10 Commandments of Bring Your Own Device

Thou Shalt Allow BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention
to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor.
There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. A Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 2016.1
This raises the inevitable question: how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? The Ten Commandments of BYOD show you how to create a peaceful, secure, and productive mobile environment.

1. Create Thy Policy Before Procuring Technology
Like any other IT project, policy must precede technology—yes, even in the cloud. To effectively leverage mobile device management (MDM) technology for employee owned devices, you still need to decide on policies. These policies affect more than just IT; they have implications for HR, legal, and security—any part of the business that uses mobile devices in the name of productivity. Since all lines of business are affected by BYOD policy, it can’t be created in an IT vacuum. With the diverse needs of users, IT must ensure they are all part of policy creation.
There’s no one right BYOD policy, but here are some questions to consider:

1

  • Devices: What mobile devices will be supported? Only certain devices or whatever the employee wants?
  • According to Forrester, 70% of smartphones belong to users, 12% are chosen from an approved list, and 16% are corporate-issued. Some 65% of tablets belong to users, 15% are chosen from a list, and 16% are corporate issued. In other words, users in most cases bring their own devices.
  • Data Plans: Will the organization pay for the data plan at all? Will you issue a stipend, or will the employee submit expense reports? Who pays for these devices? For smartphones, 70% paid the full price, 12% got a discount, 3% paid a partial amount, and in 15% of cases, the company covered the full price. With tablets,
    58% bought their own, 17% got a corporate discount, 7% shared the cost, and 18% were issued and paid for by their companies. (Source: Forrester, 2011)
  • Compliance: What regulations govern the data your organization needs to protect? For instance, the Health Insurance Portability and Accountability Act (HIPAA) requires native / encryption on any device that holds data subject to the act.
  • Security: What security measures are needed (passcode protection, jailbroken/rooted devices, anti-malware apps, encryption, device restrictions, iCloud backup)?
  • Applications: What apps are forbidden? IP scanning, data sharing, Dropbox?
  • Agreements: Is there an Acceptable Usage Agreement (AUA) for employee devices with corporate data?
  • Services: What kinds of resources can employees access—email? Certain wireless networks or VPNs? CRM?
  • Privacy: What data is collected from employees’ devices? What personal data is never collected?
    No questions are off limits when it comes to BYOD. There must be frank and honest dialog about
    how devices will be used and how IT can realistically meet those needs.

2. Seek the Flock’s Devices
Imagine this. You start using an MDM solution under the assumption your company is supporting 100 or so devices. You’ve kept a meticulous spreadsheet of device types and users—there shouldn’t be any surprises. But when you first go to view reporting, over 200 devices appear. This scenario is fact, not fiction. It occurs far more often than you would think. Don’t live in denial. What you don’t know can hurt you. Understand the current landscape of your mobile device population before engraving your strategy on stone tablets. To do this, you’ll need a tool that can communicate in real time with your email environment and detect all the devices connected to your corporate network. Remember that once ActiveSync is turned on for a mailbox, there are usually no barriers to syncing multiple devices without IT’s knowledge. All mobile devices need to be incorporated into your mobile initiative, and their owners need to be notified that new security policies are swinging into action.

2

 

 

 

 

3. Enrollment Shall Be Simple
Nothing breeds noncompliance faster than complexity. Once you identify devices to enroll, your BYOD program should leverage technology that allows for a simple, low touch way for users to enroll. The process should be simple, secure, and configure the device at the same time. In a perfect scenario, users should be able to follow an email link or text that leads to an MDM profile being created on their device—including accepting the ever-important AUA. Think of BYOD as a marriage with the AUA as a prenuptial agreement that ensures a harmonious union. Instructions should help existing users enroll in the BYOD program. We do recommend existing users clear their ActiveSync accounts so that you can isolate and manage corporate data on the device. New devices should start with a fresh profile.

3 From an IT perspective, you want the ability to enroll existing devices in bulk or for users to self-enroll their devices. You also need to authenticate employees with a basic authentication process such as a one-time passcode or use existing corporate directories such as Active Directory/LDAP. Any new devices trying to access corporate resources should be quarantined and IT notified. This provides IT with flexibility to block or initiate a proper enrollment workflow if approved, ensuring compliance with corporate policies.

4. Thou Shalt Configure Devices Over-the-Air
If there’s one thing your BYOD policy and MDM solution shouldn’t do, it’s bring more users to the help desk. All devices should be configured over-the air to maximize efficiency for both IT and business users alike. Once users have accepted the AUA, your platform should deliver all the profiles, credentials, and settings the employee needs access to including:
• Email, contacts, and calendar
• VPN and WiFi4
• Corporate documents and content
• Internal and public apps
At this point, you’ll also create policies to restrict access to certain applications and generate warnings when a user goes over their data usage or stipend limit for the month.

5. Give Thy Users Self-Service

And you will be thankful you did. Users want a functioning device, and you want to optimize help desk time. A robust self-service platform lets users directly perform:
• PIN and password resets in the event that the employee forgets the current one
• Geo-locate a lost device from a web portal, using mapping integration
• Wipe a device remotely, removing all sensitive corporate data
Security, corporate data protection, and compliance are shared responsibilities. It may be a hard pill for employees to swallow, but there is no chance of mitigating risk without their cooperation. A self-service portal can help employees understand why they may be out of compliance.5

 

 

 

 

6. Hold Sacred Personal Information
Of course, BYOD policy isn’t just about protecting corporate data; a well-crafted BYOD program holds employee data sacred and secure. Personally Identifiable Information (PII) can be used to identify, contact, or locate a person. Some privacy laws prevent corporations from even viewing this data. Communicate the privacy policy to employees and make it clear what data you cannot collect from their mobile devices. For instance, an MDM solution should be able to parse what information it can access and what it cannot, such as:
• Personal emails, contacts, and calendars6
• Application data and text messages
• Call history and voicemails
On the other hand, let users know what you collect, how it will be used, and why it benefits them. An advanced MDM solution can turn privacy policy into a privacy setting to hide the location and software information on a device. This helps companies meet PII regulations and provides added comfort for employees by preventing the
viewing of personal information on smartphones and tablets.
For example:
• Disabling app inventory reporting to restrict administrators from seeing personal applications
• Deactivating location services to prevent access to location indicators such as physical address, geographical coordinates, IP address, and WiFi SSID
• Transparency and clarity are important watchwords. There’s much less resistance to BYOD policies when
everyone knows the rules.

7. Part the Seas of Corporate and Personal Data
For BYOD to be an agreement both IT and end users can live with, personal information like birthday party photos or that great American novel should be isolated from productivity apps. Simply stated, corporate apps, documents, and other materials must be protected by IT if the employee decides to leave the organization, but personal email, apps, and photos should be untouched by corporate IT. Not only will users appreciate the freedom of this approach, but so will IT, whose life will be infinitely easier as a result. With this approach, IT can selectively wipe corporate data when an employee leaves the company. Depending on the circumstances, if an employee loses the device, the entire device can be wiped. But only a true MDM solution can give you the choice. Some 86% of device wipes are selective; only corporate data is wiped.

7

8. Manage Thy Data Usage
A BYOD policy largely takes IT out of the communications business, but most companies still need to help employees manage their data use in order to avoid excessive charges. If you pay for the data plan, you may want a way to track this data. If you are not paying, you may want to help users track their current data usage. You should be able to track in-network and roaming data usage on devices and generate alerts if a user crosses a threshold of data usage. You can set roaming and in-network megabit limits and customize the billing day to create notifications based on percentage used. We also recommend educating users on the benefits of using WiFi when available. Automatic WiFi configuration helps ensure devices automatically connect to WiFi while in corporate locations. If the stipend plan only covers $50 or 200 MB of data usage a month, employees appreciate a warning that they’re about to be responsible for overages.

8

9. Monitor Thy Flock—Herd Automatically
Once a device is enrolled, it’s all about context. Devices should be continuously monitored for certain scenarios, and automated policies should be in place. Is the user trying to disable management? Does the device comply with security policy? Do you need to make adjustments based on the data you are seeing? From here, you can start understanding any additional policies or rules to create. Here are a few common issues:
• Getting to the “Root” of Jailbreaking: To get paid apps for free, employees sometimes “jailbreak” or “root” a phone, opening the door to malware that can steal information. If a device is jailbroken, the MDM solution should be able to take action such as selectively wiping corporate data from the device immediately.
• Spare the Wipe; Send an SMS: If time wasters like Angry Birds rub against corporate policies but are not offenses, an immediate wipe is heavy handed. An MDM solution can enforce policies based on the offense. MDM can message the user, offering time to remove the application before IT hits the wipe button.
• New Operating System Available. For BYOD to remain effective, users need a simple way to be alerted when a new OS is ready for installation. With the right MDM solution, OS upgrades become a self-service function. Restricting out-of-date OS versions ensures compliance and maximizes device operability.

9

10. Drink from the Fountain of ROI
While BYOD shifts responsibility for purchasing devices to employees, it’s worth considering the big picture and long-term costs for your organization. As you’re writing policy, consider how that policy will impact ROI. That includes comparing approaches, as shown below:
Corporate-owned model
• How much you’d spend on each device
• The cost of a fully subsidized data plan
• The cost of recycling devices every few years
• Warranty plans
• IT time and labor in managing the program10
BYOD
• The cost of a partially subsidized data plan

• The eliminated cost of the device purchase
• The cost of a mobile management platform
One size never fits all, but a carefully crafted BYOD policy arms you with the direction you need to manage mobile devices effectively and efficiently. Of course, productivity increases are often seen when employees are mobile and connected at all times. BYOD is a great way to bring this advance in productivity to new users who may not have been eligible for corporate devices previously.

 

 

 


Source:  http://www.itbusinessedge.com/ebooks/184433410/95940/1613990/221985?qset=CONTEXT_STEP1&mcss=y&CCID=20338668204505267&QTR=ZZf201510131155280Za20338668Zg134Zw0Zm0Zc204505267Zs13935ZZ&CLK=226151027185843667&email=nltr-itbe&eml=eric@cloudspace.net.au&epf=Y&Submit=submit&dni=281214501&rni=13501729&&exp=y

 

5 Lessons to Brush Up Your Cloud Security Knowledge

Cloud Security Q&A

Question #1: What technology solves data residency, data privacy and data security challenges for enterprises that are using cloud applications?

The Answer: Tokenization

tokenization

Tokenization is one of the strategies that organizations consider when they are looking to protect sensitive data at-rest, in the cloud or in-transit. Tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value.

You may be wondering how tokenization differs from encryption. With tokenization, the original data is completely removed, while with encryption, the original data still bears a relationship to its unencrypted form. Tokenization tends to be more flexible in its length and format, compared to traditional encryption techniques. Additionally, tokens cannot be returned to their corresponding clear text values without access to a secured “look-up” table that matches them to their original values. Unlike encrypted values, tokens can be generated so they do not have any relationship to the length of the original value.

Question #2: Name a security and compliance method to protect cloud data from cyber threats and vulnerabilities.

The Answer: Encryption

As most of you are well aware, encryption is a process used to protect information in transit and storage, including sensitive data processed and stored through networks, the Internet, and mobile and wireless systems. It uses an algorithmic scheme to transform plain text information into a non-readable form called ciphertext. The reverse process, decryption, decodes the information from its encrypted form back to plain text. To prevent unauthorized access to plain text data, the mathematical algorithm requires a secret value, called a key, in order to encrypt or decrypt the data properly.

Cloud encryption is used to safeguard sensitive information stored and processed through networks, the Internet, and mobile and wireless devices. In the cloud, encryption algorithms are used to protect outgoing data, so that information is not vulnerable once it’s outside an enterprise. Data encryption is commonly used to achieve compliance with industry regulations, including HIPAA and PCI DSS and is an essential cloud data security tool for organizations using popular SaaS applications.

Question #3: When enterprises move applications from on-premise to cloud-based what is a challenge that arises concerning the treatment of sensitive data?

The Answer: Data Compliance

data compliance

Data compliance for the cloud refers to ensuring that data going to the cloud is protected in a way that meets all relevant standards and regulations – whether set by industry or geographic area. Depending on the industry, there are often specific regulations for how an enterprise should handle personal information and other sensitive data. Some key U.S. data regulations include: Retail – PCI DSS, Healthcare – HIPAA & HITECH, Financial – GLBA, Government – FISMA & FedRamp and others. In addition, many countries have their own cloud data regulations and laws and these also differ depending on the country. For example it’s generally said that the European Union safeguards personal information more proactively than the United States.

To meet data compliance regulations and standards, an enterprise should become familiar with and learn how to utilize data-centric security tools that work in and outside of their firewall. Encryption and tokenization are useful for meeting strict or complex data regulations and supporting the enterprise in meeting its cloud data compliance needs.

Question #4: What term has the definition “maintaining control over the location where regulated data and documents physically reside?”

The Answer: Data Residency

data residency

Cloud data residency (also called data sovereignty) refers to the physical location of where data actually resides. With cloud adoption, residency is ultimately determined by the geographic location of where data is stored. Cloud service providers (CSPs) may have data centers all over the world, so it is these locations that matter most to enterprises concerned with complying with residency laws.

With recent revelations about government surveillance of online data and many high-profile data breaches, there is understandably a focus on how to best protect sensitive data going to the cloud. Many enterprises face a growing set of data compliance regulations. Some of these laws or rules are specific to data residency.

Privacy and data residency requirements vary by country and may include specifics around what types of data may leave its borders and what must remain physically within the country. Enterprises adopting the cloud need to consider the rules that cover each of the jurisdictions they operate in, as well as the rules that govern the treatment of data at the locations where the CSP operates. Restrictions around data residency may make it more challenging for an enterprise to adopt certain cloud applications and many are seeking out solutions

Question #5: What is Gartner’s term for on-premise or cloud-hosted software that acts as a control point to secure cloud services?

The Answer: Cloud Access Security Broker (CASB)

As enterprises follow the flow of data to the cloud, it becomes quickly apparent that maintaining control of sensitive data is often a difficult task. Decision makers in enterprise IT need a solution that will bring their situation back into balance – enabling cloud adoption without loss of data control. A newer segment of technologies that Gartner calls “cloud access security brokers” (CASBs) has emerged in recent years as an enabler of critical, meaningful and deeper enterprise cloud adoption.

Today, CASBs can take different forms. Increasingly, a well-planned data privacy and protection program for the cloud incorporates CASB capabilities. No matter what stage of cloud adoption that an enterprise is in, a thorough vetting of the different CASBs available will be important to address key security issues, including data residency concerns, industry compliance, visibility on cloud usage and internal security best practices.

 


 

Source: http://www.itbusinessedge.com/slideshows/5-lessons-to-brush-up-your-cloud-security-knowledge.html

Top 10 Strategic Technology Trends for 2016

1) The Device Mesh

The device mesh refers to an expanding set of endpoints people use to access applications and information or interact with people, social communities, governments and businesses. The device mesh includes mobile devices, wearable, consumer and home electronic devices, automotive devices and environmental devices — such as sensors in the Internet of Things (IoT).

“In the post-mobile world the focus shifts to the mobile user who is surrounded by a mesh of devices extending well beyond traditional mobile devices,” said Mr. Cearley.

While devices are increasingly connected to back-end systems through various networks, they have often operated in isolation from one another. As the device mesh evolves, Gartner expects connection models to expand and greater cooperative interaction between devices to emerge.

2) Ambient User Experience

The device mesh creates the foundation for a new continuous and ambient user experience. Immersive environments delivering augmented and virtual reality hold significant potential but are only one aspect of the experience. The ambient user experience preserves continuity across boundaries of device mesh, time and space. The experience seamlessly flows across a shifting set of devices and interaction channels blending physical, virtual and electronic environment as the user moves from one place to another.

“Designing mobile apps remains an important strategic focus for the enterprise,” said Mr. Cearley. “However, the leading edge of that design is focused on providing an experience that flows across and exploits different devices, including IoT sensors, common objects such as automobiles, or even factories. Designing these advanced experiences will be a major differentiator for independent software vendors (ISVs) and enterprises alike by 2018.”

3) 3D Printing Materials

Advances in 3D printing have already enabled 3D printing to use a wide range of materials, including advanced nickel alloys, carbon fiber, glass, conductive ink, electronics, pharmaceuticals and biological materials. These innovations are driving user demand, as the practical applications for 3D printers expand to more sectors, including aerospace, medical, automotive, energy and the military. The growing range of 3D-printable materials will drive a compound annual growth rate of 64.1 percent for enterprise 3D-printer shipments through 2019. These advances will necessitate a rethinking of assembly line and supply chain processes to exploit 3D printing.

“3D printing will see a steady expansion over the next 20 years of the materials that can be printed, improvement in the speed with which items can be printed and emergence of new models to print and assemble composite parts,” said Mr. Cearley.

4) Information of Everything

Everything in the digital mesh produces, uses and transmits information. This information goes beyond textual, audio and video information to include sensory and contextual information. Information of everything addresses this influx with strategies and technologies to link data from all these different data sources. Information has always existed everywhere but has often been isolated, incomplete, unavailable or unintelligible. Advances in semantic tools such as graph databases as well as other emerging data classification and information analysis techniques will bring meaning to the often chaotic deluge of information.

5) Advanced Machine Learning

In advanced machine learning, deep neural nets (DNNs) move beyond classic computing and information management to create systems that can autonomously learn to perceive the world, on their own. The explosion of data sources and complexity of information makes manual classification and analysis infeasible and uneconomic. DNNs automate these tasks and make it possible to address key challenges related to the information of everything trend.

DNNs (an advanced form of machine learning particularly applicable to large, complex datasets) are what make smart machines appear “intelligent.” DNNs enable hardware- or software-based machines to learn for themselves all the features in their environment, from the finest details to broad sweeping abstract classes of content. This area is evolving quickly, and organizations must assess how they can apply these technologies to gain competitive advantage.

6) Autonomous Agents and Things

Machine learning gives rise to a spectrum of smart machine implementations — including robots, autonomous vehicles, virtual personal assistants (VPAs) and smart advisors — that act in an autonomous (or at least semiautonomous) manner. While advances in physical smart machines such as robots get a great deal of attention, the software-based smart machines have a more near-term and broader impact. VPAs such as Google Now, Microsoft’s Cortana and Apple’s Siri are becoming smarter and are precursors to autonomous agents. The emerging notion of assistance feeds into the ambient user experience in which an autonomous agent becomes the main user interface. Instead of interacting with menus, forms and buttons on a smartphone, the user speaks to an app, which is really an intelligent agent.

“Over the next five years we will evolve to a post-app world with intelligent agents delivering dynamic and contextual actions and interfaces,” said Mr. Cearley. “IT leaders should explore how they can use autonomous things and agents to augment human activity and free people for work that only people can do. However, they must recognize that smart agents and things are a long-term phenomenon that will continually evolve and expand their uses for the next 20 years.”

7) Adaptive Security Architecture

The complexities of digital business and the algorithmic economy combined with an emerging “hacker industry” significantly increase the threat surface for an organization. Relying on perimeter defense and rule-based security is inadequate, especially as organizations exploit more cloud-based services and open APIs for customers and partners to integrate with their systems. IT leaders must focus on detecting and responding to threats, as well as more traditional blocking and other measures to prevent attacks. Application self-protection, as well as user and entity behavior analytics, will help fulfill the adaptive security architecture.

8) Advanced System Architecture

The digital mesh and smart machines require intense computing architecture demands to make them viable for organizations. Providing this required boost are high-powered and ultra-efficient neuromorphic architectures. Fueled by field-programmable gate arrays (FPGAs) as an underlining technology for neuromorphic architectures, there are significant gains to this architecture, such as being able to run at speeds of greater than a teraflop with high-energy efficiency.

“Systems built on GPUs and FPGAs will function more like human brains that are particularly suited to be applied to deep learning and other pattern-matching algorithms that smart machines use,” said Mr. Cearley. “FPGA-based architecture will allow further distribution of algorithms into smaller form factors, with considerably less electrical power in the device mesh, thus allowing advanced machine learning capabilities to be proliferated into the tiniest IoT endpoints, such as homes, cars, wristwatches and even human beings.”

9) Mesh App and Service Architecture

Monolithic, linear application designs (e.g., the three-tier architecture) are giving way to a more loosely coupled integrative approach: the apps and services architecture. Enabled by software-defined application services, this new approach enables web-scale performance, flexibility and agility. Microservice architecture is an emerging pattern for building distributed applications that support agile delivery and scalable deployment, both on-premises and in the cloud. Containers are emerging as a critical technology for enabling agile development and microservice architectures. Bringing mobile and IoT elements into the app and service architecture creates a comprehensive model to address back-end cloud scalability and front-end device mesh experiences. Application teams must create new modern architectures to deliver agile, flexible and dynamic cloud-based applications with agile, flexible and dynamic user experiences that span the digital mesh.

10) Internet of Things Platforms

IoT platforms complement the mesh app and service architecture. The management, security, integration and other technologies and standards of the IoT platform are the base set of capabilities for building, managing and securing elements in the IoT. IoT platforms constitute the work IT does behind the scenes from an architectural and a technology standpoint to make the IoT a reality. The IoT is an integral part of the digital mesh and ambient user experience and the emerging and dynamic world of IoT platforms is what makes them possible.

“Any enterprise embracing the IoT will need to develop an IoT platform strategy, but incomplete competing vendor approaches will make standardization difficult through 2018,” said Mr. Cearley.

 


 

Source: http://www.itbusinessedge.com/slideshows/top-10-strategic-technology-trends-for-2016.html

5 Trends Shaking Up Today’s Enterprise Storage Strategy

Managing Your Data

Disruptor #1: A shift from focusing on managing your storage to managing your data (through real-time data analytics).

Data, not the underlying physical storage, is what matters. However, traditional storage systems are “big dumb buckets” that provide precious little insight into what data is growing, what applications or users are accessing it, or what is consuming storage performance and why. Next-generation storage systems are “data-aware,” with real-time analytics built directly into the storage itself, providing real-time information on data and performance at massive scale.

Software-Based Approaches

Disruptor #2: A shift from hardware-based (proprietary) approaches to software-based (using commodity hardware) approaches.

Traditional storage systems were tightly coupled to their proprietary underlying hardware, making storage systems expensive, complex, and requiring “fork lift” upgrades when replacing older, slower systems. Modern storage systems are software-only running on top of commodity x86 hardware. This reduces cost and greatly increases flexibility of deployment. Modern storage is designed to run on-premise, in the cloud, or some combination of both and does not rely on proprietary NVRAM, interconnects, or other hardware components.

Flash-First Hybrid Storage

Disruptor #3: A shift from all hard disk drive based storage systems to flash-first hybrid storage systems (using a mix of flash and spinning hard disk drives).

Flash provides the best storage performance per dollar, delivering approximately 15,000 to 30,000 IOPs per SSD compared to 150 IOPs per hard disk. While the price of flash per gigabyte has declined significantly, it is still roughly 10x more expensive on a cost per GB basis for capacity intensive storage, such as unstructured data. Modern storage systems are designed to optimally use a mix of flash and spinning disk, providing the most economic balance between cost per performance and cost per capacity.

Managing Number of Files

Disruptor #4: A shift from focusing on managing just petabytes of data (size of files) to managing billions and billions of files (number of files).

Traditional storage systems were never designed to handle the hundreds of millions and billions of files that are a reality in today’s digital and Internet-connected world. Processes such as disk or node rebuilds, automatically re-balancing data or tree-walks all break down as the number of files or objects reach high numbers. Modern storage systems are designed to handle tens of billions and ultimately trillions of files, in addition to providing petabytes of raw storage capacity.

Linux-Based OS Approaches

Disruptor #5: A shift from proprietary OS approaches to Linux-based (100 percent user space) OS approaches.

Traditional storage systems rely on a proprietary kernel-based operating system, which was necessary 10 to 20 years ago in order to achieve maximum performance from the storage system. Modern storage systems are designed to run entirely in user mode on top of a standard distribution of the Linux operating system. This accelerates the pace of software innovation, makes fully automated testing of new software possible, and accelerates the ability to support new commodity hardware platforms as they are introduced into the market.

Storage Wars” is a popular reality TV show, but the title may seem all too real to enterprises trying to deal with storage demands as they drown in data. The battlefield has changed dramatically. Organizations are faced with storing billions or even trillions of files – increasingly unstructured data, large digital files such as videos and images. And the old solution – simply adding more physical storage – doesn’t work anymore. It’s too expensive, inefficient and unmanageable.

Fortunately, technology has a way of solving the problems that technology creates, and new approaches to storage are emerging to attack the deluge of data pouring from Internet-connected devices and systems. We are seeing a major shift in how today’s enterprise storage is being developed. The emphasis now is on data management at today’s scale – intelligent, software-based systems that provide scalable, fast and reliable data storage systems and enable organizations to focus on extracting value from data rather than managing storage.


http://www.itbusinessedge.com/slideshows/five-trends-shaking-up-todays-enterprise-storage-strategy.html