SlideShare a Scribd company logo
1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
EMC GLOBAL DATA
PROTECTION INDEX
KEY FINDINGS & RESULTS FOR
AMERICAS
2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
THE DATAPROTECTION LANDSCAPE
ARE YOU ON SOLID GROUND?
3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
GLOBAL KEY FINDINGS
GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA
LOSS AND UNPLANNED DOWNTIME
Adopting advanced
data protection
tools leads to
reduced data loss
87% of businesses
are behind the
curve for data
protection maturity
and 71% of
businesses are not
fully confident of
restoring their data
62% of respondents
said at least one of
the following: big
data, hybrid cloud,
mobile devices, is
‘difficult’ or ‘very
difficult’ to protect
4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DEMOGRAPHICS
INTERVIEWED 3,300
IT DECISION-MAKERS
IN 3 REGIONS:
Americas
(575)
Asia Pacific Japan
(1,250)
Europe,
Middle East,
and Africa
(1,475)
24
COUNTRIES
TOTAL
ORGANIZATIONS
OF 250
OR MORE
EMPLOYEES
BOTH PRIVATE
AND PUBLIC
ORGANIZATIONS
INDEPENDENT
RESEARCH AND
ANALYSIS
5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DATA PROTECTION
MATURITY
6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
MATURITY INDEX
* Exact scoring included in appendix – questions show
points used for the original model with a maximum score
of 68. All scores multiplied by a factor of 1.47 to create a
model of 100 points
Maturity scored between
1–100 points*
Points awarded based on the
maturity of their data
protection strategy
More points awarded for:
• Shorter recovery times
• Confidence in backup infrastructure
• Modern backup systems
• Off-site replication
7© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
 Leaders (scored 76-100 points)
 Adopters (scored 51-75 points)
WHO IS LEADING THE WAY?
Figure 1: Analysis of maturity
Base: all respondents (3,300)
AHEAD OF
‘MATURITY’
CURVE
 Evaluators (scored 26-50 points)
 Laggards (scored 1-25 points)
Global Results Americas Results
Figure 2: Analysis of maturity
Base: all respondents from Americas (575)
35.0%
50.4%
13.2%
1.4%
Laggards
Evaluators
Adopters
Leaders
36.8%
49.5%
11.3%
2.4%
Laggards
Evaluators
Adopters
Leaders
8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Figure 3: Analysis of maturity – showing frequency of points scored
Base: all respondents (3300)
AHEAD OF THE CURVE
NUMBEROFCOMPANIESGLOBAL IT MATURITY
SHOWING FREQUENCY OF POINTS SCORED
0
100
200
300
400
500
600
700
MATURITY POINTS SCORED
25 50 75 100
Laggards 37%
(1,214 Companies)
Evaluators 50%
(1,635 Companies)
Adopters 11%
(372 Companies)
Leaders 2%
(79 Companies)
AMERICAS
9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
PROFILE CHARACTERISTICS
LEADERS
LAGGARDS
ADOPTERS
EVALUATORS
Use archiving application with offsite
replication
Back up with deduplication & offsite
replication
Recovery time 2 – 5 hours
Moderately confident of ability to
restore
Active-active instances are core
component of strategy
Archive to tape
Backup to tape
Recovery time more than one day
Not confident in ability to restore
Backup is core component of strategy
Use archiving application with
retention policies
Disaster tolerant replication with
near-zero RPO/RTO
Recovery time one hour or less
Very confident of ability to restore
Standby or virtualized servers are
core component of strategy
Archive to disk
Backup to disk
Recovery time 6 – 24 hours
Doubtful of ability to restore
Replication is core component
of strategy
10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHERE ARE THE MOST MATURE
ORGANIZATIONS?
Figure 4: Analysis of average maturity score by region and country
Base: all respondents (3300)
AMERICAS:
33.7
EMEA:
32.2
APJ:
34.7
AVERAGE SCORE ON THE MATURITY MATRIX
37.6
34.3
31.0
29.1
37.8
35.6 34.8
33.5
31.8 31.5 31.0 30.9
27.3 27.0
42.5 41.7
39.1
37.8
36.6
32.9
30.7
29.5 29.5
26.9
11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• Businesses in China and Hong
Kong most likely to be ahead
of the curve
• Outside of Asia, the US and the
Netherlands most likely to be
ahead of the curve
• UAE, Turkey and
Switzerland are least likely to
be ahead of maturity curve
MATURITY RANK
WHICH MARKETS ARE AHEAD?
RANK COUNTRY
% OF BUSINESSES AHEAD
OF MATURITY CURVE*
1 China 29.6%
2 Hong Kong 27.2%
3 Netherlands 20.8%
4 Singapore 20.0%
5 USA 19.5%
6 India 19.2%
7 South Africa 18.4%
8 Indonesia 18.4%
9 Mexico 17.6%
10 Germany 15.5%
11 Australia 14.4%
12 UK 13.0%
13 The Philippines 11.2%
14 Thailand 11.2%
15 Canada 9.6%
16 Russia 9.6%
17 Italy 9.6%
18 Brazil 8.8%
19 Japan 8.0%
20 South Korea 8.0%
21 France 6.5%
22 Switzerland 6.4%
23 Turkey 5.6%
24 UAE 0.0%
*Please note that the percentages have been rounded
to one decimal place
12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
THE IMPORTANCE OF
DATA PROTECTION
13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• The majority (71%) of
respondents consider data
protection to be totally critical
to their organization’s success
• Most likely to consider data
protection to be totally critical:
– Brazil (82%)
– US (80%)
• The consulting sector is most
likely to see data protection as
totally critical (83%)
THE CRITICALITY OF DATA PROTECTION
Figure 5: “Do you consider data protection to be totally critical to the ongoing success of your organization?”
Base: all respondents (575)
DO YOU CONSIDER DATA PROTECTION CRITICAL
TO THE SUCCESS OF YOUR ORGANIZATION?
71%
23%
5%
1%
Very
Important
But Not
Critical
Totally
critical
Plays no role in
our success
Not very important
14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
SPENDING ON DATA PROTECTION
• Average company spend:
– $254 million on IT
– $21 million on data protection, an
average of 8.16% of annual IT
budget
• The US spends the most:
– $32 million on data protection
– 8.91% of IT budget on data
protection
Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection
Base: all respondents (575)
Average percentage
of annual IT budget
that is spent on
data protection
8.16%
Average percentage
of domestic annual
revenue that is
spent annually on IT
9.67%
15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Figure 7: “Is your data protection infrastructure built on technology from more than one vendor?”
Base: all respondents (575)
• 67% have more than one data
protection vendor
– Three vendors on average
• 79% from the financial services
sector have more than one
vendor
• Organizations with more than
5,000 employees are most likely
to have multiple vendors (73%)
THE NUMBER OF DATA PROTECTION VENDORS
10%
Have no specific
vendor
23%
Have one
vendor
67%
Have more than
one vendor
16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• Organizations with three or
more vendors spend a greater
proportion of their IT budget on
data protection
• In Americas, those with three
or more vendors spend10.18%,
compared to 7.49% with one
vendor
THE EFFECT OF NUMBER OF VENDORS ON
SPEND
Figure 8: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors
Base: all respondents (575)
SHARE OF ANNUAL IT BUDGET SPENT ON DATA
PROTECTION
10.18%
Three or more
data protection
vendors
7.49%
One data
protection
vendor
6.96%
Two data
protection
vendors
17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 64% suffered disruption in the last
12 months
– 79% of consulting
– 78% of private healthcare
– 71% of public sector
• Organizations in Americas are more
likely to suffered downtime (51%)
than those in EMEA (48%) or APJ
(49%)
• 72% of organizations in the USA
suffered disruptions, compared with
59% in Brazil and 56% in Mexico
SUFFERING DISRUPTIONS
Figure 9: “Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months?”
Base: all respondents (575)
DISRUPTIONS SUFFERED IN LAST 12 MONTHS
64%
Suffered data loss
or unplanned
downtime
51%
Suffered
unplanned
downtime
31%
Suffered
data loss
19%
Suffered
data loss
and
downtime
18© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• The more vendors a business
has, the more likely it is to
experience data loss
• 39% of organizations with three
or more vendors experienced
data loss in the last 12 months
THE EFFECT OF THE NUMBER OF VENDORS ON
DISRUPTIONS
Figure 10: Analysis of the organizations suffering disruptions, cut by the number of data protection vendors
Base: all respondents (575)
DISRUPTIONS SUFFERED
(BY NUMBER OF VENDORS)
39%
21%
30%
Three or more data protection vendors
One data protection vendor
Two data protection vendors
Data loss
19© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• Average annual loss per company
is 3.65TB of data
– Equivalent to around 37 million e-
mails
– Costs $1.32 million
• Businesses with one vendor lost
1.29TB compared to 5.75TB for
those with 3 or more vendors
DATA LOSS
Figure 11: Analysis of the average data loss over the last 12 months, cut by number of data protection vendors
Base: respondents whose organization has suffered data loss (181)
AVERAGE DATA LOSS IN TERABYTES (TB)
1.98
3.65
Three or
more data
protection
vendors
One data
protection
vendor
Two data
protection
vendors
5.75
1.29
2.58
No external
data
protection
vendors
Total
20© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• There were 26 hours of
unplanned downtime on average
in the last 12 months, at a loss
of $0.56 million
• Those with three or more
vendors lost $0.69 million
compared to organizations with
one vendor ($0.33 million)
WHAT IS THE COST OF DOWNTIME?
Figure 12: Analysis of the average cost of downtime, cut by number of data protection vendors
Base: respondents whose organization has suffered downtime (296)
AVERAGE COST OF UNPLANNED
SYSTEMS DOWNTIME
(IN MILLIONS OF DOLLARS)
$0.22
$0.56
Three or
more data
protection
vendors
One data
protection
vendor
Two data
protection
vendors
$0.69
$0.33
$0.56
No external
data
protection
vendors
Total
21© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
ESTIMATEDANNUALCOST FOR DISRUPTIONS
Downtime
$83.1
Billion
Data loss
$238.5
Billion
$321.6
BILLION
TOTAL
22© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
PERCENTAGE OF DATA BACKED UP
CONTINUOUSLY BY BUSINESSES
• 30% of data is backed up
continuously
• Around one fifth (21%) of
organizations do not back up
anything continuously
• 94% of those “ahead of the
curve” back up some data
continuously, while only 73%
of Laggards do so
FREQUENCY OF CONTINUOUS BACKUP
Figure 13: Analysis of those that backup data continuously
Base: all respondents (575)
0% of data backed up continuously
1% - 25% of data backed up continuously
25% - 50% of data backed up continuously
50%- 75% of data backed up continuously
75% - 99% of data backed up continuously
100% of data backed up continuously
21%
39%
22%
6%
3%8%
23© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHAT IS CAUSING THESE DISRUPTIONS?
Figure 14: “What were the causes of your data loss and/or systems downtime?”
Base: respondents whose organization suffered data loss or downtime (370)
52%
44%
34%
27%
24%
23%
19%
12%
11%
11%
5%
Hardware failure
Loss of power
Software failure
Data corruption
Accidental user error
Security breach (e.g. malware, spyware, viruses, botnets or
cyber-terrorism)
Loss of backup power
Physical security (e.g. loss/theft of equipment)
The fault of service/cloud providers
Natural disaster (e.g. tsunami, hurricane, earthquake)
Deliberate employee sabotage
24© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
THE CONSEQUENCES OF DISRUPTION
Figure 15: “Have any of the above been commercial consequences of the data
loss and/or systems downtime you have experienced over the last 12 months?”
Base: respondents whose organization suffered data loss or downtime (370)
50%
34%
33%
25%
25%
16%
13%
11%
10%
8%
5%
Loss of employee productivity
Delay in product/service development
Loss of revenue
Loss of customer confidence/loyalty
Delay in getting products/services to market
Loss of a new business opportunity
Loss of customers
Loss of an incremental business opportunity
Loss of business to a competitor
Loss of repeat business
There have been no commercial consequences
25© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 63% are not fully confident that
they can recover systems/data
today from all platforms
• Americas are more confident
than EMEA (27%) or APJ (27%)
• Only 27% from the public sector
are very confident. The IT sector
is most confident (44%)
ARE ORGANIZATIONS CONFIDENT?
Figure 16: “How confident are you that, in the event of a data loss incident, you can fully recover systems/data
today from all platforms, on-premise and off-premise, in order to meet business service level agreements?”
Base: all respondents (575)
Used for maturity matrix
Very
confident
37%
Not very
confident
63%
26© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DATA PROTECTION
METHODS
27© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 47% use backup as the primary
protection strategy
• 7% use active-active as a key
component; less than those
from EMEA (10%) or APJ (9%)
• Those with active-active as a
key component suffered less
data loss than those with backup
– 19% active-active vs. 30%
backup
WHAT STRATEGIES ARE IN PLACE?
Figure 17: “Which of the above best characterises your organization's current data protection environment infrastructure?”
Base: all respondents (575)
Used for maturity matrix
7%
12%
14%
19%
47%
Active-active instances of applications
(including cloud) are key component of
our availability strategy
Replication is the main component of our
availability strategy
Standby servers on a remote site are the
main components of our availability
strategy
Virtual servers with restart capabilities
(including cloud) are the main
components of our availability strategy
Backup is the main component of our
availability strategy
28© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHAT OTHER STRATEGIES ARE IN PLACE?
THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN AVERAGE OF THREE
STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS
Figure 18: “Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data?”
Base: all respondents (575)
Used for maturity matrix
42%
38%
34%
28%
26%
26%
24%
22%
16%
15%
10%
Automatic backup to the cloud
Tape backup and tapes are kept off site (on own premises)
Disk-based backup and recovery including clones/snaps
Replication of both applications and data (such as virtual machine images)
Tape backup and tapes are kept off site (on 3rd party premises)
WAN-based replication of backup and recovery images to second site
Backup appliance with deduplication
Replication to a second site with restart capabilities (active/passive)
Tape backup and tapes go home with employees
Dynamic mobility of virtual applications between data centres
Disaster tolerant replication (active/active) with near zero RPO and RTO
STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA
29© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DESIRE TO HAVE VISIBILITY/CONTROL OVER DATA
PROTECTION (ON-PREMISE & IN CLOUD)
WHO IS IN CHARGE OF THE CLOUD?
RESPONSIBILITY FOR DATA PROTECTION
FOR PUBLIC CLOUD-BASED APPLICATIONS
Figure 19: “For public cloud based applications, which
organizations are responsible for data protection?”
Base: respondents whose organization is using a type of
cloud as a platform for infrastructure (339)
Figure 20: “Do you want to have visibility and/or control
over how your data is being protected both on-premise
and in the cloud?”
Base: respondents whose organization is using a type
of cloud as a platform for infrastructure (339)
72%
61%
18%
My IT department as a whole
The cloud service provider
Each department in my
organization, dependent on their
use of the application in question
70%
51%
4%
Yes – I want to have to visibility of
how the organization's on-premise
and off-premise data is being
protected
Yes - I want to have to control of
how the organization's on-premise
and off-premise data is being
protected
No – I only want to manage my
local data; the cloud service
provider should manage off-
premise data
30© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHERE IS DATA STORED?
PRIMARY DATA
Figure 21: Analysis of average amount of primary data on different platforms
Base: all respondents (575)
37%
19%
18%
7%
7%
6%
5%
2%
On-premise (physical servers)
On-premise (virtualized servers)
On-premise (private cloud)
Desktop/laptop
Hybrid cloud (applications run on a combination of private
and public clouds)
Mainframe
Public cloud
Mobile devices (e.g. tablets, smartphones etc.)
31© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHAT IS HARDEST TO PROTECT?
MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME APPLICATIONS
THAT THEY FIND HARDEST TO PROTECT
MOST DIFFICULT APPLICATIONS/PLATFORMS
TO PROTECT
APPLICATIONS/PLATFORMS
WITHOUT A RECOVERY PLAN
Figure 22: Analysis of applications/platforms that do not have disaster
recovery plans
Base: all respondents (575)
Figure 23: Analysis of applications/platforms
that are difficult to protect
Base: all respondents (575)
69%
76%
77%
Big data/data lakes
Mobile devices
Hybrid cloud applications
26%
32%
37%
Hybrid cloud applications
Mobile devices
Big data
32© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 59% currently use backup-as a
service; further 28% plan to in
the future
• 44% plan to use archive-as-a-
service and 42% plan to use
data recovery-as-a-service in
the future
FUTURE STRATEGIES
Figure 24: “Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months?”
Base: all respondents (575)
DATA PROTECTION CLOUD SERVICES
59%
38%
41%
28%
44%
42%
Backup-as-a-Service
Archive-as-a-Service
Data recovery-as-a-Service
Currently using
Plan to adopt at
some point
33© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
SUMMARY FOR AMERICAS
71% consider
data protection
to be totally
critical to their
organization’s
success, still
64% suffered
downtime or
data loss in last
12 months
More data
protection
vendors means
organizations are
more likely to
suffer data loss
85% of
businesses are
behind the curve
for data
protection
maturity and
63% of
businesses are
not fully
confident in their
ability to restore
apps/data
ENTERPRISES ARE LOSING AS MUCH AS $321.6 BILLION THROUGH DATA LOSS AND
UNPLANNED DOWNTIME
34© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
CONCLUSION
Data loss and downtime
are expensive
Most companies globally are
behind the curve and feeling
pain
Newer workloads and exploding data
volumes will continue to put pressure on
data protection
This can’t be fixed in silos –
isolated solutions by different
vendors increase cost and risk
A continuum of technologies supports
availability and protection requirements for
different tiers of apps/data
35© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
EMC RECOMMENDATIONS
Match your data protection approach with the availability and protection requirements
for your tiers of applications/data
Evaluate the gaps in your protection strategy that may emerge from disparate vendor
solutions
Manage an integrated data protection strategy and maintain a level of visibility and
control for application owners
Understand who “owns” data protection – especially in the cloud
Make sure there’s an appropriate data protection solution in place for all of your
critical data no matter where it is or how it is generated
36© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (i)
MATURITY SCORING
Which of the following best characterises
your organization's current data protection
environment infrastructure?
• Backup is the main component of our availability
strategy – (1pt.)
• Replication is the main component of our availability
strategy – (3pts.)
• Standby servers on a remote site are the main
components of our availability strategy – (4pts.)
• Virtual servers with restart capabilities (including
cloud) are the main components of our availability
strategy - (5pts.)
• Active-active (two or more production data centres
that are always on, 24/7 with no downtime) instances
of applications (including cloud) are key component of
our availability strategy – (6pts.)
What best describes your organization's
archiving strategy?
• We don’t have an archiving strategy – (0pt.)
• We use a backup application to archive data onto tape
– (1pt.)
• We use an archiving application to archive data online
(e.g. onto disk) – (3pts.)
• We use an archiving application to archive data to
appliances that provide retention locking, litigation
hold etc. – (5pts.)
• We use an archiving application to archive data to
appliances that provide retention locking, litigation
hold etc. and replicate/keep a copy off site - (7pts.)
37© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (ii)
MATURITY SCORING
• Tape backup and tapes go home with employees –
(1pt.)
• Tape backup and tapes are kept off site (on own
premises) – (2pts.)
• Tape backup and tapes are kept off site (on 3rd party
premises) – (2pts.)
• Automatic backup to the Cloud (2pts.)
• Disk-based backup and recovery including
clones/snaps – (3pts.)
• Backup appliance with deduplication – (4pts.)
• WAN-based replication of backup and recovery images
to second site – (4pts.)
• Replication of both applications and data (such as
virtual machine images) – (5pts.)
• Replication to a second site with restart capabilities
(active/passive) – (5pts.)
• Dynamic mobility of virtual applications between data
centres – (7pts.)
• Disaster tolerant replication (active/active) with near
zero RPO and RTO – (8pts.)
Which technologies/strategies are in place to help you manage the availability of your
applications, systems, and data? (Please select all that apply)
38© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (iii)
MATURITY SCORING
During an unexpected event causing
downtime to our most critical applications,
how long is your recovery time?
• Our recovery time is more than one working day
(please specify) – (0pt.)
• Our recovery time is 12 - 24hours – (1pt.)
• Our recovery time is 6 -12 hours (2pts)
• Our recovery time is 3 – 6 hours (3pts)
• Our recovery time is 2 – 3 hours (4pts)
• Our recovery time is 1 – 2 hours – (5pts.)
• Our recovery time is less than an hour– (6pts.)
• Our recovery time is zero – (7pts.)
• I do not know – (0pt.)
How confident are you that, in the event of a
data loss incident, you can fully recover
systems/data today from all platforms, on
premise and off premise, in order to meet
business service level agreements?
• Very confident – (6pts.)
• Moderately confident – (4pts.)
• Some doubt – (3pts.)
• Not very confident – (1pts.)
• Not at all confident – (0pts.)
EMC GLOBAL DATA PROTECTION INDEX

More Related Content

PDF
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
PDF
Global flows in a digital age
PDF
Budget 2015-16 Evoked Astounding Reactions on Social Media
PPTX
AVX final ppt - Urja-12
PPTX
Economic impact of covid 19 on wayra startups
PDF
Youngest aren’t always the trendsetters
PDF
Research project on investing in consumer brands and companies
PDF
Deloitte-fast-500-2014-winners'-brochure-121114
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
Global flows in a digital age
Budget 2015-16 Evoked Astounding Reactions on Social Media
AVX final ppt - Urja-12
Economic impact of covid 19 on wayra startups
Youngest aren’t always the trendsetters
Research project on investing in consumer brands and companies
Deloitte-fast-500-2014-winners'-brochure-121114

What's hot (19)

PDF
Deloitte-2014-Technology-Fast500
PPTX
Securing the Digital Economy: Reinventing the Internet for Trust
PPTX
The changing face of ICT decision making
PPTX
Telehealth Evolution & Revolution - James Hammond, Dell Healthcare / NTT Data...
PPTX
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
PDF
Cloud complexity: the need for resilience
PPT
Jd power stats online car buyers
PDF
i3 1 q16 innovation-monitor-slides
PPTX
61 Minutes AAEP 2010
PPTX
Digital globalization: The new era of global flows
PDF
Consumers Love Ride-hailing, But Commitment Remains Elusive
PPTX
Tracxn - Health Tech - Top Business Models - Feb 2021
PDF
Fast 50 2016
PDF
Executive summary - App nations
PPTX
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
PDF
Big Data and Enterprise Mobility by Richard Hurst, OVUM
PDF
A.T. Kearney 2017 State of Logistics Report: Accelerating into Uncertainty
PDF
Cost of Cyber Crime: Financial Services
PDF
GEA32876 Offshore_Study_Paper_R11
Deloitte-2014-Technology-Fast500
Securing the Digital Economy: Reinventing the Internet for Trust
The changing face of ICT decision making
Telehealth Evolution & Revolution - James Hammond, Dell Healthcare / NTT Data...
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Cloud complexity: the need for resilience
Jd power stats online car buyers
i3 1 q16 innovation-monitor-slides
61 Minutes AAEP 2010
Digital globalization: The new era of global flows
Consumers Love Ride-hailing, But Commitment Remains Elusive
Tracxn - Health Tech - Top Business Models - Feb 2021
Fast 50 2016
Executive summary - App nations
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Big Data and Enterprise Mobility by Richard Hurst, OVUM
A.T. Kearney 2017 State of Logistics Report: Accelerating into Uncertainty
Cost of Cyber Crime: Financial Services
GEA32876 Offshore_Study_Paper_R11
Ad

Viewers also liked (20)

PDF
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
PDF
Cloud Foundry Summit Berlin Keynote
 
PPTX
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
PPS
Dell EMC storage sc series
PDF
Unimed pn
PDF
Exercicios préstamos con solución 5
PDF
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Vers...
 
PDF
Mit2 092 f09_lec03
PDF
Converged data center_f_co_e_iscsi_future_storage_networking
 
PPTX
PDF
PPTX
Mon absolute monarchs
PDF
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
 
PPTX
Mon banking
PPTX
Mon build factory
PDF
The Industrial Internet@Work
 
PDF
Why Passwords are not strong enough
 
PPTX
17 λειτουργια πεπτικου - ανιχνευση ουσιων
PDF
The Global IT Trust Curve survey - Comprehensive Results Presentation
 
PPTX
Windows Server 2012 Virtualization: Notes from the Field
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Cloud Foundry Summit Berlin Keynote
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Dell EMC storage sc series
Unimed pn
Exercicios préstamos con solución 5
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Vers...
 
Mit2 092 f09_lec03
Converged data center_f_co_e_iscsi_future_storage_networking
 
Mon absolute monarchs
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
 
Mon banking
Mon build factory
The Industrial Internet@Work
 
Why Passwords are not strong enough
 
17 λειτουργια πεπτικου - ανιχνευση ουσιων
The Global IT Trust Curve survey - Comprehensive Results Presentation
 
Windows Server 2012 Virtualization: Notes from the Field
Ad

Similar to EMC GLOBAL DATA PROTECTION INDEX (20)

PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PDF
The 2016 Ponemon Cost of a Data Breach Study
PPTX
Continuing Education Conferance
PDF
Is Bimodal IT Dead? July 2017
PPTX
SaaS Data Protection
PDF
The Economics of IT Risk and Reputation
PDF
The 2018 Enterprise Cloud Trends Report
PDF
EMA Network Security Survey Findings (SEP 2016)
PDF
02 charles fombrun-reputation-institute_(eua)
PPTX
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
PDF
Highlights from the EMC & VMware CIO Summit
 
PPTX
International Technology Adoption & Workforce Issues Study - UK Summary
PPTX
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
PDF
The state of data privacy with dimensional research
PPT
ISMS implementation challenges-KASYS
PPTX
Idge dell reignite2014 qp #2
PDF
Cloud Security - What you Should Be Concerned About
PDF
FORUM 2013 Cyber Risks - not just a domain for IT
PPTX
Improving Incident Response: Building a More Efficient IT Infrastructure
PPTX
Big Data Impacts on Hybrid Infrastructure and Management
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
The 2016 Ponemon Cost of a Data Breach Study
Continuing Education Conferance
Is Bimodal IT Dead? July 2017
SaaS Data Protection
The Economics of IT Risk and Reputation
The 2018 Enterprise Cloud Trends Report
EMA Network Security Survey Findings (SEP 2016)
02 charles fombrun-reputation-institute_(eua)
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Highlights from the EMC & VMware CIO Summit
 
International Technology Adoption & Workforce Issues Study - UK Summary
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
The state of data privacy with dimensional research
ISMS implementation challenges-KASYS
Idge dell reignite2014 qp #2
Cloud Security - What you Should Be Concerned About
FORUM 2013 Cyber Risks - not just a domain for IT
Improving Incident Response: Building a More Efficient IT Infrastructure
Big Data Impacts on Hybrid Infrastructure and Management

More from EMC (20)

PDF
Citrix ready-webinar-xtremio
 
PPTX
EMC with Mirantis Openstack
 
PPTX
Modern infrastructure for business data lake
 
PDF
Force Cyber Criminals to Shop Elsewhere
 
PDF
Pivotal : Moments in Container History
 
PDF
Data Lake Protection - A Technical Review
 
PDF
Mobile E-commerce: Friend or Foe
 
PDF
Virtualization Myths Infographic
 
PDF
Intelligence-Driven GRC for Security
 
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PDF
EMC Technology Day - SRM University 2015
 
PDF
EMC Academic Summit 2015
 
PDF
Data Science and Big Data Analytics Book from EMC Education Services
 
PDF
Using EMC Symmetrix Storage in VMware vSphere Environments
 
PDF
Using EMC VNX storage with VMware vSphereTechBook
 
PDF
2014 Cybercrime Roundup: The Year of the POS Breach
 
PDF
EMC Isilon Best Practices for Hadoop Data Storage
 
PDF
The Evolution of IP Storage and Its Impact on the Network
 
PDF
Provisioning 2.0: The Future of Provisioning
 
PDF
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
 
Citrix ready-webinar-xtremio
 
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
 
EMC Isilon Best Practices for Hadoop Data Storage
 
The Evolution of IP Storage and Its Impact on the Network
 
Provisioning 2.0: The Future of Provisioning
 
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
 

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto

EMC GLOBAL DATA PROTECTION INDEX

  • 1. 1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS
  • 2. 2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. THE DATAPROTECTION LANDSCAPE ARE YOU ON SOLID GROUND?
  • 3. 3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME Adopting advanced data protection tools leads to reduced data loss 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data 62% of respondents said at least one of the following: big data, hybrid cloud, mobile devices, is ‘difficult’ or ‘very difficult’ to protect
  • 4. 4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DEMOGRAPHICS INTERVIEWED 3,300 IT DECISION-MAKERS IN 3 REGIONS: Americas (575) Asia Pacific Japan (1,250) Europe, Middle East, and Africa (1,475) 24 COUNTRIES TOTAL ORGANIZATIONS OF 250 OR MORE EMPLOYEES BOTH PRIVATE AND PUBLIC ORGANIZATIONS INDEPENDENT RESEARCH AND ANALYSIS
  • 5. 5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DATA PROTECTION MATURITY
  • 6. 6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. MATURITY INDEX * Exact scoring included in appendix – questions show points used for the original model with a maximum score of 68. All scores multiplied by a factor of 1.47 to create a model of 100 points Maturity scored between 1–100 points* Points awarded based on the maturity of their data protection strategy More points awarded for: • Shorter recovery times • Confidence in backup infrastructure • Modern backup systems • Off-site replication
  • 7. 7© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.  Leaders (scored 76-100 points)  Adopters (scored 51-75 points) WHO IS LEADING THE WAY? Figure 1: Analysis of maturity Base: all respondents (3,300) AHEAD OF ‘MATURITY’ CURVE  Evaluators (scored 26-50 points)  Laggards (scored 1-25 points) Global Results Americas Results Figure 2: Analysis of maturity Base: all respondents from Americas (575) 35.0% 50.4% 13.2% 1.4% Laggards Evaluators Adopters Leaders 36.8% 49.5% 11.3% 2.4% Laggards Evaluators Adopters Leaders
  • 8. 8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Figure 3: Analysis of maturity – showing frequency of points scored Base: all respondents (3300) AHEAD OF THE CURVE NUMBEROFCOMPANIESGLOBAL IT MATURITY SHOWING FREQUENCY OF POINTS SCORED 0 100 200 300 400 500 600 700 MATURITY POINTS SCORED 25 50 75 100 Laggards 37% (1,214 Companies) Evaluators 50% (1,635 Companies) Adopters 11% (372 Companies) Leaders 2% (79 Companies) AMERICAS
  • 9. 9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. PROFILE CHARACTERISTICS LEADERS LAGGARDS ADOPTERS EVALUATORS Use archiving application with offsite replication Back up with deduplication & offsite replication Recovery time 2 – 5 hours Moderately confident of ability to restore Active-active instances are core component of strategy Archive to tape Backup to tape Recovery time more than one day Not confident in ability to restore Backup is core component of strategy Use archiving application with retention policies Disaster tolerant replication with near-zero RPO/RTO Recovery time one hour or less Very confident of ability to restore Standby or virtualized servers are core component of strategy Archive to disk Backup to disk Recovery time 6 – 24 hours Doubtful of ability to restore Replication is core component of strategy
  • 10. 10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHERE ARE THE MOST MATURE ORGANIZATIONS? Figure 4: Analysis of average maturity score by region and country Base: all respondents (3300) AMERICAS: 33.7 EMEA: 32.2 APJ: 34.7 AVERAGE SCORE ON THE MATURITY MATRIX 37.6 34.3 31.0 29.1 37.8 35.6 34.8 33.5 31.8 31.5 31.0 30.9 27.3 27.0 42.5 41.7 39.1 37.8 36.6 32.9 30.7 29.5 29.5 26.9
  • 11. 11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • Businesses in China and Hong Kong most likely to be ahead of the curve • Outside of Asia, the US and the Netherlands most likely to be ahead of the curve • UAE, Turkey and Switzerland are least likely to be ahead of maturity curve MATURITY RANK WHICH MARKETS ARE AHEAD? RANK COUNTRY % OF BUSINESSES AHEAD OF MATURITY CURVE* 1 China 29.6% 2 Hong Kong 27.2% 3 Netherlands 20.8% 4 Singapore 20.0% 5 USA 19.5% 6 India 19.2% 7 South Africa 18.4% 8 Indonesia 18.4% 9 Mexico 17.6% 10 Germany 15.5% 11 Australia 14.4% 12 UK 13.0% 13 The Philippines 11.2% 14 Thailand 11.2% 15 Canada 9.6% 16 Russia 9.6% 17 Italy 9.6% 18 Brazil 8.8% 19 Japan 8.0% 20 South Korea 8.0% 21 France 6.5% 22 Switzerland 6.4% 23 Turkey 5.6% 24 UAE 0.0% *Please note that the percentages have been rounded to one decimal place
  • 12. 12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. THE IMPORTANCE OF DATA PROTECTION
  • 13. 13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • The majority (71%) of respondents consider data protection to be totally critical to their organization’s success • Most likely to consider data protection to be totally critical: – Brazil (82%) – US (80%) • The consulting sector is most likely to see data protection as totally critical (83%) THE CRITICALITY OF DATA PROTECTION Figure 5: “Do you consider data protection to be totally critical to the ongoing success of your organization?” Base: all respondents (575) DO YOU CONSIDER DATA PROTECTION CRITICAL TO THE SUCCESS OF YOUR ORGANIZATION? 71% 23% 5% 1% Very Important But Not Critical Totally critical Plays no role in our success Not very important
  • 14. 14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. SPENDING ON DATA PROTECTION • Average company spend: – $254 million on IT – $21 million on data protection, an average of 8.16% of annual IT budget • The US spends the most: – $32 million on data protection – 8.91% of IT budget on data protection Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection Base: all respondents (575) Average percentage of annual IT budget that is spent on data protection 8.16% Average percentage of domestic annual revenue that is spent annually on IT 9.67%
  • 15. 15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Figure 7: “Is your data protection infrastructure built on technology from more than one vendor?” Base: all respondents (575) • 67% have more than one data protection vendor – Three vendors on average • 79% from the financial services sector have more than one vendor • Organizations with more than 5,000 employees are most likely to have multiple vendors (73%) THE NUMBER OF DATA PROTECTION VENDORS 10% Have no specific vendor 23% Have one vendor 67% Have more than one vendor
  • 16. 16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • Organizations with three or more vendors spend a greater proportion of their IT budget on data protection • In Americas, those with three or more vendors spend10.18%, compared to 7.49% with one vendor THE EFFECT OF NUMBER OF VENDORS ON SPEND Figure 8: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors Base: all respondents (575) SHARE OF ANNUAL IT BUDGET SPENT ON DATA PROTECTION 10.18% Three or more data protection vendors 7.49% One data protection vendor 6.96% Two data protection vendors
  • 17. 17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 64% suffered disruption in the last 12 months – 79% of consulting – 78% of private healthcare – 71% of public sector • Organizations in Americas are more likely to suffered downtime (51%) than those in EMEA (48%) or APJ (49%) • 72% of organizations in the USA suffered disruptions, compared with 59% in Brazil and 56% in Mexico SUFFERING DISRUPTIONS Figure 9: “Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months?” Base: all respondents (575) DISRUPTIONS SUFFERED IN LAST 12 MONTHS 64% Suffered data loss or unplanned downtime 51% Suffered unplanned downtime 31% Suffered data loss 19% Suffered data loss and downtime
  • 18. 18© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • The more vendors a business has, the more likely it is to experience data loss • 39% of organizations with three or more vendors experienced data loss in the last 12 months THE EFFECT OF THE NUMBER OF VENDORS ON DISRUPTIONS Figure 10: Analysis of the organizations suffering disruptions, cut by the number of data protection vendors Base: all respondents (575) DISRUPTIONS SUFFERED (BY NUMBER OF VENDORS) 39% 21% 30% Three or more data protection vendors One data protection vendor Two data protection vendors Data loss
  • 19. 19© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • Average annual loss per company is 3.65TB of data – Equivalent to around 37 million e- mails – Costs $1.32 million • Businesses with one vendor lost 1.29TB compared to 5.75TB for those with 3 or more vendors DATA LOSS Figure 11: Analysis of the average data loss over the last 12 months, cut by number of data protection vendors Base: respondents whose organization has suffered data loss (181) AVERAGE DATA LOSS IN TERABYTES (TB) 1.98 3.65 Three or more data protection vendors One data protection vendor Two data protection vendors 5.75 1.29 2.58 No external data protection vendors Total
  • 20. 20© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • There were 26 hours of unplanned downtime on average in the last 12 months, at a loss of $0.56 million • Those with three or more vendors lost $0.69 million compared to organizations with one vendor ($0.33 million) WHAT IS THE COST OF DOWNTIME? Figure 12: Analysis of the average cost of downtime, cut by number of data protection vendors Base: respondents whose organization has suffered downtime (296) AVERAGE COST OF UNPLANNED SYSTEMS DOWNTIME (IN MILLIONS OF DOLLARS) $0.22 $0.56 Three or more data protection vendors One data protection vendor Two data protection vendors $0.69 $0.33 $0.56 No external data protection vendors Total
  • 21. 21© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. ESTIMATEDANNUALCOST FOR DISRUPTIONS Downtime $83.1 Billion Data loss $238.5 Billion $321.6 BILLION TOTAL
  • 22. 22© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. PERCENTAGE OF DATA BACKED UP CONTINUOUSLY BY BUSINESSES • 30% of data is backed up continuously • Around one fifth (21%) of organizations do not back up anything continuously • 94% of those “ahead of the curve” back up some data continuously, while only 73% of Laggards do so FREQUENCY OF CONTINUOUS BACKUP Figure 13: Analysis of those that backup data continuously Base: all respondents (575) 0% of data backed up continuously 1% - 25% of data backed up continuously 25% - 50% of data backed up continuously 50%- 75% of data backed up continuously 75% - 99% of data backed up continuously 100% of data backed up continuously 21% 39% 22% 6% 3%8%
  • 23. 23© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHAT IS CAUSING THESE DISRUPTIONS? Figure 14: “What were the causes of your data loss and/or systems downtime?” Base: respondents whose organization suffered data loss or downtime (370) 52% 44% 34% 27% 24% 23% 19% 12% 11% 11% 5% Hardware failure Loss of power Software failure Data corruption Accidental user error Security breach (e.g. malware, spyware, viruses, botnets or cyber-terrorism) Loss of backup power Physical security (e.g. loss/theft of equipment) The fault of service/cloud providers Natural disaster (e.g. tsunami, hurricane, earthquake) Deliberate employee sabotage
  • 24. 24© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. THE CONSEQUENCES OF DISRUPTION Figure 15: “Have any of the above been commercial consequences of the data loss and/or systems downtime you have experienced over the last 12 months?” Base: respondents whose organization suffered data loss or downtime (370) 50% 34% 33% 25% 25% 16% 13% 11% 10% 8% 5% Loss of employee productivity Delay in product/service development Loss of revenue Loss of customer confidence/loyalty Delay in getting products/services to market Loss of a new business opportunity Loss of customers Loss of an incremental business opportunity Loss of business to a competitor Loss of repeat business There have been no commercial consequences
  • 25. 25© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 63% are not fully confident that they can recover systems/data today from all platforms • Americas are more confident than EMEA (27%) or APJ (27%) • Only 27% from the public sector are very confident. The IT sector is most confident (44%) ARE ORGANIZATIONS CONFIDENT? Figure 16: “How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on-premise and off-premise, in order to meet business service level agreements?” Base: all respondents (575) Used for maturity matrix Very confident 37% Not very confident 63%
  • 26. 26© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DATA PROTECTION METHODS
  • 27. 27© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 47% use backup as the primary protection strategy • 7% use active-active as a key component; less than those from EMEA (10%) or APJ (9%) • Those with active-active as a key component suffered less data loss than those with backup – 19% active-active vs. 30% backup WHAT STRATEGIES ARE IN PLACE? Figure 17: “Which of the above best characterises your organization's current data protection environment infrastructure?” Base: all respondents (575) Used for maturity matrix 7% 12% 14% 19% 47% Active-active instances of applications (including cloud) are key component of our availability strategy Replication is the main component of our availability strategy Standby servers on a remote site are the main components of our availability strategy Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy Backup is the main component of our availability strategy
  • 28. 28© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHAT OTHER STRATEGIES ARE IN PLACE? THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN AVERAGE OF THREE STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS Figure 18: “Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data?” Base: all respondents (575) Used for maturity matrix 42% 38% 34% 28% 26% 26% 24% 22% 16% 15% 10% Automatic backup to the cloud Tape backup and tapes are kept off site (on own premises) Disk-based backup and recovery including clones/snaps Replication of both applications and data (such as virtual machine images) Tape backup and tapes are kept off site (on 3rd party premises) WAN-based replication of backup and recovery images to second site Backup appliance with deduplication Replication to a second site with restart capabilities (active/passive) Tape backup and tapes go home with employees Dynamic mobility of virtual applications between data centres Disaster tolerant replication (active/active) with near zero RPO and RTO STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA
  • 29. 29© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DESIRE TO HAVE VISIBILITY/CONTROL OVER DATA PROTECTION (ON-PREMISE & IN CLOUD) WHO IS IN CHARGE OF THE CLOUD? RESPONSIBILITY FOR DATA PROTECTION FOR PUBLIC CLOUD-BASED APPLICATIONS Figure 19: “For public cloud based applications, which organizations are responsible for data protection?” Base: respondents whose organization is using a type of cloud as a platform for infrastructure (339) Figure 20: “Do you want to have visibility and/or control over how your data is being protected both on-premise and in the cloud?” Base: respondents whose organization is using a type of cloud as a platform for infrastructure (339) 72% 61% 18% My IT department as a whole The cloud service provider Each department in my organization, dependent on their use of the application in question 70% 51% 4% Yes – I want to have to visibility of how the organization's on-premise and off-premise data is being protected Yes - I want to have to control of how the organization's on-premise and off-premise data is being protected No – I only want to manage my local data; the cloud service provider should manage off- premise data
  • 30. 30© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHERE IS DATA STORED? PRIMARY DATA Figure 21: Analysis of average amount of primary data on different platforms Base: all respondents (575) 37% 19% 18% 7% 7% 6% 5% 2% On-premise (physical servers) On-premise (virtualized servers) On-premise (private cloud) Desktop/laptop Hybrid cloud (applications run on a combination of private and public clouds) Mainframe Public cloud Mobile devices (e.g. tablets, smartphones etc.)
  • 31. 31© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHAT IS HARDEST TO PROTECT? MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME APPLICATIONS THAT THEY FIND HARDEST TO PROTECT MOST DIFFICULT APPLICATIONS/PLATFORMS TO PROTECT APPLICATIONS/PLATFORMS WITHOUT A RECOVERY PLAN Figure 22: Analysis of applications/platforms that do not have disaster recovery plans Base: all respondents (575) Figure 23: Analysis of applications/platforms that are difficult to protect Base: all respondents (575) 69% 76% 77% Big data/data lakes Mobile devices Hybrid cloud applications 26% 32% 37% Hybrid cloud applications Mobile devices Big data
  • 32. 32© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 59% currently use backup-as a service; further 28% plan to in the future • 44% plan to use archive-as-a- service and 42% plan to use data recovery-as-a-service in the future FUTURE STRATEGIES Figure 24: “Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months?” Base: all respondents (575) DATA PROTECTION CLOUD SERVICES 59% 38% 41% 28% 44% 42% Backup-as-a-Service Archive-as-a-Service Data recovery-as-a-Service Currently using Plan to adopt at some point
  • 33. 33© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. SUMMARY FOR AMERICAS 71% consider data protection to be totally critical to their organization’s success, still 64% suffered downtime or data loss in last 12 months More data protection vendors means organizations are more likely to suffer data loss 85% of businesses are behind the curve for data protection maturity and 63% of businesses are not fully confident in their ability to restore apps/data ENTERPRISES ARE LOSING AS MUCH AS $321.6 BILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME
  • 34. 34© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. CONCLUSION Data loss and downtime are expensive Most companies globally are behind the curve and feeling pain Newer workloads and exploding data volumes will continue to put pressure on data protection This can’t be fixed in silos – isolated solutions by different vendors increase cost and risk A continuum of technologies supports availability and protection requirements for different tiers of apps/data
  • 35. 35© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC RECOMMENDATIONS Match your data protection approach with the availability and protection requirements for your tiers of applications/data Evaluate the gaps in your protection strategy that may emerge from disparate vendor solutions Manage an integrated data protection strategy and maintain a level of visibility and control for application owners Understand who “owns” data protection – especially in the cloud Make sure there’s an appropriate data protection solution in place for all of your critical data no matter where it is or how it is generated
  • 36. 36© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. APPENDIX (i) MATURITY SCORING Which of the following best characterises your organization's current data protection environment infrastructure? • Backup is the main component of our availability strategy – (1pt.) • Replication is the main component of our availability strategy – (3pts.) • Standby servers on a remote site are the main components of our availability strategy – (4pts.) • Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy - (5pts.) • Active-active (two or more production data centres that are always on, 24/7 with no downtime) instances of applications (including cloud) are key component of our availability strategy – (6pts.) What best describes your organization's archiving strategy? • We don’t have an archiving strategy – (0pt.) • We use a backup application to archive data onto tape – (1pt.) • We use an archiving application to archive data online (e.g. onto disk) – (3pts.) • We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. – (5pts.) • We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. and replicate/keep a copy off site - (7pts.)
  • 37. 37© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. APPENDIX (ii) MATURITY SCORING • Tape backup and tapes go home with employees – (1pt.) • Tape backup and tapes are kept off site (on own premises) – (2pts.) • Tape backup and tapes are kept off site (on 3rd party premises) – (2pts.) • Automatic backup to the Cloud (2pts.) • Disk-based backup and recovery including clones/snaps – (3pts.) • Backup appliance with deduplication – (4pts.) • WAN-based replication of backup and recovery images to second site – (4pts.) • Replication of both applications and data (such as virtual machine images) – (5pts.) • Replication to a second site with restart capabilities (active/passive) – (5pts.) • Dynamic mobility of virtual applications between data centres – (7pts.) • Disaster tolerant replication (active/active) with near zero RPO and RTO – (8pts.) Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? (Please select all that apply)
  • 38. 38© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. APPENDIX (iii) MATURITY SCORING During an unexpected event causing downtime to our most critical applications, how long is your recovery time? • Our recovery time is more than one working day (please specify) – (0pt.) • Our recovery time is 12 - 24hours – (1pt.) • Our recovery time is 6 -12 hours (2pts) • Our recovery time is 3 – 6 hours (3pts) • Our recovery time is 2 – 3 hours (4pts) • Our recovery time is 1 – 2 hours – (5pts.) • Our recovery time is less than an hour– (6pts.) • Our recovery time is zero – (7pts.) • I do not know – (0pt.) How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on premise and off premise, in order to meet business service level agreements? • Very confident – (6pts.) • Moderately confident – (4pts.) • Some doubt – (3pts.) • Not very confident – (1pts.) • Not at all confident – (0pts.)