2012 Will Be All About the Data, and How We Manage It: Creating Trusted Data Networks Part 2

2012 Will Be All About the Data, and How We Manage It

… Just as Julie Andrews taught us in Sound of Music (yes geeks can still like musicals), let’s start at the very beginning, which in this case is the data. We have all seen the stats about the astronomical data growth. IDC says we will be in the Zettabytes by the year 2020, and other experts think that will happen more quickly. Even if you are not dealing with “big data,” everyone in the coming year will face a cascading rise of digital data across a wide range of device types, networks and users… Continuation from Part 1

Creating Trusted Data Networks Part 2

This reminds me of conversations I used to have in the network security field regarding secure mobile access. At that time, IT managers were faced with a growing mobile workforce, which demanded access to the network from anywhere, anytime and from any number of mobile devices. Network administrators quickly realized that the old “castle and moat” security model wasn’t working, because there truly was no way to lock down the network and prevent holes in the firewall, while still enabling the business. This was the start of the new world of business technology where IT had to demonstrate how it was enabling the business and helping it succeed, beyond just keeping the business running.

With the so-called “deperimeterization” of the network, the focus was on access to and protection of the data. So, the perimeter moved inward and security was designed to protect applications and information those employees and others needed to access easily. The same is true for the cloud and our overall data management strategy: see the cloud as an extension of your on-premise infrastructure and holistically architect your model to ensure data security and secure access to that information.

In creating trusted data networks, you’ll need to answer these questions, and obviously there can be many steps and processes involved in answering these questions and getting control, so please forgive the oversimplification:

  • What is my mission critical and business critical data?
  • Where is that data today?
  • How am I protecting that data?
  • Who needs access to the data?
  • How do I “trust” those accessing the data are authorized and authenticated?
  • How do I ensure a single source of “truth” for my data?

As we move forward, the idea of networks of trust can be applied across clouds and on-premise infrastructure. The vision is to have the ability to move information and business processes seamlessly across areas of your environment that encompasses both on-premise and the cloud. Think of this as taking the concept of SOA to the cloud, where you have a federated layer of information that is accessible by everyone in your “community”, whether internal or external.

With trusted cloud networks, you gain the ability to:

  • Connect and share information across clouds and users
  • Create or leverage cloud connectivity brokers
  • Create areas of federated services with controlled access
  • Establish SOA in the cloud for inter-enterprise information exchange
  • Ensure backup disaster recovery for all your data in case of an outage (of either your on-premise or cloud environment)

In 2012, the hype around the cloud will continue, but it will be more mature as we take an overall view of our infrastructure and focus more on creating networks of trust rather than viewing our on-premise and cloud environments as separate entities. This will not be accomplished overnight and requires centralized policies, management, analytics and integration. However, each step we take in this direction will prepare us for what appears to be a never-ending flood of data.

By Margaret Dawson /Vice President of Marketing at Symform 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

IoT Rapid Expansion Throughout The World

IoT Rapid Expansion Throughout The World

IoT Rapid Expansion Cyber Physical Systems (CPS) are a nomenclature used to define the world beyond IoT devices. CPS includes the robotic and automation systems that interact with the IoT devices. Based on that changing landscape I have come to realize that CPS and by default IoT devices actually have three distinct concerns. The three…

Weighing in on Recurring Revenues to Tip Your Business’ Scale

Weighing in on Recurring Revenues to Tip Your Business’ Scale

Tip Your Business’ Scale CEOs, investors, analysts, and business advisors have fallen in love with the recurring revenue business model. In fact, when comparing like software companies, Wall Street gives 2x higher valuations for businesses with successful recurring revenue models in place. It’s no wonder that research indicates 50% of US businesses have already adopted…

5 Tips For Building A High Growth IT Platform

5 Tips For Building A High Growth IT Platform

5 Tips For Building a High Growth IT Platform Building and maintaining today’s enterprise computing platforms is a lot more challenging than it was in the past. The competitive and fast moving nature of business requires a corporate network capable of meeting a company’s ever changing needs and requirements. For IT, this poses difficult challenges…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Driving Insight: Analytics And The Internet of Things

Driving Insight: Analytics And The Internet of Things

Analytics And The Internet of Things  For many businesses, the Internet of Things is playing an increasingly important role, influencing day-to-day operations and strategic planning. An ecosystem of growing complexity and sophistication, the IoT calls for careful navigation: advances in connectivity and cloud-based platforms have opened up a wider range of solutions to IT decision-makers…

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Tackling Complex IT Challenges Sponsored by Hybrid IT: The Next Evolution in Enterprise IT, NetApp and Verizon. Today’s sophisticated business environment demands a dynamic and robust IT infrastructure which is a far cry from the closed, controlled environments that most IT departments were created to handle. A hybrid IT infrastructure, drawing services from multiple cloud-based…

Featured Sponsored Articles
The Benefits of Cloud-Based Phone Systems

The Benefits of Cloud-Based Phone Systems

Cloud-Based Phone Systems This article has been sponsored by RingCentral, provider of state-of-the-art cloud infrastructure. Although today’s businesses rely on a host of modern technology, the century-old telephone call is as essential as ever. Of course, businesses today aren’t relying on simple analog voice calls for effective interaction with partners, suppliers, colleagues, and customers, but…

Featured Sponsored Articles
Working With Cloud White Label Partners

Working With Cloud White Label Partners

Cloud White Label Services Sponsored by CloudMGR The benefits of consolidating your cloud to one of the giants such as AWS, Microsoft Azure, and Google Cloud are improving as competition increases, with pricing wars between the service providers meaning better savings for businesses utilizing these services, and an abundance of features at user fingertips as…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor