2012 Will Be All About the Data, and How We Manage It

2012 Will Be All About the Data, and How We Manage It

Part 1

I can’t decide if this is the most exciting time to be in IT or, frankly, if it sucks. While our budgets have yet to move upward, the number of initiatives, new strategies and technologies we need to evaluate and implement are growing at exponential rates. And for those of you with CIO’s pushing a cloud strategy, it’s even harder; as you are now being told to use the cloud to solve all of your company’s woes, and you likely have employee’s signing up for SaaS applications outside of your control.

At this time last year, I predicted we were going to stop leading with the “cloud” and stick to the tried and true process of buying a solution, not the cloud. This means we start at the same place we always have, evaluating the business and technical goals of our company and finding the best solutions on the market to fulfill those requirements. If, during this process, we find a cloud-based solution that works and saves us money (and allows our CIO to check that cloud box), then that’s frosting on the cake. However, I’m not convinced we totally got there last year, as I’m still seeing too many conversations start with the cloud rather than the challenge or solution. But we have improved.

Over the past year, we also experienced huge debate around public versus private cloud, with many large enterprises (and smaller businesses) refusing to utilize so-called public cloud solutions. The biggest driver for this was data protection and privacy concerns. In 2012, I believe we must start moving beyond the public versus private cloud debate and realize that all clouds are built on an Internet backbone and, thus, present security issues if not managed or architected well. In doing so, enterprises will take a more holistic view of their infrastructure, cloud and on-premise, and will focus on the most important element of business: data.

Just as Julie Andrews taught us in Sound of Music (yes geeks can still like musicals), let’s start at the very beginning, which in this case is the data. We have all seen the stats about the astronomical data growth. IDC says we will be in the Zettabytes by the year 2020, and other experts think that will happen more quickly. Even if you are not dealing with “big data,” everyone in the coming year will face a cascading rise of digital data across a wide range of device types, networks and users.

Therefore, the emphasis needs to be on creating networks of “trust” based on proven security policies and governance; worrying less about where that information sits in a cloud, or locally, but instead on how that information is protected, managed and accessed.

Read Part 2 on Friday- Creating Trusted Data Networks

By Margaret Dawson, Vice President of Marketing at Symform

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into…

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

How Data Privacy Reform Is Wreaking Havoc In The Cloud

How Data Privacy Reform Is Wreaking Havoc In The Cloud

Data Privacy Reform Is Wreaking Havoc Nations around the globe are stepping up efforts to better protect the personal data of private citizens. In particular, cross-border data security regulations and legislative reform is on the rise. The laws must evolve in order to mitigate theft, abuse and misappropriation of personally identifiable information (PII), better guard…

5 Reasons Why The U.S. Dominates The Digital World!

5 Reasons Why The U.S. Dominates The Digital World!

U.S. Dominates The Digital World! I have spent about half my working life in the US and the other half in Europe. During this time (25 years) it has been exciting to see digital trends over the years. There has never been a doubt that the US has been a dominant power in anything digital…

Jargon Free: The Three Real Main Benefits of Cloud IAM Solutions

Jargon Free: The Three Real Main Benefits of Cloud IAM Solutions

Main Benefits of Cloud IAM Solutions There are significant discussions concerning cloud applications and software solutions, such as identity and access management (IAM) solutions, which are used in conjunction with them. These articles often discuss complex technical reasons and benefits, which may be difficult for a non-technical person to understand. Cloud applications and cloud IAM…

IoT Rapid Expansion Throughout The World

IoT Rapid Expansion Throughout The World

IoT Rapid Expansion Cyber Physical Systems (CPS) are a nomenclature used to define the world beyond IoT devices. CPS includes the robotic and automation systems that interact with the IoT devices. Based on that changing landscape I have come to realize that CPS and by default IoT devices actually have three distinct concerns. The three…

How Your Business Can Overcome Its Fear of BYOD

How Your Business Can Overcome Its Fear of BYOD

Overcoming BYOD Fear While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor