June 26, 2023 By Sam Werner 4 min read

As any business leader is keenly aware, market and organizational dynamics have changed rapidly over the last several years, and despite any desire we might have to ‘get back to normal,’ the pace of change keeps accelerating. Customers expect a personalized and proactive (and often digitally enabled) experience, competition from unexpected directions is disrupting once-stable markets, and remote work is clearly sticking around for many enterprise roles. It’s clear our organizations need to find ways to respond to opportunities and threats faster and smarter, or else they risk being outmaneuvered by more nimble challengers.

One of the primary ways that organizations are responding to this new landscape is by rapidly expanding their use of Software as a Service (SaaS) and cloud infrastructure. And it’s no wonder, as cloud services applications typically don’t require much more than a credit card to get started and can help us unlock new sources of productivity, collaboration and insight. The data being managed by these cloud solutions has become essential to our business operations.

Out of the frying pan and into the fire

While IT leaders have welcomed cloud adoption, relieving them of the burden of building out and maintaining application environments, they’ve quickly come to realize that the use of multiple cloud tools like Microsoft 365 and Salesforce has led to the spread of data across multiple clouds and data centers. This increases the challenge of consistently securing, monitoring and enforcing application and data management policies.

SecOps teams also recognize that the data cloud applications store could be vulnerable to myriad internal and external threats. These threats include accidental deletion of data by users, malicious attacks by both internal and external actors, natural disasters, unexpected service interruptions, and perhaps most worryingly of all, the rise and prevalence of ransomware attacks. Enterprise Strategy Group (ESG) noted that almost 9 out 10 organizations have experienced an email-based cyber-attack within the last year, making it clear that attacks are both widespread and common.

This is a familiar story that we’ve all experienced at some level—resolving one set of problems gives rise to a series of unintended consequences. Of course, the degree to which these challenges impact your organization depends on a variety of factors, including your industry, the nature and sensitivity of the data these applications are managing, regulations and policies that must be upheld, and the depth and breadth of your organization’s cloud footprint.

What is clear is that nearly every organization using cloud services needs to take some basic steps to make sure that the data these applications hold is secure and available so that the organization can meet its data resilience objectives.

Doesn’t my cloud provider have this covered?

Cloud providers inevitably focus their attention and effort on what they do best—keeping their service running and improving the capabilities of the application. While they will periodically back up user data, they don’t take responsibility for ensuring data hasn’t been lost or corrupted. Cloud providers almost universally recommend that users of its services take steps to protect their data.

As an example, Microsoft notes in its Microsoft 365 license agreement: “We recommend that you regularly backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services.” This is a disclaimer that all consumers of cloud services have had to come to grips with, as providers seek to protect themselves through a ‘shared responsibility’ model. ESG notes that three out of four organizations do not use a data protection solution to protect data generated by cloud application workloads. This represents a major disconnect between cloud providers and organizations that use their services, akin to walking across a busy street with your eyes closed.

What’s the worst that could happen?

The costs of a data breach are substantial for most organizations. The latest statistics from the 2022 edition of the IBM Security Cost of a Data Breach report note the following:

  • A breach in the United States costs firms an average of USD $9.44M.
  • The worldwide average cost of a breach stands at USD $4.35M.
  • Ransomware attacks have grown 41% in the last year and took 49 days longer than average to identify and contain.
  • Destructive attacks increased in cost by over USD $430,000.

Depending on the size of your organization, those cost impacts may or may not seem reasonable to you. What is clear is that data loss for any business can be expensive, disruptive and a challenge to fix without the right capabilities in place.

IBM Storage Protect for Cloud can meet the cloud data resilience challenge

The IBM Storage Protect for Cloud offering was designed to address this very problem. With dedicated versions for Microsoft 365, Microsoft Dynamics 365, Salesforce and Azure Virtual Machines (new), it scans your data for threats to create a clean copy of the data and make sure that the data is safely backed up.

Even though cloud providers will periodically backup user data, the frequency of those backups and the length of time they are retained can present challenges to IT operations teams tasked with addressing whether data retention policies and regulations are being followed. All editions of IBM Storage Protect for Cloud put you in control by letting you determine the schedule and frequency that is right for your business, with the option to perform either full or incremental backups. You’re also in control of where your data is backed up. You can use our dedicated and scalable Microsoft Azure storage, your own cloud storage or a data center of your choosing.

Restoring your data is another area where most cloud providers limit your control. What happens when you realize that data was accidentally deleted after the user’s soft delete window (i.e., the ‘recycle bin’) has been automatically purged, or when a disgruntled employee wreaks havoc on your data on the way out the door?

While these may seem like unlikely scenarios, they are examples of planning for a rainy day for which every organization needs to prepare. IBM Storage Protect for Cloud gives you granular control to restore down to the item level, whether that is restoring a missing transaction, an incorrectly modified customer record or an accidentally deleted address. IBM Storage Protect for Cloud even offers self-service capabilities, enabling users you designate to quickly address issues like this to get keep your business moving forward faster.

In short, IBM Storage Protect gives you the flexibility and operational efficiency your organization needs while freeing up your IT resources to advance your digital initiatives to stay ahead of the competition and meet your customers’ expectations. It’s available today as a true SaaS platform with nothing to install and nothing to maintain, as an easy-to-use, modern data resilience software solution.

Interested in giving IBM Storage Protect for Cloud a try? Sign up for a free 30-day trial and see for yourself how easy it can be to add robust data resilience to your cloud applications.

Get started with IBM Storage Protect for Cloud
Was this article helpful?

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters