Big Data is a big obstacle for IT professionals

Rotterdam (NL), 11 July 2014 - Measures to manage and protect the growing amount of information lead to a wave of time-consuming information requests at the IT department, according to new Iron Mountain research. The research shows that the demand for access to information from the organization annually increases by about 60 percent

Rotterdam (NL), 11 July 2014 - Measures to manage and protect the growing amount of information lead to a wave of time-consuming information requests at the IT department, according to new Iron Mountain research. The research shows that the demand for access to information from the organization annually increases by about 60 percent. This sharp increase is causing IT professionals headaches. The only solution is to separate information and better empower employees.

The fact that the number of requests for access is rising sharply has, according to the IT professionals interviewed, a number of causes:

  • The strong growth in the amount of information that no longer fits on one PC is the main cause;
  • The need for organizations to restrict access to information for the protection and security of data is seen as the second biggest cause;
  • The growth of a company correlates with the growth in information access requests that inform the IT professionals: more employees generate more data and more requests to view protected information.
  • The inevitable fact that human errors are made, such as the accidental deletion of information, forgotten documents, or the loss or theft of personal devices or shared information, also burden the IT department and its professionals.

Access requests
Most requests for access to or access to business-critical information are available in the manufacturing industry, the service sector and healthcare. For example, a medium-sized healthcare institution with more than 250 employees states that the privacy of patient data results in employees only being able to access files, after which the inspection period expires after a certain period. This leads to a swelling flow of information access requests.

Information access requests can also lead to unwanted data loss, according to the research. Much information is lost when transferring between other projects and sales and departments as support.

Combined storage
"Protecting valuable information also involves access and storage processes", says Jeroen Strik of Iron Mountain. "The combined storage of information is the best approach. First you determine which information is most used and confidential and which information is almost never used. Structure can then be applied and policy can be made about the storage, access and back-up processes. It is important to keep high-quality, frequently used information immediately available, and to store archive material and other information in an efficient manner. From conversations it appears that this message is beginning to come through. Centralized storage is increasingly being used, supported by on-site and off-site disks, tape and cloud backups. It helps if employees have access to the data they need, without this heavily burdening IT professionals and resources, nor does it increase the associated information risks irresponsibly. "