Part One – Technology Trends: The evolution of data protection in 2024 (Sponsored Post)

As you might have read in my introduction post to this series, the importance of data protection has reached new heights, and as we step into 2024, a pivotal shift in strategies is discernible. The trend of the year revolves around a proactive stance, and organisations are acknowledging the need for a comprehensive approach that amalgamates robust cybersecurity measures with innovative data recovery strategies.

Proactive Measures Taking Centre Stage

The evolution of data protection in 2024 is marked by a departure from reactive approaches to a proactive mindset. Instead of merely responding to threats, organisations are now actively implementing measures to prevent data breaches and unauthorised access. This change in thinking underscores the importance of pre-emptive actions in the face of an ever-expanding threat landscape.

The Triumvirate of Cybersecurity, Encryption, and Access Controls

In this era, where data is a cornerstone of business operations, the integration of cybersecurity measures with encryption and access controls is imperative. The evolution of data protection in 2024 mandates a comprehensive defence mechanism. Encryption acts as a robust shield, rendering data unreadable to unauthorised entities. Multi-factor authentication adds an extra layer of security, ensuring that only authenticated users gain access. Simultaneously, secure access controls monitor and manage permissions, mitigating the risk of internal threats.

create me a big fish with money in it, and cybersecurity professionals trying to hack into itRansomware attacks level up and target the big fish

If you remember my post about how to safeguard your business against ransomware, one of the key takeaways from that was highlighting and emphasizing the rise of ransomware,  In a survey across of 3,000 IT cybersecurity leaders in organisations across 14 countries in the Americas, EMEA, and Asia Pacific (commissioned by Sophos) entitled 2023 State of Ransomware, it was found that 56% of organisations with revenue of $10-$50 million (USD) experienced a ransomware attack compared to 72% of victims with annual revenue of $5 billion (USD) or more.

Among organisations with less than $10 million in revenue, 36% paid the ransom at an average payout of $690,996 (USD). Meanwhile, the heaviest earners (Over $5 billion USD) paid out 55% of the time, at an average payout of $2,464,339 (USD)

BDRSuite: Pioneering the Next Wave of Data Protection

Amidst these transformative trends, BDRSuite emerges as a frontrunner in providing innovative solutions. The platform aligns seamlessly with the proactive data protection approach, offering a suite of features designed to safeguard sensitive information.

Real-Time Monitoring and Rapid Recovery

BDRSuite‘s real-time monitoring capabilities empower organisations by providing insights into potential threats as they emerge. With this foresight, proactive measures can be taken to thwart attacks before they escalate.

Furthermore, BDRSuite‘s rapid recovery features ensure that in the unfortunate event of a data breach or loss, organisations can swiftly restore their systems to normalcy, minimising downtime and mitigating potential damages.

Instant Boot VM

Covered in one of my earlier blog posts, BDRSuite’s Instant Boot VM empowers organisations to launch a virtual machine directly and nearly instantaneously from their most recent backup dataset ensuring that critical applications and services are back online within minutes.  This tool empowers organizations to maintain peak availability even in the face of unforeseen challenges, providing a reliable safety net for critical virtual machines and the data they service out.

AI-Driven Threat Detection to reduce downtime (Coming soon)

In the face of evolving cyber threats, BDRSuite plans to incorporate A.I under the hood to enhance its threat detection capabilities. The platform utilises advanced algorithms to identify and neutralise potential risks, offering an additional layer of defence against emerging threats by using smart analytics to continuously assess data patterns, enabling swift detection of anomalies or suspicious activities. Automated response mechanisms kick in seamlessly, preventing data breaches and minimising downtime.

Granular Recovery Options

BDRSuite recognises the importance of data granularity. In the event of a security incident, organisations can use BDRSuite to selectively recover specific files or data sets, avoiding the need for extensive restoration processes and minimising the impact on operations. Check out more on file level recovery here

In Closing

The evolution of data protection in 2024 demands a proactive and multifaceted approach, and BDRSuite emerges as a true ally in this transformative landscape against some pretty significant risks. By integrating advanced features and capabilities such as Instant Boot VM, granular recovery capabilities and their mission to include AI underneath the hood to proactively predict and remove threats before they do any harm means that as an overall data protection suite (as this isn’t just about backup in 2024) BDRSuite empowers organisations to not only protect their data but also to navigate the challenges of the digital realm with confidence and resilience.

In my next post, we will take the Ransomware discussion even further with how to mitigate the risk to your organisation.

Stay tuned for Part 2: Rise of Ransomware Mitigation Strategies

1 thought on “Part One – Technology Trends: The evolution of data protection in 2024 (Sponsored Post)”

Comments are closed.

Related Post

A look back at Traditional Backup and forward to the Cloud with ‘VeeamOn’.A look back at Traditional Backup and forward to the Cloud with ‘VeeamOn’.

This year, Veeam is holding its first annual conference “VeeamON” focused on the evolution of Virtualization, the shift to the cloud, and in particular Data Protection and why now, more than ever data availability should be on the focus list of every single CIO/CDO across the globe. Why is data protection important? Let’s take a look at what workloads there were 20 years ago compared to now.

In the beginning….

Historically, Backup really revolved around tape –  usually a single tape backup drive connected to a computer that would back up days and weeks worth of precious company data to a single tape. Backups could naturally take hours to complete, as did restores which were rarely tested and also had the potential to take hours to locate the right tape drive, load it into the tape unit and restore in the event of data loss. Some may argue that the process of backing up and restoring back then was fairly straight forward as there were purpose built devices with one job but the efficiencies in doing were so were absent.

But in hindsight, there were (and still are) pitfalls in traditional backup methods, modern day features such as deduplication, compression, incremental block changes that have become a norm in storage and backup administrator’s vocabulary were not available to the business back then so things took time to complete. Eventually these features came but usually through having to purchase a new set of physical hardware or external device to perform the tasks which at times could prove costly. Virtualization was not the norm back then so servers were not portable containers and bare metals restores were 100% part of daily life for the various IT teams.  One thing that has not changed from legacy backup times is the reason why backups had to happen. To protect companies Intellectual property in the form of data and to ensure this data was online and accessible after a disaster – Availability.

The need for data availability

During my tenure at HP, I wrote a two-part article entitled “Woudl you like a side of Disaster Recovery with that” aimed to discuss the sometimes misunderstood (and unappreciated) area of Disaster Recovery – what it meant and why it is important.   I touched on points that not having data available and online can be (and is) a very costly exercise depending on what industry vertical your business operates in. You may have a read at the two part post at the following two links:

http://h30507.www3.hp.com/t5/Transforming-IT-Blog/Would-you-like-a-side-of-Disaster-Recovery-with-that-1-2/ba-p/120591

http://h30507.www3.hp.com/t5/Transforming-IT-Blog/Would-you-like-a-side-of-Disaster-Recovery-with-that-2-2/ba-p/121951

The important message I wanted to convey through these writings was availability has a cost associated with it when things goes wrong and SLAs are no longer being met due to hardware and/or software failures not to mention other unforeseen incidents such as human error (perhaps someone accidentally pulled the wrong cable out – it happens!) ,  Most storage and backup advocates know that,  a lot of our day jobs revolve around making sure SLAs are met whether you are a company providing a service or a vendor selling technology that helps meet those SLAs. – They all tie back to availability and how quickly this happens.

The landscape is evolving.

photo.JPG

Take a look at this forecast released by Cisco entitled ‘Cisco Global Cloud Index: Forecast and Methodology, 2012–2017’ and in particular Figure 5. Workload Distribution and its accompanied Table 3, and just observe how massive the shift from traditional workloads to virtual workloads is becoming,  of course this varies from country to country but as a general trend you can see the IT landscape is heading more and more into dealing with virtual environments as opposed to physical. In fact, this studies just verified that these days, virtual workloads are the norm and location, location, location also matters – whether it is based on-premise, or off-site perhaps in a cloud provider environment, these workloads still need to be protected at a local (site) basis as well as a off-site (replica) basis.  With the newest version of our flagship product – Veeam Backup and Replication, Veaam is positioned perfectly to manage virtual workloads no matter where they reside.

Now, hopefully that set the context of why VeeamOn is important to IT Leaders – CIO’s, CDO’s, CSO, and CTO’s alike. So here are the details:

 

veeamon

 

 

 

 

What is it?

VeeamON is a three day event focused on modern day data centre availability, not just backup, not just DR but all encompassing and will feature some well-known industry speakers and analysts from companies such as Gartner and ESG. It is being held October 6th-8th at the Cosmopolitan hotel in Las Vegas. This event will host a series of quality sessions focused on modern day availability solutions and trends in the modern data centre that help form the “Always-On” story – Think back to the briefs I wrote about and why it is so important to remain always on!.  Whether you are business focused, or technical – there will be valuable content catering for both business and partner streams so you can choose from a great variety of content.

Where is it?

The Cosmopolitian in Las Vegas, USA

When is it?

The event is happening between October 6th – October 9th 2014

But wait…. theres more!!!!

Veeam is giving away five free regular passes and one free VIP pass to VeeamON, all you have to do is to go here -> http://go.veeam.com/veeamon-free-pass and enter in your details.

Its that easy!

References

Cisco Global Cloud Index: Forecast and Methodology, 2012–2017. retrieved 30th July 2014 from http://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/Cloud_Index_White_Paper.html

 

 

 

 

 

BDRSuite version 3.9.0 announcement (Sponsored Post)BDRSuite version 3.9.0 announcement (Sponsored Post)

Some exciting news from our friends over at BDRSuite with the announcement of version 3.9 of their backup and recovery software, for those who arent aware of what Vembu; their BDR Suite product provides data protection for a number of workloads including, physical, virtual, and cloud based workloads.

It is packed with some new features which you may read about below.

New Features in v3.9.0:

 

Tape Backup Support:

BDRSuite extends its support to native tape backup through the Vembu BDR console. You can utilise the best known 3-2-1 backup strategy of having 3 copies of backup data on 2 different media and 1 off-site location for an efficient DR plan. This secondary backup approach will help you to archive the image based backups in both virtual and physical environments like VMware, Hyper-V and Windows Servers and recover them in multiple formats like VHD, VMDK, VHDX, VMDK-Flat and RAW.

Auto Authorization at Off-site DR:

Enabling the auto authorization feature will allow only the authorized Vembu BDR servers to get connected with Vembu OffsiteDR servers (Replication) using the registration key.

Quick VM Recovery on ESXi for Hyper-V and Disk Image Backups:

Instant recovery of backed up data on VMware ESXi is now made available for both the Hyper-V VMs and Windows Servers backup jobs for an effective Disaster Recovery. This recovery of the virtual machines happens in a matter of seconds by booting the backed up machine directly from the backup storage repository, from where all the files, folders and applications can be accessed.

Windows Event Viewer Integration:

All the events of the Vembu BDR, Off-siteDR & agents like information on critical, warnings and major events are updated in the Event Viewer of Windows Servers  when enabled for better management.

Advanced Backup level encryption for all agents:

Users will be able to configure AES-256 bit encryption for all their backup jobs of VMware, Hyper-V, Disk Image through their customized passwords using corresponding password hints as well.

OffsiteDR Server retentions using Vembu Network Backup:

OffsiteDR retention policies is now available for the Network Backup plugins too, like the image based backups of VMware, Hyper-V and Disk Image backups at the too.

Listing of files & Folders in aciTree structure:

The listing of files and folders while configuring backups on a Network Backup plugin is now up with the aciTree structure for easy and quick navigation.

Pre/Post backup scripts for all Network & Image Backup clients:

This feature provides the ability to configure running custom actions before and after the execution backup schedule. The custom actions may include running an application using some script files.

AngularJS conversion of UI for BDRSuite OnlineBackups:

The overall UI of BDRSuite OnlineBackup is improved for better performance like the current BDRSuite and Off-siteDR.

Update of consumed space on the Vembu Portal:

Based on the display of the consumed space of Vembu Online Backup and SaaS Backup plugins, the customer will be able to allocate and purchase further cloud storage post purchase and upgrade.

BDRSuite 3.9 will be available for general availability in the next week or so.

Commvault SHIFT 2024 Recap – The SHIFT from Business Continuity to Continuous Business.Commvault SHIFT 2024 Recap – The SHIFT from Business Continuity to Continuous Business.

Setting the stage – The need for Business Continuity and the threat of Cyber Attacks

This year, I had the privilege of again attending Commvault SHIFT 2024, following an exceptional experience at last year’s event. Conferences like these are invaluable in an industry that evolves so rapidly, where staying relevant and informed is more critical than ever. With a plethora of topics and innovations emerging constantly, it’s nearly impossible to keep track of everything. That’s why choosing the right events to attend becomes essential—it’s about being strategic with time and energy to focus on professional development while managing my work and personal life. In a world where industry events seem endless, it’s important to filter through the noise and select those that provide real, actionable insights.

Commvault SHIFT 2024 delivered just that—an experience that was not only insightful but also a bit sobering. The keynote, delivered by Commvault CEO Sanjay, brought attention to an alarming statistic: 50% of organisations operating remotely have fallen victim to cyber-attacks. This revelation put into perspective just how high the stakes have become in the modern digital landscape. Cybersecurity is no longer just an IT issue; it’s a core business risk, and the weight of this challenge is resting squarely on the shoulders of CIOs and CISOs globally. What was once an emerging concern is now a full-scale battle, one that no organisation can afford to ignore.

This concern is further validated by IDC’s recent statistic in my part of the world that 59% of Asia-Pacific enterprises were targeted by ransomware attacks in 2023. The frequency and severity of these attacks are growing at an alarming rate, placing unprecedented pressure on organisations to fortify their defences. The evolving nature of these threats underscores why cybersecurity is at the top of the agenda for most businesses today.

These statistics alone paint a vivid picture of the relentless fight against cybercrime. Companies are not just dealing with routine breaches; they are battling sophisticated, evolving threats that could jeopardise their entire IT operations. This escalating cyber threat landscape perfectly frames the purpose and mission of companies like Commvault. Their innovative solutions, designed to protect and recover critical data, have become more important than ever, playing a pivotal role in this ongoing battle.

What struck me most was how it emphasised the need for a proactive, rather than reactive, approach to data protection and cybersecurity, With the rise of remote work and digital transformation, companies can no longer afford to be complacent. Organisations need to shift their mindset from simply protecting the perimeter to focusing on data resiliency and recovery as key components of their overall strategy.

Commvault’s ability to innovate and adapt in this climate is exactly what sets them apart. Their tools and strategies not only help mitigate the risks but also equip businesses with the agility to bounce back quickly when faced with inevitable cyber threats. The industry’s future will rely heavily on such technologies, and companies that fail to invest in this area may soon find themselves left behind.

Cybercriminals are smart and attack the heart

Most of us know the importance of Active Directory and everything that hangs off it, which is pretty much everything. And this is why Commvault highlights that out of 10 cyber-attacks, 9 of them are targeted at Active Directory. This is staggering!

There are multiple reasons as to why this is the case, it’s quite simple – Active Directory serves as the hub for an organisation’s IT environment, it manages user accounts, devices, and permissions across the network. By gaining access, attackers can elevate their privileges, create new accounts, or alter permissions to maintain control and move laterally within the environment. It also contains privileged accounts such as domain admins, which have unrestricted access across the network.

Compromising these accounts allows attackers to perform actions like installing malware, exfiltrating data, or shutting down services without detection. The result is widespread given the architecture of Active Directory and what it plugs into.

A shift or a complete Change? Continuous Business in 2024.

The concept of Business Continuity still exists in today’s world, but the shift as it can be interpreted and what I think struck me most was how it emphasised the need for a proactive, rather than reactive, approach to data protection and cybersecurity. This is the shift from Business Continuity (Reactive) to Continuous Business and while Business Continuity traditionally focuses on restoring operations after disruptions, Continuous Business emphasises proactive measures to prevent downtime altogether. This shift is driven by the need for seamless availability, faster response times, and stronger data resilience.

To Commvault, Continuous Business brings together 5 pillars – Security, Rebalance, Readiness and Recovery, this thought leadership approach, proactive thinking ability to provoke the thought that while cyber-attacks are high – the whole notion of “Continuous” almost diminishes the concern or dismisses them altogether knowing there is a platform like this that exists. 

And Commvault’s ability to innovate and adapt in this climate is exactly what sets them apart. Their tools and strategies not only help mitigate the risks but also equip businesses with the agility to bounce back quickly when faced with inevitable cyber threats. The industry’s future will rely heavily on such technologies, and companies that fail to invest and not transform in this area may soon find themselves left behind. And Commvault is at the forefront of this transformation, providing cutting-edge solutions that ensure uninterrupted operations in an increasingly complex data environment.

 

Further Expansion and Integration into the Hyperscalers

SHIFT 2024 also saw a new list of enhancements for customers operating in the cloud:

Cleanroom Recovery: Commvault is expanding its Cleanroom Recovery solution to AWS, enabling organisations to recover and rebuild their cloud infrastructure in a secure, isolated environment. This dedicated recovery zone supports forensic analysis and regular testing of recovery plans, ensuring businesses are well-prepared for future cyber threats. I first wrote about the introduction of Cleanroom Recovery last year in this post so take a read.

Air Gap Protect: This feature provides an immutable, isolated backup of customer data within a secure Commvault tenant, ensuring critical data remains untouchable, even in the event of a widespread cyberattack.

Cyber Resilience for Amazon S3: Utilising Commvault’s acquisition of Clumio (Shout out to Poojan), this solution allows organisations to restore clean, malware-free versions of their data stored in Amazon S3 in the event of a ransomware attack. Nice and simple!

Additionally, Commvault has enhanced its cloud data protection capabilities for Google Workspace, safeguarding services like Gmail, Google Drive, and Shared Drives. As more businesses rely on cloud-based SaaS applications to serve their employees and customers, this offering ensures that critical business data remains protected, compliant, and recoverable in the event of data loss or a cyber incident.

 

Cloud Rewind

Now this is super cool, and super powerful for organisations.  It’s like a magic wand that casts time machine capability to your IT environment – both infrastructure and applications. 

In a nutshell, Commvault Cloud rewind is a cloud-native solution designed to restore not just data, but entire cloud environments. This includes applications and infrastructure. Leveraging Appranix technology (Commvault acquired Appranix earlier this year), Cloud Rewind enables organisations to effectively “rewind” to the last clean state before a cyber incident, automating the restoration of applications and infrastructure across cloud platforms such as AWS and Azure. This significantly reduces downtime, cutting recovery time objectives from days or weeks to just minutes.

Why is this important (and useful)?  In today’s cybercrime ridden landscape (remember the statistic above), where enterprises operate numerous applications across multiple cloud environments, swiftly restoring full operational capacity is crucial for ensuring business continuity. Cloud Rewind tackles this challenge head on by automating intricate processes relating to recovery, minimising manual human intervention, and significantly shortening recovery time following an attack. 

 

In closing

In amongst the expansion of product features to further integrate into hyperscaler’s like Google, Commvault delivered a well-thought-out and insightful event, prompting us to rethink how we approach business continuity to allow continuous business and again enlightening us on the ongoing battle against cyber-attacks and ransomware in today’s world.

As a personal takeaway, the whole event got me thinking that no organisation or vertical with an online presence is safe from these attacks (the research and statistics show that), and thankfully there are companies such as Commvault that are dedicated to safeguarding these organisations and making it easy in the process. 

By allowing their platform to integrate seamlessly with cloud environments, providing flexibility and scalability, while ensuring that data is always accessible and recoverable. Commvault empowers businesses to thrive in a world where downtime is not an option, ensuring that data security and protection form the backbone of Continuous Business and the fight against cyber-attacks.