emc global data protection index fileglobally, enterprises are losing as much as $1.7 trillion...
Post on 25-Apr-2019
216 Views
Preview:
TRANSCRIPT
1 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY
2 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND?
3 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME
Adopting advanced data protection tools leads to reduced data loss
87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data
62% of respondents said at least one of the following: big data, hybrid cloud, mobile devices, is ‘difficult’ or ‘very difficult’ to protect
4 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
DEMOGRAPHICS
INTERVIEWED 3,300 IT DECISION-MAKERS
IN 3 REGIONS:
Americas (575)
Asia Pacific Japan (1,250)
Europe, Middle East, and Africa (1,475)
Interviewed 125 IT decision-makers in
Turkey
24 COUNTRIES TOTAL
ORGANIZATIONS OF 250 OR MORE EMPLOYEES
BOTH PRIVATE AND PUBLIC ORGANIZATIONS
INDEPENDENT RESEARCH AND ANALYSIS
5 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
DATA PROTECTION MATURITY
6 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
MATURITY INDEX
* Exact scoring included in appendix – questions show points used for the original model with a maximum score of 68. All scores multiplied by a factor of 1.47 to create a model of 100 points
Maturity scored between 1–100 points*
Points awarded based on the maturity of their data protection strategy
More points awarded for: • Shorter recovery times • Confidence in backup infrastructure • Modern backup systems • Off-site replication
7 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
Leaders (scored 76-100 points) Adopters (scored 51-75 points)
WHO IS LEADING THE WAY?
Figure 1: Analysis of maturity Base: all respondents (3,300)
AHEAD OF ‘MATURITY’ CURVE
Evaluators (scored 26-50 points) Laggards (scored 1-25 points)
Global Results
Turkey Results
Figure 2: Analysis of maturity Base: all respondents from Turkey (125)
51.2%
43.2%
4.0%
1.6%
Laggards
Evaluators
Adopters
Leaders
36.8%
49.5%
11.3%
2.4%
Laggards
Evaluators
Adopters
Leaders
8 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
Figure 3: Analysis of maturity – showing frequency of points scored Base: all respondents (3300)
AHEAD OF THE CURVE
NU
MB
ER O
F C
OM
PAN
IES
GLOBAL IT MATURITY SHOWING FREQUENCY OF POINTS SCORED
0
100
200
300
400
500
600
700
MATURITY POINTS SCORED 25 50 75 100
Laggards 37% (1,214 Companies)
Evaluators 50% (1,635 Companies)
Adopters 11% (372 Companies)
Leaders 2% (79 Companies)
TURKEY
9 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
PROFILE CHARACTERISTICS
LEADERS
LAGGARDS
ADOPTERS
EVALUATORS
Use archiving application with offsite replication
Backup with deduplication & offsite replication
Recovery time 2 – 5 hours
Moderately confident of ability to restore
Active-active instances are core component of strategy
Archive to tape
Backup to tape
Recovery time more than one day
Not confident in ability to restore
Backup is core component of strategy
Use archiving application with retention policies
Disaster tolerant replication with near-zero RPO/RTO
Recovery time one hour or less
Very confident of ability to restore
Standby or virtualized servers are core component of strategy
Archive to disk
Backup to disk
Recovery time 6 – 24 hours
Doubtful of ability to restore
Replication is core component of strategy
10 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
37.6 34.3
31.0 29.1
37.8 35.6 34.8 33.5
31.8 31.5 31.0 30.9 27.3 27.0
42.5 41.7 39.1 37.8 36.6
32.9 30.7 29.5 29.5
26.9
WHERE ARE THE MOST MATURE ORGANIZATIONS?
Figure 4: Analysis of average maturity score by region and country Base: all respondents (3300)
AMERICAS: 33.7
EMEA: 32.2
APJ: 34.7
AVERAGE SCORE ON THE MATURITY MATRIX
11 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• Businesses in China and Hong Kong most likely to be ahead of the curve
• Outside of Asia, the US and the Netherlands most likely to be ahead of the curve
• UAE, Turkey and Switzerland and least likely to be ahead of maturity curve
MATURITY RANK WHICH MARKETS ARE AHEAD?
RANK COUNTRY % OF BUSINESSES AHEAD OF MATURITY CURVE*
1 China 29.6% 2 Hong Kong 27.2% 3 Netherlands 20.8% 4 Singapore 20.0% 5 USA 19.5% 6 India 19.2% 7 South Africa 18.4% 8 Indonesia 18.4% 9 Mexico 17.6%
10 Germany 15.5% 11 Australia 14.4% 12 UK 13.0% 13 The Philippines 11.2% 14 Thailand 11.2% 15 Canada 9.6% 16 Russia 9.6% 17 Italy 9.6% 18 Brazil 8.8% 19 Japan 8.0% 20 South Korea 8.0% 21 France 6.5% 22 Switzerland 6.4% 23 Turkey 5.6% 24 UAE 0.0%
*Please note that the percentages have been rounded to one decimal place
12 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
THE IMPORTANCE OF DATA PROTECTION
13 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
66% 18%
16% 1%
Very Important But Not Critical
Totally critical
Plays no role in our success
Not very important
• The majority (66%) of respondents consider data protection to be totally critical to their organization’s success
• 96% from the energy sector see data protection as totally critical, compared to only 24% from the retail sector
THE CRITICALITY OF DATA PROTECTION
Figure 5: “Do you consider data protection to be totally critical to the ongoing success of your organization?” Base: all respondents (125)
DO YOU CONSIDER DATA PROTECTION CRITICAL TO THE SUCCESS OF YOUR ORGANIZATION?
14 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
SPENDING ON DATA PROTECTION Average company spend:
– $73 million on IT – $5 million on data protection
• The energy sector spends the most on data protection (13.22%), the retail sector spends the least (4.72%)
• Organizations with 3,000-5,000 employees spend the most on data protection (12.69%)
Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection Base: all respondents (125)
Average percentage of annual IT budget
that is spent on data protection
7.52%
Average percentage of domestic annual
revenue that is spent annually on IT
7.97%
15 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
Figure 7: “Is your data protection infrastructure built on technology from more than one vendor?” Base: all respondents (125)
• 59% have more than one data protection vendor
– Two vendors on average
• 100% from the energy sector have more than one vendor
• 83% of organizations with 3,000-5,000 employees have multiple vendors
THE NUMBER OF DATA PROTECTION VENDORS
18% Have no specific
vendor
23% Have one vendor
59% Have more than
one vendor
16 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• The more vendors a business has, the greater proportional spend of IT budget on data protection
• In Turkey, those with three vendors spend 11.20%, compared to 5.03% with one vendor
THE EFFECT OF NUMBER OF VENDORS ON SPEND
Figure 8: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors Base: all respondents (125)
SHARE OF ANNUAL IT BUDGET SPENT ON DATA PROTECTION
11.20% Three or more
data protection vendors
5.03% One data protection
vendor
5.23% Two data protection vendors
17 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• 75% have suffered disruptions in the last 12 months
– 88% of public sector – 87% of energy – 80% of IT
• Average annual loss per company – 2.12TB of data – Equivalent to around 21 million
e-mails – Costs $0.62 million
SUFFERING DISRUPTIONS
Figure 9: “Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months?” Base: all respondents (125)
DISRUPTIONS SUFFERED IN LAST 12 MONTHS
75% Suffered data loss
or unplanned downtime
57% Suffered
unplanned downtime
50% Suffered data loss
31% Suffered data loss
and downtime
18 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• Businesses with more than one vendor are more likely to experience unplanned systems downtime
• 68% of those with three vendors or more suffered downtime
THE EFFECT OF THE NUMBER OF VENDORS ON DISRUPTIONS
Figure 10: Analysis of the organizations suffering disruptions, cut by the number of data protection vendors Base: all respondents (125)
DISRUPTIONS SUFFERED (BY NUMBER OF VENDORS)
Three or more data protection vendors
One data protection vendor
Two data protection vendors
Unplanned systems downtime
68%
48% 63%
19 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• There were 30 hours of downtime on average in the last 12 months, at a loss of $0.57m
• Organizations that have two or more vendors will lose more on downtime than those with one vendor
WHAT IS THE COST OF DOWNTIME?
Figure 11: Analysis of the average cost of downtime, cut by number of data protection vendors Base: respondents whose organization has suffered downtime (71)
AVERAGE COST OF UNPLANNED SYSTEMS DOWNTIME
(IN MILLIONS OF DOLLARS)
$1.16
$0.57
Three or more data protection vendors
One data protection
vendor
Two data protection vendors
$0.59
$0.21
$0.58
No external data
protection vendors
Total
20 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
ESTIMATED ANNUAL COST FOR DISRUPTIONS
Downtime $1.7 Billion
Data loss $2.5 Billion
$4.2 BILLION TOTAL
21 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
PERCENTAGE OF DATA BACKED UP CONTINUOUSLY BY BUSINESSES
• On average, one fifth of data is backed up continuously
• 50% of organizations do not back up anything continuously & suffered 32 hours downtime (vs. 30 hour downtime average)
• 86% of those “ahead of the curve” back up some data continuously, compared to 34% of Laggards
FREQUENCY OF CONTINUOUS BACKUP
Figure 12: Analysis of those that backup data continuously Base: all respondents (125)
0% of data backed up continuously
1% - 25% of data backed up continuously
25% - 50% of data backed up continuously
50%- 75% of data backed up continuously
75% - 99% of data backed up continuously
100% of data backed up continuously
50%
21%
16%
3% 5% 5%
22 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
WHAT IS CAUSING THESE DISRUPTIONS?
Figure 13: “What were the causes of your data loss and/or systems downtime?” Base: respondents whose organization suffered data loss or downtime (94)
61%
41%
40%
36%
24%
23%
21%
21%
14%
11%
5%
Hardware failure
Loss of power
Software failure
Data corruption
Accidental user error
Security breach (e.g. malware, spyware, viruses, botnets or cyber-terrorism)
Physical security (e.g. loss/theft of equipment)
Loss of backup power
Deliberate employee sabotage
Natural disaster (e.g. tsunami, hurricane, earthquake)
The fault of service/cloud providers
23 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
THE CONSEQUENCES OF DISRUPTION
Figure 14: “Have any of the above been commercial consequences of the data loss and/or systems downtime you have experienced over the last 12 months?” Base: respondents whose organization suffered data loss or downtime (94)
51%
41%
39%
29%
18%
16%
13%
9%
9%
5%
4%
Loss of employee productivity
Loss of revenue
Delay in product/service development
Loss of customer confidence/loyalty
Loss of a new business opportunity
Delay in getting products/services to market
Loss of an incremental business opportunity
Loss of customers
Loss of business to a competitor
Loss of repeat business
There have been no commercial consequences
24 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• 85% are not fully confident that they can recover systems/data today from all platforms
• 0% in the retail sector are very confident, IT are most confident (26%)
• Organizations with 1000-2999 employees are least confident (8%)
ARE ORGANIZATIONS CONFIDENT?
Figure 15: “How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on-premise and off-premise, in order to meet business service level agreements?” Base: all respondents (125) Used for maturity matrix
Very confident
15%
Not very confident
85%
25 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
DATA PROTECTION METHODS
26 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• 49% use backup as the primary protection strategy
• Only 11% use active-active as a key component
• Those with active-active as a key component suffered less data loss than those with backup
– 29% active-active vs. 57% backup
WHAT STRATEGIES ARE IN PLACE?
Figure 16: “Which of the above best characterises your organization's current data protection environment infrastructure?” Base: all respondents (125) Used for maturity matrix
11%
12%
13%
15%
49%
A ctive-active are key component of our availability s trategy
V irtual servers with res tart capabilities (including c loud) are the main components of our availability
s trategy
Replication is the main component of our availability s trategy
Standby servers on a remote s ite are the main components of our availability s trategy
Backup is the main component of our availability s trategy
27 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
WHAT OTHER STRATEGIES ARE IN PLACE? THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN AVERAGE OF TWO STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS
Figure 17: “Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data?” Base: all respondents (125) Used for maturity matrix
47%
34%
26%
22%
21%
19%
19%
18%
11%
7%
6%
Automatic backup to the cloud
Tape backup and tapes are kept off site (on own premises)
Tape backup and tapes are kept off site (on 3rd party premises)
Replication of both applications and data (such as virtual machine images)
Tape backup and tapes go home with employees
Disk-based backup and recovery including clones/snaps
Backup appliance with deduplication
WAN-based replication of backup and recovery images to second site
Replication to a second site with restart capabilities (active/passive)
Dynamic mobility of virtual applications between data centres
Disaster tolerant replication (active/active) with near zero RPO and RTO
STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA
28 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
DESIRE HAVE VISIBILITY/CONTROL OVER DATA PROTECTION (ON-PREMISE & IN CLOUD)
WHO IS IN CHARGE OF THE CLOUD?
RESPONSIBILITY FOR DATA PROTECTION FOR PUBLIC CLOUD-BASED APPLICATIONS
Figure 18: “For public cloud based applications, which organizations are responsible for data protection?” Base: respondents whose organization is using a type of cloud as a platform for infrastructure (79)
Figure 19: “Do you want to have visibility and/or control over how your data is being protected both on-premise and in the cloud?” Base: respondents whose organization is using a type of cloud as a platform for infrastructure (79)
75%
53%
19%
My IT department as a whole
The cloud service provider
Each department in my organization, dependent on their use of the application in question
63%
39%
15%
Yes – I want to have to visibility of how the organization's on-premise
and off-premise data is being protected
Yes - I want to have to control of how the organization's on-premise
and off-premise data is being protected
No – I only want to manage my local data; the cloud service provider should manage off-
premise data
29 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
WHERE IS DATA STORED? PRIMARY DATA
Figure 20: Analysis of average amount of primary data on different platforms Base: all respondents (125)
35%
19%
14%
13%
8%
7%
2%
1%
On-premise (physical servers)
Public cloud
Mainframe
On-premise (virtualized servers)
On-premise (private cloud)
Desktop/laptop
Mobile devices
Hybrid cloud
30 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
WHAT IS HARDEST TO PROTECT? MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME APPLICATIONS THEY FIND HARDEST TO PROTECT
MOST DIFFICULT APPLICATIONS/PLATFORMS TO PROTECT
APPLICATIONS/PLATFORMS WITHOUT A RECOVERY PLAN
Figure 21: Analysis of applications/platforms that do not have disaster recovery plans Base: all respondents (125)
Figure 22: Analysis of applications/platforms that are difficult to protect Base: all respondents (125)
82%
86%
87%
Big data/data lakes
Hybrid cloud applications
Mobile devices
31%
46%
49%
Hybrid cloud applications
Mobile devices
Big data
31 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
• 65% currently using Backup-as-a-Service; further 27% plan to in the future
• 39% plan to use archive as a service and 36% plan to use data recovery as a service in the future
FUTURE STRATEGIES
Figure 24: “Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months?” Base: all respondents (125)
DATA PROTECTION CLOUD SERVICES
65%
46%
46%
27%
39%
36%
Backup-as-a-Service
Archive-as-a-Service
Data recovery-as-a-Service
Currently using
Plan to adopt at some point
32 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
SUMMARY FOR TURKEY
66% consider data protection
to be totally critical to their organization’s success, still
75% suffered downtime or
data loss in last 12 months
Organizations with three or more data
vendors suffer more downtime
94% of businesses are
behind the curve for data
protection maturity and
85% of businesses are
not fully confident in their ability to restore
apps/data
ENTERPRISES ARE LOSING AS MUCH AS $4.2 BILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME
33 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
CONCLUSION
Data loss and downtime are expensive
Most companies globally are behind the curve and feeling pain
Newer workloads and exploding data volumes will continue to put pressure on data protection
This can’t be fixed in silos – isolated solutions by different vendors increase cost and risk
A continuum of technologies supports availability and protection requirements for different tiers of apps/data
34 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
EMC RECOMMENDATIONS
Match your data protection approach with the availability and protection requirements for your tiers of applications/data
Evaluate the gaps in your protection strategy that may emerge from disparate vendor solutions
Manage an integrated data protection strategy and maintain a level of visibility and control for application owners
Understand who “owns” data protection – especially in the cloud
Make sure there’s an appropriate data protection solution in place for all of your critical data no matter where it is or how it is generated
35 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (i) MATURITY SCORING
Which of the following best characterises your organization's current data protection environment infrastructure?
• Backup is the main component of our availability strategy – (1pt.)
• Replication is the main component of our availability strategy – (3pts.)
• Standby servers on a remote site are the main components of our availability strategy – (4pts.)
• Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy - (5pts.)
• Active-active (two or more production data centres that are always on, 24/7 with no downtime) instances of applications (including cloud) are key component of our availability strategy – (6pts.)
What best describes your organization's archiving strategy?
• We don’t have an archiving strategy – (0pt.)
• We use a backup application to archive data onto tape – (1pt.)
• We use an archiving application to archive data online (e.g. onto disk) – (3pts.)
• We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. – (5pts.)
• We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. and replicate/keep a copy off site - (7pts.)
36 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (ii) MATURITY SCORING
• Tape backup and tapes go home with employees – (1pt.)
• Tape backup and tapes are kept off site (on own premises)– (2pts.)
• Tape backup and tapes are kept off site (on 3rd party premises) – (2pts.)
• Automatic backup to the Cloud (2pts.)
• Disk-based backup and recovery including clones/snaps – (3pts.)
• Backup appliance with deduplication – (4pts.)
• WAN-based replication of backup and recovery images to second site – (4pts.)
• Replication of both applications and data (such as virtual machine images) – (5pts.)
• Replication to a second site with restart capabilities (active/passive) – (5pts.)
• Dynamic mobility of virtual applications between data centres – (7pts.)
• Disaster tolerant replication (active/active) with near zero RPO and RTO – (8pts.)
Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? (Please select all that apply)
37 © Copyright 2014 EMC Corporation. All rights reserved. © Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (iii) MATURITY SCORING
During an unexpected event causing downtime to our most critical applications, how long is your recovery time?
• Our recovery time is more than one working day (please specify) – (0pt.)
• Our recovery time is 12 - 24hours – (1pt.)
• Our recovery time is 6 -12 hours (2pts)
• Our recovery time is 3 – 6 hours (3pts)
• Our recovery time is 2 – 3 hours (4pts)
• Our recovery time is 1 – 2 hours – (5pts.)
• Our recovery time is less than an hour– (6pts.)
• Our recovery time is zero – (7pts.)
• I do not know – (0pt.)
How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on premise and off premise, in order to meet business service level agreements?
• Very confident – (6pts.)
• Moderately confident – (4pts.)
• Some doubt – (3pts.)
• Not very confident – (1pts.)
• Not at all confident – (0pts.)
top related