www.cohesity.com Open in urlscan Pro
2a02:26f0:2100::58dd:c4ea  Public Scan

Submitted URL: https://go.cohesity.com/dc/1GQ4hiLEEfpNUvqWjd4lDMMufwdGcODr_jhzK71slTARqGfb08a2dE1L_hFidoqkUNOnyhy5OkpO7zoUGFEL6xjpxeTVL...
Effective URL: https://www.cohesity.com/blogs/next-generation-data-management-evolves-to-face-new-challenges-and-threats/?utm_source=nur...
Submission: On November 09 via api from ES — Scanned from ES

Form analysis 1 forms found in the DOM

GET https://www.cohesity.com/

<form method="get" action="https://www.cohesity.com/" id="SearchInput" __bizdiag="115" __biza="WJ__">
  <input type="search" aria-labelledby="SearchBox SearchInput" aria-label="search" name="s" class="search-input" value="" required="" placeholder="Search">
  <button type="submit" aria-label="submit" class="search-btn"></button>
</form>

Text Content

Cohesity named a Leader again! 2023 Gartner® Magic Quadrant™ for Enterprise
Backup and Recovery Software Solutions

Get the report

 * MyCohesity
 * Helios
 * Support
 * Product Documentation
 * Academy
 * User Group
 * Galaxy
 * Partners

 * English
 * Deutsch
 * Français
 * 日本語


 * Why Cohesity
   Why Cohesity
   Why Cohesity
   
   Only Cohesity brings data security and management together in one platform
   that is simple, secure, and scalable.
   
   Cohesity Data Cloud
   Cohesity Data Cloud
   
   A unified platform for securing, managing, and extracting value from your
   data, available as self-managed software and SaaS.
   
   Compare Cohesity
   
   Explore how we outperform the competition, starting with the three S’s:
   security, scale, and simplicity.
   
    * Cohesity vs. Commvault
    * Cohesity vs. Rubrik
    * Cohesity vs. Veritas
   
    * Cohesity vs. Commvault
    * Cohesity vs. Rubrik
    * Cohesity vs. Veritas
   
   Customer Stories
   Customer Stories
   
   Discover what customer-centric means at Cohesity—and why enterprises
   worldwide choose us to secure and manage their data.
   
   
 * Products
   Cohesity Data Cloud
   Cohesity Data Cloud
   
   One platform. One UI. Available as self-managed software and SaaS.
   
   
    * Free trial
    * Free trial
    * Demos
    * Data Cloud packaging
    * Certified platforms
   
   Cohesity Data Cloud
   
   Cohesity Data Cloud
   
   One platform. One UI. Available as self-managed software and SaaS.
   
   DataProtect
   DataProtect
   
   Simplify data protection, ensure recovery, and defend against ransomware with
   a modern, hyperscale solution.
   
   FortKnox
   FortKnox
   
   Isolate your data to further strengthen your ransomware protection and
   recovery strategy with our SaaS solution.
   
   DataHawk
   DataHawk
   
   Protect against ransomware with threat intelligence and scanning, cyber
   vaulting, and ML-powered data classification.
   
   SmartFiles
   SmartFiles
   
   Manage, secure, and do more with unstructured data. Get software-defined file
   and object services for the hybrid cloud.
   
   SiteContinuity
   SiteContinuity
   
   Get automated disaster recovery failover and failback orchestration for
   mission-critical workloads. No added complexity.
   
   Cohesity Cloud Services
   Cohesity Cloud Services
   
   Radically simplify how you protect, secure, govern, and analyze data with our
   comprehensive portfolio of Cloud Services.
   
   Marketplace
   Marketplace
   
   Defend against cyber threats and speed access to insights with apps from
   Cohesity and industry partners.

 * Solutions
   
   Use Cases
   
   Data Protection
   
   Data Security
   
   Data Mobility
   
   Data Access
   
   Data Insights
   
    * Backup and recovery
    * Instant mass restore
    * Data resilience
    * Continuous data protection
    * Long-term retention
   
    * Resiliency at scale
    * Ransomware recovery
    * Threat protection
    * Data classification
   
    * Disaster recovery
    * Data migration
    * Data replication
   
    * File and object
    * Copy data management
    * Dev/test
   
    * Global search
    * Responsible AI
   
   Data Protection
   
    * Backup and recovery
    * Instant mass restore
    * Data resilience
    * Continuous data protection
    * Long-term retention
   
   Data Security
   
    * Resiliency at scale
    * Ransomware recovery
    * Threat protection
    * Data classification
   
   Data Mobility
   
    * Disaster recovery
    * Data migration
    * Data replication
   
   Data Access
   
    * File and object
    * Copy data management
    * Dev/test
   
   Data Insights
   
    * Global search
    * Responsible AI
   
   Industries
   
    * Financial services
    * Healthcare and life sciences
    * Manufacturing and logistics
    * Federal government
    * State, local government, and education
    * Retail and hospitality
    * Legal
    * Energy and utilities
    * Telecom
    * Technology
    * Media and Entertainment
   
   Environments
   
    * Cloud
    * AWS
    * Azure
    * Google Cloud
    * Kubernetes
   
    * Virtual
    * VMware
    * Hyper-V
    * Nutanix AHV
   
    * Physical
    * Windows
    * NAS
   
    * Applications
    * Oracle
    * SAP HANA
   
    * Databases
    * SQL
    * NoSQL and Hadoop
   
    * SaaS
    * Microsoft 365
    * Salesforce
   
   View All Solutions
   View All Solutions
 * Resources
   Resources
   Resources
   
   Looking for blogs, demos, eBooks, and more? Explore our latest resources in
   one convenient spot.
   
    * View all
    * Corporate Overview
    * Blogs
    * Demos
    * Webinars
    * Events
    * Customer Stories
    * Glossary
   
   Support
   Support
   
   We know you’re busy. So when something doesn’t work quite right, our experts
   are here to help you fix it—fast.
   
    * Support login
    * Cohesity User Group
    * Cohesity Academy
   
   Trust Center
   Trust Center
   
   With Cohesity, you can rest assured that your data is protected and secure.
   
   Trust Center
   Trust Center
   
   With Cohesity, you can rest assured that your data is protected and secure.
   
   Marketplace
   Marketplace
   
   Defend against cyber threats and speed access to insights with apps from
   Cohesity and industry partners.
   
   Get the eBook ebook
   
   
   Read how IT leaders kept their businesses running with modern data security
   and management.

 * Partners
   Partners
   Partners Overview
   
   Cohesity is 100% committed to building relationships that offer value both to
   our partners and joint customers.
   
   Login
   Channel Partners
   Channel Partners
   
   Innovate and engage with Cohesity to drive your business.
   
   Global System Integrators
   Global System Integrators
   
   Choose from a variety of Cohesity-certified GSI partners to help you
   transform your data security and management experience.
   
   Professional Services
   Professional Services
   
   Deliver confidence to customers through Cohesity-focused, partner-branded
   professional services.
   
   Technology Partners
   Technology Partners
   
   Cohesity brings together the deepest, broadest partner ecosystem for data and
   apps.
   
   Service Providers
   Service Providers
   
   Unleash the power of data and drive profitable growth and recurring revenue
   for your cloud and managed services.
   
   Learn more
   
   Login
 * Company
   Company
   About
   
   Cohesity is driving the future of AI-powered data security and management.
   
    * Leadership
    * Our values and code
    * Newsroom
    * Newsroom home
    * Press releases
    * News coverage
    * Media resources
    * Awards
   
    * Events
    * View all
    * Webinars
    * Catalyst
   
    * Careers
    * Careers home
    * Open Positions
    * Diversity, Equity, and Inclusion
    * Cohesity For Good
   
   Data Security Alliance
   Data Security Alliance
   
   A collective of data security and services companies to help enterprises win
   the war against cyberattacks.
   
   Executive Briefing Center
   Executive Briefing Center
   
   Meet with us in a personalized virtual environment to understand how Cohesity
   can fit your business needs.
   
   Learn more
   
   Contact us
   Free trial
   Contact us

 * Login
   * MyCohesity
   * Helios
   * Support
   * Product Documentation
   * Academy
   * User Group
   * Galaxy
   * Partners
 * * English
   * Deutsch
   * Français
   * 日本語
 * 
 * Free trial

MAR 16, 2022. 4 MIN READ


IDC GUEST BLOG: THE EVOLUTION OF
NEXT-GENERATION DATA MANAGEMENT



Digital transformation is changing IT, and the traditional ways of protecting
and managing organizations’ data are no longer adequate.

With the adoption of cloud and containers, organizations are facing new
challenges. A more distributed architecture increases complexity and data
sprawl. Cyber attackers take advantage of organizations’ increased attack
surface and seek out vulnerabilities to exploit and valuable data to steal.
Lastly, with more data being created and stored outside the data center,
organizations must comply with government regulations they might not have had to
consider previously.

To overcome these hurdles, the next generation of data management will evolve
into something that’s more secure, intelligent, and open than traditional data
management.


NEW ENVIRONMENTS, NEW PROBLEMS

For many organizations, digital transformation will lead to increased complexity
as organizations’ IT infrastructure extends across the core data center,
multiple public and private clouds and the edge. As data sets grow,
organizations will have an increasingly difficult time keeping track of their
data, managing the sea of products that make up their data infrastructure
environment, deriving value from their data, and optimizing their storage. IDC
research has consistently shown that enterprise storage systems continue to grow
exponentially, expanding at a five-year CAGR of 30.9%. Without proper data
management, organizations are at risk of their environments reaching an
unsustainable level of sprawl.

Additionally, more distributed infrastructure exposes more vulnerability points
for cyber attackers to exploit. Ransomware in the past was easily overcome with
good backup and recovery because it simply sought to lock out data and make it
unavailable. However, attacks have become more sophisticated in nature. The
threat has evolved to not only try to delete backups, but to steal the data and
threaten to release it.

Data exfiltration attacks take place before traditional data management touches
the data — by the time backup systems make an immutable copy and store it in an
untouchable environment, the criminals already have it. In the past, this would
be regarded as a problem for security teams to deal with, but security
operations and data operations need to work in tandem to properly defend against
this threat.

As data management and protection tools have traditionally been closed systems,
this makes it harder for security and IT to work together. This also means other
adjacent workloads that can make use of the data such as analytics and AI have
trouble accessing it. The closed-off nature of traditional data management leads
to inefficiency and complexity that compounds further with distributed,
continually expanding infrastructure.


NEXT-GENERATION SOLUTIONS

The next generation of data management will break free of its traditional
trappings to take on the data challenges of a more distributed, cloud-centric
world.

Next-generation data management tools will need to have a centralized console to
handle multiple use cases for multiple storage environments. A consolidated view
of an organization’s entire data estate will help administrators make sense of
their sprawling infrastructure. Additionally, being able to execute multiple IT
functions such as backup, disaster recovery, migration, compliance and archiving
from the same interface reduces complexity.

Traditionally, data protection focuses on pushing important assets from the core
into the cloud, but that is poised to flip soon. IDC predicts that by 2025, 55%
of organizations will have a cloud-centric approach to data protection, where
assets in the cloud are safeguarded elsewhere. The next generation of data
management will cater to this growing notion that most organizations’ critical
data and applications will be born in the cloud.

The five pillars of the NIST Cyber Security Framework are Identify, Protect,
Respond, Recover and Detect, the last of which is an area traditional data
protection misses completely. The next generation of data management will
address this by integrating security features and implementing measures at
earlier stages of a cyberattack – not just after an attack has already occurred.

Current data management tools already use AI to identify what backup copies are
safe to recover from. Next-generation data management will extend the use of AI
further to perform surface area analyses and threat vulnerability assessments
and make recommendations for boosting an organization’s security posture.

To carry this out, next-generation data management tools will need to integrate
with technology partners and form a software ecosystem, allowing multiple
products to programmatically communicate and share functionality. Data from data
management tools will be able to feed machine learning and workflow
applications, and organizations will be able to discover and implement these
functions via an online marketplace.


SETTING A NEW BAR

IDC believes the new standard of successful data management is centralized,
secure and open to integration with adjacent technologies. As organizations
undergo digital transformation, data management will transform along with it to
address the challenges that come with a more cloud-based, distributed digital
estate.

 * backup and recovery
 * cloud
 * data management
 * Data Protection
 * mass data fragmentation
 * Next-Gen Data Management
 * ransomware

PHIL GOODWIN

PHIL GOODWIN

Research Vice President, IDC

Phil Goodwin is a Research Vice President within IDC’s Infrastructure Systems,
Platforms, and Technologies Group, with responsibility for IDC’s infrastructure
software research area. Mr. Goodwin provides detailed insight and analysis on
evolving infrastructure software trends, vendor performance, and the impact of
new technology adoption. His focus is on multi-cloud data management, data
logistics, on-premises and cloud-based data protection as-a-service, cyber
protection and recovery, recovery orchestration and more.

RECENT BLOGS

 * IDC Guest Blog: The Evolution of
   Next-Generation Data Management

See All Authors

Research Vice President, IDC

JOHNNY YU

JOHNNY YU

Research Manager, IDC

Johnny Yu is a research manager within IDC’s infrastructure software platforms
research group. He covers as storage controller software, data replication,
protection and archiving, storage device management and container data
management, with a focus on how businesses optimize costs and secure their
storage environments as their infrastructure expands beyond their data
centers.Johnny Yu is a research manager within IDC’s infrastructure software
platforms research group. He covers as storage controller software, data
replication, protection and archiving, storage device management and container
data management, with a focus on how businesses optimize costs and secure their
storage environments as their infrastructure expands beyond their data centers.

RECENT BLOGS

 * IDC Guest Blog: The Evolution of
   Next-Generation Data Management

See All Authors

Research Manager, IDC

PHIL GOODWIN

Research Vice President, IDC

PHIL GOODWIN

Research Vice President, IDC

Phil Goodwin is a Research Vice President within IDC’s Infrastructure Systems,
Platforms, and Technologies Group, with responsibility for IDC’s infrastructure
software research area. Mr. Goodwin provides detailed insight and analysis on
evolving infrastructure software trends, vendor performance, and the impact of
new technology adoption. His focus is on multi-cloud data management, data
logistics, on-premises and cloud-based data protection as-a-service, cyber
protection and recovery, recovery orchestration and more.

RECENT BLOGS

 * IDC Guest Blog: The Evolution of
   Next-Generation Data Management

See All Authors


JOHNNY YU

Research Manager, IDC

JOHNNY YU

Research Manager, IDC

Johnny Yu is a research manager within IDC’s infrastructure software platforms
research group. He covers as storage controller software, data replication,
protection and archiving, storage device management and container data
management, with a focus on how businesses optimize costs and secure their
storage environments as their infrastructure expands beyond their data
centers.Johnny Yu is a research manager within IDC’s infrastructure software
platforms research group. He covers as storage controller software, data
replication, protection and archiving, storage device management and container
data management, with a focus on how businesses optimize costs and secure their
storage environments as their infrastructure expands beyond their data centers.

RECENT BLOGS

 * IDC Guest Blog: The Evolution of
   Next-Generation Data Management

See All Authors





YOU MAY ALSO LIKE

BLOG

ACCELERATE HYBRID CLOUD TRANSFORMATION WITH NEXT-GEN DATA MANAGEMENT SOLUTIONS
BY INFOSYS AND COHESITY

- By Chris Wiborg

Learn more
X
 * 
 * 
 * 
 * 
 * 

1-855-214-3133

Contact us Contact us
 * Company
   * About
   * Leadership
   * Newsroom
   * Careers
   * Awards
   * Customers
   * Diversity, Equity, and Inclusion

 * How We’re Different
   * Why Cohesity
   * Technology Partners
   * Data Security Alliance
   * Responsible AI
   * Academy and Certifications
   * Marketplace
   * Trust Center
   * Demos

 * Helpful Links
   * Support
   * Blogs
   * Backup and Recovery
   * Ransomware Recovery
   * Cohesity Cloud Services
   * All Solutions
   * Certified Platforms
   * Developer

© 2023 Cohesity, Inc. All Rights Reserved.

 * Terms of Use
 * Privacy Policy
 * Legal
 * Cookies Settings
 * Sitemap





You are now leaving the German section of www.cohesity.com/de/ and come to an
English section of the site. Please click if you want to continue.

Stay on the site Continue

Don't show this warning again




You are now leaving the German section of www.cohesity.com/de/ and come to an
English section of the site. Please click if you want to continue.

Stay on the site Continue

Don't show this warning again


Share
Share
Share
Tweet
Share


We use cookies to provide you with the best experience on our website, to
improve usability and performance and thereby improve what we offer to you. Our
website may also use third-party cookies to display advertising that is more
relevant to you. If you want to know more about how we use cookies, please see
our Privacy Policy.

Cookies Settings Accept Cookies