Conducted by Vanson Bourne Research
|
|
- Alfred Roberts
- 5 years ago
- Views:
Transcription
1 Conducted by Vanson Bourne Research N o v e m b e r
2 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA BRAZIL FRANCE ITALY NORDICS RUSSIA SOUTH AFRICA JAPAN CANADA UK GERMANY SPAIN BENELUX INDIA AUSTRALIA CHINA 10 VERTICALS 50/50 SPLIT BETWEEN ORGANIZATIONS WITH EMPLOYEES & MORE THAN 1000 EMPLOYEES 2
3 THE FOUR BIG MEGATRENDS IN INFORMATION TECHNOLOGY TODAY ARE CLOUD COMPUTING, BIG DATA, SOCIAL NETWORKING AND MOBILE DEVICES. ADOPTION AND MATURITY OF THESE TRENDS MUST FLOAT UPON A SEA OF TRUST TRUST THAT MY INFORMATION IS SECURE IN THE CLOUD, TRUST THAT MY DATA WON T BE LOST OR STOLEN, TRUST THAT MY IT WILL BE OPERATIONAL WHEN IT NEEDS TO BE WHICH, THESE DAYS, IS ALL THE TIME. THE MORE TRUST THAT CAN BE EARNED AND GUARANTEED, THE BIGGER AND FASTER THE IMPACT OF THESE TRENDS. CONVERSELY, THE LESS TRUST THAT IS ESTABLISHED, THE MORE LIMITED THESE TRENDS WILL BE. DAVID GOULDEN 3
4 NUMBER OF RESPONDENTS OVERALL MATURITY 70 OVERALL MATURITY DISTRIBUTION LAGGARDS EVALUATORS ADOPTERS LEADERS % 40% 36% 8% MATURITY SCORE (OUT OF 100) 4
5 NUMBER OF RESPONDENTS MATURITY PILLARS OVERALL MATURITY DISTRIBUTION 70 LAGGARDS EVALUATORS ADOPTERS LEADERS % 40% 36% 8% MATURITY SCORE (OUT OF 100) 5
6 SCORING METHODOLOGY The study focuses on attributes of IT information availability, backup, & security that contribute most to the ability to withstand & quickly recover from disruptive IT incidents. 1,600 IT responses were used to rank their organizations maturity levels, ranging from lowest to highest Laggard, Evaluator, Adopter, & Leader. Those organizations with more progressive strategies & those using more advanced technology achieved higher ratings. 6
7 MATURITY SCORE (OUT OF 100) BY COUNTRY China 65.2 USA 61.8 South Africa 60.9 Brazil 53.8 Australia 52.8 Spain 51.6 France 51.4 UK 49.7 Canada 49.5 Benelux 49.5 India 49.4 Italy 49.1 Russia 48.7 Germany 48.4 Nordics 43.0 Japan 38.8 CHINA IS THE MOST MATURE COUNTRY JUST AHEAD OF AHEAD OF THE USA 3 OF THE 4 MOST MATURE COUNTRIES ARE B R I C S JAPAN L A G S A S T H E L E A S T MATURE 7
8 MATURITY SCORE BY INDUSTRY Financial services (OUT OF 100) 54.1 Life sciences IT and technology Healthcare Public sector Manf. Retail and consumer products Energy Comms, media and ent. Consulting IN ADDITION TO IT, HIGHLY-REGULATED INDUSTRIES DISPLAY PROPORTIONALLY HIGHER LEVELS OF MATURITY 8
9 THE CRISIS Widespread unplanned downtime, security breaches, & data loss 61% Nearly half of respondents companies have suffered at least one of the following: unplanned downtime (37%), security breach (23%) or data loss (29%) in the last 12 months. 45% of respondents report that their senior executives are not confident that their organization has adequate data protection, security, & IT availability. 9
10 SENIOR EXECUTIVES CONFIDENCE IN THEIR ORGANIZATION S IT MATURITY On average, only 55% of respondents report their senior executives have any confidence in their data protection, security, & availability. Leaders Adopters 65% 81% This rises significantly with each level of maturity. Conversely, 45% cited no confidence. Evaluators Laggards 39% 51% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for yes, they already are, by overall maturity (Asked to all 3200 respondents) 10
11 SENIOR EXECUTIVES CONFIDENCE IN THEIR ORGANIZATION S IT MATURITY (COUNTRY) Japan the least mature country has the smallest percentage of respondents reporting that their senior teams have trust in IT. Interestingly, the BRICS countries are scattered throughout the centre neither leading or lagging in this regard. Germany France Benelux Spain India USA Australia Canada China South Africa UK Brazil Italy Russia Nordics Japan 31% 66% 64% 64% 63% 62% 61% 59% 58% 56% 55% 54% 50% 49% 49% 46% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for yes, they already are, by country (Asked to all 3200 respondents) 11
12 SENIOR EXECUTIVES CONFIDENCE IN THEIR ORGANIZATION S IT MATURITY (INDUSTRY) Life sciences, seen previously to be among the most mature in terms of the IT Trust Curve, is the vertical least likely to report their senior teams are confident in their organization s IT. 10% of those in the public sector don t think their senior teams will ever have this confidence (compared to 6% on average). Financial services IT and technology Consulting Retail and consumer Energy Manf. Comms, media and ent. Healthcare Public sector Life sciences 59% 58% 57% 57% 55% 55% 55% 51% 50% 48% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for yes, they already are, by vertical (Asked to all 3200 respondents) 12
13 CONSEQUENCES OF INCIDENTS IN THE LAST 12 MONTHS (COUNTRY) Of the 61% of organizations who have experienced either unplanned downtime, a security breach or data loss at least once in the last 12 months, the top 3 consequences are a loss of employee productivity (45%), loss of revenue (39%), and loss of customer confidence/loyalty (32%). Top consequence in each country: Loss of employee productivity: USA (58%), Canada (58%), Brazil (46%), UK (61%), France (36%), Nordics (48%), Russia (48%), Benelux (34%), South Africa (59%), Australia (47%) Loss of revenue: China (59%), Spain (46%), Italy (40%), Germany (40%), Russia (48%), Benelux (34%) Loss of an incremental business opportunity: Japan (38%) Loss of business to a competitor: India (47%) Loss of employee productivity Loss of revenue Loss of customer confidence/loyalty Loss of an incremental business Loss of business to a competitor Delay in product/ service Loss of a new business opportunity Loss of customers Damage to company brand and Loss of repeat business Delay in getting products/ Damage to company stock price Other None of these 10% 1% 4% 16% 27% 27% 26% 26% 26% 23% 20% 32% 39% What were the consequences of the incident(s) your organization experienced in the last 12 months? (Asked to those who have experienced downtime, security breach(es) and/or data loss in the last 12 months 1956/3200) 45% 13
14 THE IMPACT MATURITY MATTERS. The more advanced the organization s maturity, the less they suffer when it comes to data loss, downtime, & security breaches. 53% of organizations in the highest maturity segment reported data recovery time measured in minutes or less for their most missioncritical applications compared with only across all respondents who reported 27% data recovery in minutes or less 76% of companies in the highest maturity segment believe they are able to recover 100% of their lost data in every instance versus only in the lowest maturity segment 44% 65% Organizations in the lowest maturity segment (Laggards) lost one and a half times more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader). Average annual financial loss from downtime across all respondents is $494,
15 THE UPSIDE If you had adequate controls to protect data and breaches were stopped before impact, how would your organization benefit? (Asked to respondents who have experienced a security breach/breaches in the last 12 months 734/3200) Expedited audits & lower compliance reporting cost Lower barrier to information sharing Lower cost of investigation & response More time for innovation & analysis Reduced cost of application deployment / time to market 49% 48% 45% 43% 42% 15
16 FACTORS THAT LIMIT TECHNOLOGICAL PROGRESS 92% of all respondents experience inhibitors to their technology project success. China is the only country where budget is not the main inhibitor. Instead resources and/or workload constraints tops the list here (50%), followed by planning and anticipation (46%), knowledge and skills (44%) and then budget (41%). A lack of confidence in technology impacts one in five, & a lack of executive/management support inhibits one in seven. Budget Resources and/or workload constraints Planning and anticipation Knowledge & skills Culture (flexibility, acceptance) Lack of trust in technology/it Lack of executive/management support We have no limits to our technology project success 35% 33% 32% 25% 19% 14% 8% 52% What most limits your organization's technology project success in relation to data protection, security, & availability? (Asked to all 3200 respondents) 16
17 DIFFERING VIEWS Just 50% of BDMs (business decision makers) consider the IT department to be a driver of a resilient & secure infrastructure compared to 70% of ITDMs (IT decision makers) themselves. ITDMs 70% BDMs 50% Where is the motivation/drive for future plans/projects to deliver resilient & secure IT infrastructure coming from? Percentage that selected internal: IT department, by respondent type (Asked to all 3200 respondents 17
18 MATURITY DIVIDENDS FINANCIAL LOSS AS A RESULT OF DOWNTIME, SECURITY BREACHES, & DATA LOSS 65% Organizations in the lowest maturity segment (Laggard)lost 1.5X more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader) REPORTED AVERAGE ANNUAL FINANCIAL LOSS PER COMPANY $494,037 Downtime $860,273 Security Breaches $585,892 Data Loss 18
19 MATURITY DIVIDENDS ONLY AROUND A QUARTER OF SURVEYED ORGANIZATIONS CAN RECOVERY DATA IN MINUTES OR LESS During an unexpected event causing downtime to our most critical applications. (Asked to all 1600 respondents) 25% OUR RECOVERY TIME IS MEASURED IN MINUTES A quarter of organizations have a recovery time of minutes for mission-critical applications. Therefore, 27% of organizations surveyed have a recovery time of minutes or less for their mission-critical applications. 66% OUR RECOVERY TIME IS MEASURED IN HOURS The most common response given overall is a recovery time of hours. *Don t know * 2% OUR RECOVERY TIME IS ZERO Only 2% of surveyed organizations report a recovery time of zero for their most critical applications. 3% OUR RECOVERY TIME IS 1 DAY OR MORE Though a small minority report a recovery time of a day or more. 19
20 MATURITY DIVIDENDS BIG DATA ANALYTICS IS MORE LIKELY TO BE DEPLOYED BY THOSE WITH A HIGHER LEVEL OF TRUST MATURITY 74% of the leaders have already deployed Big Data analytics compared to just 8% of the laggards. However, less mature organizations are more likely to be in the planning stages. Leaders Adopters Evaluators Laggards 1% 8% 8% 14% 25% 23% 18% 50% 42% 63% 74% 74% No plans Deployment underway or in planning stages Already deployed Which of these strategic projects, requiring availability, data protection, & security do you have? Looking at Big Data analytics only, by overall maturity (Asked to all 1600 IT respondents) 20
21 Appendix 21
22 IT only Questions used to score Continuous Availability (i) Within each pillar section, respondents were asked questions that determine their technological maturity, the three used in Continuous Availability were (max score = 18): Select which of the following best characterizes your current IT infrastructure: Backup is the main component of our availability strategy (2pt.) Backup and replication are key components of our availability strategy (2pt.) Replication and standby servers are key components of our availability strategy (3pts.) Replication of virtual servers with restart capabilities are key components of our availability strategy - (4pts.) Active-active instances of applications across data centers is key component of our availability strategy (6pts.) During an unexpected event causing downtime to our most critical applications: Our recovery time is 1 day or more (please specify) (2pt.) Our recovery time is measured in hours (3pts.) Our recovery time is measured in minutes (4pts.) Our recovery time is zero (6pts.) Don t know no score 22
23 Questions used to score Continuous Availability (ii) Within each pillar section, respondents were asked questions that determine their technological maturity, the three used in Continuous Availability were (max score = 18): Which technologies/strategies are in place to help you manage/ensure you have trust in the availability of your applications, systems, and data? Backup and recovery infrastructure (2pt.) (or highest scoring selection) Disk-based backup and recovery (2pt.) (or highest scoring selection) WAN-based replication of backup and recovery images to second site (3pts.) (or highest scoring selection) Asynchronous transaction-level replication (2pts.) (or highest scoring selection) Synchronous transaction-level replication (3pts.) (or highest scoring selection) Replication of both applications and data (such as virtual machine images) (4pts.) (or highest scoring selection) Replication to a second site with restart capabilities (active/passive) (4pts.) (or highest scoring selection) Dynamic mobility of virtual applications between data centers (6pts.) Disaster tolerant replication (active/active) with near zero RPO and RTO (6pts.) IT only 23
24 Question used to score Advanced security IT only Within each pillar section, respondents were asked questions that determine their technological maturity, the one used in Advanced Security was (max score = 18): Which technologies/strategies do you have in place to help you trust your infrastructure and data is secure? Strong authentication - 1pt. Video surveillance 0pts. Governance, risk & compliance software 2pt. Anti-virus/anti-malware - 2pts. Network firewalls/application firewalls/intrusion detection - 1pt. Log/security monitoring - 1pt. Identity & access management -1pt. Encryption/tokenization - 1pt. Digital forensics 3pt. Predictive analytics 3pt. Security operations center - 3pts. 24
25 Questions used to score Integrated Backup and Recovery (i) Within each pillar section, respondents were asked questions that determine their technological maturity, the two used in Integrated Backup and Recovery were (max score = 18): Select which of the following best characterizes your current IT infrastructure s information protection capabilities to prevent/minimize data loss due to site disasters or technical failures: Backup is performed departmentally, as opposed to a centralized service, with independent backup tools requiring application downtime - (2pt.) Multiple, separate application-specific backup tools are deployed across the organization regularly requiring application downtime during the backup process (3pt.) Backup is coordinated with storage features to minimize application downtime for the backup process and disk-based backup has been deployed (5pts.) Centralized disk-based backup systems exploit de-duplication efficiencies while providing comprehensive reporting of backup actives and protection status (7pts.) Comprehensive backup solutions include replication of backup images to secondary sites, enable archival storage, and ensure we meet our data retention and retrieval goals (9pts.) IT only 25
26 Questions used to score Integrated Backup and Recovery (ii) Within each pillar section, respondents were asked questions that determine their technological maturity, the two used in Integrated Backup and Recovery were (max score = 18): Which technologies/strategies are you currently using to prevent data loss? Tape-based backup and archive (2pt.) (or highest scoring selection) Disk-based backup and archive (3pt.) (or highest scoring selection) WAN-based replication of backups (4pts.) (or highest scoring selection) Software to assist in ediscovery projects (5pts.) (or highest scoring selection) De-duplication of backup and archive data (6pts.) (or highest scoring selection) Consolidated backup and archive infrastructure (7pts.) (or highest scoring selection) Integrated backup and archive to meet data retention requirements (9pts.) (or highest scoring selection) IT only 26
27
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA
EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GlOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH KOREA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH KOREA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS
EMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationAre you protected? Get ahead of the curve Global data protection index
Are you protected? Get ahead of the curve Global data protection index 1 Demographics Interviewed 2,200 IT decision-makers In 3 regions: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific
More informationAre You Protected. Get Ahead of the Curve
Are You Protected Get Ahead of the Curve DEMOGRAPHICS INTERVIEWED 2,200 IT DECISION- MAKERS IN 3 REGIONS: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific Japan INDEPENDENT RESEARCH
More informationVERITAS 2017 TRUTH IN CLOUD REPORT
WHITE PAPER VERITAS 2017 TRUTH IN CLOUD REPORT The rise of multi-cloud: Combatting misconceptions and realigning data management responsibilities CLOUD-FIRST MENTALITY Today, many organisations are taking
More information5 Things Small Businesses Need to Know About Disaster Recovery
5 Things Small Businesses Need to Know About Disaster Recovery WHY WORRY ABOUT DISASTER RECOVERY? THERE WOULD BE NO NEED TO THINK ABOUT DISASTER RECOVERY IF ANY OF THE FOLLOWING WERE TRUE: Your chance
More informationMid-Market Data Center Purchasing Drivers, Priorities and Barriers
Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales
More informationEnsuring business continuity with comprehensive and cost-effective disaster recovery service.
Singtel Business Product Brochure Managed Disaster Recovery-as-a-Service Ensuring business continuity with comprehensive and cost-effective disaster recovery service. Singtel Managed Disaster Recovery-as-a-Service
More informationSDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation
SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation Research Report August 2017 suse.com Executive Summary As we approach 2020, businesses face a maelstrom of increasing customer
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationSecurity for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
More informationThe Data Protection Rule and Hybrid Cloud Backup
The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.
More informationGLOBAL ENCRYPTION TRENDS STUDY
GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.
More informationThird Annual Green IT & Sustainability Survey: U.S. Results and Services Implications
Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications Gard Little Research Manager Worldwide Services, Global Services Markets & Trends 2009 IDC 1 Agenda Overview of the
More informationPonemon Institute s 2018 Cost of a Data Breach Study
Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationSECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust
SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business
More informationFUJITSU Backup as a Service Rapid Recovery Appliance
FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports
More informationWick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP
2009, 2014 & 2015- Winner Finalist 2010, 2011, 2013 & 2016 2007, 2008, 2009, 2010 & 2015 WINNER 2007, 2008, 2009, 2010 2011, 2013, 2014, 2015 & 2016 2010, 2011, 2012, 2013, 2014 & 2015 Wick Hill Group,
More information` 2017 CloudEndure 1
` 2017 CloudEndure 1 Table of Contents Executive Summary... 3 Production Machines in the Organization... 4 Production Machines Using Disaster Recovery... 5 Workloads Primarily Covered by Disaster Recovery...
More informationThe Future of Business Continuity & Resiliency
The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services
More informationGLOBAL ENCRYPTION TRENDS STUDY
GLOBAL ENCRYPTION TRENDS STUDY April 2018 1 PONEMON INSTITUTE RESEARCH REPORT EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2018 Global Encryption Trends Study, 1 sponsored
More informationIT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection
IT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection Each customer faces a fundamental decision: will technology simply enable,
More informationAutomation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry
Automation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry An IDC InfoBrief, Sponsored by Red Hat March 2018 Sponsored by Red Hat Page 1 Methodology In September, 2017
More informationAbstract: Data Protection Cloud Strategies
Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data
More informationBACKUP TO THE FUTURE A SPICEWORKS SURVEY
BACKUP TO THE FUTURE A SPICEWORKS SURVEY 02 BACKUP TO THE FUTURE A SPICEWORKS SURVEY METHODOLOGY This research study was conducted by Spiceworks, the professional network for the IT industry, from a survey
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationMULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH
MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH A new global survey by BMC reveals the confusion created by multi-cloud, increased challenges facing organizations, and that
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationEY Norwegian Cloud Maturity Survey 2018
EY Norwegian Cloud Maturity Survey 2018 Current and planned adoption of cloud services EY Norwegian Cloud Maturity Survey 2018 1 It is still early days for cloud adoption in Norway, and the complexity
More informationDevOps Agility Demands Advanced Management and Automation
DevOps Agility Demands Advanced Management and Automation An IDC InfoBrief, Sponsored by Red Hat December 2017 Sponsored by Red Hat Page 1 Methodology In September, 2017 IDC conducted a global study to
More informationAvailability in the Modern Datacenter
Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationThe Third Annual Study on the Cyber Resilient Organization
The Third Annual Study on the Cyber Resilient Organization Global Independently conducted by the Ponemon Institute Sponsored by IBM Resilient Publication Date: March 2018 Ponemon Institute Research Report
More informationOptimisation drives digital transformation
January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business
More informationFROM TACTIC TO STRATEGY:
FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value
All Are Trying, Some Are Benefiting; Few Are Maximizing Value Germany Findings September 2016 Executive Summary Cloud adoption has increased 70% from last year, with 71% of companies in Germany pursuing
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationSecond International Barometer of Security in SMBs
1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.
More informationRECOVERY & BUSINESS CONTINUITY SERVICES. Protect your data. Recover your environment. Manage your recovery.
RECOVERY & BUSINESS CONTINUITY SERVICES Protect your data. Recover your environment. Manage your recovery. While it s true that businesses rely on IT services more than ever, it s also true that the environments
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationTSC Business Continuity & Disaster Recovery Session
TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationWhat can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco
What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco Increasing Digital Traffic Creates a Greater Attack Surface Global IP Traffic
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE John McDonald 1 What is Trust? Can I trust that my assets will be available when I need them? Availability Critical Assets Security Can I trust
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationDigital Forensics - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value
All Are Trying, Some Are Benefiting; Few Are Maximizing Value Latin America Findings September 2016 Executive Summary Cloud adoption has increased 49% from last year, with 78% of companies in Latin America
More informationDisaster Unpreparedness June 3, 2013
Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it
More informationModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific
ModernBiz Day Safeguard Your Business Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific 1 The state of data security today 81% of large corporations and 60% of small businesses reported a cyber breach
More informationBrussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security
Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation
More informationWhite Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business
Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations
More informationBusiness Resiliency Strategies for the Cloud. Summary Results September 2017
Business Resiliency Strategies for the Cloud Survey Summary Between May and September, 2017, Gatepoint Research invited selected executives to participate in a survey themed Business Resiliency Strategies
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationCloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016
All Are Trying, Some Are Benefiting; Few Are Maximizing Value September 2016 Executive Summary Cloud adoption has increased 61% from last year, with 73% pursuing a hybrid cloud strategy and on-premises
More informationIs the world ready for mobile payments?
Is the world ready for mobile payments? A global consumer perspective Presented by Charles Adriaenssens and Suraya Randawa CARTES & IDentification, 16 November 2011 We asked 13,461 mobile phone users across
More informationModern Compute Is The Foundation For Your IT Transformation
A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table
More informationEnabling the Always-On Enterprise
Enabling the Always-On Enterprise Ensure zero downtime and prevent data loss with the right backup and recovery solutions. The IT Solution Experts table of contents Introduction 3 Data, Data Everywhere
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationBackup vs. Business Continuity: Using RTO to Better Plan for Your Business
Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationIBM Resiliency Services:
IBM Resiliency Services: Always there, in an always-on world How did we get here? Two IT professionals are experiencing frequent business interruptions that are beyond what a traditional disaster recovery
More informationCyber Attack: Is Your Business at Risk?
15 July 2017 Cyber Attack: Is Your Business at Risk? Stanley Wong Regional Head of Financial Lines, Asia Pacific Agenda Some common misconceptions by SMEs around cyber protection Cyber Claims and Industry
More informationService provider GTM strategy session: New revenue opportunities with Veeam
Service provider GTM strategy session: New revenue opportunities with Veeam Jordan Jacobs Senior Director, Global Cloud Solutions Anthony Spiteri Global Technologist, Product Strategy Leah Troscianecki
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More information2016 Survey: A Pulse on Mobility in Healthcare
2016 Survey: A Pulse on Mobility in Healthcare Introduction Mobile Trends in Healthcare Mobility in Healthcare Top Motivation for Implementing a Mobile Solution Impact of Mobility on Patient Experience
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationPlant Modernization Strategies for Industrial Automation
Plant Modernization Strategies for Industrial Automation Sponsored by Copyright 2016 2016 Gatepoint Research. All rights All rights reserved. This This report report is the is the sole sole property of
More informationCIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud
CIO Guide: Disaster recovery solutions that work Making it happen with Azure in the public cloud Consult Build Transform Support When you re considering a shift to Disaster Recovery as a service (DRaaS),
More informationProtect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1
Protect Your Data At Every Point Possible Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1 Transform IT to protect your data in the digital era As the growth, mobility
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationData Loss Prevention - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report
More informationFlorida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government
Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More information2017 THALES DATA THREAT REPORT
2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security FINANCIAL SERVICES EDITION www.thales-esecurity.com 2017 THALES DATA THREAT REPORT TRENDS IN ENCRYPTION AND DATA PROTECTION U.S. U.K.
More informationEY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services
EY Norwegian Cloud Maturity Survey 2019 Current and planned adoption of cloud services Contents 01 Cloud maturity 4 02 Drivers and challenges 6 03 Current usage 10 04 Future plans 16 05 About the survey
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More information