You are on page 1of 39

EMC

GLOBAL DATA
PROTECTION INDEX
GLOBAL
KEY RESULTS &
FINDINGS

Copyright 2014 EMC Corporation. All rights reserved.

THE DATA PROTECTION LANDSCAPE


ARE YOU ON SOLID GROUND?
Copyright 2014 EMC Corporation. All rights reserved.

KEY FINDINGS

GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION


THROUGH DATA LOSS AND UNPLANNED DOWNTIME

62% of respondents
said at least one of
the following: big
data, hybrid cloud,
mobile devices, is
difficult or very
difficult to protect

Copyright 2014 EMC Corporation. All rights reserved.

Adopting advanced
data protection
tools leads to
reduced data loss

87% of businesses
are behind the
curve for data
protection maturity
and 71% of
businesses are not
fully confident of
restoring their data

DEMOGRAPHICS

INTERVIEWED 3,300
IT DECISION-MAKERS
IN 3 REGIONS:

24
COUNTRIES
TOTAL

Americas
(575)

ORGANIZATIONS
OF 250
OR MORE
EMPLOYEES

Copyright 2014 EMC Corporation. All rights reserved.

Europe,
Middle East,
and Africa
(1,475)

BOTH PRIVATE
AND PUBLIC
ORGANIZATIONS

Asia Pacific Japan


(1,250)

INDEPENDENT
RESEARCH AND
ANALYSIS

DATA
PROTECTION
MATURITY

Copyright 2014 EMC Corporation. All rights reserved.

MATURITY INDEX

More points awarded for:

Maturity scored between


1100 points*

Shorter recovery times


Confidence in backup infrastructure
Modern backup systems
Off-site replication

Points awarded based on the


maturity of their data
protection strategy

* Exact scoring included in appendix questions show


points used for the original model with a maximum score
of 68. All scores multiplied by a factor of 1.47 to create a
model of 100 points
Copyright 2014 EMC Corporation. All rights reserved.

WHO IS LEADING THE WAY?


Leaders

Maturity defined in four stages:

2.4%

Leaders (scored 76-100 points)


Adopters

11.3%

Adopters (scored 51-75 points)

Evaluators

49.5%

AHEAD OF
MATURITY
CURVE

Evaluators (scored 26-50 points)


Laggards (scored 1-25 points)

Laggards

36.8%

Figure 1: Analysis of maturity


Base: all respondents (3,300)
Copyright 2014 EMC Corporation. All rights reserved.

IT MATURITY

SHOWING FREQUENCY OF POINTS SCORED


Evaluators 50%

Laggards 37%

700

Adopters 11%

(1,635 Companies)

(1,214 Companies)

AHEAD OF THE CURVE

Leaders 2%

(372 Companies)

(79 Companies)

NUMBER OF COMPANIES

600
500
400
300
200
100
0

0
0

25

50

75

100

MATURITY POINTS SCORED


Figure 2: Analysis of maturity showing frequency of points scored
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

PROFILE CHARACTERISTICS
Use archiving application with
retention policies

Use archiving application with offsite


replication

Disaster tolerant replication with


near-zero RPO/RTO

Back up with deduplication & offsite


replication

Recovery time one hour or less


Very confident of ability to restore
Standby or virtualized servers are
core component of strategy

Archive to tape
Back up to tape
Recovery time more than one day
Not confident in ability to restore
Backup is core component of strategy

Copyright 2014 EMC Corporation. All rights reserved.

Recovery time 2 5 hours

LEADERS

Moderately confident of ability to


restore

ADOPTERS

Active-active instances are core


component of strategy

Archive to disk

LAGGARDS

Back up to disk

EVALUATORS

Recovery time 6 24 hours


Doubtful of ability to restore
Replication is core component
of strategy

WHERE ARE THE MOST MATURE


ORGANIZATIONS?
AVERAGE SCORE ON THE MATURITY MATRIX
AMERICAS:
33.7

EMEA:
32.2

APJ:
34.7
42.5

37.8

37.6
34.3
31.0

35.6

29.1

34.8

33.5

31.8

31.5

31.0

41.7

39.1

37.8

36.6
32.9

30.9
27.3

27.0

30.7

29.5

29.5

26.9

Figure 3: Analysis of average maturity score by region and country


Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

10

MATURITY RANK

WHICH MARKETS ARE AHEAD?

Businesses in China and Hong


Kong most likely to be ahead
of the curve
Outside of Asia, the US and the
Netherlands most likely to be
ahead of the curve
UAE, Turkey and
Switzerland and least likely to
be ahead of maturity curve

RANK
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24

COUNTRY
China
Hong Kong
Netherlands
Singapore
USA
India
South Africa
Indonesia
Mexico
Germany
Australia
UK
The Philippines
Thailand
Canada
Russia
Italy
Brazil
Japan
South Korea
France
Switzerland
Turkey
UAE

% OF BUSINESSES AHEAD
OF MATURITY CURVE*
29.6%
27.2%
20.8%
20.0%
19.5%
19.2%
18.4%
18.4%
17.6%
15.5%
14.4%
13.0%
11.2%
11.2%
9.6%
9.6%
9.6%
8.8%
8.0%
8.0%
6.5%
6.4%
5.6%
0.0%

*Please note that the percentages have been rounded


to one decimal place
Copyright 2014 EMC Corporation. All rights reserved.

11

THE IMPORTANCE
OF DATA
PROTECTION

Copyright 2014 EMC Corporation. All rights reserved.

12

THE CRITICALITY OF DATA PROTECTION


DO YOU CONSIDER DATA PROTECTION CRITICAL
TO THE SUCCESS OF YOUR ORGANIZATION?
Not very important

2%
8%

Very
Important
But Not
Critical

27%

Plays no role in
our success

Totally
critical
64%

Most likely to consider critical:

China (90%),
Brazil (82%)
US (80%)

84% of those "ahead of the


curve" see data protection as
totally critical, compared to
58% of Laggards and 63% of
Evaluators

Figure 4: Do you consider data protection to be totally critical to the ongoing success of your organization?
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

13

SPENDING ON DATA PROTECTION


7.70%

Average company spend:


$153 million on IT
$12 million on data protection

Average percentage
of annual IT budget
that is spent on
data protection

The US spends the most:


$32 million on data protection
8.91% of IT budget
8.67%

Average percentage
of domestic annual
revenue that is
spent annually on IT

Those ahead of curve spend most


$37 million on data protection
9.6% of IT budget

Figure 5: Analysis of average spend of revenue on IT, and of IT budget on data protection
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

14

THE NUMBER OF DATA PROTECTION


VENDORS

65% have more than one data


protection vendor
Three vendors on average

Financial services, Energy, IT


and Telecoms have most
vendors

23%

Have one
vendor

12%

Have no specific
vendor

65%

16% of Laggards have no


specific vendor at all

Have more than


one vendor

Figure 6: Is your data protection infrastructure built on technology from more than one vendor?
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

15

THE EFFECT OF NUMBER OF VENDORS


ON SPEND
SHARE OF ANNUAL IT BUDGET SPENT ON DATA
PROTECTION

Those with most vendors spend


more of their IT budget on data
protection
Top 3 spenders:
IT (9.16%)
Telecoms (8.97%)
Financial Services (8.04%)

7.04%

One data
protection
vendor

7.32%

Two data
protection
vendors

8.91%

Three or more
data protection
vendors

Figure 7: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

16

SUFFERING DISRUPTIONS
DISRUPTIONS SUFFERED IN LAST 12 MONTHS

64% suffered disruption in the


last 12 months
67% of IT
64% of Telecoms
59% of Financial Services

21% of Adopters & Leaders


suffered data loss, compared
to 37% of Laggards
64%

49%

32%

17%

Suffered data loss


or unplanned
downtime

Suffered
unplanned
downtime

Suffered
data loss

Suffered
data loss
and
downtime

Figure 8: Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months?
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

17

THE EFFECT OF THE NUMBER OF


VENDORS ON DISRUPTIONS
DISRUPTIONS SUFFERED
(BY NUMBER OF VENDORS)

24%

33%

38%

Data loss

42%

52%

54%

The more vendors a business


has, the more likely it is to
experience disruption
Those with one vendor are the
least likely to experience data
loss or downtime

Unplanned systems downtime

One data protection vendor


Two data protection vendors
Three or more data protection vendors
Figure 9: Analysis of the organizations suffering disruptions, cut by the number of data protection vendors
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

18

DATA LOSS
AVERAGE DATA LOSS IN TERABYTES (TB)
3.54

2.33
1.75

Total

1.16

No external One data


data
protection
protection
vendor
vendors

1.73

Average annual loss per company


2.33TB of data
Equivalent to around 24 million
e-mails
Costs $1.02 million
Businesses with one vendor lost the
least data, while those with 3 or
more vendors lost the most data

Two data
protection
vendors

Three or
more data
protection
vendors

IT (3.83TB) and Financial Services


(2.92TB) lost the most data

Figure 10: Analysis of the average data loss over the last 12 months, cut by number of data protection vendors
Base: respondents whose organization has suffered data loss (1071)
Copyright 2014 EMC Corporation. All rights reserved.

19

WHAT IS THE COST OF DOWNTIME?


AVERAGE COST OF UNPLANNED
SYSTEMS DOWNTIME
(IN MILLIONS OF DOLLARS)

$0.87
$0.42

Total

$0.34

No external One data


data
protection
protection
vendor
vendors

$1.66

The more data protection


vendors in use, the greater the
cost of downtime to the
business

$0.40

Two data
protection
vendors

3 working days of downtime


(25 hours) in the last 12
months, costing $870,000
($0.87 million)

Three or
more data
protection
vendors

Figure 11: Analysis of the average cost of downtime, cut by number of data protection vendors
Base: respondents whose organization has suffered downtime (1621)
Copyright 2014 EMC Corporation. All rights reserved.

20

ESTIMATED ANNUAL COST FOR DISRUPTIONS


Data loss $754
Billion

Copyright 2014 EMC Corporation. All rights reserved.

$1.7
TRILLION
TOTAL

Downtime
$954
Billion

21

FREQUENCY OF CONTINUOUS BACKUP


PERCENTAGE OF DATA BACKED UP
CONTINUOUSLY BY BUSINESSES
3% 5%
5%

26%

22%

39%
0% of data backed up continuously
1% - 25% of data backed up continuously
25% - 50% of data backed up continuously
50%- 75% of data backed up continuously
75% - 99% of data backed up continuously

25% of data is backed up


continuously
One quarter of organizations
do not back up anything
continuously & suffer 32 hours
downtime (vs. 25 hour
downtime average)
88% of those "ahead of the
curve" back up some data
continuously, while only 65%
of Laggards do so

100% of data backed up continuously


Figure 12: Analysis of those that backup data continuously
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

22

WHAT IS CAUSING THESE DISRUPTIONS?


Hardware failure

53%

Loss of power

39%

Software failure

38%

Data corruption

29%

Accidental user error

26%

Security breach (e.g. malware, spyware, viruses, botnets or


cyber-terrorism)

23%

Loss of backup power

22%

Physical security (e.g. loss/theft of equipment)


The fault of service/cloud providers
Natural disaster (e.g. tsunami, hurricane, earthquake)
Deliberate employee sabotage

14%
12%
10%
9%

Figure 13: What were the causes of your data loss and/or systems downtime?
Base: respondents whose organization suffered data loss or downtime (2120)
Copyright 2014 EMC Corporation. All rights reserved.

23

THE CONSEQUENCES OF DISRUPTION


Loss of employee productivity

47%

Loss of revenue

36%

Delay in product/service development

34%

Loss of customer confidence/loyalty

24%

Loss of a new business opportunity

20%

Delay in getting products/services to market

17%

Loss of business to a competitor

15%

Loss of an incremental business opportunity

15%

Loss of customers

14%

Loss of repeat business


There have been no commercial consequences

13%
7%

Figure 14: Have any of the above been commercial consequences of the data
loss and/or systems downtime you have experienced over the last 12 months?
Base: respondents whose organization suffered data loss or downtime (2120)
Copyright 2014 EMC Corporation. All rights reserved.

24

ARE ORGANIZATIONS CONFIDENT?


Very
confident
29%
Not very
confident
71%

71% not fully confident that


they can recover systems/data
today from all platforms

Figure 15: How confident are you that, in the event of a data loss incident, you can fully recover systems/data
today from all platforms, on-premise and off-premise, in order to meet business service level agreements?
Base: all respondents (3300)
Used for maturity matrix
Copyright 2014 EMC Corporation. All rights reserved.

25

DATA
PROTECTION
METHODS

Copyright 2014 EMC Corporation. All rights reserved.

26

WHAT STRATEGIES ARE IN PLACE?


Backup is the main component of our
availability strategy

41%

Replication is the main component of our


availability strategy

20%

Standby servers on a remote site are the


main components of our availability
strategy
Virtual servers with restart capabilities
(including cloud) are the main
components of our availability strategy
Active-active instances of applications
(including cloud) are key component of
our availability strategy

16%
13%
9%

41% use backup as the primary


protection strategy
Only 9% use active-active as a
key component
Those with active-active as key
component suffered less data
loss than those with backup
15% active-active vs. 31%
backup

Figure 16: Which of the above best characterises your organization's current data protection environment infrastructure?
Base: all respondents (3300)
Used for maturity matrix
Copyright 2014 EMC Corporation. All rights reserved.

27

WHAT OTHER STRATEGIES ARE IN PLACE?


THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN
AVERAGE OF THREE STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS

STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA


Automatic backup to the cloud

43%

Tape backup and tapes are kept off site (on own premises)

38%

Disk-based backup and recovery including clones/snaps

36%

Replication of both applications and data (such as virtual machine images)

28%

Tape backup and tapes are kept off site (on 3rd party premises)

27%

WAN-based replication of backup and recovery images to second site

27%

Backup appliance with deduplication

26%

Replication to a second site with restart capabilities (active/passive)

19%

Dynamic mobility of virtual applications between data centres

15%

Tape backup and tapes go home with employees


Disaster tolerant replication (active/active) with near zero RPO and RTO

14%
9%

Figure 17: Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data?
Base: all respondents (3300)
Used for maturity matrix
Copyright 2014 EMC Corporation. All rights reserved.

28

WHO IS IN CHARGE OF THE CLOUD?


RESPONSIBILITY FOR DATA PROTECTION
FOR PUBLIC CLOUD-BASED APPLICATIONS

74%

My IT department as a whole

58%

The cloud service provider

Each department in my
organisation, dependent on their
use of the application in question

23%

Figure 18: For public cloud based applications, which


organizations are responsible for data protection?
Base: respondents whose organization is using a type of
cloud as a platform for infrastructure (2221)
Copyright 2014 EMC Corporation. All rights reserved.

DESIRE HAVE VISIBILITY/CONTROL OVER DATA


PROTECTION (ON-PREMISE & IN CLOUD)
Yes I want to have to visibility of
how the organisation's on-premise
and off-premise data is being
protected

66%

Yes - I want to have to control of


how the organisation's on-premise
and off-premise data is being
protected
No I only want to manage my
local data; the cloud service
provider should manage offpremise data

53%

7%

Figure 19: Do you want to have visibility and/or control


over how your data is being protected both on-premise
and in the cloud?
Base: respondents whose organization is using a type
of cloud as a platform for infrastructure (2221)
29

WHERE IS DATA STORED?


PRIMARY DATA

On-premise (physical servers)

32%

On-premise (virtualized servers)

20%

On-premise (private cloud)

14%

Mainframe

9%

Public cloud

8%

Hybrid cloud (applications run on a combination of private


and public clouds)

8%

Desktop/laptop

8%

Mobile devices (e.g. tablets, smartphones etc.)

2%

Figure 20: Analysis of average amount of primary data on different platforms


Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

30

WHAT IS HARDEST TO PROTECT?

MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME


APPLICATIONS THAT THEY FIND HARDEST TO PROTECT
APPLICATIONS/PLATFORMS
WITHOUT A RECOVERY PLAN

Mobile devices

Hybrid cloud applications

Big data/data lakes

78%

76%

71%

Figure 21: Analysis of applications/platforms that do not have disaster


recovery plans
Base: all respondents (3300)

Copyright 2014 EMC Corporation. All rights reserved.

MOST DIFFICULT APPLICATIONS/PLATFORMS


TO PROTECT

Big data

Mobile devices

Hybrid cloud applications

39%

37%

30%

Figure 22: Analysis of applications/platforms


that are difficult to protect
Base: all respondents (3300)

31

FUTURE STRATEGIES
DATA PROTECTION CLOUD SERVICES
Backup-as-a-Service

Archive-as-a-Service

Data recovery-as-a-Service

53%
34%
36%
47%
36%
47%

53% currently using backup-as


a service; further 34% plan to in
the future
47% plan to use archive as a
service and data recovery as a
service in the future

Currently using
Plan to adopt at
some point

Figure 23: Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months?
Base: all respondents (3300)
Copyright 2014 EMC Corporation. All rights reserved.

32

SUMMARY

GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION


THROUGH DATA LOSS AND UNPLANNED DOWNTIME

64% consider
data protection
to be critical to
their
organizations
success, still
64% suffered
downtime or
data loss in last
12 months

More data
protection
vendors means
more data loss
and more
spending on data
protection

Copyright 2014 EMC Corporation. All rights reserved.

87% of
businesses are
behind the curve
for data
protection
maturity and
71% of
businesses are
not fully
confident in their
ability to restore
apps/data

33

CONCLUSION
Most companies globally are
behind the curve and feeling
pain

Newer workloads and exploding data


volumes will continue to put pressure on
data protection

Data loss and downtime


are expensive

This cant be fixed in silos


isolated solutions by different
vendors increase cost and risk

Copyright 2014 EMC Corporation. All rights reserved.

A continuum of technologies supports


availability and protection requirements for
different tiers of apps/data

34

EMC RECOMMENDATIONS
Make sure theres an appropriate data protection solution in place for all of your
critical data no matter where it is or how it is generated
Manage an integrated data protection strategy and maintain a level of visibility and
control for application owners
Evaluate the gaps in your protection strategy that may emerge from disparate vendor
solutions
Match your data protection approach with the availability and protection requirements
for your tiers of applications/data
Understand who owns data protection especially in the cloud

Copyright 2014 EMC Corporation. All rights reserved.

35

APPENDIX (i)
MATURITY SCORING

Which of the following best characterises


your organization's current data protection
environment infrastructure?
Backup is the main component of our availability
strategy (1pt.)
Replication is the main component of our availability
strategy (3pts.)
Standby servers on a remote site are the main
components of our availability strategy (4pts.)
Virtual servers with restart capabilities (including
cloud) are the main components of our availability
strategy - (5pts.)
Active-active (two or more production data centres
that are always on, 24/7 with no downtime) instances
of applications (including cloud) are key component of
our availability strategy (6pts.)
Copyright 2014 EMC Corporation. All rights reserved.

What best describes your organization's


archiving strategy?
We dont have an archiving strategy (0pt.)
We use a backup application to archive data onto tape
(1pt.)
We use an archiving application to archive data online
(e.g. onto disk) (3pts.)
We use an archiving application to archive data to
appliances that provide retention locking, litigation
hold etc. (5pts.)
We use an archiving application to archive data to
appliances that provide retention locking, litigation
hold etc. and replicate/keep a copy off site - (7pts.)

36

APPENDIX (ii)
MATURITY SCORING

Which technologies/strategies are in place to help you manage the availability of your
applications, systems, and data? (Please select all that apply)
Tape backup and tapes go home with employees
(1pt.)

WAN-based replication of backup and recovery images


to second site (4pts.)

Tape backup and tapes are kept off site (on own
premises) (2pts.)

Replication of both applications and data (such as


virtual machine images) (5pts.)

Tape backup and tapes are kept off site (on 3rd party
premises) (2pts.)

Replication to a second site with restart capabilities


(active/passive) (5pts.)

Automatic backup to the Cloud (2pts.)

Dynamic mobility of virtual applications between data


centres (7pts.)

Disk-based backup and recovery including


clones/snaps (3pts.)
Backup appliance with deduplication (4pts.)

Copyright 2014 EMC Corporation. All rights reserved.

Disaster tolerant replication (active/active) with near


zero RPO and RTO (8pts.)

37

APPENDIX (iii)
MATURITY SCORING

During an unexpected event causing


downtime to our most critical applications,
how long is your recovery time?
Our recovery time is more than one working day
(please specify) (0pt.)

How confident are you that, in the event of a


data loss incident, you can fully recover
systems/data today from all platforms, on
premise and off premise, in order to meet
business service level agreements?

Our recovery time is 12 - 24hours (1pt.)

Very confident (6pts.)

Our recovery time is 6 -12 hours (2pts)

Moderately confident (4pts.)

Our recovery time is 3 6 hours (3pts)

Some doubt (3pts.)

Our recovery time is 2 3 hours (4pts)

Not very confident (1pts.)

Our recovery time is 1 2 hours (5pts.)

Not at all confident (0pts.)

Our recovery time is less than an hour (6pts.)


Our recovery time is zero (7pts.)
I do not know (0pt.)
Copyright 2014 EMC Corporation. All rights reserved.

38

You might also like