Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

The promises of IoT and data management strategy

Zafar Anjum | April 24, 2015
In this wide-ranging interview, Mark Bentkower, Director of Systems Engineering, ASEAN, CommVault, talks about IoT and its promises in the context of other technologies and imperatives such as cloud, big data, virtualisation, security and data classification

This is where CommVault comes in and says, hey we're going to classify all the data and show which data hasn't been touched in years or months. What has been looked at but not modified for a certain period of time. Now that you have all this information about your data, CommVault will take this information and turn it into rules and say, okay now that you know about your data, come back and give me some rules. What hasn't been touched in more than nine months should go off to tape, cloud or disk. CommVault will pick it up and move it for you. We'll start managing where the data is located and we'll know what's there and know what's changed. That's a value that we bring as far as security in the Internet of Things is, I can't tell you if an app got naughty with another app and stole some data. But once you've identified that there's an issue, I can help you remediate it and understand it and decide what you want to do from a technical or PR standpoint. 

What are your customers in Singapore and other parts of Asia worried about currently? 

I don't think they are necessarily worried so much about the Internet of Things yet. I think their current worries include disaster-recovery. Businesses want to know they can bring their business services up as quickly as they can in a disaster. A lot of them are interested in the cloud, they've been a little wary of it. But in the last year it's starting to really pick up because it has become so inexpensive to store. So they have been talking to us about security. They want to know that no one can get to their data when it's in the cloud or that they can comply with a bank or government regulation. 

What I am also hearing a lot about is edge protection. Many people carry one or two more devices, with company data sitting in these devices. The data that belongs to the organization is now in the data center and on 4 or 5 devices that don't belong to the company. They can't control what I do with them; they can't control if it's stolen. But what information is the thief able to obtain/retrieve? CommVault is able to find devices with a beacon, which will report where the laptop is and we'll know exactly what data was on it because enterprises will be able to tell the changes from last backup. Enterprises are given a lot more control over what the data is and sharing. How do you deal with understanding who saw the files and what they did to it? How do you know that vendors, who give a free-service, are not looking at your data, and do you want them to do that? We provide places within a company's cloud or data center, to be able to let employees share large files with one another or be able to let group do collaboration work where who's got the current version for the file. 


Previous Page  1  2  3  4  5  6  Next Page 

Sign up for CIO Asia eNewsletters.