Conducted by Vanson Bourne Research

Similar documents
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH KOREA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO

Are you protected? Get ahead of the curve Global data protection index

Are You Protected. Get Ahead of the Curve

VERITAS 2017 TRUTH IN CLOUD REPORT

5 Things Small Businesses Need to Know About Disaster Recovery

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Ensuring business continuity with comprehensive and cost-effective disaster recovery service.

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

Disaster Recovery Is A Business Strategy

THE STATE OF CLOUD & DATA PROTECTION 2018

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

The Data Protection Rule and Hybrid Cloud Backup

GLOBAL ENCRYPTION TRENDS STUDY

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

Ponemon Institute s 2018 Cost of a Data Breach Study

2015 VORMETRIC INSIDER THREAT REPORT

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

FUJITSU Backup as a Service Rapid Recovery Appliance

Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

` 2017 CloudEndure 1

The Future of Business Continuity & Resiliency

GLOBAL ENCRYPTION TRENDS STUDY

IT Digital Readiness Index Joel Conover Senior Director, Technology Thought Leadership January 2016 Data Center Partner Connection

Automation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry

Abstract: Data Protection Cloud Strategies

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

Healthcare IT Modernization and the Adoption of Hybrid Cloud

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

GLOBAL PKI TRENDS STUDY

EY Norwegian Cloud Maturity Survey 2018

DevOps Agility Demands Advanced Management and Automation

Availability in the Modern Datacenter

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

The Third Annual Study on the Cyber Resilient Organization

Optimisation drives digital transformation

FROM TACTIC TO STRATEGY:

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Second International Barometer of Security in SMBs

RECOVERY & BUSINESS CONTINUITY SERVICES. Protect your data. Recover your environment. Manage your recovery.

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

TSC Business Continuity & Disaster Recovery Session

THALES DATA THREAT REPORT

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Mastering The Endpoint

Digital Forensics - Global Market Outlook ( )

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Disaster Unpreparedness June 3, 2013

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Business Resiliency Strategies for the Cloud. Summary Results September 2017

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

Is the world ready for mobile payments?

Modern Compute Is The Foundation For Your IT Transformation

Enabling the Always-On Enterprise

What can the OnBase Cloud do for you? lbmctech.com

Cybersecurity. Securely enabling transformation and change

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

IBM Resiliency Services:

Cyber Attack: Is Your Business at Risk?

Service provider GTM strategy session: New revenue opportunities with Veeam

Security in India: Enabling a New Connected Era

2016 Survey: A Pulse on Mobility in Healthcare

THALES DATA THREAT REPORT

2017 RIMS CYBER SURVEY

Plant Modernization Strategies for Industrial Automation

CIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud

Protect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Data Loss Prevention - Global Market Outlook ( )

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

2017 THALES DATA THREAT REPORT

EY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services

Cyber Resilience. Think18. Felicity March IBM Corporation

Transcription:

Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1

3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA BRAZIL FRANCE ITALY NORDICS RUSSIA SOUTH AFRICA JAPAN CANADA UK GERMANY SPAIN BENELUX INDIA AUSTRALIA CHINA 10 VERTICALS 50/50 SPLIT BETWEEN ORGANIZATIONS WITH 100 1000 EMPLOYEES & MORE THAN 1000 EMPLOYEES 2

THE FOUR BIG MEGATRENDS IN INFORMATION TECHNOLOGY TODAY ARE CLOUD COMPUTING, BIG DATA, SOCIAL NETWORKING AND MOBILE DEVICES. ADOPTION AND MATURITY OF THESE TRENDS MUST FLOAT UPON A SEA OF TRUST TRUST THAT MY INFORMATION IS SECURE IN THE CLOUD, TRUST THAT MY DATA WON T BE LOST OR STOLEN, TRUST THAT MY IT WILL BE OPERATIONAL WHEN IT NEEDS TO BE WHICH, THESE DAYS, IS ALL THE TIME. THE MORE TRUST THAT CAN BE EARNED AND GUARANTEED, THE BIGGER AND FASTER THE IMPACT OF THESE TRENDS. CONVERSELY, THE LESS TRUST THAT IS ESTABLISHED, THE MORE LIMITED THESE TRENDS WILL BE. DAVID GOULDEN 3

NUMBER OF RESPONDENTS OVERALL MATURITY 70 OVERALL MATURITY DISTRIBUTION LAGGARDS EVALUATORS ADOPTERS LEADERS 60 50 40 30 17% 40% 36% 8% 20 10 0 0 25 50 75 100 MATURITY SCORE (OUT OF 100) 4

NUMBER OF RESPONDENTS MATURITY PILLARS OVERALL MATURITY DISTRIBUTION 70 LAGGARDS EVALUATORS ADOPTERS LEADERS 60 50 40 30 17% 40% 36% 8% 20 10 0 0 25 50 75 100 MATURITY SCORE (OUT OF 100) 5

SCORING METHODOLOGY The study focuses on attributes of IT information availability, backup, & security that contribute most to the ability to withstand & quickly recover from disruptive IT incidents. 1,600 IT responses were used to rank their organizations maturity levels, ranging from lowest to highest Laggard, Evaluator, Adopter, & Leader. Those organizations with more progressive strategies & those using more advanced technology achieved higher ratings. 6

MATURITY SCORE (OUT OF 100) BY COUNTRY China 65.2 USA 61.8 South Africa 60.9 Brazil 53.8 Australia 52.8 Spain 51.6 France 51.4 UK 49.7 Canada 49.5 Benelux 49.5 India 49.4 Italy 49.1 Russia 48.7 Germany 48.4 Nordics 43.0 Japan 38.8 CHINA IS THE MOST MATURE COUNTRY JUST AHEAD OF AHEAD OF THE USA 3 OF THE 4 MOST MATURE COUNTRIES ARE B R I C S JAPAN L A G S A S T H E L E A S T MATURE 7

MATURITY SCORE BY INDUSTRY Financial services (OUT OF 100) 54.1 Life sciences IT and technology Healthcare Public sector Manf. Retail and consumer products Energy Comms, media and ent. Consulting 53.9 53.8 51.6 51.1 51.0 49.8 49.4 49.2 46.1 IN ADDITION TO IT, HIGHLY-REGULATED INDUSTRIES DISPLAY PROPORTIONALLY HIGHER LEVELS OF MATURITY 8

THE CRISIS Widespread unplanned downtime, security breaches, & data loss 61% Nearly half of respondents companies have suffered at least one of the following: unplanned downtime (37%), security breach (23%) or data loss (29%) in the last 12 months. 45% of respondents report that their senior executives are not confident that their organization has adequate data protection, security, & IT availability. 9

SENIOR EXECUTIVES CONFIDENCE IN THEIR ORGANIZATION S IT MATURITY On average, only 55% of respondents report their senior executives have any confidence in their data protection, security, & availability. Leaders Adopters 65% 81% This rises significantly with each level of maturity. Conversely, 45% cited no confidence. Evaluators Laggards 39% 51% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for yes, they already are, by overall maturity (Asked to all 3200 respondents) 10

SENIOR EXECUTIVES CONFIDENCE IN THEIR ORGANIZATION S IT MATURITY (COUNTRY) Japan the least mature country has the smallest percentage of respondents reporting that their senior teams have trust in IT. Interestingly, the BRICS countries are scattered throughout the centre neither leading or lagging in this regard. Germany France Benelux Spain India USA Australia Canada China South Africa UK Brazil Italy Russia Nordics Japan 31% 66% 64% 64% 63% 62% 61% 59% 58% 56% 55% 54% 50% 49% 49% 46% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for yes, they already are, by country (Asked to all 3200 respondents) 11

SENIOR EXECUTIVES CONFIDENCE IN THEIR ORGANIZATION S IT MATURITY (INDUSTRY) Life sciences, seen previously to be among the most mature in terms of the IT Trust Curve, is the vertical least likely to report their senior teams are confident in their organization s IT. 10% of those in the public sector don t think their senior teams will ever have this confidence (compared to 6% on average). Financial services IT and technology Consulting Retail and consumer Energy Manf. Comms, media and ent. Healthcare Public sector Life sciences 59% 58% 57% 57% 55% 55% 55% 51% 50% 48% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for yes, they already are, by vertical (Asked to all 3200 respondents) 12

CONSEQUENCES OF INCIDENTS IN THE LAST 12 MONTHS (COUNTRY) Of the 61% of organizations who have experienced either unplanned downtime, a security breach or data loss at least once in the last 12 months, the top 3 consequences are a loss of employee productivity (45%), loss of revenue (39%), and loss of customer confidence/loyalty (32%). Top consequence in each country: Loss of employee productivity: USA (58%), Canada (58%), Brazil (46%), UK (61%), France (36%), Nordics (48%), Russia (48%), Benelux (34%), South Africa (59%), Australia (47%) Loss of revenue: China (59%), Spain (46%), Italy (40%), Germany (40%), Russia (48%), Benelux (34%) Loss of an incremental business opportunity: Japan (38%) Loss of business to a competitor: India (47%) Loss of employee productivity Loss of revenue Loss of customer confidence/loyalty Loss of an incremental business Loss of business to a competitor Delay in product/ service Loss of a new business opportunity Loss of customers Damage to company brand and Loss of repeat business Delay in getting products/ Damage to company stock price Other None of these 10% 1% 4% 16% 27% 27% 26% 26% 26% 23% 20% 32% 39% What were the consequences of the incident(s) your organization experienced in the last 12 months? (Asked to those who have experienced downtime, security breach(es) and/or data loss in the last 12 months 1956/3200) 45% 13

THE IMPACT MATURITY MATTERS. The more advanced the organization s maturity, the less they suffer when it comes to data loss, downtime, & security breaches. 53% of organizations in the highest maturity segment reported data recovery time measured in minutes or less for their most missioncritical applications compared with only across all respondents who reported 27% data recovery in minutes or less 76% of companies in the highest maturity segment believe they are able to recover 100% of their lost data in every instance versus only in the lowest maturity segment 44% 65% Organizations in the lowest maturity segment (Laggards) lost one and a half times more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader). Average annual financial loss from downtime across all respondents is $494,037. 14

THE UPSIDE If you had adequate controls to protect data and breaches were stopped before impact, how would your organization benefit? (Asked to respondents who have experienced a security breach/breaches in the last 12 months 734/3200) Expedited audits & lower compliance reporting cost Lower barrier to information sharing Lower cost of investigation & response More time for innovation & analysis Reduced cost of application deployment / time to market 49% 48% 45% 43% 42% 15

FACTORS THAT LIMIT TECHNOLOGICAL PROGRESS 92% of all respondents experience inhibitors to their technology project success. China is the only country where budget is not the main inhibitor. Instead resources and/or workload constraints tops the list here (50%), followed by planning and anticipation (46%), knowledge and skills (44%) and then budget (41%). A lack of confidence in technology impacts one in five, & a lack of executive/management support inhibits one in seven. Budget Resources and/or workload constraints Planning and anticipation Knowledge & skills Culture (flexibility, acceptance) Lack of trust in technology/it Lack of executive/management support We have no limits to our technology project success 35% 33% 32% 25% 19% 14% 8% 52% What most limits your organization's technology project success in relation to data protection, security, & availability? (Asked to all 3200 respondents) 16

DIFFERING VIEWS Just 50% of BDMs (business decision makers) consider the IT department to be a driver of a resilient & secure infrastructure compared to 70% of ITDMs (IT decision makers) themselves. ITDMs 70% BDMs 50% Where is the motivation/drive for future plans/projects to deliver resilient & secure IT infrastructure coming from? Percentage that selected internal: IT department, by respondent type (Asked to all 3200 respondents 17

MATURITY DIVIDENDS FINANCIAL LOSS AS A RESULT OF DOWNTIME, SECURITY BREACHES, & DATA LOSS 65% Organizations in the lowest maturity segment (Laggard)lost 1.5X more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader) REPORTED AVERAGE ANNUAL FINANCIAL LOSS PER COMPANY $494,037 Downtime $860,273 Security Breaches $585,892 Data Loss 18

MATURITY DIVIDENDS ONLY AROUND A QUARTER OF SURVEYED ORGANIZATIONS CAN RECOVERY DATA IN MINUTES OR LESS During an unexpected event causing downtime to our most critical applications. (Asked to all 1600 respondents) 25% OUR RECOVERY TIME IS MEASURED IN MINUTES A quarter of organizations have a recovery time of minutes for mission-critical applications. Therefore, 27% of organizations surveyed have a recovery time of minutes or less for their mission-critical applications. 66% OUR RECOVERY TIME IS MEASURED IN HOURS The most common response given overall is a recovery time of hours. *Don t know * 2% OUR RECOVERY TIME IS ZERO Only 2% of surveyed organizations report a recovery time of zero for their most critical applications. 3% OUR RECOVERY TIME IS 1 DAY OR MORE Though a small minority report a recovery time of a day or more. 19

MATURITY DIVIDENDS BIG DATA ANALYTICS IS MORE LIKELY TO BE DEPLOYED BY THOSE WITH A HIGHER LEVEL OF TRUST MATURITY 74% of the leaders have already deployed Big Data analytics compared to just 8% of the laggards. However, less mature organizations are more likely to be in the planning stages. Leaders Adopters Evaluators Laggards 1% 8% 8% 14% 25% 23% 18% 50% 42% 63% 74% 74% No plans Deployment underway or in planning stages Already deployed Which of these strategic projects, requiring availability, data protection, & security do you have? Looking at Big Data analytics only, by overall maturity (Asked to all 1600 IT respondents) 20

Appendix 21

IT only Questions used to score Continuous Availability (i) Within each pillar section, respondents were asked questions that determine their technological maturity, the three used in Continuous Availability were (max score = 18): Select which of the following best characterizes your current IT infrastructure: Backup is the main component of our availability strategy (2pt.) Backup and replication are key components of our availability strategy (2pt.) Replication and standby servers are key components of our availability strategy (3pts.) Replication of virtual servers with restart capabilities are key components of our availability strategy - (4pts.) Active-active instances of applications across data centers is key component of our availability strategy (6pts.) During an unexpected event causing downtime to our most critical applications: Our recovery time is 1 day or more (please specify) (2pt.) Our recovery time is measured in hours (3pts.) Our recovery time is measured in minutes (4pts.) Our recovery time is zero (6pts.) Don t know no score 22

Questions used to score Continuous Availability (ii) Within each pillar section, respondents were asked questions that determine their technological maturity, the three used in Continuous Availability were (max score = 18): Which technologies/strategies are in place to help you manage/ensure you have trust in the availability of your applications, systems, and data? Backup and recovery infrastructure (2pt.) (or highest scoring selection) Disk-based backup and recovery (2pt.) (or highest scoring selection) WAN-based replication of backup and recovery images to second site (3pts.) (or highest scoring selection) Asynchronous transaction-level replication (2pts.) (or highest scoring selection) Synchronous transaction-level replication (3pts.) (or highest scoring selection) Replication of both applications and data (such as virtual machine images) (4pts.) (or highest scoring selection) Replication to a second site with restart capabilities (active/passive) (4pts.) (or highest scoring selection) Dynamic mobility of virtual applications between data centers (6pts.) Disaster tolerant replication (active/active) with near zero RPO and RTO (6pts.) IT only 23

Question used to score Advanced security IT only Within each pillar section, respondents were asked questions that determine their technological maturity, the one used in Advanced Security was (max score = 18): Which technologies/strategies do you have in place to help you trust your infrastructure and data is secure? Strong authentication - 1pt. Video surveillance 0pts. Governance, risk & compliance software 2pt. Anti-virus/anti-malware - 2pts. Network firewalls/application firewalls/intrusion detection - 1pt. Log/security monitoring - 1pt. Identity & access management -1pt. Encryption/tokenization - 1pt. Digital forensics 3pt. Predictive analytics 3pt. Security operations center - 3pts. 24

Questions used to score Integrated Backup and Recovery (i) Within each pillar section, respondents were asked questions that determine their technological maturity, the two used in Integrated Backup and Recovery were (max score = 18): Select which of the following best characterizes your current IT infrastructure s information protection capabilities to prevent/minimize data loss due to site disasters or technical failures: Backup is performed departmentally, as opposed to a centralized service, with independent backup tools requiring application downtime - (2pt.) Multiple, separate application-specific backup tools are deployed across the organization regularly requiring application downtime during the backup process (3pt.) Backup is coordinated with storage features to minimize application downtime for the backup process and disk-based backup has been deployed (5pts.) Centralized disk-based backup systems exploit de-duplication efficiencies while providing comprehensive reporting of backup actives and protection status (7pts.) Comprehensive backup solutions include replication of backup images to secondary sites, enable archival storage, and ensure we meet our data retention and retrieval goals (9pts.) IT only 25

Questions used to score Integrated Backup and Recovery (ii) Within each pillar section, respondents were asked questions that determine their technological maturity, the two used in Integrated Backup and Recovery were (max score = 18): Which technologies/strategies are you currently using to prevent data loss? Tape-based backup and archive (2pt.) (or highest scoring selection) Disk-based backup and archive (3pt.) (or highest scoring selection) WAN-based replication of backups (4pts.) (or highest scoring selection) Software to assist in ediscovery projects (5pts.) (or highest scoring selection) De-duplication of backup and archive data (6pts.) (or highest scoring selection) Consolidated backup and archive infrastructure (7pts.) (or highest scoring selection) Integrated backup and archive to meet data retention requirements (9pts.) (or highest scoring selection) IT only 26