Image default
Guest Article

As Data Generation Increases, Renewed Focus Falls on Data Center Security

How much is a quintillion? Well, it has 18 zeros in it. We are talking about this to understand the magnanimity of the amount of data being generated, which is overwhelming. Only last year i.e 2020 on average people generated data measuring 2.5 quintillion bytes per day! The number will only keep increasing in the coming years as the world moves towards digitalization. Cloud services, increased digital transactions, remote working and operations, edtech, fintech, digital communities, social media and newer technologies generating more data have all added pressure on cybersecurity. This has naturally increased the demand for data center services and this has renewed focus on data center security.

A strong data center not just has a robust infrastructure, it includes a stronger security portfolio. Enterprises put their trust in data center operations as the safety of their data is paramount. Security for data center includes physical, virtual and networking and each security feature in the right mix makes for a robust structure. The pandemic transformed the way the world functions and data centers became targets like many organizations for data thefts. This made admins realize how important upgrading security is. Multiple steps have been and still needs to be taken to strengthen the security infrastructure.

  • Web Application Firewall (WAF)
  • SIEM Tool
  • Two-factor/Multi-factor authentication
  • Encryption, data backup and recovery
  • Segmented network infrastructure
  • Malware protection
  • Security patch management and assessment
  • Surveillance Management
  • Intrusion Prevention Systems (IPS)
  • Zero-Trust Network Access (ZTNA)

Every data center comes under any of 1-4 tier infrastructures each associated with its own functionalities. Tier 1 and 2 data centers are meant for small businesses that do not have real-time servicing requirements. Whereas, tier 3 and 4 data centers are meant for large businesses that require robust structure and necessary support systems. But, there are many ramifications when security breaches occur in data centers – legal tangle, breach of contract and regulations, fines, loss of revenue and financial damage, but most of all damage to trust and reputation. A legacy system no longer is an ideal format to operate, but until a complete overhaul of the system is done, importantly the security infrastructure. The creation of a culture that embodies the ideals of security is a critical component of keeping data centers safe. A colocation data center is now one of the most sought after infrastructures. Data center colocation providers protect data in case of an emergency. They do so through their physical building design, security tools and compliance expertise. Just physical security isn’t enough there is a possibility of a virtual breach which also needs to be considered. Every data center needs to have a best practice as they help organizations in being cost-effective when compared to running an in-house infrastructure. India is now the sought after market for data centers and the organizations here will be able to benefit from the development as we are also a major contributor in generating data. True success will however continue to depend upon how appropriately security measures are taken by these operations. This will be an ongoing journey and not a destination.

By: Amarjeet Singh Manchanda, Vice President – DC & Cloud Business, iValue InfoSolutions

Related posts

12 Effective Tips to Safeguard Your Organization’s Data

adminsmec

Future of Cyber Security in the times of work from home

adminsmec

Deepening your network security

adminsmec