www.cohesity.com
Open in
urlscan Pro
2a02:26f0:2100::58dd:c4ea
Public Scan
Submitted URL: https://go.cohesity.com/dc/1GQ4hiLEEfpNUvqWjd4lDMMufwdGcODr_jhzK71slTARqGfb08a2dE1L_hFidoqkUNOnyhy5OkpO7zoUGFEL6xjpxeTVL...
Effective URL: https://www.cohesity.com/blogs/next-generation-data-management-evolves-to-face-new-challenges-and-threats/?utm_source=nur...
Submission: On November 09 via api from ES — Scanned from ES
Effective URL: https://www.cohesity.com/blogs/next-generation-data-management-evolves-to-face-new-challenges-and-threats/?utm_source=nur...
Submission: On November 09 via api from ES — Scanned from ES
Form analysis
1 forms found in the DOMGET https://www.cohesity.com/
<form method="get" action="https://www.cohesity.com/" id="SearchInput" __bizdiag="115" __biza="WJ__">
<input type="search" aria-labelledby="SearchBox SearchInput" aria-label="search" name="s" class="search-input" value="" required="" placeholder="Search">
<button type="submit" aria-label="submit" class="search-btn"></button>
</form>
Text Content
Cohesity named a Leader again! 2023 Gartner® Magic Quadrant™ for Enterprise Backup and Recovery Software Solutions Get the report * MyCohesity * Helios * Support * Product Documentation * Academy * User Group * Galaxy * Partners * English * Deutsch * Français * 日本語 * Why Cohesity Why Cohesity Why Cohesity Only Cohesity brings data security and management together in one platform that is simple, secure, and scalable. Cohesity Data Cloud Cohesity Data Cloud A unified platform for securing, managing, and extracting value from your data, available as self-managed software and SaaS. Compare Cohesity Explore how we outperform the competition, starting with the three S’s: security, scale, and simplicity. * Cohesity vs. Commvault * Cohesity vs. Rubrik * Cohesity vs. Veritas * Cohesity vs. Commvault * Cohesity vs. Rubrik * Cohesity vs. Veritas Customer Stories Customer Stories Discover what customer-centric means at Cohesity—and why enterprises worldwide choose us to secure and manage their data. * Products Cohesity Data Cloud Cohesity Data Cloud One platform. One UI. Available as self-managed software and SaaS. * Free trial * Free trial * Demos * Data Cloud packaging * Certified platforms Cohesity Data Cloud Cohesity Data Cloud One platform. One UI. Available as self-managed software and SaaS. DataProtect DataProtect Simplify data protection, ensure recovery, and defend against ransomware with a modern, hyperscale solution. FortKnox FortKnox Isolate your data to further strengthen your ransomware protection and recovery strategy with our SaaS solution. DataHawk DataHawk Protect against ransomware with threat intelligence and scanning, cyber vaulting, and ML-powered data classification. SmartFiles SmartFiles Manage, secure, and do more with unstructured data. Get software-defined file and object services for the hybrid cloud. SiteContinuity SiteContinuity Get automated disaster recovery failover and failback orchestration for mission-critical workloads. No added complexity. Cohesity Cloud Services Cohesity Cloud Services Radically simplify how you protect, secure, govern, and analyze data with our comprehensive portfolio of Cloud Services. Marketplace Marketplace Defend against cyber threats and speed access to insights with apps from Cohesity and industry partners. * Solutions Use Cases Data Protection Data Security Data Mobility Data Access Data Insights * Backup and recovery * Instant mass restore * Data resilience * Continuous data protection * Long-term retention * Resiliency at scale * Ransomware recovery * Threat protection * Data classification * Disaster recovery * Data migration * Data replication * File and object * Copy data management * Dev/test * Global search * Responsible AI Data Protection * Backup and recovery * Instant mass restore * Data resilience * Continuous data protection * Long-term retention Data Security * Resiliency at scale * Ransomware recovery * Threat protection * Data classification Data Mobility * Disaster recovery * Data migration * Data replication Data Access * File and object * Copy data management * Dev/test Data Insights * Global search * Responsible AI Industries * Financial services * Healthcare and life sciences * Manufacturing and logistics * Federal government * State, local government, and education * Retail and hospitality * Legal * Energy and utilities * Telecom * Technology * Media and Entertainment Environments * Cloud * AWS * Azure * Google Cloud * Kubernetes * Virtual * VMware * Hyper-V * Nutanix AHV * Physical * Windows * NAS * Applications * Oracle * SAP HANA * Databases * SQL * NoSQL and Hadoop * SaaS * Microsoft 365 * Salesforce View All Solutions View All Solutions * Resources Resources Resources Looking for blogs, demos, eBooks, and more? Explore our latest resources in one convenient spot. * View all * Corporate Overview * Blogs * Demos * Webinars * Events * Customer Stories * Glossary Support Support We know you’re busy. So when something doesn’t work quite right, our experts are here to help you fix it—fast. * Support login * Cohesity User Group * Cohesity Academy Trust Center Trust Center With Cohesity, you can rest assured that your data is protected and secure. Trust Center Trust Center With Cohesity, you can rest assured that your data is protected and secure. Marketplace Marketplace Defend against cyber threats and speed access to insights with apps from Cohesity and industry partners. Get the eBook ebook Read how IT leaders kept their businesses running with modern data security and management. * Partners Partners Partners Overview Cohesity is 100% committed to building relationships that offer value both to our partners and joint customers. Login Channel Partners Channel Partners Innovate and engage with Cohesity to drive your business. Global System Integrators Global System Integrators Choose from a variety of Cohesity-certified GSI partners to help you transform your data security and management experience. Professional Services Professional Services Deliver confidence to customers through Cohesity-focused, partner-branded professional services. Technology Partners Technology Partners Cohesity brings together the deepest, broadest partner ecosystem for data and apps. Service Providers Service Providers Unleash the power of data and drive profitable growth and recurring revenue for your cloud and managed services. Learn more Login * Company Company About Cohesity is driving the future of AI-powered data security and management. * Leadership * Our values and code * Newsroom * Newsroom home * Press releases * News coverage * Media resources * Awards * Events * View all * Webinars * Catalyst * Careers * Careers home * Open Positions * Diversity, Equity, and Inclusion * Cohesity For Good Data Security Alliance Data Security Alliance A collective of data security and services companies to help enterprises win the war against cyberattacks. Executive Briefing Center Executive Briefing Center Meet with us in a personalized virtual environment to understand how Cohesity can fit your business needs. Learn more Contact us Free trial Contact us * Login * MyCohesity * Helios * Support * Product Documentation * Academy * User Group * Galaxy * Partners * * English * Deutsch * Français * 日本語 * * Free trial MAR 16, 2022. 4 MIN READ IDC GUEST BLOG: THE EVOLUTION OF NEXT-GENERATION DATA MANAGEMENT Digital transformation is changing IT, and the traditional ways of protecting and managing organizations’ data are no longer adequate. With the adoption of cloud and containers, organizations are facing new challenges. A more distributed architecture increases complexity and data sprawl. Cyber attackers take advantage of organizations’ increased attack surface and seek out vulnerabilities to exploit and valuable data to steal. Lastly, with more data being created and stored outside the data center, organizations must comply with government regulations they might not have had to consider previously. To overcome these hurdles, the next generation of data management will evolve into something that’s more secure, intelligent, and open than traditional data management. NEW ENVIRONMENTS, NEW PROBLEMS For many organizations, digital transformation will lead to increased complexity as organizations’ IT infrastructure extends across the core data center, multiple public and private clouds and the edge. As data sets grow, organizations will have an increasingly difficult time keeping track of their data, managing the sea of products that make up their data infrastructure environment, deriving value from their data, and optimizing their storage. IDC research has consistently shown that enterprise storage systems continue to grow exponentially, expanding at a five-year CAGR of 30.9%. Without proper data management, organizations are at risk of their environments reaching an unsustainable level of sprawl. Additionally, more distributed infrastructure exposes more vulnerability points for cyber attackers to exploit. Ransomware in the past was easily overcome with good backup and recovery because it simply sought to lock out data and make it unavailable. However, attacks have become more sophisticated in nature. The threat has evolved to not only try to delete backups, but to steal the data and threaten to release it. Data exfiltration attacks take place before traditional data management touches the data — by the time backup systems make an immutable copy and store it in an untouchable environment, the criminals already have it. In the past, this would be regarded as a problem for security teams to deal with, but security operations and data operations need to work in tandem to properly defend against this threat. As data management and protection tools have traditionally been closed systems, this makes it harder for security and IT to work together. This also means other adjacent workloads that can make use of the data such as analytics and AI have trouble accessing it. The closed-off nature of traditional data management leads to inefficiency and complexity that compounds further with distributed, continually expanding infrastructure. NEXT-GENERATION SOLUTIONS The next generation of data management will break free of its traditional trappings to take on the data challenges of a more distributed, cloud-centric world. Next-generation data management tools will need to have a centralized console to handle multiple use cases for multiple storage environments. A consolidated view of an organization’s entire data estate will help administrators make sense of their sprawling infrastructure. Additionally, being able to execute multiple IT functions such as backup, disaster recovery, migration, compliance and archiving from the same interface reduces complexity. Traditionally, data protection focuses on pushing important assets from the core into the cloud, but that is poised to flip soon. IDC predicts that by 2025, 55% of organizations will have a cloud-centric approach to data protection, where assets in the cloud are safeguarded elsewhere. The next generation of data management will cater to this growing notion that most organizations’ critical data and applications will be born in the cloud. The five pillars of the NIST Cyber Security Framework are Identify, Protect, Respond, Recover and Detect, the last of which is an area traditional data protection misses completely. The next generation of data management will address this by integrating security features and implementing measures at earlier stages of a cyberattack – not just after an attack has already occurred. Current data management tools already use AI to identify what backup copies are safe to recover from. Next-generation data management will extend the use of AI further to perform surface area analyses and threat vulnerability assessments and make recommendations for boosting an organization’s security posture. To carry this out, next-generation data management tools will need to integrate with technology partners and form a software ecosystem, allowing multiple products to programmatically communicate and share functionality. Data from data management tools will be able to feed machine learning and workflow applications, and organizations will be able to discover and implement these functions via an online marketplace. SETTING A NEW BAR IDC believes the new standard of successful data management is centralized, secure and open to integration with adjacent technologies. As organizations undergo digital transformation, data management will transform along with it to address the challenges that come with a more cloud-based, distributed digital estate. * backup and recovery * cloud * data management * Data Protection * mass data fragmentation * Next-Gen Data Management * ransomware PHIL GOODWIN PHIL GOODWIN Research Vice President, IDC Phil Goodwin is a Research Vice President within IDC’s Infrastructure Systems, Platforms, and Technologies Group, with responsibility for IDC’s infrastructure software research area. Mr. Goodwin provides detailed insight and analysis on evolving infrastructure software trends, vendor performance, and the impact of new technology adoption. His focus is on multi-cloud data management, data logistics, on-premises and cloud-based data protection as-a-service, cyber protection and recovery, recovery orchestration and more. RECENT BLOGS * IDC Guest Blog: The Evolution of Next-Generation Data Management See All Authors Research Vice President, IDC JOHNNY YU JOHNNY YU Research Manager, IDC Johnny Yu is a research manager within IDC’s infrastructure software platforms research group. He covers as storage controller software, data replication, protection and archiving, storage device management and container data management, with a focus on how businesses optimize costs and secure their storage environments as their infrastructure expands beyond their data centers.Johnny Yu is a research manager within IDC’s infrastructure software platforms research group. He covers as storage controller software, data replication, protection and archiving, storage device management and container data management, with a focus on how businesses optimize costs and secure their storage environments as their infrastructure expands beyond their data centers. RECENT BLOGS * IDC Guest Blog: The Evolution of Next-Generation Data Management See All Authors Research Manager, IDC PHIL GOODWIN Research Vice President, IDC PHIL GOODWIN Research Vice President, IDC Phil Goodwin is a Research Vice President within IDC’s Infrastructure Systems, Platforms, and Technologies Group, with responsibility for IDC’s infrastructure software research area. Mr. Goodwin provides detailed insight and analysis on evolving infrastructure software trends, vendor performance, and the impact of new technology adoption. His focus is on multi-cloud data management, data logistics, on-premises and cloud-based data protection as-a-service, cyber protection and recovery, recovery orchestration and more. RECENT BLOGS * IDC Guest Blog: The Evolution of Next-Generation Data Management See All Authors JOHNNY YU Research Manager, IDC JOHNNY YU Research Manager, IDC Johnny Yu is a research manager within IDC’s infrastructure software platforms research group. He covers as storage controller software, data replication, protection and archiving, storage device management and container data management, with a focus on how businesses optimize costs and secure their storage environments as their infrastructure expands beyond their data centers.Johnny Yu is a research manager within IDC’s infrastructure software platforms research group. He covers as storage controller software, data replication, protection and archiving, storage device management and container data management, with a focus on how businesses optimize costs and secure their storage environments as their infrastructure expands beyond their data centers. RECENT BLOGS * IDC Guest Blog: The Evolution of Next-Generation Data Management See All Authors YOU MAY ALSO LIKE BLOG ACCELERATE HYBRID CLOUD TRANSFORMATION WITH NEXT-GEN DATA MANAGEMENT SOLUTIONS BY INFOSYS AND COHESITY - By Chris Wiborg Learn more X * * * * * 1-855-214-3133 Contact us Contact us * Company * About * Leadership * Newsroom * Careers * Awards * Customers * Diversity, Equity, and Inclusion * How We’re Different * Why Cohesity * Technology Partners * Data Security Alliance * Responsible AI * Academy and Certifications * Marketplace * Trust Center * Demos * Helpful Links * Support * Blogs * Backup and Recovery * Ransomware Recovery * Cohesity Cloud Services * All Solutions * Certified Platforms * Developer © 2023 Cohesity, Inc. All Rights Reserved. * Terms of Use * Privacy Policy * Legal * Cookies Settings * Sitemap You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue. Stay on the site Continue Don't show this warning again You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue. Stay on the site Continue Don't show this warning again Share Share Share Tweet Share We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. If you want to know more about how we use cookies, please see our Privacy Policy. Cookies Settings Accept Cookies