SlideShare une entreprise Scribd logo
1  sur  39
1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
EMC GLOBAL DATA
PROTECTION INDEX
KEY FINDINGS & RESULTS FOR
AMERICAS
2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
THE DATAPROTECTION LANDSCAPE
ARE YOU ON SOLID GROUND?
3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
GLOBAL KEY FINDINGS
GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA
LOSS AND UNPLANNED DOWNTIME
Adopting advanced
data protection
tools leads to
reduced data loss
87% of businesses
are behind the
curve for data
protection maturity
and 71% of
businesses are not
fully confident of
restoring their data
62% of respondents
said at least one of
the following: big
data, hybrid cloud,
mobile devices, is
‘difficult’ or ‘very
difficult’ to protect
4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DEMOGRAPHICS
INTERVIEWED 3,300
IT DECISION-MAKERS
IN 3 REGIONS:
Americas
(575)
Asia Pacific Japan
(1,250)
Europe,
Middle East,
and Africa
(1,475)
24
COUNTRIES
TOTAL
ORGANIZATIONS
OF 250
OR MORE
EMPLOYEES
BOTH PRIVATE
AND PUBLIC
ORGANIZATIONS
INDEPENDENT
RESEARCH AND
ANALYSIS
5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DATA PROTECTION
MATURITY
6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
MATURITY INDEX
* Exact scoring included in appendix – questions show
points used for the original model with a maximum score
of 68. All scores multiplied by a factor of 1.47 to create a
model of 100 points
Maturity scored between
1–100 points*
Points awarded based on the
maturity of their data
protection strategy
More points awarded for:
• Shorter recovery times
• Confidence in backup infrastructure
• Modern backup systems
• Off-site replication
7© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
 Leaders (scored 76-100 points)
 Adopters (scored 51-75 points)
WHO IS LEADING THE WAY?
Figure 1: Analysis of maturity
Base: all respondents (3,300)
AHEAD OF
‘MATURITY’
CURVE
 Evaluators (scored 26-50 points)
 Laggards (scored 1-25 points)
Global Results Americas Results
Figure 2: Analysis of maturity
Base: all respondents from Americas (575)
35.0%
50.4%
13.2%
1.4%
Laggards
Evaluators
Adopters
Leaders
36.8%
49.5%
11.3%
2.4%
Laggards
Evaluators
Adopters
Leaders
8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Figure 3: Analysis of maturity – showing frequency of points scored
Base: all respondents (3300)
AHEAD OF THE CURVE
NUMBEROFCOMPANIESGLOBAL IT MATURITY
SHOWING FREQUENCY OF POINTS SCORED
0
100
200
300
400
500
600
700
MATURITY POINTS SCORED
25 50 75 100
Laggards 37%
(1,214 Companies)
Evaluators 50%
(1,635 Companies)
Adopters 11%
(372 Companies)
Leaders 2%
(79 Companies)
AMERICAS
9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
PROFILE CHARACTERISTICS
LEADERS
LAGGARDS
ADOPTERS
EVALUATORS
Use archiving application with offsite
replication
Back up with deduplication & offsite
replication
Recovery time 2 – 5 hours
Moderately confident of ability to
restore
Active-active instances are core
component of strategy
Archive to tape
Backup to tape
Recovery time more than one day
Not confident in ability to restore
Backup is core component of strategy
Use archiving application with
retention policies
Disaster tolerant replication with
near-zero RPO/RTO
Recovery time one hour or less
Very confident of ability to restore
Standby or virtualized servers are
core component of strategy
Archive to disk
Backup to disk
Recovery time 6 – 24 hours
Doubtful of ability to restore
Replication is core component
of strategy
10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHERE ARE THE MOST MATURE
ORGANIZATIONS?
Figure 4: Analysis of average maturity score by region and country
Base: all respondents (3300)
AMERICAS:
33.7
EMEA:
32.2
APJ:
34.7
AVERAGE SCORE ON THE MATURITY MATRIX
37.6
34.3
31.0
29.1
37.8
35.6 34.8
33.5
31.8 31.5 31.0 30.9
27.3 27.0
42.5 41.7
39.1
37.8
36.6
32.9
30.7
29.5 29.5
26.9
11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• Businesses in China and Hong
Kong most likely to be ahead
of the curve
• Outside of Asia, the US and the
Netherlands most likely to be
ahead of the curve
• UAE, Turkey and
Switzerland are least likely to
be ahead of maturity curve
MATURITY RANK
WHICH MARKETS ARE AHEAD?
RANK COUNTRY
% OF BUSINESSES AHEAD
OF MATURITY CURVE*
1 China 29.6%
2 Hong Kong 27.2%
3 Netherlands 20.8%
4 Singapore 20.0%
5 USA 19.5%
6 India 19.2%
7 South Africa 18.4%
8 Indonesia 18.4%
9 Mexico 17.6%
10 Germany 15.5%
11 Australia 14.4%
12 UK 13.0%
13 The Philippines 11.2%
14 Thailand 11.2%
15 Canada 9.6%
16 Russia 9.6%
17 Italy 9.6%
18 Brazil 8.8%
19 Japan 8.0%
20 South Korea 8.0%
21 France 6.5%
22 Switzerland 6.4%
23 Turkey 5.6%
24 UAE 0.0%
*Please note that the percentages have been rounded
to one decimal place
12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
THE IMPORTANCE OF
DATA PROTECTION
13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• The majority (71%) of
respondents consider data
protection to be totally critical
to their organization’s success
• Most likely to consider data
protection to be totally critical:
– Brazil (82%)
– US (80%)
• The consulting sector is most
likely to see data protection as
totally critical (83%)
THE CRITICALITY OF DATA PROTECTION
Figure 5: “Do you consider data protection to be totally critical to the ongoing success of your organization?”
Base: all respondents (575)
DO YOU CONSIDER DATA PROTECTION CRITICAL
TO THE SUCCESS OF YOUR ORGANIZATION?
71%
23%
5%
1%
Very
Important
But Not
Critical
Totally
critical
Plays no role in
our success
Not very important
14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
SPENDING ON DATA PROTECTION
• Average company spend:
– $254 million on IT
– $21 million on data protection, an
average of 8.16% of annual IT
budget
• The US spends the most:
– $32 million on data protection
– 8.91% of IT budget on data
protection
Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection
Base: all respondents (575)
Average percentage
of annual IT budget
that is spent on
data protection
8.16%
Average percentage
of domestic annual
revenue that is
spent annually on IT
9.67%
15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Figure 7: “Is your data protection infrastructure built on technology from more than one vendor?”
Base: all respondents (575)
• 67% have more than one data
protection vendor
– Three vendors on average
• 79% from the financial services
sector have more than one
vendor
• Organizations with more than
5,000 employees are most likely
to have multiple vendors (73%)
THE NUMBER OF DATA PROTECTION VENDORS
10%
Have no specific
vendor
23%
Have one
vendor
67%
Have more than
one vendor
16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• Organizations with three or
more vendors spend a greater
proportion of their IT budget on
data protection
• In Americas, those with three
or more vendors spend10.18%,
compared to 7.49% with one
vendor
THE EFFECT OF NUMBER OF VENDORS ON
SPEND
Figure 8: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors
Base: all respondents (575)
SHARE OF ANNUAL IT BUDGET SPENT ON DATA
PROTECTION
10.18%
Three or more
data protection
vendors
7.49%
One data
protection
vendor
6.96%
Two data
protection
vendors
17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 64% suffered disruption in the last
12 months
– 79% of consulting
– 78% of private healthcare
– 71% of public sector
• Organizations in Americas are more
likely to suffered downtime (51%)
than those in EMEA (48%) or APJ
(49%)
• 72% of organizations in the USA
suffered disruptions, compared with
59% in Brazil and 56% in Mexico
SUFFERING DISRUPTIONS
Figure 9: “Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months?”
Base: all respondents (575)
DISRUPTIONS SUFFERED IN LAST 12 MONTHS
64%
Suffered data loss
or unplanned
downtime
51%
Suffered
unplanned
downtime
31%
Suffered
data loss
19%
Suffered
data loss
and
downtime
18© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• The more vendors a business
has, the more likely it is to
experience data loss
• 39% of organizations with three
or more vendors experienced
data loss in the last 12 months
THE EFFECT OF THE NUMBER OF VENDORS ON
DISRUPTIONS
Figure 10: Analysis of the organizations suffering disruptions, cut by the number of data protection vendors
Base: all respondents (575)
DISRUPTIONS SUFFERED
(BY NUMBER OF VENDORS)
39%
21%
30%
Three or more data protection vendors
One data protection vendor
Two data protection vendors
Data loss
19© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• Average annual loss per company
is 3.65TB of data
– Equivalent to around 37 million e-
mails
– Costs $1.32 million
• Businesses with one vendor lost
1.29TB compared to 5.75TB for
those with 3 or more vendors
DATA LOSS
Figure 11: Analysis of the average data loss over the last 12 months, cut by number of data protection vendors
Base: respondents whose organization has suffered data loss (181)
AVERAGE DATA LOSS IN TERABYTES (TB)
1.98
3.65
Three or
more data
protection
vendors
One data
protection
vendor
Two data
protection
vendors
5.75
1.29
2.58
No external
data
protection
vendors
Total
20© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• There were 26 hours of
unplanned downtime on average
in the last 12 months, at a loss
of $0.56 million
• Those with three or more
vendors lost $0.69 million
compared to organizations with
one vendor ($0.33 million)
WHAT IS THE COST OF DOWNTIME?
Figure 12: Analysis of the average cost of downtime, cut by number of data protection vendors
Base: respondents whose organization has suffered downtime (296)
AVERAGE COST OF UNPLANNED
SYSTEMS DOWNTIME
(IN MILLIONS OF DOLLARS)
$0.22
$0.56
Three or
more data
protection
vendors
One data
protection
vendor
Two data
protection
vendors
$0.69
$0.33
$0.56
No external
data
protection
vendors
Total
21© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
ESTIMATEDANNUALCOST FOR DISRUPTIONS
Downtime
$83.1
Billion
Data loss
$238.5
Billion
$321.6
BILLION
TOTAL
22© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
PERCENTAGE OF DATA BACKED UP
CONTINUOUSLY BY BUSINESSES
• 30% of data is backed up
continuously
• Around one fifth (21%) of
organizations do not back up
anything continuously
• 94% of those “ahead of the
curve” back up some data
continuously, while only 73%
of Laggards do so
FREQUENCY OF CONTINUOUS BACKUP
Figure 13: Analysis of those that backup data continuously
Base: all respondents (575)
0% of data backed up continuously
1% - 25% of data backed up continuously
25% - 50% of data backed up continuously
50%- 75% of data backed up continuously
75% - 99% of data backed up continuously
100% of data backed up continuously
21%
39%
22%
6%
3%8%
23© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHAT IS CAUSING THESE DISRUPTIONS?
Figure 14: “What were the causes of your data loss and/or systems downtime?”
Base: respondents whose organization suffered data loss or downtime (370)
52%
44%
34%
27%
24%
23%
19%
12%
11%
11%
5%
Hardware failure
Loss of power
Software failure
Data corruption
Accidental user error
Security breach (e.g. malware, spyware, viruses, botnets or
cyber-terrorism)
Loss of backup power
Physical security (e.g. loss/theft of equipment)
The fault of service/cloud providers
Natural disaster (e.g. tsunami, hurricane, earthquake)
Deliberate employee sabotage
24© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
THE CONSEQUENCES OF DISRUPTION
Figure 15: “Have any of the above been commercial consequences of the data
loss and/or systems downtime you have experienced over the last 12 months?”
Base: respondents whose organization suffered data loss or downtime (370)
50%
34%
33%
25%
25%
16%
13%
11%
10%
8%
5%
Loss of employee productivity
Delay in product/service development
Loss of revenue
Loss of customer confidence/loyalty
Delay in getting products/services to market
Loss of a new business opportunity
Loss of customers
Loss of an incremental business opportunity
Loss of business to a competitor
Loss of repeat business
There have been no commercial consequences
25© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 63% are not fully confident that
they can recover systems/data
today from all platforms
• Americas are more confident
than EMEA (27%) or APJ (27%)
• Only 27% from the public sector
are very confident. The IT sector
is most confident (44%)
ARE ORGANIZATIONS CONFIDENT?
Figure 16: “How confident are you that, in the event of a data loss incident, you can fully recover systems/data
today from all platforms, on-premise and off-premise, in order to meet business service level agreements?”
Base: all respondents (575)
Used for maturity matrix
Very
confident
37%
Not very
confident
63%
26© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DATA PROTECTION
METHODS
27© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 47% use backup as the primary
protection strategy
• 7% use active-active as a key
component; less than those
from EMEA (10%) or APJ (9%)
• Those with active-active as a
key component suffered less
data loss than those with backup
– 19% active-active vs. 30%
backup
WHAT STRATEGIES ARE IN PLACE?
Figure 17: “Which of the above best characterises your organization's current data protection environment infrastructure?”
Base: all respondents (575)
Used for maturity matrix
7%
12%
14%
19%
47%
Active-active instances of applications
(including cloud) are key component of
our availability strategy
Replication is the main component of our
availability strategy
Standby servers on a remote site are the
main components of our availability
strategy
Virtual servers with restart capabilities
(including cloud) are the main
components of our availability strategy
Backup is the main component of our
availability strategy
28© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHAT OTHER STRATEGIES ARE IN PLACE?
THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN AVERAGE OF THREE
STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS
Figure 18: “Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data?”
Base: all respondents (575)
Used for maturity matrix
42%
38%
34%
28%
26%
26%
24%
22%
16%
15%
10%
Automatic backup to the cloud
Tape backup and tapes are kept off site (on own premises)
Disk-based backup and recovery including clones/snaps
Replication of both applications and data (such as virtual machine images)
Tape backup and tapes are kept off site (on 3rd party premises)
WAN-based replication of backup and recovery images to second site
Backup appliance with deduplication
Replication to a second site with restart capabilities (active/passive)
Tape backup and tapes go home with employees
Dynamic mobility of virtual applications between data centres
Disaster tolerant replication (active/active) with near zero RPO and RTO
STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA
29© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
DESIRE TO HAVE VISIBILITY/CONTROL OVER DATA
PROTECTION (ON-PREMISE & IN CLOUD)
WHO IS IN CHARGE OF THE CLOUD?
RESPONSIBILITY FOR DATA PROTECTION
FOR PUBLIC CLOUD-BASED APPLICATIONS
Figure 19: “For public cloud based applications, which
organizations are responsible for data protection?”
Base: respondents whose organization is using a type of
cloud as a platform for infrastructure (339)
Figure 20: “Do you want to have visibility and/or control
over how your data is being protected both on-premise
and in the cloud?”
Base: respondents whose organization is using a type
of cloud as a platform for infrastructure (339)
72%
61%
18%
My IT department as a whole
The cloud service provider
Each department in my
organization, dependent on their
use of the application in question
70%
51%
4%
Yes – I want to have to visibility of
how the organization's on-premise
and off-premise data is being
protected
Yes - I want to have to control of
how the organization's on-premise
and off-premise data is being
protected
No – I only want to manage my
local data; the cloud service
provider should manage off-
premise data
30© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHERE IS DATA STORED?
PRIMARY DATA
Figure 21: Analysis of average amount of primary data on different platforms
Base: all respondents (575)
37%
19%
18%
7%
7%
6%
5%
2%
On-premise (physical servers)
On-premise (virtualized servers)
On-premise (private cloud)
Desktop/laptop
Hybrid cloud (applications run on a combination of private
and public clouds)
Mainframe
Public cloud
Mobile devices (e.g. tablets, smartphones etc.)
31© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
WHAT IS HARDEST TO PROTECT?
MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME APPLICATIONS
THAT THEY FIND HARDEST TO PROTECT
MOST DIFFICULT APPLICATIONS/PLATFORMS
TO PROTECT
APPLICATIONS/PLATFORMS
WITHOUT A RECOVERY PLAN
Figure 22: Analysis of applications/platforms that do not have disaster
recovery plans
Base: all respondents (575)
Figure 23: Analysis of applications/platforms
that are difficult to protect
Base: all respondents (575)
69%
76%
77%
Big data/data lakes
Mobile devices
Hybrid cloud applications
26%
32%
37%
Hybrid cloud applications
Mobile devices
Big data
32© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
• 59% currently use backup-as a
service; further 28% plan to in
the future
• 44% plan to use archive-as-a-
service and 42% plan to use
data recovery-as-a-service in
the future
FUTURE STRATEGIES
Figure 24: “Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months?”
Base: all respondents (575)
DATA PROTECTION CLOUD SERVICES
59%
38%
41%
28%
44%
42%
Backup-as-a-Service
Archive-as-a-Service
Data recovery-as-a-Service
Currently using
Plan to adopt at
some point
33© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
SUMMARY FOR AMERICAS
71% consider
data protection
to be totally
critical to their
organization’s
success, still
64% suffered
downtime or
data loss in last
12 months
More data
protection
vendors means
organizations are
more likely to
suffer data loss
85% of
businesses are
behind the curve
for data
protection
maturity and
63% of
businesses are
not fully
confident in their
ability to restore
apps/data
ENTERPRISES ARE LOSING AS MUCH AS $321.6 BILLION THROUGH DATA LOSS AND
UNPLANNED DOWNTIME
34© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
CONCLUSION
Data loss and downtime
are expensive
Most companies globally are
behind the curve and feeling
pain
Newer workloads and exploding data
volumes will continue to put pressure on
data protection
This can’t be fixed in silos –
isolated solutions by different
vendors increase cost and risk
A continuum of technologies supports
availability and protection requirements for
different tiers of apps/data
35© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
EMC RECOMMENDATIONS
Match your data protection approach with the availability and protection requirements
for your tiers of applications/data
Evaluate the gaps in your protection strategy that may emerge from disparate vendor
solutions
Manage an integrated data protection strategy and maintain a level of visibility and
control for application owners
Understand who “owns” data protection – especially in the cloud
Make sure there’s an appropriate data protection solution in place for all of your
critical data no matter where it is or how it is generated
36© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (i)
MATURITY SCORING
Which of the following best characterises
your organization's current data protection
environment infrastructure?
• Backup is the main component of our availability
strategy – (1pt.)
• Replication is the main component of our availability
strategy – (3pts.)
• Standby servers on a remote site are the main
components of our availability strategy – (4pts.)
• Virtual servers with restart capabilities (including
cloud) are the main components of our availability
strategy - (5pts.)
• Active-active (two or more production data centres
that are always on, 24/7 with no downtime) instances
of applications (including cloud) are key component of
our availability strategy – (6pts.)
What best describes your organization's
archiving strategy?
• We don’t have an archiving strategy – (0pt.)
• We use a backup application to archive data onto tape
– (1pt.)
• We use an archiving application to archive data online
(e.g. onto disk) – (3pts.)
• We use an archiving application to archive data to
appliances that provide retention locking, litigation
hold etc. – (5pts.)
• We use an archiving application to archive data to
appliances that provide retention locking, litigation
hold etc. and replicate/keep a copy off site - (7pts.)
37© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (ii)
MATURITY SCORING
• Tape backup and tapes go home with employees –
(1pt.)
• Tape backup and tapes are kept off site (on own
premises) – (2pts.)
• Tape backup and tapes are kept off site (on 3rd party
premises) – (2pts.)
• Automatic backup to the Cloud (2pts.)
• Disk-based backup and recovery including
clones/snaps – (3pts.)
• Backup appliance with deduplication – (4pts.)
• WAN-based replication of backup and recovery images
to second site – (4pts.)
• Replication of both applications and data (such as
virtual machine images) – (5pts.)
• Replication to a second site with restart capabilities
(active/passive) – (5pts.)
• Dynamic mobility of virtual applications between data
centres – (7pts.)
• Disaster tolerant replication (active/active) with near
zero RPO and RTO – (8pts.)
Which technologies/strategies are in place to help you manage the availability of your
applications, systems, and data? (Please select all that apply)
38© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
APPENDIX (iii)
MATURITY SCORING
During an unexpected event causing
downtime to our most critical applications,
how long is your recovery time?
• Our recovery time is more than one working day
(please specify) – (0pt.)
• Our recovery time is 12 - 24hours – (1pt.)
• Our recovery time is 6 -12 hours (2pts)
• Our recovery time is 3 – 6 hours (3pts)
• Our recovery time is 2 – 3 hours (4pts)
• Our recovery time is 1 – 2 hours – (5pts.)
• Our recovery time is less than an hour– (6pts.)
• Our recovery time is zero – (7pts.)
• I do not know – (0pt.)
How confident are you that, in the event of a
data loss incident, you can fully recover
systems/data today from all platforms, on
premise and off premise, in order to meet
business service level agreements?
• Very confident – (6pts.)
• Moderately confident – (4pts.)
• Some doubt – (3pts.)
• Not very confident – (1pts.)
• Not at all confident – (0pts.)
EMC GLOBAL DATA PROTECTION INDEX

Contenu connexe

Tendances

Deloitte-2014-Technology-Fast500
Deloitte-2014-Technology-Fast500Deloitte-2014-Technology-Fast500
Deloitte-2014-Technology-Fast500
Seth Greenberg
 
GEA32876 Offshore_Study_Paper_R11
GEA32876 Offshore_Study_Paper_R11GEA32876 Offshore_Study_Paper_R11
GEA32876 Offshore_Study_Paper_R11
Jane Howell
 

Tendances (19)

Deloitte-2014-Technology-Fast500
Deloitte-2014-Technology-Fast500Deloitte-2014-Technology-Fast500
Deloitte-2014-Technology-Fast500
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
Telehealth Evolution & Revolution - James Hammond, Dell Healthcare / NTT Data...
Telehealth Evolution & Revolution - James Hammond, Dell Healthcare / NTT Data...Telehealth Evolution & Revolution - James Hammond, Dell Healthcare / NTT Data...
Telehealth Evolution & Revolution - James Hammond, Dell Healthcare / NTT Data...
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 
Jd power stats online car buyers
Jd power stats online car buyersJd power stats online car buyers
Jd power stats online car buyers
 
i3 1 q16 innovation-monitor-slides
i3 1 q16 innovation-monitor-slidesi3 1 q16 innovation-monitor-slides
i3 1 q16 innovation-monitor-slides
 
61 Minutes AAEP 2010
61 Minutes AAEP 201061 Minutes AAEP 2010
61 Minutes AAEP 2010
 
Digital globalization: The new era of global flows
Digital globalization: The new era of global flowsDigital globalization: The new era of global flows
Digital globalization: The new era of global flows
 
Consumers Love Ride-hailing, But Commitment Remains Elusive
Consumers Love Ride-hailing, But Commitment Remains ElusiveConsumers Love Ride-hailing, But Commitment Remains Elusive
Consumers Love Ride-hailing, But Commitment Remains Elusive
 
Tracxn - Health Tech - Top Business Models - Feb 2021
Tracxn - Health Tech - Top Business Models - Feb 2021Tracxn - Health Tech - Top Business Models - Feb 2021
Tracxn - Health Tech - Top Business Models - Feb 2021
 
Fast 50 2016
Fast 50 2016Fast 50 2016
Fast 50 2016
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
 
Big Data and Enterprise Mobility by Richard Hurst, OVUM
Big Data and Enterprise Mobility by Richard Hurst, OVUMBig Data and Enterprise Mobility by Richard Hurst, OVUM
Big Data and Enterprise Mobility by Richard Hurst, OVUM
 
A.T. Kearney 2017 State of Logistics Report: Accelerating into Uncertainty
A.T. Kearney 2017 State of Logistics Report: Accelerating into UncertaintyA.T. Kearney 2017 State of Logistics Report: Accelerating into Uncertainty
A.T. Kearney 2017 State of Logistics Report: Accelerating into Uncertainty
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
 
GEA32876 Offshore_Study_Paper_R11
GEA32876 Offshore_Study_Paper_R11GEA32876 Offshore_Study_Paper_R11
GEA32876 Offshore_Study_Paper_R11
 

En vedette

Exercicios préstamos con solución 5
Exercicios préstamos con solución 5Exercicios préstamos con solución 5
Exercicios préstamos con solución 5
silamora4
 
Converged data center_f_co_e_iscsi_future_storage_networking
Converged data center_f_co_e_iscsi_future_storage_networkingConverged data center_f_co_e_iscsi_future_storage_networking
Converged data center_f_co_e_iscsi_future_storage_networking
EMC
 
Mon absolute monarchs
Mon absolute monarchsMon absolute monarchs
Mon absolute monarchs
Travis Klein
 
17 λειτουργια πεπτικου - ανιχνευση ουσιων
17   λειτουργια πεπτικου - ανιχνευση ουσιων17   λειτουργια πεπτικου - ανιχνευση ουσιων
17 λειτουργια πεπτικου - ανιχνευση ουσιων
Xristos Lyg
 

En vedette (20)

Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Dell EMC storage sc series
Dell EMC storage sc seriesDell EMC storage sc series
Dell EMC storage sc series
 
Unimed pn
Unimed pnUnimed pn
Unimed pn
 
Exercicios préstamos con solución 5
Exercicios préstamos con solución 5Exercicios préstamos con solución 5
Exercicios préstamos con solución 5
 
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Vers...
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Vers...RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Vers...
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Vers...
 
Mit2 092 f09_lec03
Mit2 092 f09_lec03Mit2 092 f09_lec03
Mit2 092 f09_lec03
 
Converged data center_f_co_e_iscsi_future_storage_networking
Converged data center_f_co_e_iscsi_future_storage_networkingConverged data center_f_co_e_iscsi_future_storage_networking
Converged data center_f_co_e_iscsi_future_storage_networking
 
Math
MathMath
Math
 
Clientes
ClientesClientes
Clientes
 
Mon absolute monarchs
Mon absolute monarchsMon absolute monarchs
Mon absolute monarchs
 
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
Highlights from the EMC & VMware CIO Summit | LAS VEGAS, held at EMC World 2013
 
Mon banking
Mon bankingMon banking
Mon banking
 
Mon build factory
Mon build factoryMon build factory
Mon build factory
 
The Industrial Internet@Work
The Industrial Internet@WorkThe Industrial Internet@Work
The Industrial Internet@Work
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
17 λειτουργια πεπτικου - ανιχνευση ουσιων
17   λειτουργια πεπτικου - ανιχνευση ουσιων17   λειτουργια πεπτικου - ανιχνευση ουσιων
17 λειτουργια πεπτικου - ανιχνευση ουσιων
 
The Global IT Trust Curve survey - Comprehensive Results Presentation
The Global IT Trust Curve survey - Comprehensive Results PresentationThe Global IT Trust Curve survey - Comprehensive Results Presentation
The Global IT Trust Curve survey - Comprehensive Results Presentation
 
Windows Server 2012 Virtualization: Notes from the Field
Windows Server 2012 Virtualization: Notes from the FieldWindows Server 2012 Virtualization: Notes from the Field
Windows Server 2012 Virtualization: Notes from the Field
 

Similaire à EMC GLOBAL DATA PROTECTION INDEX

Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
FERMA
 

Similaire à EMC GLOBAL DATA PROTECTION INDEX (20)

Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Is Bimodal IT Dead? July 2017
Is Bimodal IT Dead?  July 2017Is Bimodal IT Dead?  July 2017
Is Bimodal IT Dead? July 2017
 
SaaS Data Protection
SaaS Data ProtectionSaaS Data Protection
SaaS Data Protection
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
02 charles fombrun-reputation-institute_(eua)
02 charles fombrun-reputation-institute_(eua)02 charles fombrun-reputation-institute_(eua)
02 charles fombrun-reputation-institute_(eua)
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Highlights from the EMC & VMware CIO Summit
Highlights from the EMC & VMware CIO SummitHighlights from the EMC & VMware CIO Summit
Highlights from the EMC & VMware CIO Summit
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel WorldCEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned About
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 

Plus de EMC

Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

Plus de EMC (20)

Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 
The Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkThe Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the Network
 
Provisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of ProvisioningProvisioning 2.0: The Future of Provisioning
Provisioning 2.0: The Future of Provisioning
 
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
EMC Big Data | Hadoop Starter Kit | EMC Forum 2014
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

EMC GLOBAL DATA PROTECTION INDEX

  • 1. 1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS
  • 2. 2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. THE DATAPROTECTION LANDSCAPE ARE YOU ON SOLID GROUND?
  • 3. 3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME Adopting advanced data protection tools leads to reduced data loss 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data 62% of respondents said at least one of the following: big data, hybrid cloud, mobile devices, is ‘difficult’ or ‘very difficult’ to protect
  • 4. 4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DEMOGRAPHICS INTERVIEWED 3,300 IT DECISION-MAKERS IN 3 REGIONS: Americas (575) Asia Pacific Japan (1,250) Europe, Middle East, and Africa (1,475) 24 COUNTRIES TOTAL ORGANIZATIONS OF 250 OR MORE EMPLOYEES BOTH PRIVATE AND PUBLIC ORGANIZATIONS INDEPENDENT RESEARCH AND ANALYSIS
  • 5. 5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DATA PROTECTION MATURITY
  • 6. 6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. MATURITY INDEX * Exact scoring included in appendix – questions show points used for the original model with a maximum score of 68. All scores multiplied by a factor of 1.47 to create a model of 100 points Maturity scored between 1–100 points* Points awarded based on the maturity of their data protection strategy More points awarded for: • Shorter recovery times • Confidence in backup infrastructure • Modern backup systems • Off-site replication
  • 7. 7© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.  Leaders (scored 76-100 points)  Adopters (scored 51-75 points) WHO IS LEADING THE WAY? Figure 1: Analysis of maturity Base: all respondents (3,300) AHEAD OF ‘MATURITY’ CURVE  Evaluators (scored 26-50 points)  Laggards (scored 1-25 points) Global Results Americas Results Figure 2: Analysis of maturity Base: all respondents from Americas (575) 35.0% 50.4% 13.2% 1.4% Laggards Evaluators Adopters Leaders 36.8% 49.5% 11.3% 2.4% Laggards Evaluators Adopters Leaders
  • 8. 8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Figure 3: Analysis of maturity – showing frequency of points scored Base: all respondents (3300) AHEAD OF THE CURVE NUMBEROFCOMPANIESGLOBAL IT MATURITY SHOWING FREQUENCY OF POINTS SCORED 0 100 200 300 400 500 600 700 MATURITY POINTS SCORED 25 50 75 100 Laggards 37% (1,214 Companies) Evaluators 50% (1,635 Companies) Adopters 11% (372 Companies) Leaders 2% (79 Companies) AMERICAS
  • 9. 9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. PROFILE CHARACTERISTICS LEADERS LAGGARDS ADOPTERS EVALUATORS Use archiving application with offsite replication Back up with deduplication & offsite replication Recovery time 2 – 5 hours Moderately confident of ability to restore Active-active instances are core component of strategy Archive to tape Backup to tape Recovery time more than one day Not confident in ability to restore Backup is core component of strategy Use archiving application with retention policies Disaster tolerant replication with near-zero RPO/RTO Recovery time one hour or less Very confident of ability to restore Standby or virtualized servers are core component of strategy Archive to disk Backup to disk Recovery time 6 – 24 hours Doubtful of ability to restore Replication is core component of strategy
  • 10. 10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHERE ARE THE MOST MATURE ORGANIZATIONS? Figure 4: Analysis of average maturity score by region and country Base: all respondents (3300) AMERICAS: 33.7 EMEA: 32.2 APJ: 34.7 AVERAGE SCORE ON THE MATURITY MATRIX 37.6 34.3 31.0 29.1 37.8 35.6 34.8 33.5 31.8 31.5 31.0 30.9 27.3 27.0 42.5 41.7 39.1 37.8 36.6 32.9 30.7 29.5 29.5 26.9
  • 11. 11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • Businesses in China and Hong Kong most likely to be ahead of the curve • Outside of Asia, the US and the Netherlands most likely to be ahead of the curve • UAE, Turkey and Switzerland are least likely to be ahead of maturity curve MATURITY RANK WHICH MARKETS ARE AHEAD? RANK COUNTRY % OF BUSINESSES AHEAD OF MATURITY CURVE* 1 China 29.6% 2 Hong Kong 27.2% 3 Netherlands 20.8% 4 Singapore 20.0% 5 USA 19.5% 6 India 19.2% 7 South Africa 18.4% 8 Indonesia 18.4% 9 Mexico 17.6% 10 Germany 15.5% 11 Australia 14.4% 12 UK 13.0% 13 The Philippines 11.2% 14 Thailand 11.2% 15 Canada 9.6% 16 Russia 9.6% 17 Italy 9.6% 18 Brazil 8.8% 19 Japan 8.0% 20 South Korea 8.0% 21 France 6.5% 22 Switzerland 6.4% 23 Turkey 5.6% 24 UAE 0.0% *Please note that the percentages have been rounded to one decimal place
  • 12. 12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. THE IMPORTANCE OF DATA PROTECTION
  • 13. 13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • The majority (71%) of respondents consider data protection to be totally critical to their organization’s success • Most likely to consider data protection to be totally critical: – Brazil (82%) – US (80%) • The consulting sector is most likely to see data protection as totally critical (83%) THE CRITICALITY OF DATA PROTECTION Figure 5: “Do you consider data protection to be totally critical to the ongoing success of your organization?” Base: all respondents (575) DO YOU CONSIDER DATA PROTECTION CRITICAL TO THE SUCCESS OF YOUR ORGANIZATION? 71% 23% 5% 1% Very Important But Not Critical Totally critical Plays no role in our success Not very important
  • 14. 14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. SPENDING ON DATA PROTECTION • Average company spend: – $254 million on IT – $21 million on data protection, an average of 8.16% of annual IT budget • The US spends the most: – $32 million on data protection – 8.91% of IT budget on data protection Figure 6: Analysis of average spend of revenue on IT, and of IT budget on data protection Base: all respondents (575) Average percentage of annual IT budget that is spent on data protection 8.16% Average percentage of domestic annual revenue that is spent annually on IT 9.67%
  • 15. 15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Figure 7: “Is your data protection infrastructure built on technology from more than one vendor?” Base: all respondents (575) • 67% have more than one data protection vendor – Three vendors on average • 79% from the financial services sector have more than one vendor • Organizations with more than 5,000 employees are most likely to have multiple vendors (73%) THE NUMBER OF DATA PROTECTION VENDORS 10% Have no specific vendor 23% Have one vendor 67% Have more than one vendor
  • 16. 16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • Organizations with three or more vendors spend a greater proportion of their IT budget on data protection • In Americas, those with three or more vendors spend10.18%, compared to 7.49% with one vendor THE EFFECT OF NUMBER OF VENDORS ON SPEND Figure 8: Analysis of average spend of IT budget on data protection, cut by number of data protection vendors Base: all respondents (575) SHARE OF ANNUAL IT BUDGET SPENT ON DATA PROTECTION 10.18% Three or more data protection vendors 7.49% One data protection vendor 6.96% Two data protection vendors
  • 17. 17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 64% suffered disruption in the last 12 months – 79% of consulting – 78% of private healthcare – 71% of public sector • Organizations in Americas are more likely to suffered downtime (51%) than those in EMEA (48%) or APJ (49%) • 72% of organizations in the USA suffered disruptions, compared with 59% in Brazil and 56% in Mexico SUFFERING DISRUPTIONS Figure 9: “Has your organization suffered from either unplanned systems downtime or data loss in the last 12 months?” Base: all respondents (575) DISRUPTIONS SUFFERED IN LAST 12 MONTHS 64% Suffered data loss or unplanned downtime 51% Suffered unplanned downtime 31% Suffered data loss 19% Suffered data loss and downtime
  • 18. 18© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • The more vendors a business has, the more likely it is to experience data loss • 39% of organizations with three or more vendors experienced data loss in the last 12 months THE EFFECT OF THE NUMBER OF VENDORS ON DISRUPTIONS Figure 10: Analysis of the organizations suffering disruptions, cut by the number of data protection vendors Base: all respondents (575) DISRUPTIONS SUFFERED (BY NUMBER OF VENDORS) 39% 21% 30% Three or more data protection vendors One data protection vendor Two data protection vendors Data loss
  • 19. 19© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • Average annual loss per company is 3.65TB of data – Equivalent to around 37 million e- mails – Costs $1.32 million • Businesses with one vendor lost 1.29TB compared to 5.75TB for those with 3 or more vendors DATA LOSS Figure 11: Analysis of the average data loss over the last 12 months, cut by number of data protection vendors Base: respondents whose organization has suffered data loss (181) AVERAGE DATA LOSS IN TERABYTES (TB) 1.98 3.65 Three or more data protection vendors One data protection vendor Two data protection vendors 5.75 1.29 2.58 No external data protection vendors Total
  • 20. 20© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • There were 26 hours of unplanned downtime on average in the last 12 months, at a loss of $0.56 million • Those with three or more vendors lost $0.69 million compared to organizations with one vendor ($0.33 million) WHAT IS THE COST OF DOWNTIME? Figure 12: Analysis of the average cost of downtime, cut by number of data protection vendors Base: respondents whose organization has suffered downtime (296) AVERAGE COST OF UNPLANNED SYSTEMS DOWNTIME (IN MILLIONS OF DOLLARS) $0.22 $0.56 Three or more data protection vendors One data protection vendor Two data protection vendors $0.69 $0.33 $0.56 No external data protection vendors Total
  • 21. 21© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. ESTIMATEDANNUALCOST FOR DISRUPTIONS Downtime $83.1 Billion Data loss $238.5 Billion $321.6 BILLION TOTAL
  • 22. 22© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. PERCENTAGE OF DATA BACKED UP CONTINUOUSLY BY BUSINESSES • 30% of data is backed up continuously • Around one fifth (21%) of organizations do not back up anything continuously • 94% of those “ahead of the curve” back up some data continuously, while only 73% of Laggards do so FREQUENCY OF CONTINUOUS BACKUP Figure 13: Analysis of those that backup data continuously Base: all respondents (575) 0% of data backed up continuously 1% - 25% of data backed up continuously 25% - 50% of data backed up continuously 50%- 75% of data backed up continuously 75% - 99% of data backed up continuously 100% of data backed up continuously 21% 39% 22% 6% 3%8%
  • 23. 23© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHAT IS CAUSING THESE DISRUPTIONS? Figure 14: “What were the causes of your data loss and/or systems downtime?” Base: respondents whose organization suffered data loss or downtime (370) 52% 44% 34% 27% 24% 23% 19% 12% 11% 11% 5% Hardware failure Loss of power Software failure Data corruption Accidental user error Security breach (e.g. malware, spyware, viruses, botnets or cyber-terrorism) Loss of backup power Physical security (e.g. loss/theft of equipment) The fault of service/cloud providers Natural disaster (e.g. tsunami, hurricane, earthquake) Deliberate employee sabotage
  • 24. 24© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. THE CONSEQUENCES OF DISRUPTION Figure 15: “Have any of the above been commercial consequences of the data loss and/or systems downtime you have experienced over the last 12 months?” Base: respondents whose organization suffered data loss or downtime (370) 50% 34% 33% 25% 25% 16% 13% 11% 10% 8% 5% Loss of employee productivity Delay in product/service development Loss of revenue Loss of customer confidence/loyalty Delay in getting products/services to market Loss of a new business opportunity Loss of customers Loss of an incremental business opportunity Loss of business to a competitor Loss of repeat business There have been no commercial consequences
  • 25. 25© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 63% are not fully confident that they can recover systems/data today from all platforms • Americas are more confident than EMEA (27%) or APJ (27%) • Only 27% from the public sector are very confident. The IT sector is most confident (44%) ARE ORGANIZATIONS CONFIDENT? Figure 16: “How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on-premise and off-premise, in order to meet business service level agreements?” Base: all respondents (575) Used for maturity matrix Very confident 37% Not very confident 63%
  • 26. 26© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DATA PROTECTION METHODS
  • 27. 27© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 47% use backup as the primary protection strategy • 7% use active-active as a key component; less than those from EMEA (10%) or APJ (9%) • Those with active-active as a key component suffered less data loss than those with backup – 19% active-active vs. 30% backup WHAT STRATEGIES ARE IN PLACE? Figure 17: “Which of the above best characterises your organization's current data protection environment infrastructure?” Base: all respondents (575) Used for maturity matrix 7% 12% 14% 19% 47% Active-active instances of applications (including cloud) are key component of our availability strategy Replication is the main component of our availability strategy Standby servers on a remote site are the main components of our availability strategy Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy Backup is the main component of our availability strategy
  • 28. 28© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHAT OTHER STRATEGIES ARE IN PLACE? THERE IS NO CONSENSUS ON THE TECHNOLOGY IN PLACE FOR AVAILABILITY, ALTHOUGH AN AVERAGE OF THREE STRATEGIES SHOWS A VARIED APPROACH ACROSS ALL ORGANIZATIONS Figure 18: “Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data?” Base: all respondents (575) Used for maturity matrix 42% 38% 34% 28% 26% 26% 24% 22% 16% 15% 10% Automatic backup to the cloud Tape backup and tapes are kept off site (on own premises) Disk-based backup and recovery including clones/snaps Replication of both applications and data (such as virtual machine images) Tape backup and tapes are kept off site (on 3rd party premises) WAN-based replication of backup and recovery images to second site Backup appliance with deduplication Replication to a second site with restart capabilities (active/passive) Tape backup and tapes go home with employees Dynamic mobility of virtual applications between data centres Disaster tolerant replication (active/active) with near zero RPO and RTO STRATEGIES TO HELP MANAGE AVAILABILITY OF APPLICATIONS, SYSTEMS & DATA
  • 29. 29© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. DESIRE TO HAVE VISIBILITY/CONTROL OVER DATA PROTECTION (ON-PREMISE & IN CLOUD) WHO IS IN CHARGE OF THE CLOUD? RESPONSIBILITY FOR DATA PROTECTION FOR PUBLIC CLOUD-BASED APPLICATIONS Figure 19: “For public cloud based applications, which organizations are responsible for data protection?” Base: respondents whose organization is using a type of cloud as a platform for infrastructure (339) Figure 20: “Do you want to have visibility and/or control over how your data is being protected both on-premise and in the cloud?” Base: respondents whose organization is using a type of cloud as a platform for infrastructure (339) 72% 61% 18% My IT department as a whole The cloud service provider Each department in my organization, dependent on their use of the application in question 70% 51% 4% Yes – I want to have to visibility of how the organization's on-premise and off-premise data is being protected Yes - I want to have to control of how the organization's on-premise and off-premise data is being protected No – I only want to manage my local data; the cloud service provider should manage off- premise data
  • 30. 30© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHERE IS DATA STORED? PRIMARY DATA Figure 21: Analysis of average amount of primary data on different platforms Base: all respondents (575) 37% 19% 18% 7% 7% 6% 5% 2% On-premise (physical servers) On-premise (virtualized servers) On-premise (private cloud) Desktop/laptop Hybrid cloud (applications run on a combination of private and public clouds) Mainframe Public cloud Mobile devices (e.g. tablets, smartphones etc.)
  • 31. 31© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. WHAT IS HARDEST TO PROTECT? MAJORITY DO NOT HAVE DISASTER RECOVERY PLAN FOR SOME APPLICATIONS THAT THEY FIND HARDEST TO PROTECT MOST DIFFICULT APPLICATIONS/PLATFORMS TO PROTECT APPLICATIONS/PLATFORMS WITHOUT A RECOVERY PLAN Figure 22: Analysis of applications/platforms that do not have disaster recovery plans Base: all respondents (575) Figure 23: Analysis of applications/platforms that are difficult to protect Base: all respondents (575) 69% 76% 77% Big data/data lakes Mobile devices Hybrid cloud applications 26% 32% 37% Hybrid cloud applications Mobile devices Big data
  • 32. 32© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. • 59% currently use backup-as a service; further 28% plan to in the future • 44% plan to use archive-as-a- service and 42% plan to use data recovery-as-a-service in the future FUTURE STRATEGIES Figure 24: “Are you currently, using or looking to adopt, any of the above data protection cloud services in the next 12 months?” Base: all respondents (575) DATA PROTECTION CLOUD SERVICES 59% 38% 41% 28% 44% 42% Backup-as-a-Service Archive-as-a-Service Data recovery-as-a-Service Currently using Plan to adopt at some point
  • 33. 33© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. SUMMARY FOR AMERICAS 71% consider data protection to be totally critical to their organization’s success, still 64% suffered downtime or data loss in last 12 months More data protection vendors means organizations are more likely to suffer data loss 85% of businesses are behind the curve for data protection maturity and 63% of businesses are not fully confident in their ability to restore apps/data ENTERPRISES ARE LOSING AS MUCH AS $321.6 BILLION THROUGH DATA LOSS AND UNPLANNED DOWNTIME
  • 34. 34© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. CONCLUSION Data loss and downtime are expensive Most companies globally are behind the curve and feeling pain Newer workloads and exploding data volumes will continue to put pressure on data protection This can’t be fixed in silos – isolated solutions by different vendors increase cost and risk A continuum of technologies supports availability and protection requirements for different tiers of apps/data
  • 35. 35© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC RECOMMENDATIONS Match your data protection approach with the availability and protection requirements for your tiers of applications/data Evaluate the gaps in your protection strategy that may emerge from disparate vendor solutions Manage an integrated data protection strategy and maintain a level of visibility and control for application owners Understand who “owns” data protection – especially in the cloud Make sure there’s an appropriate data protection solution in place for all of your critical data no matter where it is or how it is generated
  • 36. 36© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. APPENDIX (i) MATURITY SCORING Which of the following best characterises your organization's current data protection environment infrastructure? • Backup is the main component of our availability strategy – (1pt.) • Replication is the main component of our availability strategy – (3pts.) • Standby servers on a remote site are the main components of our availability strategy – (4pts.) • Virtual servers with restart capabilities (including cloud) are the main components of our availability strategy - (5pts.) • Active-active (two or more production data centres that are always on, 24/7 with no downtime) instances of applications (including cloud) are key component of our availability strategy – (6pts.) What best describes your organization's archiving strategy? • We don’t have an archiving strategy – (0pt.) • We use a backup application to archive data onto tape – (1pt.) • We use an archiving application to archive data online (e.g. onto disk) – (3pts.) • We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. – (5pts.) • We use an archiving application to archive data to appliances that provide retention locking, litigation hold etc. and replicate/keep a copy off site - (7pts.)
  • 37. 37© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. APPENDIX (ii) MATURITY SCORING • Tape backup and tapes go home with employees – (1pt.) • Tape backup and tapes are kept off site (on own premises) – (2pts.) • Tape backup and tapes are kept off site (on 3rd party premises) – (2pts.) • Automatic backup to the Cloud (2pts.) • Disk-based backup and recovery including clones/snaps – (3pts.) • Backup appliance with deduplication – (4pts.) • WAN-based replication of backup and recovery images to second site – (4pts.) • Replication of both applications and data (such as virtual machine images) – (5pts.) • Replication to a second site with restart capabilities (active/passive) – (5pts.) • Dynamic mobility of virtual applications between data centres – (7pts.) • Disaster tolerant replication (active/active) with near zero RPO and RTO – (8pts.) Which technologies/strategies are in place to help you manage the availability of your applications, systems, and data? (Please select all that apply)
  • 38. 38© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. APPENDIX (iii) MATURITY SCORING During an unexpected event causing downtime to our most critical applications, how long is your recovery time? • Our recovery time is more than one working day (please specify) – (0pt.) • Our recovery time is 12 - 24hours – (1pt.) • Our recovery time is 6 -12 hours (2pts) • Our recovery time is 3 – 6 hours (3pts) • Our recovery time is 2 – 3 hours (4pts) • Our recovery time is 1 – 2 hours – (5pts.) • Our recovery time is less than an hour– (6pts.) • Our recovery time is zero – (7pts.) • I do not know – (0pt.) How confident are you that, in the event of a data loss incident, you can fully recover systems/data today from all platforms, on premise and off premise, in order to meet business service level agreements? • Very confident – (6pts.) • Moderately confident – (4pts.) • Some doubt – (3pts.) • Not very confident – (1pts.) • Not at all confident – (0pts.)