SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
THE DATABERG REPORT:
SEE WHAT
OTHERS DON’T
IDENTIFY THE VALUE, RISK
AND COST OF YOUR DATA
02	 SEE WHAT OTHERS DON’T THE DATABERG REPORT
Covering 1,475 respondents across 14 countries,
this study, conducted for Veritas by research firm
Vanson Bourne, looks at how organisations across
Europe, Middle East and Africa store and manage
their data, highlighting attitudes and behaviors that
are fuelling the data explosion.
We are revealing exclusive
findings from one of the largest
independent research reports into
organisational data management.
1,475respondents countries
14
In order to manage for the Databerg Age, we need to
recognise that Databergs exist in every organisation
and are made up of three very different elements:
REDUNDANT, OBSOLETE
AND TRIVIAL, OR ROT DATA
DARK DATA, LURKING FAR
BENEATH THE LINE OF SIGHT
BUSINESS
CRITICAL DATA
A new and largely ignored set of risks are threatening
our organisations. The effects of today’s exploding data
volumes have gone overlooked by most business leaders.
They may be forgiven for this oversight. Previous leaders did not expect their
organisations to cope with data levels growing this fast. Such a data deluge
never previously existed.
We all need to pay close attention because the data deluge is not only set
to continue but to rapidly accelerate, with important consequences for
organisations whose behaviour is stuck in the pre-Databerg Age.
The Databerg concept helps explain how we have got here. Databergs are
caused by adding enormous ‘dark data’ volumes to poorly understood corporate
data. They conceal a threat ‘below the waterline’ that adds significant levels of
risk and cost to organisations. And this risk is rising.
EXECUTIVE SUMMARY
03	 SEE WHAT OTHERS DON’T THE DATABERG REPORT
DATABERGS ARE NOT ALL BAD.
WHEN THEY ARE WELL MANAGED,
BUSINESS CRITICAL DATA IS
SAFEGUARDED AND WASTE
IS MINIMISED. WE CAN ONLY
MANAGE WHAT WE SEE.
REDUNDANT, OBSOLETE
AND TRIVIAL, OR ROT DATA
BUSINESS
CRITICAL DATA
DARK DATA, LURKING FAR
BENEATH THE LINE OF SIGHT
54%
TAGGED OR
CLASSIFIED DATA
46%
32%
14%
The Databerg is the key concept to understand
why we are failing to deal with the new
phenomenon of data explosion. Databergs
contain all three types of data we store today:
BUSINESS CRITICAL DATA
This is data identified as vital to the on-going operational success
of our organisation. We need to protect and proactively manage
business critical data.
REDUNDANT, OBSOLETE AND TRIVIAL (ROT) DATA
This is data identified as Redundant, or duplicate, data, Obsolete,
no longer having business value, and Trivial data with little or no
business value for us. We need to proactively minimise ROT data
by securely deleting it on a regular basis.
DARK DATA
This is data whose value has not yet been identified. It may include
vital business critical data as well as useless ROT data. Either
way, it consumes resources. We need to explore and assign dark
data, as either ROT or business critical data, as soon as practical.
Most importantly, dark data may contain high risk non-compliant
data, leading to a critical and unseen business risk at the heart of
corporate IT systems.
04	 SEE WHAT OTHERS DON’T THE DATABERG REPORT
THE DATABERG
EXPLAINED
Even the $891bn figure may not tell the full story.
The direct costs consumed by Databergs in IT
resources and management time do not account for
the current and future investment cash which they
tie up and which could be better spent elsewhere.
In order to avoid spiralling future data management
costs and the risk of sweeping sanctions, we need to
take action. This means illuminating dark data, losing
the ROT which clogs our organisations and encouraging
our employees to proactively maintain and manage the
data which is vital to our modern organisations.
Few predicted growth in data volumes would one day
outstrip our ability to control it. Now, at last, it has.
It’s time for us to gain visibility, take action and
once again assume control.
In the most comprehensive study of its type, we have uncovered EMEA organisations
hold on average 54% dark data, 32% ROT and 14% of identifiable business critical
data. If left unchecked, this could equate to $891bn of avoidable storage and
management costs by 2020.
05	 SEE WHAT OTHERS DON’T THE DATABERG REPORT
ROT DATA ALONE COULD COST
ORGANISATIONS $891BN BY 2020
OUR EVERYDAY ATTITUDES TO
DATA AND OUR BEHAVIOUR AT THE
STRATEGIC, ORGANISATIONAL AND
EMPLOYEE LEVELS CAUSE THE DARK
DATA AND ROT LEVELS TO GROW.
These behaviours include:
1	Strategy and budgets based solely on data
volumes, not business value
2	Rapid adoption of cloud applications and
storage solutions under the false premise
that ‘storage is free’
3	Employees’ belief that corporate IT resources
are free to use, both for corporate and
personal use
06	 SEE WHAT OTHERS DON’T
Key: Dark data ROT data Clean data
HOW DARK IS
EMEA DATA?
The worst dark data offenders are
Germany, UK and South Africa with
respectively 66%, 59% and 58% of their
stored data defined as dark
Smaller countries such as Switzerland and
the Nordic region fare better on dark data
Redundant, Obsolete and Trivial ROT
data, was highest in Denmark (48%),
Netherlands (44%) and the United Arab
Emirate (43%)
The highest proportion of clean and
identified business critical data was
found in Israel (24% clean) and France
(22% clean)
Germany
UK
South Africa
Italy
France
Spain
Russia
UAE
Netherlands
Denmark
Sweden
Norway
Switzerland
Israel
0% 100%50%
THE DATABERG REPORT
EMEA’S DATA STATISTICS EMEA data types
So what causes the ROT and the dark data in our Databergs? In two words, Data Hoarding.
To understand the reasons for Data Hoarding, we need to understand the three underlying
attitudes which allow Databergs to grow daily as identified in the research.
1STRATEGIES BASED ON DATA
VOLUMES NOT BUSINESS VALUE
•	Basing our budgets and IT strategies on the
volume of data stored and processed, rather
than the data’s value, rewards bad behaviour.
•	Most of us operate like this today, even when
we know it makes no sense. Some organisations
are truly behind the pack.
•	Across EMEA almost 20% of respondents
said they currently do not or have no plans to
calculate the business value of their data.
•	This means they will spend more and more on
managing data which may, but most likely does
not have any business value.
•	In the worst case, it could be causing them to be
unknowingly non-compliant.
07	 SEE WHAT OTHERS DON’T
WHAT CAUSES
DATABERGS?
Key:
The right way:
More value =
more budget
The wrong way:
Larger volume =
more budget -36%
0
+19%
% differential between those costing
on volume rather than value
Russia
Spain
SouthAfrica
Italy
Germany
UK
France
Denmark
UAE
Switzerland
Netherlands
Israel
Norway
Sweden
THE DATABERG REPORT
2INCREASED RELIANCE ON ‘FREE’ STORAGE
AND THE ACCELERATION TO CLOUD
•	The ‘free storage’ myth is seductive. It makes us believe
we have no need to worry where our data resides while
we freely adopt cloud applications and storage.
•	A third more of us will move to the cloud in the next year.
•	This move is about cost. The top three reasons for moving
to the cloud are reducing costs on storage (56%), on
backup (52%) and on disaster recovery (45%).
•	But vendor lock-in is a real concern, with more than 50%
having no ability to change cloud providers in under
twelve months should any issues, including
rising costs, occur.
3GROWING DISREGARD FOR CORPORATE
DATA POLICIES BY EMPLOYEES
•	Our colleagues are treating corporate systems as
dumping grounds. They store unstructured data from
personal photos, stored by 57% of employees, to
personal ID and legal documents by 53%, as well as
music, games and videos, stored by 45%, 43% and
29% respectively.
•	This dark data is worrying especially when, in addition
to the 92% of respondents using Sync  Share
according to organisational policy, a majority, 62%,
also used non-sanctioned versions of these services.
THE DATABERG REPORT08	 SEE WHAT OTHERS DON’T
The 3 myths driving
data hoarding
ALL DATA
IS EQUAL
MORE DATA =
MORE VALUE
STORAGE
IS FREE
Top 3 reasons to move to the cloud
Reduced
storage cost
56%
52%
45%
Backup Disaster
recovery
57%
Photos
53%
PersonalID
legaldocs
45%
Music
43%
Games
29%
Videos
TAKE CONTROL OF
THE DATABERG
THE DATABERG REPORT
Dealing with Data Hoarding means addressing the issues the
research uncovered.
•	Firstly, allocating IT budgets and building strategies based on a belief data
can be allowed to grow uncontrollably is a strategic error.
•	If we let this happen, our IT investments will be used merely to ‘Keep The
Lights On’, storing and processing ROT data and increasingly starving our
organisations of strategic resources.
•	Secondly, the notion of ‘free storage’, both from Sync  Share services and
the storage bundled with cloud applications is false. It is neither truly free of
cost nor limitless.
•	In fact the ‘free storage’ myth means dark data is still growing but is just
further away from the line of sight of management teams adding significant
compliance risks.
•	Lastly, the research shows how co-mingling of corporate and personal data
across the surveyed organisations’ networks and systems grows Databergs
dangerously.
•	Allowing employees more and more ways to extract and indeed upload data is
a failure of control especially at the time European legislators are gunning for
more control over data privacy. This needs to be addressed urgently.
9	 SEE WHAT OTHERS DON’T
HOW DO WE MANAGE
THE DATABERG?
1	Protect and make business
critical data safely available
2	Eliminate ROT promptly to
reduce waste
3	Illuminate dark data to speed
up above processes
At Veritas, our mission is to help organisations harness the
power of their information, wherever it resides, by driving
availability and revealing insights.
www.veritas.com
In addition to the Dark Data Assessment which offers
guidance on illuminating dark data and eliminating ROT,
Veritas offers a full range of Information Management
software including:
Veritas™ Data Insight	 
Veritas™ Information Map	 
Veritas™ Enterprise Vault	 
Veritas™ eDiscovery Platform	 
Veritas InfoScale	 
NetBackup	 
Resiliency Platform	 
HOW VERITAS CAN HELP
© 2015 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
10	 SEE WHAT OTHERS DON’T THE DATABERG REPORT
GAIN VISIBILITY
Identify your dark data, expose the risks and extract the value from
your information
TAKE ACTION
Make better business decisions to classify, retain or defensibly delete
your ROT data
ASSUME CONTROL
Define a workable information governance strategy, sponsored at
C-Level, to encourage compliant user behaviour and reduce risk
3
1
2

Weitere ähnliche Inhalte

Was ist angesagt?

Understanding Dark Data
Understanding Dark DataUnderstanding Dark Data
Understanding Dark Data
Ahmed Banafa
 
Achieving roi from content management
Achieving roi from content managementAchieving roi from content management
Achieving roi from content management
Peter Hickey
 
IBM Technology Day 2013 BigData Salle Rome
IBM Technology Day 2013 BigData Salle RomeIBM Technology Day 2013 BigData Salle Rome
IBM Technology Day 2013 BigData Salle Rome
IBM Switzerland
 
White_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copyWhite_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copy
Tania Mushtaq
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres
- Chris - Henry -
 

Was ist angesagt? (20)

Big Data Management: Work Smarter Not Harder
Big Data Management: Work Smarter Not HarderBig Data Management: Work Smarter Not Harder
Big Data Management: Work Smarter Not Harder
 
Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation Readiness
 
Management information system
Management information systemManagement information system
Management information system
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
 
Understanding Dark Data
Understanding Dark DataUnderstanding Dark Data
Understanding Dark Data
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...
Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...
Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...
 
Corporate Information Management: Core Concepts & Best Practices
Corporate Information Management: Core Concepts & Best PracticesCorporate Information Management: Core Concepts & Best Practices
Corporate Information Management: Core Concepts & Best Practices
 
Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020
 
Achieving roi from content management
Achieving roi from content managementAchieving roi from content management
Achieving roi from content management
 
DRIVERS AND IMPEDIMENTS TO DIGITAL TRANSFORMATION - THE RESEARCH
DRIVERS AND IMPEDIMENTS TO DIGITAL TRANSFORMATION - THE RESEARCHDRIVERS AND IMPEDIMENTS TO DIGITAL TRANSFORMATION - THE RESEARCH
DRIVERS AND IMPEDIMENTS TO DIGITAL TRANSFORMATION - THE RESEARCH
 
GDPR Compliance: The challenge for HR and how Cezanne HR helps
GDPR Compliance: The challenge for HR and how Cezanne HR helpsGDPR Compliance: The challenge for HR and how Cezanne HR helps
GDPR Compliance: The challenge for HR and how Cezanne HR helps
 
IBM Technology Day 2013 BigData Salle Rome
IBM Technology Day 2013 BigData Salle RomeIBM Technology Day 2013 BigData Salle Rome
IBM Technology Day 2013 BigData Salle Rome
 
White_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copyWhite_Paper_Beyond_Visualisation copy
White_Paper_Beyond_Visualisation copy
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres
 
Odgers Berndtson and Unico Big Data White Paper
Odgers Berndtson and Unico Big Data White PaperOdgers Berndtson and Unico Big Data White Paper
Odgers Berndtson and Unico Big Data White Paper
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Digital Transformation and Application Decommissioning - THE RESEARCH
Digital Transformation and Application Decommissioning - THE RESEARCHDigital Transformation and Application Decommissioning - THE RESEARCH
Digital Transformation and Application Decommissioning - THE RESEARCH
 

Andere mochten auch

Threat report 2015_v1
Threat report 2015_v1Threat report 2015_v1
Threat report 2015_v1
at MicroFocus Italy ❖✔
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 
Chelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlanChelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlan
chelsea tropper
 
Tara J Walshe CV
Tara J Walshe CVTara J Walshe CV
Tara J Walshe CV
Tara walsh
 

Andere mochten auch (17)

Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
 
Threat report 2015_v1
Threat report 2015_v1Threat report 2015_v1
Threat report 2015_v1
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Chelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlanChelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlan
 
Ict Security per le nuove esigenze di business
Ict Security per le nuove esigenze di businessIct Security per le nuove esigenze di business
Ict Security per le nuove esigenze di business
 
Hp secure file
Hp secure fileHp secure file
Hp secure file
 
Artechange
ArtechangeArtechange
Artechange
 
Hp SecureData
Hp SecureDataHp SecureData
Hp SecureData
 
Tara J Walshe CV
Tara J Walshe CVTara J Walshe CV
Tara J Walshe CV
 
Soluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hpSoluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hp
 
Privacy e recupero crediti il vademecum
Privacy e recupero crediti   il vademecumPrivacy e recupero crediti   il vademecum
Privacy e recupero crediti il vademecum
 
Activité Espace de Fabrication Numérique - rentrée 2016
Activité Espace de Fabrication Numérique - rentrée 2016Activité Espace de Fabrication Numérique - rentrée 2016
Activité Espace de Fabrication Numérique - rentrée 2016
 
Reportec hp atalla soluzioni enterprise per la protezione dei dati sensibili
Reportec   hp atalla soluzioni enterprise per la protezione dei dati sensibiliReportec   hp atalla soluzioni enterprise per la protezione dei dati sensibili
Reportec hp atalla soluzioni enterprise per la protezione dei dati sensibili
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
愛,是唯一的添加 - 鮮乳坊
愛,是唯一的添加 - 鮮乳坊愛,是唯一的添加 - 鮮乳坊
愛,是唯一的添加 - 鮮乳坊
 
Logo_print
Logo_printLogo_print
Logo_print
 
Omkar mulje
Omkar muljeOmkar mulje
Omkar mulje
 

Ähnlich wie THE DATABERG REPORT SEE WHAT OTHERS DON’T

Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Data
ijtsrd
 
Group 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxGroup 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptx
NATASHABANO
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidence
IBM Software India
 

Ähnlich wie THE DATABERG REPORT SEE WHAT OTHERS DON’T (20)

Building an Effective Data Management Strategy
Building an Effective Data Management StrategyBuilding an Effective Data Management Strategy
Building an Effective Data Management Strategy
 
Veritas corporate brochure emea
Veritas corporate brochure emeaVeritas corporate brochure emea
Veritas corporate brochure emea
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Using a Data Lake at the core of a Life Assurance business
Using a Data Lake at the core of a Life Assurance businessUsing a Data Lake at the core of a Life Assurance business
Using a Data Lake at the core of a Life Assurance business
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...
 
The state-of-dark-data-report
The state-of-dark-data-reportThe state-of-dark-data-report
The state-of-dark-data-report
 
Digital Catapult's Innovation Optimism Index
Digital Catapult's Innovation Optimism IndexDigital Catapult's Innovation Optimism Index
Digital Catapult's Innovation Optimism Index
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
Extract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark DataExtract the Analyzed Information from Dark Data
Extract the Analyzed Information from Dark Data
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Group 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptxGroup 2 Handling and Processing of big data (1).pptx
Group 2 Handling and Processing of big data (1).pptx
 
Understanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidenceUnderstanding Big Data so you can act with confidence
Understanding Big Data so you can act with confidence
 
Slides: Empowering Data Consumers to Deliver Business Value
Slides: Empowering Data Consumers to Deliver Business ValueSlides: Empowering Data Consumers to Deliver Business Value
Slides: Empowering Data Consumers to Deliver Business Value
 
Data-Analytics-Resource-updated for analysis
Data-Analytics-Resource-updated for analysisData-Analytics-Resource-updated for analysis
Data-Analytics-Resource-updated for analysis
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex Pongpech
 
The state of data in 2015
The state of data in 2015The state of data in 2015
The state of data in 2015
 
Not Waving but Drowning - The State of Data in 2015
Not Waving but Drowning - The State of Data in 2015Not Waving but Drowning - The State of Data in 2015
Not Waving but Drowning - The State of Data in 2015
 
Not waving-but-drowning
Not waving-but-drowningNot waving-but-drowning
Not waving-but-drowning
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 

Mehr von at MicroFocus Italy ❖✔

Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
at MicroFocus Italy ❖✔
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
at MicroFocus Italy ❖✔
 
Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
at MicroFocus Italy ❖✔
 
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiSicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
at MicroFocus Italy ❖✔
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
at MicroFocus Italy ❖✔
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 

Mehr von at MicroFocus Italy ❖✔ (20)

Bper services Case Study Application Delivery Management
Bper services Case Study Application Delivery ManagementBper services Case Study Application Delivery Management
Bper services Case Study Application Delivery Management
 
Configuration Management in a Multi-Cloud Era
Configuration Management in a Multi-Cloud EraConfiguration Management in a Multi-Cloud Era
Configuration Management in a Multi-Cloud Era
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economy
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformation
 
HPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailHPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMail
 
Chationary
ChationaryChationary
Chationary
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
 
HPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 DecemberHPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 December
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
 
Mobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsMobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectations
 
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiSicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Soluzioni per proteggere i dati nel cloud
Soluzioni per proteggere i dati nel cloudSoluzioni per proteggere i dati nel cloud
Soluzioni per proteggere i dati nel cloud
 

Kürzlich hochgeladen

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 

Kürzlich hochgeladen (20)

%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 

THE DATABERG REPORT SEE WHAT OTHERS DON’T

  • 1. THE DATABERG REPORT: SEE WHAT OTHERS DON’T IDENTIFY THE VALUE, RISK AND COST OF YOUR DATA
  • 2. 02 SEE WHAT OTHERS DON’T THE DATABERG REPORT Covering 1,475 respondents across 14 countries, this study, conducted for Veritas by research firm Vanson Bourne, looks at how organisations across Europe, Middle East and Africa store and manage their data, highlighting attitudes and behaviors that are fuelling the data explosion. We are revealing exclusive findings from one of the largest independent research reports into organisational data management. 1,475respondents countries 14
  • 3. In order to manage for the Databerg Age, we need to recognise that Databergs exist in every organisation and are made up of three very different elements: REDUNDANT, OBSOLETE AND TRIVIAL, OR ROT DATA DARK DATA, LURKING FAR BENEATH THE LINE OF SIGHT BUSINESS CRITICAL DATA A new and largely ignored set of risks are threatening our organisations. The effects of today’s exploding data volumes have gone overlooked by most business leaders. They may be forgiven for this oversight. Previous leaders did not expect their organisations to cope with data levels growing this fast. Such a data deluge never previously existed. We all need to pay close attention because the data deluge is not only set to continue but to rapidly accelerate, with important consequences for organisations whose behaviour is stuck in the pre-Databerg Age. The Databerg concept helps explain how we have got here. Databergs are caused by adding enormous ‘dark data’ volumes to poorly understood corporate data. They conceal a threat ‘below the waterline’ that adds significant levels of risk and cost to organisations. And this risk is rising. EXECUTIVE SUMMARY 03 SEE WHAT OTHERS DON’T THE DATABERG REPORT DATABERGS ARE NOT ALL BAD. WHEN THEY ARE WELL MANAGED, BUSINESS CRITICAL DATA IS SAFEGUARDED AND WASTE IS MINIMISED. WE CAN ONLY MANAGE WHAT WE SEE.
  • 4. REDUNDANT, OBSOLETE AND TRIVIAL, OR ROT DATA BUSINESS CRITICAL DATA DARK DATA, LURKING FAR BENEATH THE LINE OF SIGHT 54% TAGGED OR CLASSIFIED DATA 46% 32% 14% The Databerg is the key concept to understand why we are failing to deal with the new phenomenon of data explosion. Databergs contain all three types of data we store today: BUSINESS CRITICAL DATA This is data identified as vital to the on-going operational success of our organisation. We need to protect and proactively manage business critical data. REDUNDANT, OBSOLETE AND TRIVIAL (ROT) DATA This is data identified as Redundant, or duplicate, data, Obsolete, no longer having business value, and Trivial data with little or no business value for us. We need to proactively minimise ROT data by securely deleting it on a regular basis. DARK DATA This is data whose value has not yet been identified. It may include vital business critical data as well as useless ROT data. Either way, it consumes resources. We need to explore and assign dark data, as either ROT or business critical data, as soon as practical. Most importantly, dark data may contain high risk non-compliant data, leading to a critical and unseen business risk at the heart of corporate IT systems. 04 SEE WHAT OTHERS DON’T THE DATABERG REPORT THE DATABERG EXPLAINED
  • 5. Even the $891bn figure may not tell the full story. The direct costs consumed by Databergs in IT resources and management time do not account for the current and future investment cash which they tie up and which could be better spent elsewhere. In order to avoid spiralling future data management costs and the risk of sweeping sanctions, we need to take action. This means illuminating dark data, losing the ROT which clogs our organisations and encouraging our employees to proactively maintain and manage the data which is vital to our modern organisations. Few predicted growth in data volumes would one day outstrip our ability to control it. Now, at last, it has. It’s time for us to gain visibility, take action and once again assume control. In the most comprehensive study of its type, we have uncovered EMEA organisations hold on average 54% dark data, 32% ROT and 14% of identifiable business critical data. If left unchecked, this could equate to $891bn of avoidable storage and management costs by 2020. 05 SEE WHAT OTHERS DON’T THE DATABERG REPORT ROT DATA ALONE COULD COST ORGANISATIONS $891BN BY 2020 OUR EVERYDAY ATTITUDES TO DATA AND OUR BEHAVIOUR AT THE STRATEGIC, ORGANISATIONAL AND EMPLOYEE LEVELS CAUSE THE DARK DATA AND ROT LEVELS TO GROW. These behaviours include: 1 Strategy and budgets based solely on data volumes, not business value 2 Rapid adoption of cloud applications and storage solutions under the false premise that ‘storage is free’ 3 Employees’ belief that corporate IT resources are free to use, both for corporate and personal use
  • 6. 06 SEE WHAT OTHERS DON’T Key: Dark data ROT data Clean data HOW DARK IS EMEA DATA? The worst dark data offenders are Germany, UK and South Africa with respectively 66%, 59% and 58% of their stored data defined as dark Smaller countries such as Switzerland and the Nordic region fare better on dark data Redundant, Obsolete and Trivial ROT data, was highest in Denmark (48%), Netherlands (44%) and the United Arab Emirate (43%) The highest proportion of clean and identified business critical data was found in Israel (24% clean) and France (22% clean) Germany UK South Africa Italy France Spain Russia UAE Netherlands Denmark Sweden Norway Switzerland Israel 0% 100%50% THE DATABERG REPORT EMEA’S DATA STATISTICS EMEA data types
  • 7. So what causes the ROT and the dark data in our Databergs? In two words, Data Hoarding. To understand the reasons for Data Hoarding, we need to understand the three underlying attitudes which allow Databergs to grow daily as identified in the research. 1STRATEGIES BASED ON DATA VOLUMES NOT BUSINESS VALUE • Basing our budgets and IT strategies on the volume of data stored and processed, rather than the data’s value, rewards bad behaviour. • Most of us operate like this today, even when we know it makes no sense. Some organisations are truly behind the pack. • Across EMEA almost 20% of respondents said they currently do not or have no plans to calculate the business value of their data. • This means they will spend more and more on managing data which may, but most likely does not have any business value. • In the worst case, it could be causing them to be unknowingly non-compliant. 07 SEE WHAT OTHERS DON’T WHAT CAUSES DATABERGS? Key: The right way: More value = more budget The wrong way: Larger volume = more budget -36% 0 +19% % differential between those costing on volume rather than value Russia Spain SouthAfrica Italy Germany UK France Denmark UAE Switzerland Netherlands Israel Norway Sweden THE DATABERG REPORT
  • 8. 2INCREASED RELIANCE ON ‘FREE’ STORAGE AND THE ACCELERATION TO CLOUD • The ‘free storage’ myth is seductive. It makes us believe we have no need to worry where our data resides while we freely adopt cloud applications and storage. • A third more of us will move to the cloud in the next year. • This move is about cost. The top three reasons for moving to the cloud are reducing costs on storage (56%), on backup (52%) and on disaster recovery (45%). • But vendor lock-in is a real concern, with more than 50% having no ability to change cloud providers in under twelve months should any issues, including rising costs, occur. 3GROWING DISREGARD FOR CORPORATE DATA POLICIES BY EMPLOYEES • Our colleagues are treating corporate systems as dumping grounds. They store unstructured data from personal photos, stored by 57% of employees, to personal ID and legal documents by 53%, as well as music, games and videos, stored by 45%, 43% and 29% respectively. • This dark data is worrying especially when, in addition to the 92% of respondents using Sync Share according to organisational policy, a majority, 62%, also used non-sanctioned versions of these services. THE DATABERG REPORT08 SEE WHAT OTHERS DON’T The 3 myths driving data hoarding ALL DATA IS EQUAL MORE DATA = MORE VALUE STORAGE IS FREE Top 3 reasons to move to the cloud Reduced storage cost 56% 52% 45% Backup Disaster recovery 57% Photos 53% PersonalID legaldocs 45% Music 43% Games 29% Videos
  • 9. TAKE CONTROL OF THE DATABERG THE DATABERG REPORT Dealing with Data Hoarding means addressing the issues the research uncovered. • Firstly, allocating IT budgets and building strategies based on a belief data can be allowed to grow uncontrollably is a strategic error. • If we let this happen, our IT investments will be used merely to ‘Keep The Lights On’, storing and processing ROT data and increasingly starving our organisations of strategic resources. • Secondly, the notion of ‘free storage’, both from Sync Share services and the storage bundled with cloud applications is false. It is neither truly free of cost nor limitless. • In fact the ‘free storage’ myth means dark data is still growing but is just further away from the line of sight of management teams adding significant compliance risks. • Lastly, the research shows how co-mingling of corporate and personal data across the surveyed organisations’ networks and systems grows Databergs dangerously. • Allowing employees more and more ways to extract and indeed upload data is a failure of control especially at the time European legislators are gunning for more control over data privacy. This needs to be addressed urgently. 9 SEE WHAT OTHERS DON’T HOW DO WE MANAGE THE DATABERG? 1 Protect and make business critical data safely available 2 Eliminate ROT promptly to reduce waste 3 Illuminate dark data to speed up above processes
  • 10. At Veritas, our mission is to help organisations harness the power of their information, wherever it resides, by driving availability and revealing insights. www.veritas.com In addition to the Dark Data Assessment which offers guidance on illuminating dark data and eliminating ROT, Veritas offers a full range of Information Management software including: Veritas™ Data Insight  Veritas™ Information Map  Veritas™ Enterprise Vault  Veritas™ eDiscovery Platform  Veritas InfoScale  NetBackup  Resiliency Platform  HOW VERITAS CAN HELP © 2015 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 10 SEE WHAT OTHERS DON’T THE DATABERG REPORT GAIN VISIBILITY Identify your dark data, expose the risks and extract the value from your information TAKE ACTION Make better business decisions to classify, retain or defensibly delete your ROT data ASSUME CONTROL Define a workable information governance strategy, sponsored at C-Level, to encourage compliant user behaviour and reduce risk 3 1 2