Como todos sabemos, nada es 100% seguro, tal vez no más que cuando se trata de una infraestructura de servidor heredada. Los equipos viejos y vulnerables son una bendición para los piratas informáticos. Los ataques cada vez más sofisticados atacan la infraestructura obsoleta.
€ 4 million per data breachAccording to figures from the IBM Cost of a Data Breach report1, the average financial cost of a security breach in 2020 was €3.86 million. The cost to reputation (both corporate and personal) can be long lasting and even more brutal. It is clear that regulations like the EU's GDPR carry heavy penalties for data breaches. As a CIO or senior IT specialist, you are increasingly being asked to do more with less. Budgets shrink as expectations rise, but new security threats still require time and focused resources. It's a tough position to hold - you don't have to be a wizard to work in IT, but it helps. So how do you balance the cycle of adding stronger and stronger security measures to reduce the risk of a data breach while cutting costs and managing resources wisely? Say hello to HCI
Hyperconverged infrastructure, or HCI, provides much of the answer. HCI combines the elements of a traditional data center—compute, storage, and networking—into a single system. Instead of a hardware-defined infrastructure, HCI creates a virtualized, software-defined environment that is often easier to maintain and easier to scale. This helps reduce operating costs and improve performance. Digital transformation is pushing enterprise data centers toward hyper-converged infrastructure (HCI) and away from traditional RAID infrastructures and computer storage networks. It's not hard to see why: HMI makes sense when agility, total cost of ownership, and security are your top priorities. But HCI is not secure by default To reduce the risk of security breaches, you should choose secure components in your HCI solution. AMD EPYCä processors are designed with a sophisticated set of security features that help minimize security risks. How AMD EPYC™ Processors Bring Security Capabilities to Your HCI Solution
1. IBM Security Report, Cost of a Data Breach, page 5. Report © Copyright IBM Corporation 2020
2. AMD Infinity Guard security features on EPYC™ processors must be enabled by server OEMs and/or cloud service providers to work. Check with your OEM or carrier to confirm support for these features. Learn more about Infinity Guard at https://www.amd.com/en/technologies/infinity-guard. GD-177 AMD, AMD Arrow, EPYC, and combinations thereof are trademarks of Advanced Micro Devices, Inc.
<p>Copyright © 2021 IDG Communications, Inc.</p>