MeriTalk: Gov’t Adopting Cloud But Concerned Over Data Stewardship; NetApp’s Kirk Kern Comments

cloudMeriTalk has released the findings of a study underwritten by NetApp and Arrow indicating that federal agencies are looking to expand their use of cloud but many remain wary about its potential impact to operations.

The study found that 89 percent of information technology professionals in government continue to be concerned about data stewardship as they turn over management of data and IT services to cloud vendors, MeriTalk said Tuesday.

“The benefits cloud offers are immense, but with the introduction of new hybrid cloud architectures, data stewardship becomes even more complex, as data must be managed and accessed across any cloud,” said Kirk Kern, chief technology officer for NetApp’s U.S. public sector practice.

According to the “Cloud Control: Moving to the Comfort Zone” report, security is a top concern among agencies alongside data integration, interoperability and other data governance challenges.

Kern pointed to enterprisewide data governance, role-based control systems and streamlining of data mobility across cloud models as measures that federal agencies can implement to ensure effective data stewardship.

Respondents also noted on-premises security functions, certifications, cloud brokerage and a dedicated server or network to house data as other practices to manage trust on the vendor.

“To get more comfortable with the transition, agencies should seek out partners that offer best of breed IT services and focus on government data security for a proven path to cloud success,” added Dee Dee Lear, vice president of cloud and business development at Arrow ECS.

The MeriTalk report is based on an online survey of 153 government IT professionals conducted in June.

Check Also


NSA Reports on New Cyber Vulnerability in Computers

The National Security Agency (NSA) has issued a report on a new cyber vulnerability that threatens certain systems present within the Department of Defense and other organizations. The BootHole vulnerability allows cyber actors to get through the Secure Boot security standard that makes devices boot only with software trusted by original manufacturers. 

Leave a Reply

Your email address will not be published. Required fields are marked *