Intelligent Data Centres Issue 63 | Page 26

IN THE HASTE TO ADOPT CLOUD SOLUTIONS , ARE ORGANISATIONS OVERLOOKING THE POWERFUL AND ENDURING VALUE OF ON-PREMISES TECHNOLOGIES AND , IN DOING SO , POTENTIALLY MISSING OUT ON A RANGE OF IMPORTANT BENEFITS ?
I N D U S T R Y I N T E L L I G E N C E
he rapid expansion of

T the cloud infrastructure and services sector has sparked widespread debate about its longterm impact , including what its success means for the traditional on-premises approach to IT delivery . According to Gartner , for example , more than half of enterprise IT expenditure in key market segments will shift to the cloud by 2025 , overtaking investments in traditional IT approaches in the process .

In the context of cybersecurity , the growth of outsourced , cloud-based services has

IN THE HASTE TO ADOPT CLOUD SOLUTIONS , ARE ORGANISATIONS OVERLOOKING THE POWERFUL AND ENDURING VALUE OF ON-PREMISES TECHNOLOGIES AND , IN DOING SO , POTENTIALLY MISSING OUT ON A RANGE OF IMPORTANT BENEFITS ?
ignited similar discussions , including their relevance and impact on data storage strategies , such as those relying on the use of data vaults . The prevailing belief that effective data security is synonymous with on-premises storage is gradually losing favour among providers and users . However , in the haste to adopt cloud solutions , are organisations overlooking the powerful and enduring value of on-premises technologies and , in doing so , potentially missing out on a range of important benefits ?
It ’ s important to note that the cloud ’ s popularity does not automatically detract from the inherent strengths of in-house solutions . In fact , certain critical applications and sensitive data may be better suited to on-premises storage due to security concerns and regulatory compliance . Organisations must carefully evaluate the nature of their data and the specific security requirements it demands . For example , this should include an understanding of the importance of geographical location in data storage , as some regulations require data residency within specific borders .
Looking specifically at the role of data vaults , these technologies were designed to align with regulatory standards and improve data security , primarily serving as a reliable backup for data protection in the event of cyberattacks or other security issues . Immutable data vaults store data in a way that prevents any alterations , deletions , or unauthorised changes to the data once it is stored . This is especially key for use cases and industries subject to strict data retention and compliance requirements , such as healthcare and finance .
The cloud ’ s efficiency and convenience make it a popular choice for immutable data vaults , offering benefits like easy setup , no hardware maintenance concerns and simplified billing processes with a single service provider . However , this approach also has its downsides , including a loss of control due to third-party system management and reduced autonomy .
In addition , delays in data transfer from cloud to in-house storage , coupled with additional egress fees , deter some IT leaders from choosing cloud-based solutions for their vaults . In contrast , in-house vaults offer some specific advantages such as heightened control , the ability to customise more effectively than cloud-based alternatives , enhanced air-gapping and better recovery speeds . Despite a potentially steeper learning curve initially , with expert assistance and a supportive community , these challenges are manageable .
Additionally , an isolated recovery environment in an in-house setup returns control to IT and security operations teams . Unlike cloud-based vaults managed by service providers , in-house systems allow organisations to tailor their deployment , configuration and management to suit their specific requirements , offering flexibility absent in the more rigid cloud model .
Striking the right balance
Regardless of the situation or technological approach taken by a given organisation , the cornerstone of robust cyber-resilience ultimately lies in the deployment of isolated , offline vaults – wherever they are hosted . These are essential for data protection and play a pivotal role in real-time threat detection , such as identifying ransomware attacks . The swift detection and response to cyberthreats are critical as they can prevent incidents from spiralling into major crises .
When evaluating immutable data vault solutions for robust data protection , a key consideration beyond just data security is recoverability . After all , the
26 www . intelligentdatacentres . com