{"id":119712,"date":"2022-03-16T07:00:09","date_gmt":"2022-03-16T14:00:09","guid":{"rendered":"https:\/\/www.cohesity.com\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/"},"modified":"2024-10-15T05:11:09","modified_gmt":"2024-10-15T12:11:09","slug":"next-generation-data-management-evolves-to-face-new-challenges-and-threats","status":"publish","type":"post","link":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/","title":{"rendered":"IDC Guest Blog: The Evolution of <br>Next-Generation Data Management"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Digital transformation is changing IT, and the traditional ways of protecting and managing organizations&#8217; data are no longer adequate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the adoption of cloud and containers, organizations are facing new challenges. A more distributed architecture increases complexity and data sprawl. Cyber attackers take advantage of organizations&#8217; increased attack surface and seek out vulnerabilities to exploit and valuable data to steal. Lastly, with more data being created and stored outside the data center, organizations must comply with government regulations they might not have had to consider previously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To overcome these hurdles, the next generation of data management will evolve into something that&#8217;s more secure, intelligent, and open than traditional data management.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">New Environments, New Problems<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">For many organizations, digital transformation will lead to increased complexity as organizations&#8217; IT infrastructure extends across the core data center, multiple public and private clouds and the edge. As data sets grow, organizations will have an increasingly difficult time keeping track of their data, managing the sea of products that make up their data infrastructure environment, deriving value from their data, and optimizing their storage. IDC research has consistently shown that enterprise storage systems continue to grow exponentially, expanding at a five-year CAGR of 30.9%. Without proper data management, organizations are at risk of their environments reaching an unsustainable level of sprawl.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, more distributed infrastructure exposes more vulnerability points for cyber attackers to exploit. Ransomware in the past was easily overcome with good backup and recovery because it simply sought to lock out data and make it unavailable. However, attacks have become more sophisticated in nature. The threat has evolved to not only try to delete backups, but to steal the data and threaten to release it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data exfiltration attacks take place before traditional data management touches the data \u2014 by the time backup systems make an immutable copy and store it in an untouchable environment, the criminals already have it. In the past, this would be regarded as a problem for security teams to deal with, but security operations and data operations need to work in tandem to properly defend against this threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As data management and protection tools have traditionally been closed systems, this makes it harder for security and IT to work together. This also means other adjacent workloads that can make use of the data such as analytics and AI have trouble accessing it. The closed-off nature of traditional data management leads to inefficiency and complexity that compounds further with distributed, continually expanding infrastructure.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Next-Generation Solutions<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The next generation of data management will break free of its traditional trappings to take on the data challenges of a more distributed, cloud-centric world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Next-generation data management tools will need to have a centralized console to handle multiple use cases for multiple storage environments. A consolidated view of an organization&#8217;s entire data estate will help administrators make sense of their sprawling infrastructure. Additionally, being able to execute multiple IT functions such as backup, disaster recovery, migration, compliance and archiving from the same interface reduces complexity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Traditionally, data protection focuses on pushing important assets from the core into the cloud, but that is poised to flip soon. IDC predicts that by 2025, 55% of organizations will have a cloud-centric approach to data protection, where assets in the cloud are safeguarded elsewhere. The next generation of data management will cater to this growing notion that most organizations&#8217; critical data and applications will be born in the cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The five pillars of the NIST Cyber Security Framework are Identify, Protect, Respond, Recover and Detect, the last of which is an area traditional data protection misses completely. The next generation of data management will address this by integrating security features and implementing measures at earlier stages of a cyberattack \u2013 not just after an attack has already occurred.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Current data management tools already use AI to identify what backup copies are safe to recover from. Next-generation data management will extend the use of AI further to perform surface area analyses and threat vulnerability assessments and make recommendations for boosting an organization&#8217;s security posture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To carry this out, next-generation data management tools will need to integrate with technology partners and form a software ecosystem, allowing multiple products to programmatically communicate and share functionality. Data from data management tools will be able to feed machine learning and workflow applications, and organizations will be able to discover and implement these functions via an online marketplace.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Setting a New Bar<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">IDC believes the new standard of successful data management is centralized, secure and open to integration with adjacent technologies. As organizations undergo digital transformation, data management will transform along with it to address the challenges that come with a more cloud-based, distributed digital estate.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital transformation is changing IT, and the traditional ways of protecting and managing organizations&#8217; data are no longer adequate. With the adoption of cloud and containers, organizations are facing new challenges. A more distributed architecture increases complexity and data sprawl. Cyber attackers take advantage of organizations&#8217; increased attack surface and seek out vulnerabilities to exploit [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":117757,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[1162],"tags":[1163,1164,1165,1166,1167,1168,1169],"class_list":["post-119712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-de","tag-backup-and-recovery-de","tag-cloud-de","tag-data-management-de","tag-data-protection-de","tag-mass-data-fragmentation-de","tag-next-gen-data-management-de","tag-ransomware-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IDC Guest Blog: The Evolution of Next-Generation Data Management | Cohesity<\/title>\n<meta name=\"description\" content=\"Digital transformation is changing IT, and the traditional ways of protecting and managing organizations&#039; data are no longer adequate. With the adoption\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IDC Guest Blog: The Evolution of Next-Generation Data Management\" \/>\n<meta property=\"og:description\" content=\"Digital transformation is changing IT, and the traditional ways of protecting and managing organizations&#039; data are no longer adequate. With the adoption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Cohesity\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cohesity\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-16T14:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T12:11:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png\" \/>\n\t<meta property=\"og:image:width\" content=\"926\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Phil Goodwin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cohesity\" \/>\n<meta name=\"twitter:site\" content=\"@cohesity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Phil Goodwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\"},\"author\":{\"name\":\"Phil Goodwin\",\"@id\":\"https:\/\/www.cohesity.com\/de\/#\/schema\/person\/bc79393ac3a204bde1ff47c19db67302\"},\"headline\":\"IDC Guest Blog: The Evolution of Next-Generation Data Management\",\"datePublished\":\"2022-03-16T14:00:09+00:00\",\"dateModified\":\"2024-10-15T12:11:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png\",\"keywords\":[\"backup and recovery\",\"cloud\",\"data management\",\"Data Protection\",\"mass data fragmentation\",\"Next-Gen Data Management\",\"ransomware\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\",\"url\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\",\"name\":\"IDC Guest Blog: The Evolution of Next-Generation Data Management | Cohesity\",\"isPartOf\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png\",\"datePublished\":\"2022-03-16T14:00:09+00:00\",\"dateModified\":\"2024-10-15T12:11:09+00:00\",\"description\":\"Digital transformation is changing IT, and the traditional ways of protecting and managing organizations' data are no longer adequate. With the adoption\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage\",\"url\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png\",\"contentUrl\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png\",\"width\":926,\"height\":440,\"caption\":\"Next-Generation Data Management Evolves to Face New Challenges and Threats Hero Banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cohesity.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IDC Guest Blog: The Evolution of Next-Generation Data Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cohesity.com\/de\/#website\",\"url\":\"https:\/\/www.cohesity.com\/de\/\",\"name\":\"Cohesity\",\"description\":\"Eliminate mass data fragmentation with Cohesity\u2019s modern approach to data management, beginning with backup. Gain instant recovery.\",\"publisher\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cohesity.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cohesity.com\/de\/#organization\",\"name\":\"Cohesity\",\"url\":\"https:\/\/www.cohesity.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cohesity.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg\",\"contentUrl\":\"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg\",\"width\":143,\"height\":20,\"caption\":\"Cohesity\"},\"image\":{\"@id\":\"https:\/\/www.cohesity.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/cohesity\",\"https:\/\/x.com\/cohesity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cohesity.com\/de\/#\/schema\/person\/bc79393ac3a204bde1ff47c19db67302\",\"name\":\"Phil Goodwin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cohesity.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4f8e409cee1d1b6de392b59d3d8f627?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4f8e409cee1d1b6de392b59d3d8f627?s=96&d=mm&r=g\",\"caption\":\"Phil Goodwin\"},\"description\":\"Phil Goodwin is a Research Vice President within IDC\u2019s Infrastructure Systems, Platforms, and Technologies Group, with responsibility for IDC\u2019s infrastructure software research area. Mr. Goodwin provides detailed insight and analysis on evolving infrastructure software trends, vendor performance, and the impact of new technology adoption. His focus is on multi-cloud data management, data logistics, on-premises and cloud-based data protection as-a-service, cyber protection and recovery, recovery orchestration and more.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IDC Guest Blog: The Evolution of Next-Generation Data Management | Cohesity","description":"Digital transformation is changing IT, and the traditional ways of protecting and managing organizations' data are no longer adequate. With the adoption","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/","og_locale":"de_DE","og_type":"article","og_title":"IDC Guest Blog: The Evolution of Next-Generation Data Management","og_description":"Digital transformation is changing IT, and the traditional ways of protecting and managing organizations' data are no longer adequate. With the adoption","og_url":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/","og_site_name":"Cohesity","article_publisher":"https:\/\/www.facebook.com\/cohesity","article_published_time":"2022-03-16T14:00:09+00:00","article_modified_time":"2024-10-15T12:11:09+00:00","og_image":[{"width":926,"height":440,"url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png","type":"image\/png"}],"author":"Phil Goodwin","twitter_card":"summary_large_image","twitter_creator":"@cohesity","twitter_site":"@cohesity","twitter_misc":{"Written by":"Phil Goodwin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#article","isPartOf":{"@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/"},"author":{"name":"Phil Goodwin","@id":"https:\/\/www.cohesity.com\/de\/#\/schema\/person\/bc79393ac3a204bde1ff47c19db67302"},"headline":"IDC Guest Blog: The Evolution of Next-Generation Data Management","datePublished":"2022-03-16T14:00:09+00:00","dateModified":"2024-10-15T12:11:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/"},"wordCount":786,"publisher":{"@id":"https:\/\/www.cohesity.com\/de\/#organization"},"image":{"@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png","keywords":["backup and recovery","cloud","data management","Data Protection","mass data fragmentation","Next-Gen Data Management","ransomware"],"articleSection":["Technology"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/","url":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/","name":"IDC Guest Blog: The Evolution of Next-Generation Data Management | Cohesity","isPartOf":{"@id":"https:\/\/www.cohesity.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png","datePublished":"2022-03-16T14:00:09+00:00","dateModified":"2024-10-15T12:11:09+00:00","description":"Digital transformation is changing IT, and the traditional ways of protecting and managing organizations' data are no longer adequate. With the adoption","breadcrumb":{"@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#primaryimage","url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png","contentUrl":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2022\/03\/ngdm-new-threats-blog-hero.png","width":926,"height":440,"caption":"Next-Generation Data Management Evolves to Face New Challenges and Threats Hero Banner"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cohesity.com\/de\/blogs\/next-generation-data-management-evolves-to-face-new-challenges-and-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cohesity.com\/de\/"},{"@type":"ListItem","position":2,"name":"IDC Guest Blog: The Evolution of Next-Generation Data Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cohesity.com\/de\/#website","url":"https:\/\/www.cohesity.com\/de\/","name":"Cohesity","description":"Eliminate mass data fragmentation with Cohesity\u2019s modern approach to data management, beginning with backup. Gain instant recovery.","publisher":{"@id":"https:\/\/www.cohesity.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cohesity.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cohesity.com\/de\/#organization","name":"Cohesity","url":"https:\/\/www.cohesity.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cohesity.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg","contentUrl":"https:\/\/www.cohesity.com\/wp-content\/new_media\/2020\/10\/cohesity_logo.svg","width":143,"height":20,"caption":"Cohesity"},"image":{"@id":"https:\/\/www.cohesity.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cohesity","https:\/\/x.com\/cohesity"]},{"@type":"Person","@id":"https:\/\/www.cohesity.com\/de\/#\/schema\/person\/bc79393ac3a204bde1ff47c19db67302","name":"Phil Goodwin","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cohesity.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4f8e409cee1d1b6de392b59d3d8f627?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4f8e409cee1d1b6de392b59d3d8f627?s=96&d=mm&r=g","caption":"Phil Goodwin"},"description":"Phil Goodwin is a Research Vice President within IDC\u2019s Infrastructure Systems, Platforms, and Technologies Group, with responsibility for IDC\u2019s infrastructure software research area. Mr. Goodwin provides detailed insight and analysis on evolving infrastructure software trends, vendor performance, and the impact of new technology adoption. His focus is on multi-cloud data management, data logistics, on-premises and cloud-based data protection as-a-service, cyber protection and recovery, recovery orchestration and more."}]}},"_links":{"self":[{"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/posts\/119712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/comments?post=119712"}],"version-history":[{"count":1,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/posts\/119712\/revisions"}],"predecessor-version":[{"id":265799,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/posts\/119712\/revisions\/265799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/media\/117757"}],"wp:attachment":[{"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/media?parent=119712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/categories?post=119712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cohesity.com\/de\/wp-json\/wp\/v2\/tags?post=119712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}