Virtualization Technology News and Information
Article
RSS
Druva 2022 Predictions: More Cyber Threats, SaaS Adoption, and a Demand to Strengthen Data Resilience

vmblog predictions 2022 

Industry executives and experts share their predictions for 2022.  Read them in this 14th annual VMblog.com series exclusive.

More Cyber Threats, SaaS Adoption, and a Demand to Strengthen Data Resilience

By Stephen Manley, CTO, Druva

In 2021, data was under siege. The attacks began with ransomware. Cyber criminals deployed globally coordinated attacks on organizations every few seconds. Meanwhile, disruptions to the global supply chain made it almost impossible to acquire new hardware, organizations reduced IT budgets, and remote work accelerated data sprawl.

In 2022, all roads will lead to technologies that can solve today's data challenges in an autonomous, simplified and secure way. 2021 showed that organizations cannot simply work harder. With the escalating threats to their data, they need to change their approach from data protection to data resiliency.

Businesses will have to strengthen data resilience to combat ever-evolving ransomware.

In 2022 we will see a dramatic increase in both the volume and complexity of ransomware attacks. Cyber criminals will attack virtually any organization because ransomware has gone mainstream by becoming "as-a-service." These attacks target users to penetrate your security and once inside, silently spread through your environment. The attack first deletes your backups, so you cannot recover from the attack without paying the ransom. Once your defenses are eliminated, they rapidly encrypt file data on servers, NAS appliances, and endpoints and demand payment for the decryption key.

Ransomware attacks are also evolving, and it is critical for companies to start preparing for the new types of attacks, including:

  • Gaining control of the environment - bad actors take over email, phones, etc. because, as an insider threat, they can thwart your protection and recovery processes
  • Detection avoidance - encrypt data more slowly, target only portions of files and maintain file size and type to avoid existing anomaly detection
  • Exfiltration of data - pull data out of your environment and threaten to post it online or sell it
  • Targeting more than files - attack SaaS applications such as Salesforce and Microsoft 365, virtual machines, and cloud native applications

In a multi-cloud environment, it is nearly impossible to defend the perimeter, so customers will invest more to protect what the attackers are trying to access - their data.

Customers will explore technologies such as:

  • Data resiliency - to ensure that data will be automatically protected and recoverable, regardless of the attack
  • Data classification - to identify the type and location of data throughout the organization, so they can minimize the risk to their most sensitive data
  • Data access governance - to manage who and what can access data
  • Data access analysis - to monitor the patterns of who or what is accessing data

Modern data security depends on analyzing metadata about data, users, and the environment, so organizations that develop a centralized metadata management strategy will lead the way.

Organizations will adopt SaaS offerings to protect themselves from software and hardware supply chain vulnerabilities

With the interruptions to the hardware supply chain and the vulnerabilities to the software supply chain, businesses will continue to adopt software-as-a-service (SaaS). The shortage of processors, SSDs, and memory means that most companies cannot acquire servers and storage. The cloud providers have the purchasing leverage to expand and they offer the on-demand capacity that businesses need. Still, for those new to cloud, if you buy infrastructure-as-a-service, management can be complicated and you are still responsible for the security of your data.

The security threats are only increasing as criminals target the software supply chain. Cyber criminals penetrate a software supplier's environment and compromise their modules with malware. Every organization that leverages that software is then vulnerable. The only way to combat such threats is to constantly scan for vulnerabilities in a dynamic microservices environment. Rather than taking on that burden for all applications, leading organizations will select proven vendors for common services. To cope with the physical and software supply chain challenges, businesses will adopt SaaS for common services, so they focus their equipment and teams on delivering unique customer value.

While we won't ever be able to predict the future, one thing is for certain: technologies that are easy to deploy, offer simplified management, and enhance resiliency will be the winning combination in 2022.

##

ABOUT THE AUTHOR

Stephen Manley 

Stephen Manley is CTO at Druva ​​where he delivers solutions to help customers extract the full potential of their data. In leading development of data management capabilities for startups and serving as CTO of the Data Protection Group at Dell EMC, Stephen found his passion in partnering with customers to solve data protection challenges for today's enterprise and evolve modern data storage. He also spent time at NetApp as a senior technical director of data protection. Stephen is excited to connect with new customers and technology to transform how people protect, preserve, and use their data. Stephen works tirelessly to bring the latest innovative technologies to our customers, so they can always protect, manage, and increasingly obtain more value from their data.

Published Thursday, January 13, 2022 7:33 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<January 2022>
SuMoTuWeThFrSa
2627282930311
2345678
9101112131415
16171819202122
23242526272829
303112345