What were the top data recovery concerns in 2015?

A spike in adoption of complex, high-end software defined storage (SDS) systems was the top trend impacting the international data recovery industry in 2015, resulting in demand for more enhanced recovery technologies for businesses.  Other trends on the rise include the need for better data privacy and security as well as enhanced legacy data management technologies. 

[easy-tweet tweet=”A spike in adoption of #software defined storage was the top trend in #DR in 2015″ user=”comparethecloud”]

Growing demand for recovery services from SDS systems

Recovery from SDS systems is not only possible, it’s now expected. Growing industry adoption of SDS storage is reflected in the increasing demand for recovery solutions from these systems when they prove fallible. With vendors establishing their own proprietary methods of storing data within their systems, we have found that most enterprise-level failures resulting in data loss require a custom recovery solution.

there was a two-fold increase in the number of high-end system failures resulting in data loss in 2015

In fact, we’ve seen a two-fold increase in the number of high-end system failures resulting in data loss in 2015 and have found that recovery success with SDS rests on accurately pinpointing the failure, analysing and deciphering proprietary storage designs, rebuilding file systems and developing solutions to restore critical data.

At the leading edge of storage innovation lies hyper-convergence, an approach to IT architecture that consolidates and manages computing, networking and storage resources via software to run on any manufacturer’s hardware. Hyper-converged storage empowers simplicity in ease of use, rapid implementation, space savings and quick redundancy which all make it very easy to expand and protect data while realising cost savings. 

[easy-tweet tweet=”The need for data recovery from hyper-converged systems, will rise significantly in 2016″ via=”no” hashtags=”data”]

The need for data recovery from hyper-converged systems, which launched in the mainstream market in late 2014 and gained adoption in 2015, will rise significantly in 2016.  Recovery is challenging in part because data is fully integrated into the unit, making it difficult to gain sector level access to the disks.

Further, system pre-configuration, especially with HDD, SSD and FLASH cache, or lack of information about system configuration, could also pose recovery challenges. Kroll Ontrack research and development engineering teams are analysing this emerging storage trend and are developing strategies to overcome data loss when it arises.   

Global data privacy and security laws

Like many industries, the data recovery industry is not immune to the impact of global data privacy and security laws. In fact, the evolving data privacy landscape and the impetus by highly regulated organisations to keep sensitive data on premise have resulted in a growing need for onsite or remote data recovery solutions. In addition to addressing data privacy concerns, onsite technical expertise is increasingly required when complex data configurations or the massive size of systems make it difficult for organisations to hone in on the target data for recovery.

the data recovery industry is not immune to the impact of global data privacy and security laws

Highly complex systems and the obligation to protect data privacy are driving more onsite requests than ever before. While some organisations are able to leverage remote technologies like Ontrack® Remote Data Recovery™ (RDR®) to perform data recovery without a hard disk or other storage device leaving an enterprise’s data centre, we’re seeing that some highly regulated industries, such as healthcare and financial services, can disallow even connecting remotely to their network for privacy reasons. As a result, we’re seeing a growing trend for onsite technical support and recovery.

Where’s my legacy data?

As organisations grapple with their legal obligation to keep and maintain access to regulated data, maintaining legacy data management systems can be costly and tedious, leaving some organisations at risk if they fail to comply. A 2015 global Kroll Ontrack survey of 720 IT administrators found that nearly one third of organisations do not have clear insight into the information within their tape archives, and more than one third store more than 100 tapes in their archive.

Not surprisingly, Kroll Ontrack is seeing a demand for technologies that not only catalogue the information/location of data to meet legal demands, but also consolidate catalogues from various systems into a single, searchable, inventory to eliminate costs associated with maintaining legacy systems.

End of life data destruction

2015 has once again proven that data privacy and security are paramount to any organisation handling digital data. Certainly nefarious cybercrime and data breaches continue to plague the news prompting organisations to beef up data security practices. However, IT administrators and even drive manufacturers themselves are combatting a slightly different data security challenge, namely ensuring that built-in data wiping tools are securely and completely sanitising drives prior to re-use or disposal.

[easy-tweet tweet=”Nefarious #cybercrime continues to plague the news prompting organisations to beef up #datasecurity practices”]

As a result, we’ve seen an uptick in requests from IT departments and drive manufacturers for third-party validation that a system’s sanitisation function is 100 percent effective in securely deleting data. 

There’s been an exponential increase in demand for our Erasure Verification Services, where our engineers perform detailed analysis of sanitised drives and provide reporting on results to validate whether deletion methods are secure. It’s another layer of protection organisations have at their disposal, and one that we believe will only grow in importance in 2016 and beyond.

+ posts

CIF Presents TWF – Ems Lord

Newsletter

Related articles

The Future of Marketing: Automation vs Innovation

Does AI Understand Your Brand Voice? AI is dropping jaws...

AI Act – New Rules, Same Task

The first law for AI was approved this month...

Time to Ditch Traditional Tools for Cloud Security

Reliance on cloud technologies has significantly expanded the attack...

AI Show – Episode 3 – Guy Murphy

In this third episode of The AI Show! Host...

6 Ways Businesses Can Boost Their Cloud Security Resilience

The rise in cloud-based cyberattacks continues to climb as...

Subscribe to our Newsletter