EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

Similar documents
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH KOREA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS

Are You Protected. Get Ahead of the Curve

Are you protected? Get ahead of the curve Global data protection index

Conducted by Vanson Bourne Research

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Disaster Recovery Is A Business Strategy

Ensuring business continuity with comprehensive and cost-effective disaster recovery service.

The Data Protection Rule and Hybrid Cloud Backup

Server Virtualisation Assessment. Service Overview

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

5 Things Small Businesses Need to Know About Disaster Recovery

Three Steps Toward Zero Downtime. Guide. Solution Guide Server.

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

THE STATE OF CLOUD & DATA PROTECTION 2018

IM-B23: What s New with NetBackup Appliances

Global Ultrabooks Market Insights, Forecast to 2025

Improving digital infrastructure for a better connected Thailand

Protect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1

Availability in the Modern Datacenter

Repairing the Broken State of Data Protection

Copyright 2012 EMC Corporation. All rights reserved.

Innovative Fastening Technologies

Data Protection Everywhere. For the modern data center

Transforming networks and services for communications service providers

Software-defined Networking Development Model

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software

SEMINAR. Achieve 100% Backup Success! Achieve 100% Backup Success! Today s Goals. Today s Goals

Backup vs. Business Continuity

HPE Converged Data Solutions

arcserve r16.5 Hybrid data protection

HYBRID CLOUD BACKUP & DISASTER RECOVERY

GLOBAL BROADBAND HITS 484 MILLION SUBSCRIBER MARK AS MORE THAN 14 MILLION LINES ARE ADDED IN Q1 2010

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Managed Network Services. Managing your network to enable your digital business

Global Smoothie Market Insights, Forecast to 2025

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

Abstract: Data Protection Cloud Strategies

Global Mobile Patient Lifts Market Research Report 2018

Business Resiliency in the Cloud: Reality or Hype?

VERITAS 2017 TRUTH IN CLOUD REPORT

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

How the world pays, now and in the future: The Global Payments Report. Ieuan Owen, SVP Strategy Worldpay ecom

Protecting enterprises from potentially disastrous data loss.

Introduction to Business continuity Planning

Digital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.

GreinTech Software Andrew Schrijver Jesse Suchoff Gregory Maugeri

Power Analyzer Firmware Update Utility Version Software Release Notes

Module 4 STORAGE NETWORK BACKUP & RECOVERY

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

BSRIA Air Conditioning Worldwide Market Intelligence

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Data Protection Everywhere

How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization

addendum Uptime Cisco customer interactive solutions

Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD

YEAR-END 201O BROADBAND AND IPTV REPORT HIGHLIGHTS: GLOBAL BROADBAND PENETRATION IS THE CRITICAL DRIVER BEHIND BROADBAND FORUM s IPv6 SOLUTIONS

Trends and Opportunities in the Global Printing Market. Thayer Long President Association for Print Technologies May 2018

TRANSFORM IT+BUSINESS. Fady Richmany Regional Managing Director Emerging Africa. August 9 th, 2012

Data Loss Prevention - Global Market Outlook ( )

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

BUSINESS CONTINUITY: THE PROFIT SCENARIO

Excerpt Poland: LTE and Fiber Rollouts to Turn Telecom Market Around, M&A to Continue

Farid SAADI. Senior Systems Engineer, Backup Recovery Systems

IBM Resiliency Services:

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Digital Forensics - Global Market Outlook ( )

Availability and the Always-on Enterprise: Why Backup is Dead

DATA LOSS. - Whitepaper - A look at various data loss issues, how they happen and how you can solve the problem of data loss.

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

2015 VORMETRIC INSIDER THREAT REPORT

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

1 INTRODUCTION OBJECTIVES OF THE STUDY MARKET DEFINITION MARKET SCOPE... 15

GLOBAL ENCRYPTION TRENDS STUDY

` 2017 CloudEndure 1

The Nuances of Backup and Recovery Solutions

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Maximizing Availability With Hyper-Converged Infrastructure

Managed LAN Service Level Agreement

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

BC/DR Strategy with VMware

Transcription:

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE 1

THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2

GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME 62% of respondents said at least one of the following: big data, hybrid cloud, mobile devices, is difficult or very difficult to protect Adopting advanced data protection tools leads to reduced data loss 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data 3

DEMOGRAPHICS INTERVIEWED 3,300 IT DECISION-MAKERS IN 3 REGIONS: Americas (575) Europe, Middle East, and Africa (1,475) Asia Pacific Japan (1,250) Interviewed 125 IT decision-makers in UAE 24 COUNTRIES TOTAL ORGANIZATIONS OF 250 OR MORE EMPLOYEES BOTH PRIVATE AND PUBLIC ORGANIZATIONS INDEPENDENT RESEARCH AND ANALYSIS 4

DATA PROTECTION MATURITY 5

MATURITY INDEX Maturity scored between 1 100 points* More points awarded for: Shorter recovery times Confidence in backup infrastructure Modern backup systems Off-site replication Points awarded based on the maturity of their data protection strategy * Exact scoring included in appendix questions show points used for the original model with a maximum score of 68. All scores multiplied by a factor of 1.47 to create a model of 100 points 6

WHO IS LEADING THE WAY? Global Results UAE Results Leaders 2.4% Leaders 0% Adopters 11.3% Adopters 0 % Evaluators 49.5% Evaluators 55.2% Laggards 36.8% Laggards 44.8% Leaders (scored 76-100 points) Adopters (scored 51-75 points) AHEAD OF MATURITY CURVE Evaluators (scored 26-50 points) Laggards (scored 1-25 points) Figure 1: Analysis of maturity Base: all respondents (3,300) Figure 2: Analysis of maturity Base: all respondents from UAE (125) 7

GLOBAL IT MATURITY SHOWING FREQUENCY OF POINTS SCORED AHEAD OF THE CURVE 700 Laggards 37% (1,214 Companies) Evaluators 50% (1,635 Companies) Adopters 11% (372 Companies) Leaders 2% (79 Companies) 600 UAE NUMBER OF COMPANIES 500 400 300 200 100 0 25 50 75 100 MATURITY POINTS SCORED Figure 3: Analysis of maturity showing frequency of points scored Base: all respondents (3300) 8

PROFILE CHARACTERISTICS Use archiving application with retention policies Use archiving application with offsite replication Disaster tolerant replication with near-zero RPO/RTO Backup with deduplication & offsite replication Recovery time one hour or less Very confident of ability to restore Standby or virtualized servers are core component of strategy LEADERS ADOPTERS Recovery time 2 5 hours Moderately confident of ability to restore Active-active instances are core component of strategy Archive to tape Backup to tape LAGGARDS Archive to disk Backup to disk Recovery time more than one day Not confident in ability to restore EVALUATORS Recovery time 6 24 hours Doubtful of ability to restore Backup is core component of strategy Replication is core component of strategy 9

WHERE ARE THE MOST MATURE ORGANIZATIONS? AVERAGE SCORE ON THE MATURITY MATRIX AMERICAS: 33.7 EMEA: 32.2 APJ: 34.7 42.5 41.7 37.6 34.3 31.0 29.1 37.8 35.6 34.8 33.5 31.8 31.5 31.0 30.9 27.3 27.0 39.1 37.8 36.6 32.9 30.7 29.5 29.5 26.9 Figure 4: Analysis of average maturity score by region and country Base: all respondents (3300) 10

MATURITY RANK WHICH MARKETS ARE AHEAD? Businesses in China and Hong Kong most likely to be ahead of the curve Outside of Asia, the US and the Netherlands most likely to be ahead of the curve UAE, Turkey and Switzerland are least likely to be ahead of maturity curve RANK COUNTRY % OF BUSINESSES AHEAD OF MATURITY CURVE* 1 China 29.6% 2 Hong Kong 27.2% 3 Netherlands 20.8% 4 Singapore 20.0% 5 USA 19.5% 6 India 19.2% 7 South Africa 18.4% 8 Indonesia 18.4% 9 Mexico 17.6% 10 Germany 15.5% 11 Australia 14.4% 12 UK 13.0% 13 The Philippines 11.2% 14 Thailand 11.2% 15 Canada 9.6% 16 Russia 9.6% 17 Italy 9.6% 18 Brazil 8.8% 19 Japan 8.0% 20 South Korea 8.0% 21 France 6.5% 22 Switzerland 6.4% 23 Turkey 5.6% 24 UAE 0.0% *Please note that the percentages have been rounded to one decimal place 11

THE IMPORTANCE OF DATA PROTECTION 12

THE CRITICALITY OF DATA PROTECTION DO YOU CONSIDER DATA PROTECTION CRITICAL TO THE SUCCESS OF YOUR organization? Not very important 20% 6% Very Important But Not Critical 40% Totally critical 34% Plays no role in our success Around a third (34%) of respondents consider data protection to be totally critical to their organization s success The consulting sector is most likely to see data protection as totally critical (57%) Only 15% of organizations with 3,000-5,000 employees consider data protection to be totally critical Figure 5: Do you consider data protection to be totally critical to the ongoing success of your organization? Base: all respondents (125) 13

SPENDING ON DATA PROTECTION 7.30% Average percentage of annual IT budget that is spent on data protection Average company spend: $12 million on IT $1 million on data protection The private healthcare sector spends the most on data protection (8.18%) 6.89% Average percentage of domestic annual revenue that is spent annually on IT Organizations with 3,000-5,000 employees spend the least amount of their IT budget on data protection (7.0%) Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection Base: all respondents (125) 14

THE NUMBER OF DATA PROTECTION VENDORS 84% have more than one data protection vendor Two vendors on average Over nine in ten from the consulting (95%), life sciences (91%) and private healthcare (91%) sectors have more than one vendor 9% Have one vendor 7% Have no specific vendor 84% Have more than one vendor 90% of organizations with 250-499 employees have multiple data protection vendors Figure 7: Is your data protection infrastructure built on technology from more than one vendor? Base: all respondents (125) 15

THE EFFECT OF NUMBER OF VENDORS ON SPEND SHARE OF ANNUAL IT BUDGET SPENT ON DATA PROTECTION The more vendors a business has, the greater the proportional spend of IT budget on data protection In UAE, those with three vendors spend 8.35%, compared to 4.93% with one vendor 4.93% One data protection vendor 7.38% Two data protection vendors 8.35% Three or more data protection vendors Figure 8: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors Base: all respondents (125) 16

SUFFERING DISRUPTIONS DISRUPTIONS SUFFERED IN LAST 12 MONTHS 77% have suffered disruptions in the last 12 months 90% of consulting 82% of life sciences 82% of energy 77% 56% 35% 14% Average annual loss per company is 1.28TB of data Equivalent to around 13 million e-mails Costs $0.34 million Suffered data loss or unplanned downtime Suffered unplanned downtime Suffered data loss Suffered data loss and downtime Figure 9: Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months? Base: all respondents (125) 17

WHAT IS THE COST OF DOWNTIME? $0.50 Total AVERAGE COST OF UNPLANNED SYSTEMS DOWNTIME (IN MILLIONS OF DOLLARS) $0.19 One data protection vendor $0.17 Two data protection vendors $0.91 Three or more data protection vendors There were 22 hours of downtime on average in last 12 months, at a loss of $0.50 million This is almost three times more than in 2012 Organizations that have three or more vendors lose more on downtime than those with one or two vendors Figure 10: Analysis of the average cost of downtime, cut by number of data protection vendors Base: respondents whose organization has suffered downtime (70) 18

ESTIMATED ANNUAL COST FOR DISRUPTIONS Data loss $850.6 Million $2.8 BILLION TOTAL Downtime $1.9 Billion 19

FREQUENCY OF CONTINUOUS BACKUP PERCENTAGE OF DATA BACKED UP CONTINUOUSLY BY BUSINESSES 2% 1% 0% 5% 22% 70% 0% of data backed up continuously 1% - 25% of data backed up continuously 25% - 50% of data backed up continuously 50%- 75% of data backed up continuously 75% - 99% of data backed up continuously 100% of data backed up continuously On average, around a quarter (24%) of data is backed up continuously 70% only backup a maximum of a quarter of their data continuously The manufacturing sector has the highest proportion of data that is backed up continuously Figure 11: Analysis of those that backup data continuously Base: all respondents (125) 20

WHAT IS CAUSING THESE DISRUPTIONS? Hardware failure 43% Loss of power 34% Software failure 29% Data corruption Accidental user error Security breach (e.g. malware, spyware, viruses, botnets or cyberterrorism) Loss of backup power Physical security (e.g. loss/theft of equipment) Deliberate employee sabotage 17% 16% 15% 14% 13% 11% Natural disaster (e.g. tsunami, hurricane, earthquake) The fault of service/cloud providers The cause is still unknown 3% 2% 0% Figure 12: What were the causes of your data loss and/or systems downtime? Base: respondents whose organization suffered data loss or downtime (96) 21

THE CONSEQUENCES OF DISRUPTION Loss of revenue 41% Loss of employee productivity 36% Loss of a new business opportunity 28% Loss of an incremental business opportunity Loss of business to a competitor Loss of repeat business 19% 18% 17% Delay in product/service development Loss of customer confidence/loyalty 13% 13% Loss of customers Delay in getting products/services to market There have been no commercial consequences 3% 0% 6% Figure 13: Have any of the above been commercial consequences of the data loss and/or systems downtime you have experienced over the last 12 months? Base: respondents whose organization suffered data loss or downtime (96) 22

ARE ORGANIZATIONS CONFIDENT? Not very confident 50% Very confident 50% 50% are not fully confident that they can recover systems/data today from all platforms Only 12% from the manufacturing sector are very confident. The consulting sector is most confident (90%) Organizations with 3,000-5,000 employees are least confident that they can recover (12%) Figure 14: How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on-premise and off-premise, in order to meet business service level agreements? Base: all respondents (125) Used for maturity matrix 23

DATA PROTECTION METHODS 24

WHAT STRATEGIES ARE IN PLACE? Replication is the main component of our availability strategy Standby servers on a remote site are the main components of our availability strategy Backup is the main component of our availability strategy 26% 25% 39% 25% use backup as the primary protection strategy Only 3% use active-active as a key component Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy Active-active instances of applications (including cloud) are key component of our availability strategy 6% 3% Organizations with 250-499 employees are most likely to use backup as a primary data protection strategy Figure 15: Which of the above best characterizes your organization's current data protection environment infrastructure? Base: all respondents (125) Used for maturity matrix 25

WHAT OTHER STRATEGIES ARE IN PLACE? THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN AVERAGE OF TWO STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA Automatic backup to the cloud 49% Tape backup and tapes are kept off site (on own premises) WAN-based replication of backup and recovery images to second site 26% 25% Backup appliance with deduplication Disk-based backup and recovery including clones/snaps Tape backup and tapes are kept off site (on 3rd party premises) Dynamic mobility of virtual applications between data centres 21% 18% 18% 17% Tape backup and tapes go home with employees Replication of both applications and data (such as virtual machine images) 10% 10% Replication to a second site with restart capabilities (active/passive) Disaster tolerant replication (active/active) with near zero RPO and RTO 2% 2% Figure 16: Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? Base: all respondents (125) Used for maturity matrix 26

WHO IS IN CHARGE OF THE CLOUD? RESPONSIBILITY FOR DATA PROTECTION FOR PUBLIC CLOUD-BASED APPLICATIONS DESIRE HAVE VISIBILITY/CONTROL OVER DATA PROTECTION (ON-PREMISE & IN CLOUD) My IT department as a whole 72% Yes - I want to have to control of how the organization's on-premise and off-premise data is being protected 78% The cloud service provider 43% Yes I want to have to visibility of how the organization's on-premise and off-premise data is being protected 55% Each department in my organization, dependent on their use of the application in question 22% No I only want to manage my local data; the cloud service provider should manage offpremise data 4% Figure 17: For public cloud based applications, which organizations are responsible for data protection? Base: respondents whose organization is using a type of cloud as a platform for infrastructure (94) Figure 18: Do you want to have visibility and/or control over how your data is being protected both on-premise and in the cloud? Base: respondents whose organization is using a type of cloud as a platform for infrastructure (94) 27

WHERE IS DATA STORED? PRIMARY DATA On-premise (private cloud) 30% Public cloud 20% Mainframe 16% On-premise (virtualized servers) 11% Hybrid cloud 11% On-premise (physical servers) 6% Desktop/laptop 5% Mobile devices 0% Figure 19: Analysis of average amount of primary data on different platforms Base: all respondents (125) 28

WHAT IS HARDEST TO PROTECT? MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME APPLICATIONS THEY FIND HARDEST TO PROTECT APPLICATIONS/PLATFORMS WITHOUT A RECOVERY PLAN MOST DIFFICULT APPLICATIONS/PLATFORMS TO PROTECT Big data/data lakes 90% Mobile devices 22% Hybrid cloud applications 86% Big data 22% Mobile devices 74% Hybrid cloud applications 18% Figure 20: Analysis of applications/platforms that do not have disaster recovery plans Base: all respondents (125) Figure 21: Analysis of applications/platforms that are difficult to protect Base: all respondents (125) 29

FUTURE STRATEGIES DATA PROTECTION CLOUD SERVICES 44% Backup-as-a-Service 46% 26% Archive-as-a-Service 52% 30% Data recovery-as-a-service 59% 44% currently using backup-asa-service; further 46% plan to in the future 52% plan to use archive-as-aservice and 59% plan to use data recovery-as-a-service in the future Currently using Plan to adopt at some point Figure 22: Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months? Base: all respondents (125) 30

SUMMARY FOR UAE ENTERPRISES ARE LOSING AS MUCH AS $2.8 BILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME 34% consider data protection to be totally critical to their organization s success, still 77% suffered either downtime or data loss in last 12 months Three or more vendors results in more spending on data protection and increased costs of downtime 100% of businesses are behind the curve for data protection maturity and 50% of businesses are not fully confident in their ability to restore apps/data 31

CONCLUSION Most companies globally are behind the curve and feeling pain Newer workloads and exploding data volumes will continue to put pressure on data protection Data loss and downtime are expensive This can t be fixed in silos isolated solutions by different vendors increase cost and risk A continuum of technologies supports availability and protection requirements for different tiers of apps/data 32

EMC RECOMMENDATIONS Make sure there s an appropriate data protection solution in place for all of your critical data no matter where it is or how it is generated Manage an integrated data protection strategy and maintain a level of visibility and control for application owners Evaluate the gaps in your protection strategy that may emerge from disparate vendor solutions Match your data protection approach with the availability and protection requirements for your tiers of applications/data Understand who owns data protection especially in the cloud 33

APPENDIX (i) MATURITY SCORING Which of the following best characterises your organization's current data protection environment infrastructure? Backup is the main component of our availability strategy (1pt.) Replication is the main component of our availability strategy (3pts.) Standby servers on a remote site are the main components of our availability strategy (4pts.) Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy - (5pts.) Active-active (two or more production data centres that are always on, 24/7 with no downtime) instances of applications (including cloud) are key component of our availability strategy (6pts.) What best describes your organization's archiving strategy? We don t have an archiving strategy (0pt.) We use a backup application to archive data onto tape (1pt.) We use an archiving application to archive data online (e.g. onto disk) (3pts.) We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. (5pts.) We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. and replicate/keep a copy off site - (7pts.) 34

APPENDIX (ii) MATURITY SCORING Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? (Please select all that apply) Tape backup and tapes go home with employees (1pt.) Tape backup and tapes are kept off site (on own premises) (2pts.) Tape backup and tapes are kept off site (on 3rd party premises) (2pts.) Automatic backup to the Cloud (2pts.) Disk-based backup and recovery including clones/snaps (3pts.) Backup appliance with deduplication (4pts.) WAN-based replication of backup and recovery images to second site (4pts.) Replication of both applications and data (such as virtual machine images) (5pts.) Replication to a second site with restart capabilities (active/passive) (5pts.) Dynamic mobility of virtual applications between data centres (7pts.) Disaster tolerant replication (active/active) with near zero RPO and RTO (8pts.) 35

APPENDIX (iii) MATURITY SCORING During an unexpected event causing downtime to our most critical applications, how long is your recovery time? Our recovery time is more than one working day (please specify) (0pt.) Our recovery time is 12-24hours (1pt.) Our recovery time is 6-12 hours (2pts) Our recovery time is 3 6 hours (3pts) Our recovery time is 2 3 hours (4pts) Our recovery time is 1 2 hours (5pts.) How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on premise and off premise, in order to meet business service level agreements? Very confident (6pts.) Moderately confident (4pts.) Some doubt (3pts.) Not very confident (1pts.) Not at all confident (0pts.) Our recovery time is less than an hour (6pts.) Our recovery time is zero (7pts.) I do not know (0pt.) 36