
Why Next-Generation Data Protection Has Ascended
Eric Herzog is the Chief Marketing Officer at Infinidat.
When I attend the RSA 2025 conference in San Francisco at the end of April, I will be having a series of conversations with customers, partners and people who want to be customers or partners, and the one question I will ask all of them is: 'What are you doing about next-generation data protection?'
If the answer is 'Nothing,' then they have a problem because cybercriminals will exploit this oversight. Traditional data protection is no longer enough for enterprises.
Cybercriminals have figured out that the storage infrastructure is like a beachhead for them to launch cyberattacks, such as ransomware and malware, against a company. Cybercriminals are known to dwell within the data infrastructure of an enterprise for months, waiting for the optimal opportunity to inflict the most damage.
These bad actors will take your organization's data hostage and give you a 'ransom' demand that is in the millions of dollars, if not the tens of millions of dollars. All because of the outdatedness or incompleteness of data protection capabilities and the lack of a cyber storage resilience and recovery strategy!
If cybercriminals are patient enough to wait months for their 'opportunity' to strike, then anyone responsible for their company's cybersecurity efforts can take five minutes to learn the key elements of next-generation data protection.
The scope of data protection has expanded over the past couple of years. It's no longer just about doing snapshots of data or being able to handle backup repositories. Those things are still needed, of course, but securing the data infrastructure has grown much wider with the addition of two key elements: cyber storage resilience and near-immediate cyber recovery.
These elements are core to next-generation data protection, and they are built on being cyber-focused and recovery-first. This is a revolutionary way of thinking about your enterprise storage to support applications and workloads. What's the priority? It's the endpoint.
You certainly want to use immutable snapshots for next-gen data protection so that data cannot be altered, corrupted or deleted, and you get a known clean copy of data. But you also need to get to a point of orchestration and deeper integration than what is common today.
The capabilities that are required to ascend to next-gen data protection are automated cyber protection and cyber detection. They can make the difference between:
• Option A, an enterprise paying $5 million, $10 million, $100 million (or more) to 'ransom' their data from cyber criminals.
• Option B, an enterprise ignoring cybercriminals because the organization is able to simply recover and restore its data on its own—with no ransom payment at all—because of next-generation data protection.
Automated cyber protection, or ACP, automates the taking of immutable snapshots of data as soon as a security alert from a data center-wide cybersecurity application is triggered. There is virtually no delay compared to the commonly used manual process. This is a step that helps advance your infrastructure from just being for backup to now being optimized for restore. Restoration can happen within minutes with ACP capabilities paving the way.
Cyber detection that is integrated into primary storage is the key to determining whether data is clean or compromised. The last thing you want to do is restore corrupt data. Cyber detection uses machine learning (ML) to scan huge amounts of data to check for data integrity. This is vital in today's day and age.
When you have a cyber-focused, recovery-first strategy that utilizes these next-generation data protection capabilities, you take steps to prevent your company's data from being held hostage. It gets rid of the cyber weak spots. To use a metaphor, think of it this way: Your data infrastructure is made up of the equivalent of what I like to call 'cyber steel,' which was unthinkable just a few years ago.
If construction workers are going to build a skyscraper with a steel infrastructure for longevity, they would use the appropriate tools: heavy-duty cranes, welding equipment and specialized tools for steel work. Likewise, when you're going to build or revamp your enterprise storage infrastructure to be 'steel-like' cyber resilient, you need the right tools: immutable snapshots, logical air gapping, a fenced forensic environment, a near-instantaneous recovery capability, automated cyber protection and cyber detection.
These tools enable a smart IT team to detect, contain and mitigate the impact of an attack on your data infrastructure. They make it possible to do lightning-fast recovery of data with integrity—and do it at scale.
Last but not least: The culmination of next-generation data protection is that you are able to obtain a faster return on security investment (ROSI), a standard cybersecurity industry metric, because the money you save will far outweigh the IT investment in cyber resilient storage capabilities with integrated cyber detection and the revolutionary automated cyber protection.
As an industry, we may be getting closer to needing to consider creating a new return on security and storage investment (ROSSI) metric because the financial benefits—and the ability to put a number on cyber recovery—are changing the conversations in C-suites of leading-edge enterprises.
Instead of the classic Tony Bennett song 'I Left My Heart in San Francisco,' chief information security officers (CISOs) and cybersecurity decision-makers in attendance at the largest meeting of security experts in the world may be singing 'I Left My Traditional Data Protection in San Francisco.' After the conversations that will invariably take place across the community at the RSA conference in San Francisco, data protection cannot be viewed the same.
With a cyber-focused, recovery-first strategy that delivers end-to-end cyber storage resilience, the best is yet to come for enterprises to safeguard their data and mitigate the effects of a cyberattack—powered by next-generation data protection.
Forbes Communications Council is an invitation-only community for executives in successful public relations, media strategy, creative and advertising agencies. Do I qualify?

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
2 days ago
- Yahoo
Australian PM Floats Potential US Beef Import Deal for Trump
(Bloomberg) -- Australian Prime Minister Anthony Albanese has signaled scope for a potential deal on US beef imports to his nation as part of tariff negotiations with President Donald Trump. Next Stop: Rancho Cucamonga! ICE Moves to DNA-Test Families Targeted for Deportation with New Contract Where Public Transit Systems Are Bouncing Back Around the World US Housing Agency Vulnerable to Fraud After DOGE Cuts, Documents Warn The Global Struggle to Build Safer Cars Albanese reiterated Friday that Australia wouldn't 'change or compromise' its biosecurity laws as part of negotiations with the Trump administration to lift import duties on steel and aluminum, as well as a general 10% 'reciprocal' tariff. However, he added that a deal could be struck if Australia was able to maintain its rules to keep invasive pests and diseases out of the island nation. 'If things can be sorted out in a way that protects our biosecurity, of course, we don't just say no,' Albanese said in a radio interview with Australia Broadcasting Corp. The prime minister is expected to hold his first face-to-face meeting with Trump in coming weeks, potentially on the sidelines of a June 15-17 Group of Seven meeting that host nation Canada invited Albanese to attend. The two leaders have previously spoken on the phone multiple times, with Trump praising his 'very good relationship' with Albanese following the Australian PM's reelection on May 3. The lack of US beef exports to Australia has been a sticking point for the Trump administration. The president singled out Canberra for special mention in an April press conference, saying that while Australians were 'wonderful people and wonderful everything,' they were not buying enough American produce. Australia barred US beef imports in 2003 after an outbreak of mad cow disease in the nation, and only lifted some restrictions in 2019. However, Washington is demanding 'full market access for fresh US beef and beef products,' according to the US Trade Representative's 2025 Foreign Trade Barriers report released in March. The Australian government is also weighing a potential deal on critical minerals with the Trump administration as part of its tariff negotiations. Cavs Owner Dan Gilbert Wants to Donate His Billions—and Walk Again YouTube Is Swallowing TV Whole, and It's Coming for the Sitcom Millions of Americans Are Obsessed With This Japanese Barbecue Sauce Is Elon Musk's Political Capital Spent? Trump Considers Deporting Migrants to Rwanda After the UK Decides Not To ©2025 Bloomberg L.P. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
3 days ago
- Yahoo
Anchoring Innovation and Community: EC-Council's RSA 2025 Yacht Reception Sets the Stage for Black Hat USA
From RSA's luxury yacht reception to Black Hat's TopGolf Las Vegas event, EC-Council's leadership and community-led conversations shape a more secure and connected digital world. Anchoring Innovation and Community: EC-Council's RSA 2025 Yacht Reception Sets the Stage for Black Hat USA Tampa, Florida, June 05, 2025 (GLOBE NEWSWIRE) -- Against the backdrop of RSA Conference 2025, EC-Council- the global leader in cybersecurity education and training, and creator of the world-renowned Certified Ethical Hacker (CEH) credential; hosted a landmark executive cocktail reception aboard a luxury yacht. This invite-only event brought together a handpicked network of cybersecurity decision-makers from across continents, creating a powerful forum for strategic exchange, global connection, and collective foresight. With its unique setting and high-caliber attendees, the evening served as a catalyst for industry-shaping dialogue at a time when cybersecurity is undergoing one of its most pivotal transformations. The event brought together 150 senior executives from a pool of over 650 registrants, the reception represented a powerful cross-section of sectors, technology, finance, healthcare, consulting, and featured leaders from renowned global powerhouses like Amazon, Bank of America, Cisco, Google, Microsoft, Uber, and Wells Fargo. This diversity reflected the depth of leadership fuelling the evening's high-level discussions. From North America to Europe and Asia, participants From North America to Europe and Asia, this international community of cybersecurity professionals united around a shared mission: defending digital ecosystems amid the rise of AI-driven threats. The yacht setting offered a rare chance to move beyond formal sessions, enabling candid, forward-looking conversations about the rapidly shifting threat landscape and the technologies that will define the future of cyber defense. Jay Bavisi, Group President, EC-Council, shared: 'Cybersecurity cannot remain the domain of a few, it must be accessible to all. At EC-Council, we are building not just certifications, but a movement. One that empowers professionals across geographies and generations through high-impact training, real-world simulation, and community-led collaboration. Events like this reception are a reminder that the future of cybersecurity is collective, and we are proud to nurture the global community that drives it forward.' The reception also marked a defining moment for EC-Council's continued innovation. From the launch of CEH with AI-powered capabilities to the release of CPENT AI, and the introduction of The Hackerverse - a global competition platform that immerses learners in simulated real-world attack scenarios each initiative reflects EC-Council's deep commitment to preparing professionals for tomorrow's threats, today. With its $100 million cybersecurity innovation initiative now underway, EC-Council is accelerating the development of solutions that bridge capability gaps, empower learners, and fuel next-gen defense strategies, creating a future where cybersecurity expertise is scalable, inclusive, and globally accessible. Bavisi concluded, 'By engaging with leaders at RSA and Black Hat, EC-Council continues to build a global movement focused on empowering professionals and democratizing access to critical cybersecurity skills. These conversations are shaping the future of digital defense.' Next Stop: Black Hat USA 2025 at Top Golf Building on the momentum from RSA, EC-Council is set to host its next major gathering during Black Hat USA 2025, this time at Top Golf Las Vegas. This high-energy, immersive experience will blend cybersecurity insights with interactive networking, bringing together industry leaders, innovators, and rising talent for an unforgettable evening of connection and collaboration. For media inquiries or to connect with EC-Council at Black Hat USA 2025, please contact: press@ About EC-Council: EC-Council is the creator of the world-renowned Certified Ethical Hacker (CEH) program and a leader in cybersecurity education. Founded in 2001, EC-Council's mission is to provide high-quality training and certifications for cybersecurity professionals to keep organizations safe from cyber threats. EC-Council offers over 200 certifications and degrees in various cybersecurity domains, including forensics, security analysis, threat intelligence, and information security. An ISO/IEC 17024 accredited organization, EC-Council has certified over 350,000 professionals worldwide, with clients ranging from government agencies to Fortune 100 companies. EC-Council is the gold standard in cybersecurity certification, trusted by the U.S. Department of Defense, the Army, Navy, Air Force, and leading global corporations. For more information, visit: Attachment Anchoring Innovation and Community: EC-Council's RSA 2025 Yacht Reception Sets the Stage for Black Hat USA CONTACT: EC-Council press@ in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Forbes
4 days ago
- Forbes
The New Cloud Rush: How AI Is Reshaping Everything
Jeffrey Gregor is General Manager of OVHcloud US . getty AI is driving a seismic shift in how we think about cloud infrastructure. As businesses rush to integrate AI, cloud service providers are having to evolve to meet soaring demand, and we're only just starting to grasp the full scope of this transformation. In my work with enterprise clients, tech teams and cloud architects, I've seen firsthand how AI is reshaping expectations and capabilities. Let's look at how AI is redefining the cloud, what businesses should watch for and how they can extract real value while keeping costs and risks under control. One of the most common use cases at the moment is AI-powered virtual assistants and internal chatbots. These tools help support teams respond more efficiently by enabling employees to retrieve company-specific data through simple questions—no need to dig through files or wikis. In legal departments, AI is transforming how research is conducted. Instead of sifting through documents or search engines, firms can connect proprietary databases to LLMs that give relevant answers instantly. It's like having a tireless assistant with domain knowledge built in, available 24/7. Firms are also increasingly leveraging AI to assess and refine trial strategies, aiming to enhance their chances of success in the courtroom. The technology can help predict judicial decisions, simulate jury behavior, enhance legal research and help with document review. AI workloads are incredibly resource-intensive, requiring powerful GPUs, high-speed networking and secure environments for sensitive data. Building and maintaining this in-house is out of reach for many businesses. Fortunately, cloud providers are on hand to offer instant access to the latest cutting-edge chips, tools and frameworks. Cloud platforms also democratize AI. Whether you're using pretrained models, APIs for image recognition or full-blown GenAI, cloud providers offer an easy usage-based on-ramp for organizations at any stage of AI adoption, at a fraction of the cost required to build this infrastructure. Many companies are still exploring what AI can do for them, and the cloud makes that process fast while minimizing risk. Crucially, the cloud supports rapid testing and iteration. You don't necessarily need the most powerful GPUs or deepest pockets to get started; models like the NVIDIA L40S can be a cost-effective, lower-power option for high-performance inference and training without the cost or power draw of the H200. The key is to test, refine and scale what works without committing to massive infrastructure investments up front. Trust, Transparency And Cost Control Public cloud models come with their own risks, especially when it comes to cost and trust. Even as excitement around AI grows, companies are discovering that evaluating costs and ROI can be challenging. I've heard many clients share their frustrations about unpredictable cloud billing, with unexpected and quickly mounting fees for storage, bandwidth or API calls. To use AI responsibly in the cloud, transparent pricing models are key so businesses are clear about costs up front. That means understanding factors like egress and ingress charges, query volumes, storage tiers and model usage limits. Security and trust are just as important. GenAI often involves sensitive or proprietary data. If you're using a shared model or public API, you must ensure your data isn't being logged, used for training or exposed to risks like prompt injection. Poorly configured AI services have already led to accidental data leaks. That's why I often recommend hosting your own model in a controlled cloud environment, especially when regulations like HIPAA or GDPR are involved. Many top cloud providers offer dedicated hardened environments, encryption and certifications. Another often-overlooked factor is networking. Moving data between your systems and the cloud can be slow and expensive unless your provider offers enterprise-grade connectivity. Not all clouds are created equal. Some run on their own global fiber, while others don't. Ask questions before you commit. Looking Ahead: The AI-Cloud Era We're at the dawn of a new era in enterprise technology. Cloud platforms are becoming the foundations of secure, intelligent and scalable systems. AI—especially GenAI and now agentic AI—is driving this evolution, and things are only going to accelerate. A handful of major players, along with a thriving open-source community, are laying the foundation for powerful, customizable AI tools. Success in this new landscape comes down to three things: know what you need, ensure you're getting value and keep control over your data. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?