SlideShare a Scribd company logo
1 of 9
Backup and Recovery Flash Poll
Global Results
Methodology
• Survey Performed by Applied Research
• 1,425 organizations worldwide
• Enterprises (500 employees or more)
• C-level, strategic management,
  and tactical management
• Cross-industry




                                         2
Key Findings
• Backup confidence is lacking - especially virtual backups
• Backup SLAs are inadequately met
• The current backup and recovery approach is a long process with too many
  tools
• As a result, backup and recovery will change




                                                                             3
Backup Confidence Lacking
• Only 28% completely confident that 100% of the backed-up data can be
  recovered
• More than a third (36%) would NOT bet their paychecks that 100% of
  backed-up data could be recovered
• Virtualization backup ranks 2nd lowest of successful IT initiatives
  – Only 58% think that their virtualization backup is adequately/perfectly working
Backup SLAs Are Inadequate
• One-third of respondents don’t know/unsure they meet backup and
  recovery SLAs
• No penalty for missing backup SLAs for 1 in 5 (22%)
• Primary reasons for not meeting backup and recovery SLAs:
  – Size of the backup
  – Bandwidth
  – Too much data volume
• 25% of virtual environments have less stringent SLAs than physical ones
• 37% of virtual environments have more stringent SLAs than physical ones
Backup And Recovery Takes Too Long
• 39% say their organizations’ backup takes too long
• 33% say their organizations’ recovery takes too long
• 72% would switch vendors for faster backups
• Respondents report they are understaffed by average of 8
Complex Tools To Consolidate
• 28% say they have too many backup tools
• Organizations use average of 4 backup solutions for physical systems
• Organizations use average of 3 backup solutions for virtual systems
• 42% of respondents say they use native tools within applications
• Only 32% say they will use native tools in 12 months
Backup Will Change
• Organizations to move away from tape backup and off-site storage to cloud
  backup solutions
  – 45% of respondents say they use cloud based backup/replication currently
  – 51% report they will use cloud based backup in next 12 months (increase of 6
    percentage points)
  – 61% say they use disk based backup/replication currently
  – 40% report they will use disk based backup in next 12 months (drop in 21
    percentage points)
Recommendations
• Unite Virtual and Physical Backups
• Consolidate backup and recovery tools in a single appliance
• Fight infinite retention
• Stop Putting Tapes on Trucks

More Related Content

What's hot

Access to health data and information – challenges
Access to health data and information – challengesAccess to health data and information – challenges
Access to health data and information – challengesDr Venkatesh Karthikeyan
 
Speed Clinical Trials from Start to Close: The Path to a Modern CTMS
Speed Clinical Trials from Start to Close: The Path to a Modern CTMSSpeed Clinical Trials from Start to Close: The Path to a Modern CTMS
Speed Clinical Trials from Start to Close: The Path to a Modern CTMSVeeva Systems
 
Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...
Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...
Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...Veeva Systems
 
Medical Education and Bioskills Labs - Case Study
Medical Education and Bioskills Labs   - Case StudyMedical Education and Bioskills Labs   - Case Study
Medical Education and Bioskills Labs - Case StudyGoInformatics
 
Hands-on Machine Learning Using Healthcare
Hands-on Machine Learning Using HealthcareHands-on Machine Learning Using Healthcare
Hands-on Machine Learning Using HealthcareHealth Catalyst
 
The Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsThe Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsVeeva Systems
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check Andrew Ryan
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
PICI’s Best Practices for Building Oncology Studies in an EDC
PICI’s Best Practices for Building Oncology Studies in an EDCPICI’s Best Practices for Building Oncology Studies in an EDC
PICI’s Best Practices for Building Oncology Studies in an EDCVeeva Systems
 
What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)
What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)
What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)Julie Champagne
 
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Veeva Systems
 
Efficient Trial Management through Unified CTMS and Study Start-up
Efficient Trial Management through Unified CTMS and Study Start-upEfficient Trial Management through Unified CTMS and Study Start-up
Efficient Trial Management through Unified CTMS and Study Start-upVeeva Systems
 
Data Migrations powered by GalenETL
Data Migrations powered by GalenETLData Migrations powered by GalenETL
Data Migrations powered by GalenETLJulie Champagne
 
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...Veeva Systems
 
Designing an EDC System to Work for a CRA
Designing an EDC System to Work for a CRADesigning an EDC System to Work for a CRA
Designing an EDC System to Work for a CRAVeeva Systems
 
Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...
Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...
Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...Environmental Protection Agency, Ireland
 

What's hot (20)

Access to health data and information – challenges
Access to health data and information – challengesAccess to health data and information – challenges
Access to health data and information – challenges
 
MRDB 7
MRDB 7MRDB 7
MRDB 7
 
Speed Clinical Trials from Start to Close: The Path to a Modern CTMS
Speed Clinical Trials from Start to Close: The Path to a Modern CTMSSpeed Clinical Trials from Start to Close: The Path to a Modern CTMS
Speed Clinical Trials from Start to Close: The Path to a Modern CTMS
 
Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...
Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...
Improving Clinical Trial Performance: Part 1 - Findings from the Veeva 2018 U...
 
Medical Education and Bioskills Labs - Case Study
Medical Education and Bioskills Labs   - Case StudyMedical Education and Bioskills Labs   - Case Study
Medical Education and Bioskills Labs - Case Study
 
Hands-on Machine Learning Using Healthcare
Hands-on Machine Learning Using HealthcareHands-on Machine Learning Using Healthcare
Hands-on Machine Learning Using Healthcare
 
9.35am presentation - john landy
9.35am   presentation - john landy9.35am   presentation - john landy
9.35am presentation - john landy
 
The Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsThe Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical Trials
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
NARDA
NARDANARDA
NARDA
 
PICI’s Best Practices for Building Oncology Studies in an EDC
PICI’s Best Practices for Building Oncology Studies in an EDCPICI’s Best Practices for Building Oncology Studies in an EDC
PICI’s Best Practices for Building Oncology Studies in an EDC
 
What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)
What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)
What to Expect When Migrating: A Walk Through a Clinical Data Migration (2017)
 
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
 
Efficient Trial Management through Unified CTMS and Study Start-up
Efficient Trial Management through Unified CTMS and Study Start-upEfficient Trial Management through Unified CTMS and Study Start-up
Efficient Trial Management through Unified CTMS and Study Start-up
 
Data Migrations powered by GalenETL
Data Migrations powered by GalenETLData Migrations powered by GalenETL
Data Migrations powered by GalenETL
 
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...
 
Designing an EDC System to Work for a CRA
Designing an EDC System to Work for a CRADesigning an EDC System to Work for a CRA
Designing an EDC System to Work for a CRA
 
Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...
Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...
Annual environment and health conference 2018 fiona o rourke epa 2018 env&amp...
 

Similar to Symantec 2012 Backup and Recovery Flash Poll Global Results

2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global ResultsSymantec
 
5 state-of-cloud-applications-and-platforms
5 state-of-cloud-applications-and-platforms5 state-of-cloud-applications-and-platforms
5 state-of-cloud-applications-and-platformszafargilani
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1jmariani14
 
Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2jmariani14
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentationAndrey Karpov
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...Denodo
 
Windstream DRaaS Checklist
Windstream DRaaS Checklist Windstream DRaaS Checklist
Windstream DRaaS Checklist Ideba
 
Scrum Master of the Universe.pptx
Scrum Master of the Universe.pptxScrum Master of the Universe.pptx
Scrum Master of the Universe.pptxChandan Patary
 
Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2jmariani14
 
System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey InfographicInforsystemi
 
Regulatory operations at PLG
Regulatory operations at PLGRegulatory operations at PLG
Regulatory operations at PLGAlison Fautré
 
Slide share apj symantec 2011 small business virtualization poll
Slide share   apj symantec 2011 small business virtualization pollSlide share   apj symantec 2011 small business virtualization poll
Slide share apj symantec 2011 small business virtualization pollwuiwuiyu
 
Storage: Limitations, Frustrations, and Coping with Future Needs
Storage: Limitations, Frustrations, and Coping with Future NeedsStorage: Limitations, Frustrations, and Coping with Future Needs
Storage: Limitations, Frustrations, and Coping with Future NeedsRed_Hat_Storage
 
The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelAxcient
 
How to Realize Benefits from Data Management Maturity Models
How to Realize Benefits from Data Management Maturity ModelsHow to Realize Benefits from Data Management Maturity Models
How to Realize Benefits from Data Management Maturity ModelsKingland
 
[AIIM16] A Look behind the Curtain: The State of the Industry Report
[AIIM16] A Look behind the Curtain: The State of the Industry Report[AIIM16] A Look behind the Curtain: The State of the Industry Report
[AIIM16] A Look behind the Curtain: The State of the Industry ReportAIIM International
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Micah Altman
 
June brownbagpressurvey
June brownbagpressurveyJune brownbagpressurvey
June brownbagpressurveyMicah Altman
 

Similar to Symantec 2012 Backup and Recovery Flash Poll Global Results (20)

2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results
 
5 state-of-cloud-applications-and-platforms
5 state-of-cloud-applications-and-platforms5 state-of-cloud-applications-and-platforms
5 state-of-cloud-applications-and-platforms
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
 
Windstream DRaaS Checklist
Windstream DRaaS Checklist Windstream DRaaS Checklist
Windstream DRaaS Checklist
 
Scrum Master of the Universe.pptx
Scrum Master of the Universe.pptxScrum Master of the Universe.pptx
Scrum Master of the Universe.pptx
 
Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2
 
System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey Infographic
 
Regulatory operations at PLG
Regulatory operations at PLGRegulatory operations at PLG
Regulatory operations at PLG
 
Slide share apj symantec 2011 small business virtualization poll
Slide share   apj symantec 2011 small business virtualization pollSlide share   apj symantec 2011 small business virtualization poll
Slide share apj symantec 2011 small business virtualization poll
 
Storage: Limitations, Frustrations, and Coping with Future Needs
Storage: Limitations, Frustrations, and Coping with Future NeedsStorage: Limitations, Frustrations, and Coping with Future Needs
Storage: Limitations, Frustrations, and Coping with Future Needs
 
The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity Level
 
How to Realize Benefits from Data Management Maturity Models
How to Realize Benefits from Data Management Maturity ModelsHow to Realize Benefits from Data Management Maturity Models
How to Realize Benefits from Data Management Maturity Models
 
Survey Report
Survey ReportSurvey Report
Survey Report
 
[AIIM16] A Look behind the Curtain: The State of the Industry Report
[AIIM16] A Look behind the Curtain: The State of the Industry Report[AIIM16] A Look behind the Curtain: The State of the Industry Report
[AIIM16] A Look behind the Curtain: The State of the Industry Report
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies
 
June brownbagpressurvey
June brownbagpressurveyJune brownbagpressurvey
June brownbagpressurvey
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Recently uploaded (20)

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Symantec 2012 Backup and Recovery Flash Poll Global Results

  • 1. Backup and Recovery Flash Poll Global Results
  • 2. Methodology • Survey Performed by Applied Research • 1,425 organizations worldwide • Enterprises (500 employees or more) • C-level, strategic management, and tactical management • Cross-industry 2
  • 3. Key Findings • Backup confidence is lacking - especially virtual backups • Backup SLAs are inadequately met • The current backup and recovery approach is a long process with too many tools • As a result, backup and recovery will change 3
  • 4. Backup Confidence Lacking • Only 28% completely confident that 100% of the backed-up data can be recovered • More than a third (36%) would NOT bet their paychecks that 100% of backed-up data could be recovered • Virtualization backup ranks 2nd lowest of successful IT initiatives – Only 58% think that their virtualization backup is adequately/perfectly working
  • 5. Backup SLAs Are Inadequate • One-third of respondents don’t know/unsure they meet backup and recovery SLAs • No penalty for missing backup SLAs for 1 in 5 (22%) • Primary reasons for not meeting backup and recovery SLAs: – Size of the backup – Bandwidth – Too much data volume • 25% of virtual environments have less stringent SLAs than physical ones • 37% of virtual environments have more stringent SLAs than physical ones
  • 6. Backup And Recovery Takes Too Long • 39% say their organizations’ backup takes too long • 33% say their organizations’ recovery takes too long • 72% would switch vendors for faster backups • Respondents report they are understaffed by average of 8
  • 7. Complex Tools To Consolidate • 28% say they have too many backup tools • Organizations use average of 4 backup solutions for physical systems • Organizations use average of 3 backup solutions for virtual systems • 42% of respondents say they use native tools within applications • Only 32% say they will use native tools in 12 months
  • 8. Backup Will Change • Organizations to move away from tape backup and off-site storage to cloud backup solutions – 45% of respondents say they use cloud based backup/replication currently – 51% report they will use cloud based backup in next 12 months (increase of 6 percentage points) – 61% say they use disk based backup/replication currently – 40% report they will use disk based backup in next 12 months (drop in 21 percentage points)
  • 9. Recommendations • Unite Virtual and Physical Backups • Consolidate backup and recovery tools in a single appliance • Fight infinite retention • Stop Putting Tapes on Trucks