Q: What are your expectations for deployment and knowledge transfer in the data storage security project?
Who is responsible for the deployment of the data storage security solution? How does the client envision the installation, and at what point do they expect knowledge transfer?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The reality is that data storage security technologies require deployment by experienced staff. For the very same reasons that one should not be their own lawyer, or practice self-dentistry, or self-surgery, you want to be sure that the people planning and deploying the project have the necessary expertise. Often the best knowledge transfer can be acquired during the planning and deployment stages by assigning internal resources to work alongside the specialists through the process.
The prospect of sending the clients security or support resources for training, and then letting them loose on a new installation, or expecting them to open a box and deploy, will net disastrous results. A lack of familiarity with the translation of data storage security policy to the necessary configuration parameters with the technology may leave unprotected gaps in the deployed security policy.