EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

Similar documents
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH KOREA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS

Are You Protected. Get Ahead of the Curve

Are you protected? Get ahead of the curve Global data protection index

Conducted by Vanson Bourne Research

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Disaster Recovery Is A Business Strategy

Ensuring business continuity with comprehensive and cost-effective disaster recovery service.

The Data Protection Rule and Hybrid Cloud Backup

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

Server Virtualisation Assessment. Service Overview

Global Ultrabooks Market Insights, Forecast to 2025

Improving digital infrastructure for a better connected Thailand

5 Things Small Businesses Need to Know About Disaster Recovery

THE STATE OF CLOUD & DATA PROTECTION 2018

Availability in the Modern Datacenter

Data Protection Everywhere. For the modern data center

Protect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1

Backup vs. Business Continuity

Repairing the Broken State of Data Protection

Three Steps Toward Zero Downtime. Guide. Solution Guide Server.

Copyright 2012 EMC Corporation. All rights reserved.

IM-B23: What s New with NetBackup Appliances

Innovative Fastening Technologies

SEMINAR. Achieve 100% Backup Success! Achieve 100% Backup Success! Today s Goals. Today s Goals

Managed Network Services. Managing your network to enable your digital business

NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software

Transforming networks and services for communications service providers

Software-defined Networking Development Model

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

How the world pays, now and in the future: The Global Payments Report. Ieuan Owen, SVP Strategy Worldpay ecom

HYBRID CLOUD BACKUP & DISASTER RECOVERY

Business Resiliency in the Cloud: Reality or Hype?

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

arcserve r16.5 Hybrid data protection

Digital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Data Protection Everywhere

Global Smoothie Market Insights, Forecast to 2025

Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Protecting enterprises from potentially disastrous data loss.

Power Analyzer Firmware Update Utility Version Software Release Notes

HPE Converged Data Solutions

State of Mobile Commerce. Q

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

Introduction to Business continuity Planning

Module 4 STORAGE NETWORK BACKUP & RECOVERY

GLOBAL BROADBAND HITS 484 MILLION SUBSCRIBER MARK AS MORE THAN 14 MILLION LINES ARE ADDED IN Q1 2010

GLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016

Trends and Opportunities in the Global Printing Market. Thayer Long President Association for Print Technologies May 2018

How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

Abstract: Data Protection Cloud Strategies

Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD

YEAR-END 201O BROADBAND AND IPTV REPORT HIGHLIGHTS: GLOBAL BROADBAND PENETRATION IS THE CRITICAL DRIVER BEHIND BROADBAND FORUM s IPv6 SOLUTIONS

VERITAS 2017 TRUTH IN CLOUD REPORT

Digital EAGLEs. Outlook and perspectives

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

Excerpt Poland: LTE and Fiber Rollouts to Turn Telecom Market Around, M&A to Continue

Data Loss Prevention - Global Market Outlook ( )

2015 VORMETRIC INSIDER THREAT REPORT

TRANSFORM IT+BUSINESS. Fady Richmany Regional Managing Director Emerging Africa. August 9 th, 2012

BSRIA Air Conditioning Worldwide Market Intelligence

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Farid SAADI. Senior Systems Engineer, Backup Recovery Systems

Availability and the Always-on Enterprise: Why Backup is Dead

DATA LOSS. - Whitepaper - A look at various data loss issues, how they happen and how you can solve the problem of data loss.

addendum Uptime Cisco customer interactive solutions

Insights for Clubs

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Managed LAN Service Level Agreement

Maximizing Availability With Hyper-Converged Infrastructure

Global Mobile Patient Lifts Market Research Report 2018

BC/DR Strategy with VMware

Redefine Data Protection: Next Generation Backup And Business Continuity

Background Information. Instructions. Problem Statement. HOMEWORK HELP PROJECT INSTRUCTIONS Homework #5 Help Travel and Tourism Industry Problem

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

The Evolution of IT Resilience & Assurance

Transcription:

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA 1

THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2

GlOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME 62% of respondents said at least one of the following: big data, hybrid cloud, mobile devices, is difficult or very difficult to protect Adopting advanced data protection tools leads to reduced data loss 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data 3

DEMOGRAPHICS INTERVIEWED 3,300 IT DECISION-MAKERS IN 3 REGIONS: Americas (575) Europe, Middle East, and Africa (1,475) Asia Pacific Japan (1,250) Interviewed 125 IT decision-makers in Indonesia 24 COUNTRIES TOTAL ORGANIZATIONS OF 250 OR MORE EMPLOYEES BOTH PRIVATE AND PUBLIC ORGANIZATIONS INDEPENDENT RESEARCH AND ANALYSIS 4

DATA PROTECTION MATURITY 5

MATURITY INDEX Maturity scored between 1 100 points* More points awarded for: Shorter recovery times Confidence in backup infrastructure Modern backup systems Off-site replication Points awarded based on the maturity of their data protection strategy * Exact scoring included in appendix questions show points used for the original model with a maximum score of 68. All scores multiplied by a factor of 1.47 to create a model of 100 points 6

WHO IS LEADING THE WAY? Global Results Indonesia Results Leaders 2.4% Leaders 7.2% Adopters 11.3% Adopters 11.2% Evaluators 49.5% Evaluators 60.8% Laggards 36.8% Laggards 20.8% Leaders (scored 76-100 points) Adopters (scored 51-75 points) AHEAD OF MATURITY CURVE Evaluators (scored 26-50 points) Laggards (scored 1-25 points) Figure 1: Analysis of maturity Base: all respondents (3,300) Figure 2: Analysis of maturity Base: all respondents from Indonesia (125) 7

GLOBAL IT MATURITY SHOWING FREQUENCY OF POINTS SCORED AHEAD OF THE CURVE 700 Laggards 37% (1,214 Companies) Evaluators 50% (1,635 Companies) Adopters 11% (372 Companies) Leaders 2% (79 Companies) 600 NUMBER OF COMPANIES 500 400 300 200 100 Indonesia 0 0 25 50 75 100 MATURITY POINTS SCORED Figure 3: Analysis of maturity showing frequency of points scored Base: all respondents (125) 8

PROFILE CHARACTERISTICS Use archiving application with retention policies Use archiving application with offsite replication Disaster tolerant replication with near-zero RPO/RTO Backup with deduplication & offsite replication Recovery time one hour or less Very confident of ability to restore Standby or virtualized servers are core component of strategy LEADERS ADOPTERS Recovery time 2 5 hours Moderately confident of ability to restore Active-active instances are core component of strategy Archive to tape Backup to tape LAGGARDS Archive to disk Backup to disk Recovery time more than one day Not confident in ability to restore EVALUATORS Recovery time 6 24 hours Doubtful of ability to restore Backup is core component of strategy Replication is core component of strategy 9

WHERE ARE THE MOST MATURE ORGANIZATIONS? AVERAGE SCORE ON THE MATURITY MATRIX AMERICAS: 33.7 EMEA: 32.2 APJ: 34.7 42.5 41.7 37.6 34.3 31.0 29.1 37.8 35.6 34.8 33.5 31.8 31.5 31.0 30.9 27.3 27.0 39.1 37.8 36.6 32.9 30.7 29.5 29.5 26.9 Figure 4: Analysis of average maturity score by region and country Base: all respondents (3300) 10

MATURITY RANK WHICH MARKETS ARE AHEAD? Businesses in China and Hong Kong most likely to be ahead of the curve Outside of Asia, the US and the Netherlands most likely to be ahead of the curve UAE, Turkey and Switzerland are least likely to be ahead of maturity curve RANK COUNTRY % OF BUSINESSES AHEAD OF MATURITY CURVE* 1 China 29.6% 2 Hong Kong 27.2% 3 Netherlands 20.8% 4 Singapore 20.0% 5 USA 19.5% 6 India 19.2% 7 South Africa 18.4% 8 Indonesia 18.4% 9 Mexico 17.6% 10 Germany 15.5% 11 Australia 14.4% 12 UK 13.0% 13 The Philippines 11.2% 14 Thailand 11.2% 15 Canada 9.6% 16 Russia 9.6% 17 Italy 9.6% 18 Brazil 8.8% 19 Japan 8.0% 20 South Korea 8.0% 21 France 6.5% 22 Switzerland 6.4% 23 Turkey 5.6% 24 UAE 0.0% *Please note that the percentages have been rounded to one decimal place 11

THE IMPORTANCE OF DATA PROTECTION 12

THE CRITICALITY OF DATA PROTECTION DO YOU CONSIDER DATA PROTECTION CRITICAL TO THE SUCCESS OF YOUR ORGANIZATION? Not very important Very Important But Not Critical 18% 5% 2% Totally critical 76% Plays no role in our success 76% of respondents consider data protection to be totally critical to their organization s success 88% from the manufacturing sector see data protection as totally critical 90% of organizations with 3,000-5,000 employees consider data protection to be totally critical Figure 5: Do you consider data protection to be critical to the ongoing success of your organization? Base: all respondents (125) 13

SPENDING ON DATA PROTECTION 9.27% Average percentage of annual IT budget that is spent on data protection Average company spend: $131 million on IT $12 million on data protection The IT sector spends the most on data protection (13.27%), public sector spends the least (6.44%) 10.31% Average percentage of domestic annual revenue that is spent annually on IT The larger the organization, the more likely to spend more of their IT budget on data protection Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection Base: all respondents (125) 14

THE NUMBER OF DATA PROTECTION VENDORS 56% have more than one data protection vendor Two vendors on average 100% from the life sciences sector have more than one vendor 27% Have one vendor 17% Have no specific vendor 56% Have more than one vendor 88% of organizations with 1,000-2,999 employees have multiple vendors Figure 7: Is your data protection infrastructure built on technology from more than one vendor? Base: all respondents (125) 15

SUFFERING DISRUPTIONS DISRUPTIONS SUFFERED IN LAST 12 MONTHS 70% suffered disruptions in the last 12 months 100% of life sciences 83% of public sector 75% of IT 70% Suffered data loss or unplanned downtime 62% Suffered unplanned downtime 35% Suffered data loss 28% Suffered data loss and downtime Average annual loss per company 2.14TB of data Equivalent to around 21 million e-mails Costs $0.97 million Figure 8: Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months? Base: all respondents (125) 16

WHAT IS THE COST OF DOWNTIME? AVERAGE COST OF UNPLANNED SYSTEMS DOWNTIME (IN MILLIONS OF DOLLARS) $0.46 Total $0.07 One data protection vendor $0.35 Two data protection vendors $0.60 Three or more data protection vendors There were 19 hours of downtime on average in the last 12 months, at a loss of $0.46 million The more data protection vendors in use, the greater the cost of downtime to the business Figure 9: Analysis of the average cost of downtime, cut by number of data protection vendors Base: respondents whose organization has suffered downtime (78) 17

ESTIMATED ANNUAL COST FOR DISRUPTIONS Data loss $10.4 Billion $16 BILLION TOTAL Downtime $5.6 Billion 18

FREQUENCY OF CONTINUOUS BACKUP PERCENTAGE OF DATA BACKED UP CONTINUOUSLY BY BUSINESSES 46% 0% 2% 4% 6% 42% 0% of data backed up continuously 1% - 25% of data backed up continuously 25% - 50% of data backed up continuously 50%- 75% of data backed up continuously 75% - 99% of data backed up continuously 100% of data backed up continuously On average, over a quarter (30%) of data is backed up continuously Around one in twenty organizations do not back up anything continuously 96% of those ahead of the curve back up some data continuously, compared to 88% of Laggards Figure 10: Analysis of those that backup data continuously Base: all respondents (125) 19

WHAT IS CAUSING THESE DISRUPTIONS? Hardware failure Loss of power 48% 48% Software failure 44% Accidental user error 39% Loss of backup power 33% Data corruption Security breach (e.g. malware, spyware, viruses, botnets or cyber-terrorism) Physical security (e.g. loss/theft of equipment) The fault of service/cloud providers Natural disaster (e.g. tsunami, hurricane, earthquake) 23% 21% 21% 18% 17% Deliberate employee sabotage 13% Figure 11: What were the causes of your data loss and/or systems downtime? Base: respondents whose organization suffered data loss or downtime (87) 20

THE CONSEQUENCES OF DISRUPTION Delay in product/service development Loss of employee productivity Loss of revenue 47% 46% 46% Loss of an incremental business opportunity Loss of customer confidence/loyalty Delay in getting products/services to market 31% 31% 31% Loss of business to a competitor Loss of a new business opportunity Loss of repeat business Loss of customers 24% 22% 22% 21% There have been no commercial consequences 3% Figure 12: Have any of the above been commercial consequences of the data loss and/or systems downtime you have experienced over the last 12 months? Base: respondents whose organization suffered data loss or downtime (87) 21

ARE ORGANIZATIONS CONFIDENT? Not very confident 71% Very confident 29% 71% are not fully confident that they can recover systems/data today from all platforms 0% from the life sciences sector is very confident, the retail sector is most confident (42%) Organizations with 1,000-2,999 employees are least confident that they can recover Figure 13: How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on-premise and off-premise, in order to meet business service level agreements? Base: all respondents (125) Used for maturity matrix 22

DATA PROTECTION METHODS 23

WHAT STRATEGIES ARE IN PLACE? Backup is the main component of our availability strategy Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy Replication is the main component of our availability strategy 18% 18% 40% 40% use backup as the primary protection strategy 11% use active-active as a key component Standby servers on a remote site are the main components of our availability strategy Active-active instances of applications (including cloud) are key component of our availability strategy 13% 11% Those with active-active as a key component suffered less data loss than those with backup 7% active-active vs. 32% backup Figure 14: Which of the above best characterizes your organization's current data protection environment infrastructure? Base: all respondents (125) Used for maturity matrix 24

WHAT OTHER STRATEGIES ARE IN PLACE? AN AVERAGE OF FOUR STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA Automatic backup to the cloud 60% Tape backup and tapes are kept off site (on own premises) Disk-based backup and recovery including clones/snaps 49% 49% Replication of both applications and data (such as virtual machine images) Backup appliance with deduplication 36% 36% Tape backup and tapes are kept off site (on 3rd party premises) WAN-based replication of backup and recovery images to second site 30% 30% Dynamic mobility of virtual applications between data centres Replication to a second site with restart capabilities (active/passive) 26% 24% Tape backup and tapes go home with employees 19% Disaster tolerant replication (active/active) with near zero RPO and RTO 13% Figure 15: Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? Base: all respondents (125) Used for maturity matrix 25

WHO IS IN CHARGE OF THE CLOUD? RESPONSIBILITY FOR DATA PROTECTION FOR PUBLIC CLOUD-BASED APPLICATIONS DESIRE TO HAVE VISIBILITY/CONTROL OVER DATA PROTECTION (ON-PREMISE & IN CLOUD) My IT department as a whole 86% Yes I want to have to visibility of how the organization's on-premise and off-premise data is being protected 87% The cloud service provider 81% Yes - I want to have to control of how the organization's on-premise and off-premise data is being protected 63% Each department in my organization, dependent on their use of the application in question 27% No I only want to manage my local data; the cloud service provider should manage offpremise data 1% Figure 16: For public cloud based applications, which organizations are responsible for data protection? Base: respondents whose organization is using a type of cloud as a platform for infrastructure (83) Figure 17: Do you want to have visibility and/or control over how your data is being protected both on-premise and in the cloud? Base: respondents whose organization is using a type of cloud as a platform for infrastructure (83) 26

WHERE IS DATA STORED? PRIMARY DATA On-premise (physical servers) 40% On-premise (virtualized servers) 21% Hybrid cloud (applications run on a combination of private and public clouds) Desktop/laptop 9% 9% On-premise (private cloud) 8% Public cloud 7% Mainframe 4% Mobile devices (e.g. tablets, smartphones etc.) 3% Figure 18: Analysis of average amount of primary data on different platforms Base: all respondents (125) 27

WHAT IS HARDEST TO PROTECT? 50 PER CENT OR MORE DO NOT HAVE A DISASTER RECOVERY PLAN FOR SOME APPLICATIONS THEY FIND HARDEST TO PROTECT APPLICATIONS/PLATFORMS WITHOUT A RECOVERY PLAN MOST DIFFICULT APPLICATIONS/PLATFORMS TO PROTECT Mobile devices 72% Big data 48% Hybrid cloud applications 62% Hybrid cloud applications 39% Big data/data lakes 50% Mobile devices 24% Figure 19: Analysis of applications/platforms that do not have disaster recovery plans Base: all respondents (125) Figure 20: Analysis of applications/platforms that are difficult to protect Base: all respondents (125) 28

FUTURE STRATEGIES Axis Title DATA PROTECTION CLOUD SERVICES 51% Backup-as-a-Service 47% 50% Archive-as-a-Service 50% 46% Data recovery-as-a-service 51% Currently using 51% currently use backup-as-aservice; further 47% plan to in the future 50% plan to use archive-as-aservice and 51% plan to use data recovery-as-a-service in the future Plan to adopt at some point Figure 21: Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months? Base: all respondents (125) 29

SUMMARY FOR INDONESIA ENTERPRISES ARE LOSING AS MUCH AS $16 BILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME 76% consider data protection to be totally critical to their organization s success, still 70% suffered downtime or data loss in last 12 months More data protection vendors means more loss from unplanned downtime 82% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident in their ability to restore apps/data 30

CONCLUSION Most companies globally are behind the curve and feeling pain Newer workloads and exploding data volumes will continue to put pressure on data protection Data loss and downtime are expensive This can t be fixed in silos isolated solutions by different vendors increase cost and risk A continuum of technologies supports availability and protection requirements for different tiers of apps/data 31

EMC RECOMMENDATIONS Make sure there s an appropriate data protection solution in place for all of your critical data no matter where it is or how it is generated Manage an integrated data protection strategy and maintain a level of visibility and control for application owners Evaluate the gaps in your protection strategy that may emerge from disparate vendor solutions Match your data protection approach with the availability and protection requirements for your tiers of applications/data Understand who owns data protection especially in the cloud 32

APPENDIX (i) MATURITY SCORING Which of the following best characterises your organization's current data protection environment infrastructure? Backup is the main component of our availability strategy (1pt.) Replication is the main component of our availability strategy (3pts.) Standby servers on a remote site are the main components of our availability strategy (4pts.) Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy - (5pts.) Active-active (two or more production data centres that are always on, 24/7 with no downtime) instances of applications (including cloud) are key component of our availability strategy (6pts.) What best describes your organization's archiving strategy? We don t have an archiving strategy (0pt.) We use a backup application to archive data onto tape (1pt.) We use an archiving application to archive data online (e.g. onto disk) (3pts.) We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. (5pts.) We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. and replicate/keep a copy off site - (7pts.) 33

APPENDIX (ii) MATURITY SCORING Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? (Please select all that apply) Tape backup and tapes go home with employees (1pt.) Tape backup and tapes are kept off site (on own premises) (2pts.) Tape backup and tapes are kept off site (on 3rd party premises) (2pts.) Automatic backup to the Cloud (2pts.) Disk-based backup and recovery including clones/snaps (3pts.) Backup appliance with deduplication (4pts.) WAN-based replication of backup and recovery images to second site (4pts.) Replication of both applications and data (such as virtual machine images) (5pts.) Replication to a second site with restart capabilities (active/passive) (5pts.) Dynamic mobility of virtual applications between data centres (7pts.) Disaster tolerant replication (active/active) with near zero RPO and RTO (8pts.) 34

APPENDIX (iii) MATURITY SCORING During an unexpected event causing downtime to our most critical applications, how long is your recovery time? Our recovery time is more than one working day (please specify) (0pt.) Our recovery time is 12-24hours (1pt.) Our recovery time is 6-12 hours (2pts) Our recovery time is 3 6 hours (3pts) Our recovery time is 2 3 hours (4pts) Our recovery time is 1 2 hours (5pts.) How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on premise and off premise, in order to meet business service level agreements? Very confident (6pts.) Moderately confident (4pts.) Some doubt (3pts.) Not very confident (1pts.) Not at all confident (0pts.) Our recovery time is less than an hour (6pts.) Our recovery time is zero (7pts.) I do not know (0pt.) 35