The cost of a data breach can be astronomical. Each record lost is estimated to cost a business $141. While individually that doesn’t seem like much, consider the scale. When an enterprise business comes under attack, the number of records can mean a $3.62 million price tag. With businesses investing in more hardware—31 percent of IT budgets are earmarked for hardware purchases—it opens the door to a new possible security breach. Outdated hardware often contains sensitive information, meaning that businesses don’t just need to watch for frontline attacks, they also need to watch the back door of data disposal. When trying to keep data out of the wrong hands, several challenges present themselves.
1. Creating Clear Disposal Policies
When upgrading to new systems, tossing old systems into the trash or donating them to a nonprofit might seem like the most efficient solution, but without solid policies in place to guide when, and more importantly how, these disposal options are handled, you might be giving away your corporate data for free. A surprising amount of sensitive information may be stored locally on devices, making it important for your business to have a checklist in place for what to do with any decommissioned device that has internal storage.
2. Controlling Shadow IT Devices
Your company may not hand out flash drives or load data onto discs, but that doesn’t mean employees are as discriminating. To get the job done, employees will often adopt processes that don’t have a security-first mindset. For example, someone in marketing might download a list of leads to a flash drive for a quick handoff to the sales department. If that flash drive isn’t part of your IT inventory, how do you know what happens to it, and the data stored on the drive?
3. Managing BYOD Mobile Situations
Handing out smartphones to dozens or hundreds of employees can get expensive, which is why many companies have switched to a Bring Your Own Device model. When employees use their own phones to access sensitive information, they may not have enough security installed to protect it, and what happens to their existing phone when they upgrade? All of these questions should be part of any decisions about mobile policy and data access.
4. Decisions about Encryption vs. Erasure
Permanently deleting data from hard drives is virtually impossible, which may be one reason to implement physical destruction for older drives. With newer solid-state drives, sometimes encryption is a better solution than erasing data. After all, you have a limited nmumber of times you can re-write to these drives before they become inoperable. Top-level encryption can keep your data alost as secure, without the need for a NIST-licensed incinerator.
5. The Challenge of Total Data Destruction
Most storage devices don’t easily delete data. Shadows are left behind. With the right software, a hacker can come along behind you and recreate a lot of the content you ‘deleted.’ For actual data disposal, physical destruction of the storage device is the most secure method. That doesn’t mean taking a hammer to your old servers, but it does mean pulling your drives and sending them to a disposal facility. This process is time-consuming and expensive, so it should only be implemented for your most private storage units.
Many businesses are moving toward cloud-based solutions, in part to avoid some of these challenges. When your sensitive data is stored elsewhere, you don’t need to worry about disposal, though you will want to know how your vendor handles the issue.
When talking about technology, security is always a top-line issue. Data breaches are costly and a near-constant risk. Today, 54 percent of companies report being the victim of a successful cyber attack. Many companies faced with data loss never recover, so identifying and plugging holes in your security is a crucial task. With the number of cyber attacks always on the rise, you need to keep security at the forefront of your planning. Here are a few data security forecasts to watch for and possible solutions for the next few years.
- 99% of breaches exploit known risks. Cyber attacks happen, but the method of attack is often through a hole in security that has been identified for at least a year before the attack happens. Your security professionals know that an attack is possible, so be prepared to focus your efforts where they will do the most good—fixing known vulnerabilities.
- Shadow IT is a major risk factor. While many third-party programs offer big productivity boots, shadow IT solutions don’t come with the same protections as those deployed by your IT department. Google Docs might be a quick way to share information and get feedback, but it can also leave your documents exposed to hackers. Develop policies that inform and secure these shadowy programs so your business can stay agile without opening any doors to outsiders.
- Cloud-based solutions lead to flying attacks. Analysts predict that the cloud will be a standard part of any IT stack by 2020, which also leads to the need to protect that digital space. Since IT can’t secure cloud data with physical resources, data protection becomes the next best thing. Stronger encryption, better passwords, two-factor authentication, and other increasingly sophisticated strategies will be a must as the cloud becomes part of life on the ground for businesses.
- Be prepared to leave passwords behind. As recognition software platforms become more applicable, the need for passwords disappears. When software can use facial recognition, voice recognition or even your typing rhythm, you won’t need to remember a complex password or carry a security token to access systems. Start looking at these security options now, and be ready to deploy them as soon as you feel they are ready.
- Invest in IoT security. Predictions say IoT devices could be involved in up to 25 percent of cyber attacks, which means this is an area that needs some better defenses. This is particularly true when you realize that a recent HP report noted that 70 percent of common IoT devices have known security vulnerabilities. Since these devices provide a point of access, you really need to close the gates before malicious code jumps from the IoT to your secured network.
More technology options mean significant improvements to business processes. Unfortunately, this boost comes with the price tag of more attack vectors for malicious coders. More devices and more access points add up to more spending on IT security and education. Done right, IT security can be the guard dog it should be, sending the burglar on to the next, less protected house.
The environmental cost of data centers is on the rise, with energy topping the list of concerns. While these centers provide massive amounts of digital storage and grow compute power for businesses and consumers, the operational costs of these centers aren’t only measured in dollars.
Hidden Costs of Digital Technologies
Newer data centers consume a fraction of the amount of energy and other resources to run, but older centers face the challenge of delivering similar levels of service at a much higher run rate. The capital cost of new centers is staggering with an estimated $20 billion annual price tag, but the continuing energy consumption of older centers is an even greater challenge. Currently, data centers use 3 percent of the global electricity supply and pollute as much as all airlines combined. Stack that energy usage next to data needs doubling every two years and you can see the cliff approaching in the near future.
Light the World with Simple Searches
It’s easy to ignore the ecological impact of digital technologies, especially since these technologies rarely make it to the forefront. Instead of producing products, these systems run production. They are the invisible helper behind everything from hailing a cab to manufacturing a bar of soap. And, older data centers are anything but green. Google estimated that a single search used as much electricity as a 60-watt bulb for 17 seconds. That might not seem like much until you realize that this search engine process 1.2 trillion requests each year.
Simply storing and accessing data eats a lot of power, but that problem is compounded by the fact that it can cost as much to cool these systems as it does to run them.
Overcoming Energy Issues
Turning older data centers into energy efficient operations depends on two factors:
- Energy efficiency
- Renewable resources
For new centers, this has driven construction in areas where renewable energy or alternative cooling solutions are readily accessible like Finland, Denmark, and Sweden. For older centers, the location is already set, but that doesn’t mean energy usage must remain static. Older data centers can retrofit their existing systems with modern techniques for cooling and balancing energy usage. The Federal Energy Management Program demonstrated the viability of this option with a 31 percent drop in PUE.
Start with Modular Cooling
At Aligned Energy, we target the cooling end of the power problem. Since cooling can cost as much as operations, we focus on providing a system that helps you keep temperatures optimal without draining local water supplies or spiking the electric grid. Our industry leading 1.15 PUE helps reduce costs and drives toward the goal of energy-efficient operations. Plus, keeping water use low (our system uses 1/10 the water of historical data centers) tackles the next environmental issue looming for data centers. Update existing centers for the future using modular cooling at the point of heat and see a reduction in continued energy costs. It’s a win for everyone.
Data scientists predict that data volume will double every two years. But, that may not include all the data coming in from IoT devices and the rapid adoption of smartphones, globally. Some predictions put raw data numbers in excess of 44 zettabytes by 2020. Over the past two years, 90 percent of data has been generated. Here’s a glimpse at just a few statistics that shed some light on data.
Data Doubles Every 2 Years
Consumer use of data is just a small fraction of the current load, and it alone accounts for some amazing numbers. Consider this from Internet Live Stats:
- Nearly 2 billion websites are active and available.
- More than 3 billion daily searches crawl the web.
- 2.7 million emails are sent every second.
- Nearly 52,000 photos are posted on Instagram every hour of the day.
- 60,581 GB of Internet traffic occur every second.
That’s a lot of data moving around, and the load is only expected to grow.
What’s Driving Data Growth?
Three essential factors are behind this incredible increase in the amount of data used, stored, collected, and analyzed-smartphone adoption, AI and machine learning technologies, and the spread of IoT devices. Business data use is particularly tied to growth in AI and IoT devices, with data storage needed for training and AI and collecting information from all of the disparate devices that make up the IoT. A recent report by Gartner concludes that by 2020:
- Economic viability will affect 30 percent of data centers that fail to apply AI support to enterprise businesses.
- 90 percent of serverless deployments will not involve I$O organizations for general use.
- 50 percent of Mode 1 workloads will be using n-tier bimodal systems and 80 percent of Mode 2 workloads will also use n-tier bimodal designs.
- Enterprise use of mission-critical, containerized cloud-native apps will rise from 5 to 50 percent.
As businesses move toward AI applications and develop increasingly complex systems run from the cloud, the burden on data centers will only increase. This will naturally lead to denser racks and the need for higher efficiency cooling solutions.
Aligned Energy offers unique cooling solutions designed to meet the needs of the next generation of data centers. By designing for tomorrow, using modular cooling that can be deployed as needed, these cooling options help control the rising costs of cooling that go hand-in-hand with exponential increases in business data.
Over the next three years, data and analytics programs will become even more mission-critical throughout businesses and across industries. The digital business future confronts leaders with almost unlimited possibilities to create business value. This transition requires moving away from the old mindset of siloed data, applications and analytics used for reactive reporting and basic analytics. Instead, leaders need to look at data as the raw material for any decision and consider that data comes from both within and outside the enterprise. Here are 10 data and analytics predictions to keep at the forefront for business decisions:
1.Core Data and Analytics: By 2019, 50% of analytics queries will be generated using search, natural-language query or voice, or will be auto-generated.
Advanced analytics and data science are fast becoming mainstream solutions and competencies in most organizations, even supplanting traditional business intelligence and analytics resources and budgets. They allow more types of knowledge and insights to be extracted from data. To become and remain competitive, enterprises must seek to adopt advanced analytics, and adapt their business models, establish specialist data science teams and rethink their overall strategies to keep pace with the competition.
2. Artificial Intelligence: By 2019, AI platform services will cannibalize revenues for 30% of market-leading companies.
Business and IT leaders are stepping up to a broad range of opportunities enabled by AI, including autonomous vehicles, smart vision systems, virtual customer assistants, smart (personal) agents and natural-language processing. This new general-purpose technology is just beginning a 75-year technology cycle that will have far-reaching implications for every industry. AI is changing the way in which organizations innovate and communicate their processes, products, and services. Practical strategies for employing AI and choosing the right vendors are available to data and analytics leaders right now.
3.Information Management: By 2019, 250,000 patent applications will be filed, including claims for algorithms—a tenfold increase from five years ago.
Information strategy is not a technology (or stack of technologies) that an enterprise can easily acquire. It is a long-term commitment to the exploitation of information for improved business outcomes. In fact, its importance has risen to the executive level. The increasing prominence of the role of the CDO is the most obvious indication of this. Information management and analytics are now about much more than architecting, integrating, cleansing, storing and analyzing data—they’re central to most organizations’ business strategies and demand significant attention.
4.Information Infrastructure: By 2019, 30% of organizations will use object storage as a data repository on-premises, bringing cloud architecture to the data center.
Modern information infrastructure will include data virtualization, the separation of storage and compute, and cloud-based data persistence. Data and analytics leaders must evolve their technology capabilities for digital transformation. An increasing pressure to manage data in multiple deployment models, while also optimizing its access and retrieval, is mounting and will guide modernization efforts in a way that will deliver optimal long-term value.
5. Data Security, Privacy, and Identity: By 2020, 30% of large enterprises will leverage snapshots and backups for more than just recovery, up from less than 10% in 2015.
In 2017 and beyond, achieving three important goals—privacy, safety, and reliability—will require strong planning and execution in the areas of security, privacy and identity management. IT leaders should consider these forward-looking predictions when allocating resources and selecting products and services.
6. Enterprise Content: By 2020, 95% of video/image content will never be viewed by humans; instead, it will be vetted by machines that provide some degree of automated analysis.
Enterprises are modernizing their content management infrastructures and applications to better support digital workplace initiatives. At the same time, emerging content management technologies and capabilities provide enterprises with the opportunity to leverage the trends associated with cloud, mobile and social. We assist IT leaders responsible for the enterprise content strategy with addressing not only how to manage content, but also how to use content in ways that promote productivity, efficiency, and business opportunities.
7. Internet of Things: Through 2020, lack of data science professionals will inhibit 75% of organizations from achieving the full potential of IoT.
The IoT is emerging as a key enabler of our digital future, and global spending on IoT—including all hardware, software and services—will increase in the next five years. However, the path to capturing benefits from IoT will not be a straight line. It will have many twists and turns as companies pursue big plans, hit roadblocks, learn and adjust. Some will give up, while others will follow through and realize the transformational potential the IoT can have in helping them become a successful digital business.
8. Smart Cities: By 2020, 30% of smart cities’ ambient care applications, related to, for example, medical/healthcare/nursing care, including proactive care, will have introduced smart machines and robotics in nursing care and medical facilities.
Smart city applications and solutions have become important in citizens’ user experience and can leverage IoT technologies to improve the quality of life. Strategists in smart city projects should consider the user experiences and how the solutions are being accepted by the citizens.
9. Mobile, Web, and Personal Devices: By 2020, over 50% of consumer mobile interactions will be in contextualized, “hyperpersonal” experiences based on past behavior and current, real-time behavior.
Mobile devices and applications are being used more frequently to support business-critical applications, requiring more stringent manageability to ensure secure user access and system availability. The following research provides insight for CIOs, IT leaders, application leaders and mobile app development managers into some key developments over the next few years for mobile devices and apps. The personal device market represents connected devices used by people during the day, at work, at home, to play or on the go. The personal device market is expanding with new types of products, such as wearables, linking with IoT endpoints and using immersive technologies.
10. Personal Technologies
By 2020, 5% of adults 65 years of age and older will have a personal healthcare robot.
The personal technology market has never changed as fast as it is changing today. This prediction will help technology product management leaders identify key trends regarding what and where the growth opportunities are in this vast and lucrative market.
To learn more about the future of data and analytics and the value for your business, contact Aligned Energy.
Fundamental shifts in security markets are driving significant changes for providers in automation, compliance and service-based security solutions. Technology business unit leaders must rapidly embrace the changes if they are to maintain their relevance and competitiveness.
Here are three trends across multiple security market segments, which are expected to grow over the next three years:
- More advanced automation capabilities
- Continued shift of buyers’ preferences for service-based security solutions
- Added compliance mandates and regulations due to ongoing, large-scale breaches.
Let’s delve into what experts predict for these three trends facing the Security Segment for 2018.
By 2021, requirements for greater efficiency in threat response will drive 20% of buyers to heavily weight automation in buying criteria.
A growing demand for automation of tasks performed primarily by individuals in the past, which have been enabled by the advancement of predictive and prescriptive analytics. This shift is driven by the need for faster responses to threats, and customer adoption of continuous, adaptive risk and trust-assessment-focused security programs.
Data science techniques happening today are the inception for the future of more automated threat detection solutions. Threat detection is a prime market for solutions that incorporate automation. Understaffed, overworked and error-prone humans are making security automation an attractive approach.
Security automation itself is not a market; it’s a method. It’s a way to create new value in existing products, or potentially give rise to new market categories. Vendors of threat detection solutions today are adding more capabilities for automation within their products.
Most innovation in security automation should be more than just investigating and responding to threats and performing simple tasks, such as automatic antivirus updates. Vendors must also seek to use automation to create top-line value and differentiation.
By 2020, at least one-third of leading endpoint protection platform vendors will acquire mobile threat detection companies to complete their endpoint protection suites.
As of the first quarter of 2018, 52-percent of global web traffic originated from mobile devices, up from 50 percent in the corresponding quarter of the previous year, according to Statista. As a result, there is a significant shift in customer buying preferences toward service-based security offerings. This transition will strain traditional vendors that must sharply alter virtually every aspect of their business to respond.
Only 3% of enterprises surveyed by Gartner have anti-malware protection on mobile Android devices and only 1% on iOS devices. Mobile malware represents only 7.5% of total malware reported in standard tests today, but given current trends, Gartner expects this percentage to rise to one-third of the total by 2020.
Mobile malware will continue to become more prevalent, especially on Android devices, as desktop and laptop security software becomes harder for criminals to penetrate. This growth will drive EPP vendors to more aggressively extending their protections to mobile platforms. Many EPP players already have mobile security software offerings, but they are typically weaker and less comprehensive than solutions sold by vendors in the growing mobile threat defense (MTD) market. Most mobile endpoint security needs are met today by the MTD.
More Tools, More Compliance
By 2020, more than 60% of organizations will invest in multiple data security tools, up from approximately 35% in 2017.
Compliance mandates and regulations are creating increased concern among buyers, especially as the cost of failure becomes more painful. Continued, large-scale breaches—themselves a driver for security purchases—will bring about even more stringent levels of regulation.
End-user organizations continue to struggle with data protection and lack strong policies and procedures. Regulations have created buyer angst, reinvigorating data protection needs in broad support for compliance activity and the vendor landscape in the data security market has been in a constant state of change for years, and needs to continue to adapt and evolve.
The use of data-centric audit and protection (DCAP), data loss prevention (DLP) and encryption tools will grow as organizations continue to protect sensitive data, but end users need a continuous risk-based and trust-based assessment approach.
The need for adherence to the requirements of regulatory mandates, such as this year’s sweeping European General Data Protection Regulation (GDPR) protocols and ongoing releases from the Payment Card Industry (PCI) will drive further guidelines in the data security space. These groups will likely lead to products being made smarter and more efficient, geared toward being people-centric and security-aware.
Security for the Future
As these and more trends continue to drive the security segment this year and beyond, IT leaders must evolve their strategies beyond compliance-only-related data protection, and shift attention to tools capable of protecting digital intellectual property. As a result, take advantage of growing market opportunities arising from the demand to implement data security products in reaction to regulatory compliance concerns. Also, focus on intellectual property protection, as well as insider threats of data theft. Integration of advanced analytics and new technologies, such as blockchain, artificial intelligence, and machine learning, should be a focus going forward for product enhancement.
Rapidly changing to meet your company’s and customers’ expectations will keep your data secure while staying current, relevant and competitive. Aligned Energy can be your trusted partner for your data security needs. Take a tour of our Dallas data center today!