Categories: Cyber Security

Is zero trust the way ahead for data center security?

We look at how data center security protocols are changing

The last two years have transformed the way businesses operate. Large-scale digital transformation has led to an exponential rise in the amount of data being generated. [box type=”info” align=”” class=”” width=””]A recent report by IDC has stated that by 2025, there will be about 175 Zettabytes of data generated[/box]

With such a proliferation of data, businesses also need to be mindful of the rise in cyberattacks. As digital transformation gains momentum, it inadvertently offers cybercriminals more entry points to launch attacks, placing the large volumes of data generated at risk. It thus becomes pertinent for hyperscalers as well as data centers to operate under a zero trust policy to ensure that data is protected at all times.

As hybrid work models become the new normal, data will continue to be spread across datacenters on-premises, in the cloud, and in hybrid environments. Furthering the resolve to operate as a zero-trust network, IT managers need to take on a data centric approach: What this essentially entails is keeping security controls as close to the data as possible. With the right software capabilities that provide a granular file-based event notification system, users can leverage this interface to enjoy greater visibility of data access within the network.

In order to ensure that data is secured, the three main areas of focus should be:

Data Visibility: Any security measures cannot be deployed without knowing what must be protected. Hence it is of utmost significance that there is complete visibility of users, devices, networks, applications, and processes. When planning a zero-trust protection strategy, this can help speed up the process of preventing and countering attacks. Apart from this, in case of a breach, visibility also helps in comprehending the extent of damage the breach has caused.

Data Segmentation: Segmentation integrates security directly into a virtualized workload without requiring a hardware-based firewall. Owing to this, security policies for data centers should be synchronized with a virtual network, virtual machine (VM), operating system (OS), and other virtual security targets. The process of segmenting networks thus helps in minimizing the scope of any denial-of-service (DoS) attacks, if not by 100%, but reduces the speed at which the hacker is trying to invade the system.

Data Protection: Zero-trust models highlight the fact that vulnerabilities may arise anytime and from anywhere. Hence, ensuring threat protection from situations where employees could directly contribute to data breaches, hackers gaining access to an employee’s system, and mobile applications providing a platform for hacking – becomes important; companies that work across cloud and data centers can deploy integrated security products to ensure that their data is secured, and that access to it is next to impossible.

In the near future, IDC estimates that data will represent 61% CAGR, out of which 90 ZB would be attributed to the Internet of Things. Given this exponential growth, the dependency on secure facilities to store and access data will simultaneously increase. Within this scenario, there is a strong need for companies to adhere to the zero-trust model for cloud and data center security further avoiding any potential reputational and financial damage caused by data breaches.

[author title=”” image=”http://”]Puneet Gupta, Managing Director & VP India/SAARC at NetApp India[/author]

[divider style=”solid” top=”20″ bottom=”20″]

Disclaimer: The views expressed in this article are those of the author and do not necessarily reflect the views of the Economic Times – ET Edge Insights, its management, or its members.

ET Edge Insights

Recent Posts

ShellKode launches initiative to train 100,000 women developers in Gen AI

ShellKode, a globally distributed cloud-native company, has introduced "EmpowerHer" in collaboration with Amazon Web Services…

2 days ago

IBM expands globally to 92 countries via AWS marketplace, including India

IBM has announced the global expansion of its software portfolio, now available in 92 countries…

2 days ago

Building a culture that inspires innovation

In the global services landscape, India's role has evolved remarkably- establishing itself as a notable…

2 days ago

Elections & Economy: India’s financial symphony

As a common Indian citizen, I am compelled to delve into the profound relationship between…

2 days ago

Fostering leadership excellence: Empowering women to lead through inclusive culture

Fostering leadership excellence in today’s dynamic and interconnected world requires more than mere surface-level measures.…

2 days ago

Should traditional logistics players reassess their last-mile burden?

Logistics has always been a complex process of moving goods, such as warehousing and transportation,…

2 days ago