorestoreasystemtoanypreviouspointintime. Thistypeofbackupsolvestheproblemoflosingdatacreatedbetweentwoscheduledbackups.Italsoprovidesprotectionagainstattackslikeransomwareormalware,aswellasaccidentaldeletionofdata. Readmore:ContinuousDataProtection GDPRDataProtection TheGDPRisalegalstandardthatprotectsthepersonaldataofEuropeanUnioncitizens.AnycompanythatprocessesandstorespersonaldataofEUcitizens,evenifitisnotphysicallylocatedintheEU,mustapplytotheGDPRrules. TherearetwomainrolesintheGDPR:theGDPRDataProcessorisanentitythatholdsorprocessesthistypeofdataonbehalfofanotherorganization,andaGDPRDataControllerthatcollectsorprocessespersonaldataforitsownpurposes. Readmore:GDPRDataProtection S3ObjectLock—ProtectingDataforRansomwareThreatsandCompliance AmazonS3ObjectLockstoresobjectsusingawrite-once-read-many(WORM)model.ObjectLockpreventsobjectversiondeletionduringauser-definedretentionperiod.ImmutableS3objectsareprotectedusingobject,orbucket-levelconfigurationofWORMandretentionattributes. Thisfunctionalityprovidesbothdataprotection,includingextraprotectionagainstaccidentalormaliciousdeletionaswellasransomwareandregulatorycompliance. Readmore:S3ObjectLock—ProtectingDataforRansomwareThreatsandCompliance Office365DataProtection.ItisEssential. Thecloud-basedsubscriptionofOffice365enablesemployeestoworkanywhere,anytimewithouttheneedtohosttheirowncontentandemails.However,thesefilesarenotalwaysprotectedfromfailure,disaster,orattack.Organizationscanachievethisbybackingupdatainsecureandreliablestorage,on-premorinthecloud. Readmore:Office365DataProtection.ItisEssential SeeOurAdditionalGuidesonKeyDataProtectionTopics: Wehaveauthoredin-depthguidesonseveralotherdataprotectiontopicsthatcanalsobeusefulasyouexploretheworldofdatabackup.Alsorefertothecompleteguidetodatabreaches. DataBackupGuide Databackupiscriticaltoensureorganizationscanrecoverfromvarioustypesofdatalosses.Learnhowtosuccessfullyimplementdatabackuptechniques. Seetoparticlesinourdatabackupguide: DataArchivesandWhyYouNeedThem BackupCloudStorage:EnsuringBusinessContinuity BackupStorage:CloudvsOn-Premises EndpointSecurity AuthoredbyCynet Threatactorsoftenleverageendpointstogainunauthorizedaccessandlaunchvariousattacks.Endpointsecurityprovidesthevisibilityneededtodetectandrespondtoendpointthreats. Seetoparticlesinourendpointsecurityguide: CloudEndpointProtection:ProtectingYourWeakestLink EPPSecurity:Prevention,DetectionandResponseatYourFingertips EndpointSecurityVPN:SecuringRemoteAccess DataClassification AuthoredbySatori Learnhoworganizationsclassifylargescaledatasetsinordertobettersecureandprotecttheirmostsensitiveandvaluabledata. DataClassification:Compliance,Concepts,and4BestPractices DataClassificationPolicy:Benefits,Examples,andTechniques DataClassificationTypes:Criteria,Levels,Methods,andMore GetStartedWithCloudianToday RequestaDemo Joina30minutedemowithaCloudianexpert. SignUp DownloadaFreeTrial TryCloudianinyourshop.RunonanyVM,evenyourlaptop. TryNow Pricing ReceiveaCloudianquoteandseehowmuchyoucansave. Pricing Pricing ContactUs
延伸文章資訊
- 1Protection of personal data and privacy - The Council of Europe
The frontier-less nature of the internet, which enables the free flow of data across countries, a...
- 2Data Protection and Privacy: 12 Ways to Protect User Data
Another important distinction between privacy and protection is who is typically in control. For ...
- 3Privacy Statement of Bank of Taiwan
The collection, use and protection of personal data by BOT Website are conducted in accordance wi...
- 4What is Privacy Protection? [Updated for 2021]
- 5Privacy Protection and Website Security Policy
establish a management system, regularly verify by independent third parties, in order to protect...