SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Conducted by
Vanson Bourne Research
N o v e m b e r

© Copyright 2013 EMC Corporation. All rights reserved.

2 0 1 3

1
&

100
IT
DECISIONMAKERS

3200
INTERVIEWS

ALTOGETHER, 1600 IT & 1600
BUSINESS DECISIONMAKERS

COUNTRIES

USA
BRAZIL
FRANCE
ITALY
NORDICS
RUSSIA
SOUTH AFRICA
JAPAN

100
BUSINESS
DECISIONMAKERS

CANADA
UK
GERMANY
SPAIN
BENELUX
INDIA
AUSTRALIA
CHINA

10
50/50 SPLIT
VERTICALS

BETWEEN ORGANIZATIONS WITH
100–1000 EMPLOYEES &
MORE THAN 1000 EMPLOYEES

© Copyright 2013 EMC Corporation. All rights reserved.

2
THE FOUR BIG MEGATRENDS IN INFORMATION TECHNOLOGY TODAY
ARE CLOUD COMPUTING, BIG DATA, SOCIAL NETWORKING AND
MOBILE DEVICES. ADOPTION AND MATURITY OF THESE TRENDS
MUST FLOAT UPON A SEA OF TRUST — TRUST THAT MY
INFORMATION IS SECURE IN THE CLOUD, TRUST THAT MY DATA
WON’T BE LOST OR STOLEN, TRUST THAT MY IT WILL BE
OPERATIONAL WHEN IT NEEDS TO BE — WHICH, THESE DAYS, IS
ALL THE TIME. THE MORE TRUST THAT CAN BE EARNED AND
GUARANTEED, THE BIGGER AND FASTER THE IMPACT OF THESE
TRENDS. CONVERSELY, THE LESS TRUST THAT IS ESTABLISHED, THE
MORE LIMITED THESE TRENDS WILL BE.

DAVID GOULDEN

© Copyright 2013 EMC Corporation. All rights reserved.

3
OVERALL MATURITY
OVERALL MATURITY DISTRIBUTION
LAGGARDS

70

EVALUATORS

ADOPTERS

LEADERS

36%

8%

NUMBER OF RESPONDENTS

60
50
40

17%

30

40%

20
10
0

0

25

50

75

100

MATURITY SCORE (OUT OF 100)

© Copyright 2013 EMC Corporation. All rights reserved.

4
MATURITY PILLARS
OVERALL MATURITY DISTRIBUTION
LAGGARDS

70

EVALUATORS

ADOPTERS

LEADERS

36%

8%

NUMBER OF RESPONDENTS

60
50
40

17%

30

40%

20
10

0
0

25

50

75

100

MATURITY SCORE (OUT OF 100)

© Copyright 2013 EMC Corporation. All rights reserved.

5
SCORING
METHODOLOGY
The study focuses on attributes of IT
– information availability, backup, &
security – that contribute most to
the ability to withstand & quickly
recover from disruptive IT incidents.

1,600 IT responses were used to
rank their organizations’ maturity
levels, ranging from lowest to
highest – Laggard, Evaluator,
Adopter, & Leader.

Those organizations with more
progressive strategies & those
using more advanced technology
achieved higher ratings.

© Copyright 2013 EMC Corporation. All rights reserved.

6
MATURITY SCORE
BY COUNTRY

CHINA
(OUT OF 100)
China

65.2

USA

61.8

South Africa

60.9

Brazil

53.8

Australia

52.8

Spain

51.6

France

COUNTRY—JUST AHEAD
OF AHEAD OF THE USA

3 OF THE 4 MOST
MATURE COUNTRIES ARE

51.4

UK

BRICS

49.7

Canada

49.5

Benelux

49.5

India

49.4

Italy

49.1

Russia

48.7

Germany

48.4

Nordics
Japan

© Copyright 2013 EMC Corporation. All rights reserved.

IS THE MOST MATURE

43.0
38.8

J A PA N

LAGS AS THE
L E A S T MATURE

7
MATURITY SCORE
BY INDUSTRY

(OUT OF 100)
Financial services

54.1

Life sciences

53.9

IT and technology

53.8

Healthcare

51.6

Public sector

51.1

Manf.

51.0

Retail and consumer products

49.8

Energy

49.4

Comms, media and ent.

49.2

Consulting

© Copyright 2013 EMC Corporation. All rights reserved.

IN ADDITION TO IT,
HIGHLY-REGULATED
INDUSTRIES DISPLAY
PROPORTIONALLY
HIGHER LEVELS OF
MATURITY

46.1

8
THE CRISIS
Widespread unplanned downtime,
security breaches, & data loss

61%

of respondents’ companies have
suffered at least one of the
following: unplanned downtime
(37%), security breach (23%) or
data loss (29%) in the last 12
months.

© Copyright 2013 EMC Corporation. All rights reserved.

Nearly half—

45%

—of respondents report that their senior
executives are not confident that their
organization has adequate data
protection, security, & IT availability.

9
SENIOR EXECUTIVES’ CONFIDENCE IN THEIR
ORGANIZATION’S IT MATURITY
On average, only 55% of respondents
report their senior executives have any
confidence in their data protection,
security, & availability.
This rises significantly with each level
of maturity.

Leaders

81%

Adopters
Evaluators
Laggards

65%
51%
39%

Conversely, 45% cited no confidence.
Do you think your senior executives are confident they
currently have adequate data protection, security, &
availability?
Only showing percentage for “yes, they already are”, by overall
maturity (Asked to all 3200 respondents)

© Copyright 2013 EMC Corporation. All rights reserved.

10
SENIOR EXECUTIVES’ CONFIDENCE IN THEIR
ORGANIZATION’S IT MATURITY (COUNTRY)
Germany

Japan—the least mature country—has
the smallest percentage of respondents
reporting that their senior teams have
trust in IT.

66%

France

64%

Benelux

64%

Spain

63%

India

62%

USA

61%

Australia

59%

Canada

58%

China

Interestingly, the BRICS countries are
scattered throughout the centre—
neither leading or lagging in this
regard.

56%

South Africa

55%

UK

54%

Brazil

50%

Italy

49%

Russia

49%

Nordics
Japan

46%
31%

Do you think your senior executives are confident they
currently have adequate data protection, security, &
availability?
Only showing percentage for “yes, they already are”, by
country (Asked to all 3200 respondents)

© Copyright 2013 EMC Corporation. All rights reserved.

11
SENIOR EXECUTIVES’ CONFIDENCE IN THEIR
ORGANIZATION’S IT MATURITY (INDUSTRY)
Life sciences, seen previously to be
among the most mature in terms of the
IT Trust Curve, is the vertical least likely
to report their senior teams are confident
in their organization’s IT.

Financial services

59%

IT and technology

58%

Consulting

57%

Retail and consumer…

55%

Manf.

55%

Comms, media and ent.

10% of those in the public sector don’t
think their senior teams will ever have
this confidence (compared to 6% on
average).

57%

Energy

55%

Healthcare

51%

Public sector

50%

Life sciences

48%

Do you think your senior executives are confident they
currently have adequate data protection, security, &
availability?
Only showing percentage for “yes, they already are”, by
vertical (Asked to all 3200 respondents)

© Copyright 2013 EMC Corporation. All rights reserved.

12
CONSEQUENCES OF INCIDENTS IN THE LAST
12 MONTHS (COUNTRY)
Of the 61% of organizations who have experienced
either unplanned downtime, a security breach or data
loss at least once in the last 12 months, the top 3
consequences are a loss of employee productivity
(45%), loss of revenue (39%), and loss of customer
confidence/loyalty (32%).
Top consequence in each country:
• Loss of employee productivity: USA (58%), Canada
(58%), Brazil (46%), UK (61%), France (36%),
Nordics (48%), Russia (48%), Benelux (34%),
South Africa (59%), Australia (47%)
• Loss of revenue: China (59%), Spain (46%), Italy
(40%), Germany (40%), Russia (48%), Benelux
(34%)
• Loss of an incremental business opportunity: Japan
(38%)

Loss of employee productivity

45%

Loss of revenue

39%

Loss of customer confidence/loyalty

32%

Loss of an incremental business…

27%

Loss of business to a competitor

27%

Delay in product/ service…

26%

Loss of a new business opportunity

26%

Loss of customers

26%

Damage to company brand and…

23%

Loss of repeat business

20%

Delay in getting products/…

16%

Damage to company stock price… 10%
Other

1%

None of these

4%

• Loss of business to a competitor: India (47%)
What were the consequences of the incident(s) your
organization experienced in the last 12 months?
(Asked to those who have experienced downtime, security
breach(es) and/or data loss in the last 12 months 1956/3200)

© Copyright 2013 EMC Corporation. All rights reserved.

13
THE IMPACT
MATURITY MATTERS.
The more advanced
the organization’s
maturity, the less they
suffer when it comes
to data loss,
downtime,
& security breaches.

the
53% of organizations indata highest maturity
segment reported
recovery time
measured in minutes or less for their most missioncritical applications compared with only
across all respondents who reported
data recovery in minutes or less

27%
76%

of companies in the highest maturity
segment believe they are able to recover
100% of their lost data in every instance versus only
in the lowest maturity segment

44%
65%

© Copyright 2013 EMC Corporation. All rights reserved.

Organizations in the lowest maturity segment
(Laggards) lost one and a half times more
money over the last 12 months as a result of
downtime than those in the highest maturity
segment (Leader). Average annual financial loss
from downtime across all respondents is
$494,037.

14
THE UPSIDE
“If you had adequate controls
to protect data and breaches
were stopped before impact,
how would your organization
benefit?”
(Asked to respondents who have experienced a
security breach/breaches in the last 12 months
734/3200)

Expedited audits & lower
compliance reporting cost
Lower barrier to information
sharing
Lower cost of investigation &
response
More time for innovation &
analysis
Reduced cost of application
deployment / time to market

© Copyright 2013 EMC Corporation. All rights reserved.

49%
48%
45%
43%
42%

15
FACTORS THAT LIMIT
TECHNOLOGICAL PROGRESS
92% of all respondents experience inhibitors to
their technology project success.
China is the only country where budget is not the
main inhibitor. Instead resources and/or workload
constraints tops the list here (50%), followed by
planning and anticipation (46%), knowledge and
skills (44%) and then budget (41%).
A lack of confidence in technology impacts one in
five, & a lack of executive/management support
inhibits one in seven.

52%

Budget

Resources and/or workload
constraints

35%

33%

Planning and anticipation

32%

Knowledge & skills

25%

Culture (flexibility, acceptance)

Lack of trust in technology/IT
Lack of executive/management
support
We have no limits to our technology
project success

19%

14%
8%

What most limits your organization's technology project
success in relation to data protection, security, & availability?
(Asked to all 3200 respondents)

© Copyright 2013 EMC Corporation. All rights reserved.

16
DIFFERING VIEWS

Just 50% of BDMs (business decision
makers) consider the IT department to
be a driver of a resilient & secure
infrastructure—compared to 70% of
ITDMs (IT decision makers) themselves.
ITDMs
BDMs

70%
50%

Where is the motivation/drive for future
plans/projects to deliver resilient & secure IT
infrastructure coming from?
Percentage that selected “internal: IT department”, by
respondent type (Asked to all 3200 respondents

© Copyright 2013 EMC Corporation. All rights reserved.

17
MATURITY DIVIDENDS

FINANCIAL LOSS AS A RESULT OF DOWNTIME, SECURITY
BREACHES, & DATA LOSS

65%

Organizations in the
lowest maturity
segment
(Laggard)lost

REPORTED AVERAGE ANNUAL
FINANCIAL LOSS PER COMPANY

1.5X
more money over
the last 12 months
as a result of
downtime than
those in the highest
maturity segment
(Leader)

© Copyright 2013 EMC Corporation. All rights reserved.

$494,037
Downtime

$860,273
Security Breaches

$585,892
Data Loss

18
MATURITY DIVIDENDS

ONLY AROUND A QUARTER OF SURVEYED ORGANIZATIONS CAN
RECOVERY DATA IN MINUTES OR LESS
OUR RECOVERY TIME IS

25% MEASURED IN MINUTES

During an unexpected event
causing downtime to our
most critical applications.

A quarter of organizations have a recovery time
of minutes for mission-critical applications.
Therefore, 27% of organizations surveyed have
a recovery time of minutes or less for their
mission-critical applications.

(Asked to all 1600 respondents)

66%

OUR RECOVERY TIME IS
MEASURED IN HOURS

*

The most common response given overall
is a recovery time of hours.

2% OUR RECOVERY TIME
IS ZERO
Only 2% of surveyed organizations report a
recovery time of zero for their most critical
applications.

3% OUR RECOVERY TIME IS
1 DAY OR MORE
*Don’t know

© Copyright 2013 EMC Corporation. All rights reserved.

Though a small minority report a recovery
time of a day or more.

19
MATURITY DIVIDENDS

BIG DATA ANALYTICS IS MORE LIKELY TO BE DEPLOYED BY
THOSE WITH A HIGHER LEVEL OF TRUST MATURITY
74% of the leaders have already
deployed Big Data analytics compared
to just 8% of the laggards. However,
less mature organizations are more
likely to be in the planning stages.

Leaders
Adopters
Evaluators
Laggards

1%

25%

74%

8%
42%
14%
23%
18%
8%

50%
63%
74%

No plans
Deployment underway or in planning stages
Already deployed

Which of these strategic projects, requiring availability, data
protection, & security do you have?
Looking at Big Data analytics only, by overall maturity (Asked to all
1600 IT respondents)

© Copyright 2013 EMC Corporation. All rights reserved.

20
Appendix

© Copyright 2013 EMC Corporation. All rights reserved.

21
IT only

Questions used to score Continuous Availability (i)
Within each pillar section, respondents were asked questions that determine their technological maturity,
the three used in Continuous Availability were (max score = 18):
Select which of the following best characterizes your current IT infrastructure:


Backup is the main component of our availability strategy – (2pt.)



Backup and replication are key components of our availability strategy – (2pt.)



Replication and standby servers are key components of our availability strategy – (3pts.)



Replication of virtual servers with restart capabilities are key components of our availability strategy - (4pts.)



Active-active instances of applications across data centers is key component of our availability strategy – (6pts.)

During an unexpected event causing downtime to our most critical applications:


Our recovery time is 1 day or more (please specify) – (2pt.)



Our recovery time is measured in hours – (3pts.)



Our recovery time is measured in minutes – (4pts.)



Our recovery time is zero – (6pts.)



Don’t know – no score

© Copyright 2013 EMC Corporation. All rights reserved.

22
Questions used to score Continuous Availability
(ii)

IT only

Within each pillar section, respondents were asked questions that determine their technological maturity,
the three used in Continuous Availability were (max score = 18):
Which technologies/strategies are in place to help you manage/ensure you have trust in the availability of your
applications, systems, and data?


Backup and recovery infrastructure – (2pt.) (or highest scoring selection)



Disk-based backup and recovery – (2pt.) (or highest scoring selection)



WAN-based replication of backup and recovery images to second site – (3pts.) (or highest scoring selection)



Asynchronous transaction-level replication – (2pts.) (or highest scoring selection)



Synchronous transaction-level replication – (3pts.) (or highest scoring selection)



Replication of both applications and data (such as virtual machine images) – (4pts.) (or highest scoring selection)



Replication to a second site with restart capabilities (active/passive) – (4pts.) (or highest scoring selection)



Dynamic mobility of virtual applications between data centers – (6pts.)



Disaster tolerant replication (active/active) with near zero RPO and RTO – (6pts.)

© Copyright 2013 EMC Corporation. All rights reserved.

23
Question used to score Advanced security

IT only

Within each pillar section, respondents were asked questions that determine their technological maturity,
the one used in Advanced Security was (max score = 18):
Which technologies/strategies do you have in place to help you trust your infrastructure and data is secure?


Strong authentication - 1pt.



Video surveillance – 0pts.



Governance, risk & compliance software – 2pt.



Anti-virus/anti-malware - 2pts.



Network firewalls/application firewalls/intrusion detection - 1pt.



Log/security monitoring - 1pt.



Identity & access management -1pt.



Encryption/tokenization - 1pt.



Digital forensics – 3pt.



Predictive analytics – 3pt.



Security operations center - 3pts.

© Copyright 2013 EMC Corporation. All rights reserved.

24
Questions used to score Integrated Backup and
Recovery (i)

IT only

Within each pillar section, respondents were asked questions that determine their technological maturity,
the two used in Integrated Backup and Recovery were (max score = 18):
Select which of the following best characterizes your current IT infrastructure’s information protection capabilities
to prevent/minimize data loss due to site disasters or technical failures:


Backup is performed departmentally, as opposed to a centralized service, with independent backup tools requiring application downtime - (2pt.)



Multiple, separate application-specific backup tools are deployed across the organization regularly requiring application downtime during the backup process
– (3pt.)



Backup is coordinated with storage features to minimize application downtime for the backup process and disk-based backup has been deployed – (5pts.)



Centralized disk-based backup systems exploit de-duplication efficiencies while providing comprehensive reporting of backup actives and protection status –
(7pts.)



Comprehensive backup solutions include replication of backup images to secondary sites, enable archival storage, and ensure we meet our data retention
and retrieval goals – (9pts.)

© Copyright 2013 EMC Corporation. All rights reserved.

25
Questions used to score Integrated Backup and
Recovery (ii)

IT only

Within each pillar section, respondents were asked questions that determine their technological maturity,
the two used in Integrated Backup and Recovery were (max score = 18):
Which technologies/strategies are you currently using to prevent data loss?


Tape-based backup and archive – (2pt.) (or highest scoring selection)



Disk-based backup and archive – (3pt.) (or highest scoring selection)



WAN-based replication of backups – (4pts.) (or highest scoring selection)



Software to assist in eDiscovery projects – (5pts.) (or highest scoring selection)



De-duplication of backup and archive data – (6pts.) (or highest scoring selection)



Consolidated backup and archive infrastructure – (7pts.) (or highest scoring selection)



Integrated backup and archive to meet data retention requirements – (9pts.) (or highest scoring selection)

© Copyright 2013 EMC Corporation. All rights reserved.

26
The Global IT Trust Curve survey - Comprehensive Results Presentation

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
Aiim capture trends 2009 2010
Aiim capture trends 2009 2010Aiim capture trends 2009 2010
Aiim capture trends 2009 2010Vander Loto
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy researchbbw1984
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
Study master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarshipStudy master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarshipnewedgecs
 
Global Study: The Benefits and Barriers to Video Collaboration Adoption
Global Study: The Benefits and Barriers to Video Collaboration AdoptionGlobal Study: The Benefits and Barriers to Video Collaboration Adoption
Global Study: The Benefits and Barriers to Video Collaboration AdoptionPier Paolo Mucelli
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Communications
 
7 information management trends
7 information management trends7 information management trends
7 information management trendsVander Loto
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
Managing the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance RequiresManaging the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance RequiresWNS Global Services
 
Voice of the workforce - Infrastructure
Voice of the workforce - InfrastructureVoice of the workforce - Infrastructure
Voice of the workforce - InfrastructureLewis Watling CertRP
 

Was ist angesagt? (15)

Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Aiim capture trends 2009 2010
Aiim capture trends 2009 2010Aiim capture trends 2009 2010
Aiim capture trends 2009 2010
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
Study master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarshipStudy master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarship
 
Global Study: The Benefits and Barriers to Video Collaboration Adoption
Global Study: The Benefits and Barriers to Video Collaboration AdoptionGlobal Study: The Benefits and Barriers to Video Collaboration Adoption
Global Study: The Benefits and Barriers to Video Collaboration Adoption
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013
 
7 information management trends
7 information management trends7 information management trends
7 information management trends
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Managing the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance RequiresManaging the Complexities of Governance, Risk & Compliance Requires
Managing the Complexities of Governance, Risk & Compliance Requires
 
Voice of the workforce - Infrastructure
Voice of the workforce - InfrastructureVoice of the workforce - Infrastructure
Voice of the workforce - Infrastructure
 

Andere mochten auch

Goderich Hockeyville
Goderich HockeyvilleGoderich Hockeyville
Goderich HockeyvilleStMarysSchool
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds EMC
 
Swipp Brochure
Swipp BrochureSwipp Brochure
Swipp BrochureSwipp
 
Adaptec by PMC Series 7 Adapters
Adaptec by PMC Series 7 AdaptersAdaptec by PMC Series 7 Adapters
Adaptec by PMC Series 7 AdaptersAdaptec by PMC
 
17 λειτουργια πεπτικου - ανιχνευση ουσιων
17   λειτουργια πεπτικου - ανιχνευση ουσιων17   λειτουργια πεπτικου - ανιχνευση ουσιων
17 λειτουργια πεπτικου - ανιχνευση ουσιωνXristos Lyg
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recoverChandan Dubey
 
Weapons for peace
Weapons for peaceWeapons for peace
Weapons for peacevicolombia
 
Zipcar For Business Meet Your New Company Car
Zipcar For Business   Meet Your New Company CarZipcar For Business   Meet Your New Company Car
Zipcar For Business Meet Your New Company CarCharlotte Gatehouse
 
September 2011 Webinar: Beyond Fan Pages
September 2011 Webinar: Beyond Fan PagesSeptember 2011 Webinar: Beyond Fan Pages
September 2011 Webinar: Beyond Fan PagesResearch Now
 
Insaat kursu-beykoz
Insaat kursu-beykozInsaat kursu-beykoz
Insaat kursu-beykozsersld54
 
Research with Social Media Data
Research with Social Media DataResearch with Social Media Data
Research with Social Media DataResearch Now
 
Срок жизни печатающей головки
Срок жизни печатающей головкиСрок жизни печатающей головки
Срок жизни печатающей головкиPROFIBLOG
 
Bespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopenBespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopenNetwerk Bewust Verbruiken
 
Informe datos del paciente
Informe datos del pacienteInforme datos del paciente
Informe datos del pacienteNathalia Sanchez
 

Andere mochten auch (20)

Goderich Hockeyville
Goderich HockeyvilleGoderich Hockeyville
Goderich Hockeyville
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds
 
Swipp Brochure
Swipp BrochureSwipp Brochure
Swipp Brochure
 
Adaptec by PMC Series 7 Adapters
Adaptec by PMC Series 7 AdaptersAdaptec by PMC Series 7 Adapters
Adaptec by PMC Series 7 Adapters
 
17 λειτουργια πεπτικου - ανιχνευση ουσιων
17   λειτουργια πεπτικου - ανιχνευση ουσιων17   λειτουργια πεπτικου - ανιχνευση ουσιων
17 λειτουργια πεπτικου - ανιχνευση ουσιων
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recover
 
Weapons for peace
Weapons for peaceWeapons for peace
Weapons for peace
 
Zipcar For Business Meet Your New Company Car
Zipcar For Business   Meet Your New Company CarZipcar For Business   Meet Your New Company Car
Zipcar For Business Meet Your New Company Car
 
September 2011 Webinar: Beyond Fan Pages
September 2011 Webinar: Beyond Fan PagesSeptember 2011 Webinar: Beyond Fan Pages
September 2011 Webinar: Beyond Fan Pages
 
Insaat kursu-beykoz
Insaat kursu-beykozInsaat kursu-beykoz
Insaat kursu-beykoz
 
летние мастер-классы в сидо
летние мастер-классы в сидолетние мастер-классы в сидо
летние мастер-классы в сидо
 
jQuery
jQueryjQuery
jQuery
 
The Power of PowerShell: Advanced
The Power of PowerShell: Advanced The Power of PowerShell: Advanced
The Power of PowerShell: Advanced
 
Research with Social Media Data
Research with Social Media DataResearch with Social Media Data
Research with Social Media Data
 
Titanium
TitaniumTitanium
Titanium
 
Cvpw
CvpwCvpw
Cvpw
 
Palestra Barrett Brown - sustentabilidade
Palestra Barrett Brown - sustentabilidadePalestra Barrett Brown - sustentabilidade
Palestra Barrett Brown - sustentabilidade
 
Срок жизни печатающей головки
Срок жизни печатающей головкиСрок жизни печатающей головки
Срок жизни печатающей головки
 
Bespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopenBespaar 1000€ door bewust te leven en te kopen
Bespaar 1000€ door bewust te leven en te kopen
 
Informe datos del paciente
Informe datos del pacienteInforme datos del paciente
Informe datos del paciente
 

Ähnlich wie The Global IT Trust Curve survey - Comprehensive Results Presentation

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA
 
Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde
Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde
Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde Sungard Availability Services
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
The state-of-dark-data-report
The state-of-dark-data-reportThe state-of-dark-data-report
The state-of-dark-data-reportVaibhav Agarwal
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Hereaccenture
 
2019 Data Trends Survey Results
2019 Data Trends Survey Results2019 Data Trends Survey Results
2019 Data Trends Survey ResultsPrecisely
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfMichelleTartalio
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryCompTIA
 
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...Mindbowser Inc
 
The State of Canadian Technology Adoption and the IT Workforce
The State of Canadian Technology Adoption and the IT WorkforceThe State of Canadian Technology Adoption and the IT Workforce
The State of Canadian Technology Adoption and the IT WorkforceCompTIA
 
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel WorldCEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel WorldJDA Software
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
Enterprise Firewall Market - Outlook (2017-21) for IT & Telecommunications
Enterprise Firewall Market - Outlook (2017-21) for IT & TelecommunicationsEnterprise Firewall Market - Outlook (2017-21) for IT & Telecommunications
Enterprise Firewall Market - Outlook (2017-21) for IT & TelecommunicationsResearchFox
 

Ähnlich wie The Global IT Trust Curve survey - Comprehensive Results Presentation (20)

EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Rise of the Superuser
Rise of the SuperuserRise of the Superuser
Rise of the Superuser
 
Ramsus Aaen Madesn HR4 ICT12
Ramsus Aaen Madesn HR4 ICT12Ramsus Aaen Madesn HR4 ICT12
Ramsus Aaen Madesn HR4 ICT12
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde
Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde
Infographic- Why Do Hybrid IT Solutions Create Jekyll & Hyde
 
2012 TECNA National Survey of Technology, Policy & Strategic Issues
2012 TECNA National Survey of Technology, Policy & Strategic Issues2012 TECNA National Survey of Technology, Policy & Strategic Issues
2012 TECNA National Survey of Technology, Policy & Strategic Issues
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
The state-of-dark-data-report
The state-of-dark-data-reportThe state-of-dark-data-report
The state-of-dark-data-report
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
 
2019 Data Trends Survey Results
2019 Data Trends Survey Results2019 Data Trends Survey Results
2019 Data Trends Survey Results
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 Summary
 
Bridge the Gap Between IT and Staff
Bridge the Gap Between IT and StaffBridge the Gap Between IT and Staff
Bridge the Gap Between IT and Staff
 
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
 
Where Do We Go From Here V01
Where Do We Go From Here V01Where Do We Go From Here V01
Where Do We Go From Here V01
 
The State of Canadian Technology Adoption and the IT Workforce
The State of Canadian Technology Adoption and the IT WorkforceThe State of Canadian Technology Adoption and the IT Workforce
The State of Canadian Technology Adoption and the IT Workforce
 
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel WorldCEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
CEO ViewPoint: Supply Chain's Critical Role in an All-Channel World
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
Enterprise Firewall Market - Outlook (2017-21) for IT & Telecommunications
Enterprise Firewall Market - Outlook (2017-21) for IT & TelecommunicationsEnterprise Firewall Market - Outlook (2017-21) for IT & Telecommunications
Enterprise Firewall Market - Outlook (2017-21) for IT & Telecommunications
 

Mehr von EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

The Global IT Trust Curve survey - Comprehensive Results Presentation

  • 1. Conducted by Vanson Bourne Research N o v e m b e r © Copyright 2013 EMC Corporation. All rights reserved. 2 0 1 3 1
  • 2. & 100 IT DECISIONMAKERS 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISIONMAKERS COUNTRIES USA BRAZIL FRANCE ITALY NORDICS RUSSIA SOUTH AFRICA JAPAN 100 BUSINESS DECISIONMAKERS CANADA UK GERMANY SPAIN BENELUX INDIA AUSTRALIA CHINA 10 50/50 SPLIT VERTICALS BETWEEN ORGANIZATIONS WITH 100–1000 EMPLOYEES & MORE THAN 1000 EMPLOYEES © Copyright 2013 EMC Corporation. All rights reserved. 2
  • 3. THE FOUR BIG MEGATRENDS IN INFORMATION TECHNOLOGY TODAY ARE CLOUD COMPUTING, BIG DATA, SOCIAL NETWORKING AND MOBILE DEVICES. ADOPTION AND MATURITY OF THESE TRENDS MUST FLOAT UPON A SEA OF TRUST — TRUST THAT MY INFORMATION IS SECURE IN THE CLOUD, TRUST THAT MY DATA WON’T BE LOST OR STOLEN, TRUST THAT MY IT WILL BE OPERATIONAL WHEN IT NEEDS TO BE — WHICH, THESE DAYS, IS ALL THE TIME. THE MORE TRUST THAT CAN BE EARNED AND GUARANTEED, THE BIGGER AND FASTER THE IMPACT OF THESE TRENDS. CONVERSELY, THE LESS TRUST THAT IS ESTABLISHED, THE MORE LIMITED THESE TRENDS WILL BE. DAVID GOULDEN © Copyright 2013 EMC Corporation. All rights reserved. 3
  • 4. OVERALL MATURITY OVERALL MATURITY DISTRIBUTION LAGGARDS 70 EVALUATORS ADOPTERS LEADERS 36% 8% NUMBER OF RESPONDENTS 60 50 40 17% 30 40% 20 10 0 0 25 50 75 100 MATURITY SCORE (OUT OF 100) © Copyright 2013 EMC Corporation. All rights reserved. 4
  • 5. MATURITY PILLARS OVERALL MATURITY DISTRIBUTION LAGGARDS 70 EVALUATORS ADOPTERS LEADERS 36% 8% NUMBER OF RESPONDENTS 60 50 40 17% 30 40% 20 10 0 0 25 50 75 100 MATURITY SCORE (OUT OF 100) © Copyright 2013 EMC Corporation. All rights reserved. 5
  • 6. SCORING METHODOLOGY The study focuses on attributes of IT – information availability, backup, & security – that contribute most to the ability to withstand & quickly recover from disruptive IT incidents. 1,600 IT responses were used to rank their organizations’ maturity levels, ranging from lowest to highest – Laggard, Evaluator, Adopter, & Leader. Those organizations with more progressive strategies & those using more advanced technology achieved higher ratings. © Copyright 2013 EMC Corporation. All rights reserved. 6
  • 7. MATURITY SCORE BY COUNTRY CHINA (OUT OF 100) China 65.2 USA 61.8 South Africa 60.9 Brazil 53.8 Australia 52.8 Spain 51.6 France COUNTRY—JUST AHEAD OF AHEAD OF THE USA 3 OF THE 4 MOST MATURE COUNTRIES ARE 51.4 UK BRICS 49.7 Canada 49.5 Benelux 49.5 India 49.4 Italy 49.1 Russia 48.7 Germany 48.4 Nordics Japan © Copyright 2013 EMC Corporation. All rights reserved. IS THE MOST MATURE 43.0 38.8 J A PA N LAGS AS THE L E A S T MATURE 7
  • 8. MATURITY SCORE BY INDUSTRY (OUT OF 100) Financial services 54.1 Life sciences 53.9 IT and technology 53.8 Healthcare 51.6 Public sector 51.1 Manf. 51.0 Retail and consumer products 49.8 Energy 49.4 Comms, media and ent. 49.2 Consulting © Copyright 2013 EMC Corporation. All rights reserved. IN ADDITION TO IT, HIGHLY-REGULATED INDUSTRIES DISPLAY PROPORTIONALLY HIGHER LEVELS OF MATURITY 46.1 8
  • 9. THE CRISIS Widespread unplanned downtime, security breaches, & data loss 61% of respondents’ companies have suffered at least one of the following: unplanned downtime (37%), security breach (23%) or data loss (29%) in the last 12 months. © Copyright 2013 EMC Corporation. All rights reserved. Nearly half— 45% —of respondents report that their senior executives are not confident that their organization has adequate data protection, security, & IT availability. 9
  • 10. SENIOR EXECUTIVES’ CONFIDENCE IN THEIR ORGANIZATION’S IT MATURITY On average, only 55% of respondents report their senior executives have any confidence in their data protection, security, & availability. This rises significantly with each level of maturity. Leaders 81% Adopters Evaluators Laggards 65% 51% 39% Conversely, 45% cited no confidence. Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for “yes, they already are”, by overall maturity (Asked to all 3200 respondents) © Copyright 2013 EMC Corporation. All rights reserved. 10
  • 11. SENIOR EXECUTIVES’ CONFIDENCE IN THEIR ORGANIZATION’S IT MATURITY (COUNTRY) Germany Japan—the least mature country—has the smallest percentage of respondents reporting that their senior teams have trust in IT. 66% France 64% Benelux 64% Spain 63% India 62% USA 61% Australia 59% Canada 58% China Interestingly, the BRICS countries are scattered throughout the centre— neither leading or lagging in this regard. 56% South Africa 55% UK 54% Brazil 50% Italy 49% Russia 49% Nordics Japan 46% 31% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for “yes, they already are”, by country (Asked to all 3200 respondents) © Copyright 2013 EMC Corporation. All rights reserved. 11
  • 12. SENIOR EXECUTIVES’ CONFIDENCE IN THEIR ORGANIZATION’S IT MATURITY (INDUSTRY) Life sciences, seen previously to be among the most mature in terms of the IT Trust Curve, is the vertical least likely to report their senior teams are confident in their organization’s IT. Financial services 59% IT and technology 58% Consulting 57% Retail and consumer… 55% Manf. 55% Comms, media and ent. 10% of those in the public sector don’t think their senior teams will ever have this confidence (compared to 6% on average). 57% Energy 55% Healthcare 51% Public sector 50% Life sciences 48% Do you think your senior executives are confident they currently have adequate data protection, security, & availability? Only showing percentage for “yes, they already are”, by vertical (Asked to all 3200 respondents) © Copyright 2013 EMC Corporation. All rights reserved. 12
  • 13. CONSEQUENCES OF INCIDENTS IN THE LAST 12 MONTHS (COUNTRY) Of the 61% of organizations who have experienced either unplanned downtime, a security breach or data loss at least once in the last 12 months, the top 3 consequences are a loss of employee productivity (45%), loss of revenue (39%), and loss of customer confidence/loyalty (32%). Top consequence in each country: • Loss of employee productivity: USA (58%), Canada (58%), Brazil (46%), UK (61%), France (36%), Nordics (48%), Russia (48%), Benelux (34%), South Africa (59%), Australia (47%) • Loss of revenue: China (59%), Spain (46%), Italy (40%), Germany (40%), Russia (48%), Benelux (34%) • Loss of an incremental business opportunity: Japan (38%) Loss of employee productivity 45% Loss of revenue 39% Loss of customer confidence/loyalty 32% Loss of an incremental business… 27% Loss of business to a competitor 27% Delay in product/ service… 26% Loss of a new business opportunity 26% Loss of customers 26% Damage to company brand and… 23% Loss of repeat business 20% Delay in getting products/… 16% Damage to company stock price… 10% Other 1% None of these 4% • Loss of business to a competitor: India (47%) What were the consequences of the incident(s) your organization experienced in the last 12 months? (Asked to those who have experienced downtime, security breach(es) and/or data loss in the last 12 months 1956/3200) © Copyright 2013 EMC Corporation. All rights reserved. 13
  • 14. THE IMPACT MATURITY MATTERS. The more advanced the organization’s maturity, the less they suffer when it comes to data loss, downtime, & security breaches. the 53% of organizations indata highest maturity segment reported recovery time measured in minutes or less for their most missioncritical applications compared with only across all respondents who reported data recovery in minutes or less 27% 76% of companies in the highest maturity segment believe they are able to recover 100% of their lost data in every instance versus only in the lowest maturity segment 44% 65% © Copyright 2013 EMC Corporation. All rights reserved. Organizations in the lowest maturity segment (Laggards) lost one and a half times more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader). Average annual financial loss from downtime across all respondents is $494,037. 14
  • 15. THE UPSIDE “If you had adequate controls to protect data and breaches were stopped before impact, how would your organization benefit?” (Asked to respondents who have experienced a security breach/breaches in the last 12 months 734/3200) Expedited audits & lower compliance reporting cost Lower barrier to information sharing Lower cost of investigation & response More time for innovation & analysis Reduced cost of application deployment / time to market © Copyright 2013 EMC Corporation. All rights reserved. 49% 48% 45% 43% 42% 15
  • 16. FACTORS THAT LIMIT TECHNOLOGICAL PROGRESS 92% of all respondents experience inhibitors to their technology project success. China is the only country where budget is not the main inhibitor. Instead resources and/or workload constraints tops the list here (50%), followed by planning and anticipation (46%), knowledge and skills (44%) and then budget (41%). A lack of confidence in technology impacts one in five, & a lack of executive/management support inhibits one in seven. 52% Budget Resources and/or workload constraints 35% 33% Planning and anticipation 32% Knowledge & skills 25% Culture (flexibility, acceptance) Lack of trust in technology/IT Lack of executive/management support We have no limits to our technology project success 19% 14% 8% What most limits your organization's technology project success in relation to data protection, security, & availability? (Asked to all 3200 respondents) © Copyright 2013 EMC Corporation. All rights reserved. 16
  • 17. DIFFERING VIEWS Just 50% of BDMs (business decision makers) consider the IT department to be a driver of a resilient & secure infrastructure—compared to 70% of ITDMs (IT decision makers) themselves. ITDMs BDMs 70% 50% Where is the motivation/drive for future plans/projects to deliver resilient & secure IT infrastructure coming from? Percentage that selected “internal: IT department”, by respondent type (Asked to all 3200 respondents © Copyright 2013 EMC Corporation. All rights reserved. 17
  • 18. MATURITY DIVIDENDS FINANCIAL LOSS AS A RESULT OF DOWNTIME, SECURITY BREACHES, & DATA LOSS 65% Organizations in the lowest maturity segment (Laggard)lost REPORTED AVERAGE ANNUAL FINANCIAL LOSS PER COMPANY 1.5X more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader) © Copyright 2013 EMC Corporation. All rights reserved. $494,037 Downtime $860,273 Security Breaches $585,892 Data Loss 18
  • 19. MATURITY DIVIDENDS ONLY AROUND A QUARTER OF SURVEYED ORGANIZATIONS CAN RECOVERY DATA IN MINUTES OR LESS OUR RECOVERY TIME IS 25% MEASURED IN MINUTES During an unexpected event causing downtime to our most critical applications. A quarter of organizations have a recovery time of minutes for mission-critical applications. Therefore, 27% of organizations surveyed have a recovery time of minutes or less for their mission-critical applications. (Asked to all 1600 respondents) 66% OUR RECOVERY TIME IS MEASURED IN HOURS * The most common response given overall is a recovery time of hours. 2% OUR RECOVERY TIME IS ZERO Only 2% of surveyed organizations report a recovery time of zero for their most critical applications. 3% OUR RECOVERY TIME IS 1 DAY OR MORE *Don’t know © Copyright 2013 EMC Corporation. All rights reserved. Though a small minority report a recovery time of a day or more. 19
  • 20. MATURITY DIVIDENDS BIG DATA ANALYTICS IS MORE LIKELY TO BE DEPLOYED BY THOSE WITH A HIGHER LEVEL OF TRUST MATURITY 74% of the leaders have already deployed Big Data analytics compared to just 8% of the laggards. However, less mature organizations are more likely to be in the planning stages. Leaders Adopters Evaluators Laggards 1% 25% 74% 8% 42% 14% 23% 18% 8% 50% 63% 74% No plans Deployment underway or in planning stages Already deployed Which of these strategic projects, requiring availability, data protection, & security do you have? Looking at Big Data analytics only, by overall maturity (Asked to all 1600 IT respondents) © Copyright 2013 EMC Corporation. All rights reserved. 20
  • 21. Appendix © Copyright 2013 EMC Corporation. All rights reserved. 21
  • 22. IT only Questions used to score Continuous Availability (i) Within each pillar section, respondents were asked questions that determine their technological maturity, the three used in Continuous Availability were (max score = 18): Select which of the following best characterizes your current IT infrastructure:  Backup is the main component of our availability strategy – (2pt.)  Backup and replication are key components of our availability strategy – (2pt.)  Replication and standby servers are key components of our availability strategy – (3pts.)  Replication of virtual servers with restart capabilities are key components of our availability strategy - (4pts.)  Active-active instances of applications across data centers is key component of our availability strategy – (6pts.) During an unexpected event causing downtime to our most critical applications:  Our recovery time is 1 day or more (please specify) – (2pt.)  Our recovery time is measured in hours – (3pts.)  Our recovery time is measured in minutes – (4pts.)  Our recovery time is zero – (6pts.)  Don’t know – no score © Copyright 2013 EMC Corporation. All rights reserved. 22
  • 23. Questions used to score Continuous Availability (ii) IT only Within each pillar section, respondents were asked questions that determine their technological maturity, the three used in Continuous Availability were (max score = 18): Which technologies/strategies are in place to help you manage/ensure you have trust in the availability of your applications, systems, and data?  Backup and recovery infrastructure – (2pt.) (or highest scoring selection)  Disk-based backup and recovery – (2pt.) (or highest scoring selection)  WAN-based replication of backup and recovery images to second site – (3pts.) (or highest scoring selection)  Asynchronous transaction-level replication – (2pts.) (or highest scoring selection)  Synchronous transaction-level replication – (3pts.) (or highest scoring selection)  Replication of both applications and data (such as virtual machine images) – (4pts.) (or highest scoring selection)  Replication to a second site with restart capabilities (active/passive) – (4pts.) (or highest scoring selection)  Dynamic mobility of virtual applications between data centers – (6pts.)  Disaster tolerant replication (active/active) with near zero RPO and RTO – (6pts.) © Copyright 2013 EMC Corporation. All rights reserved. 23
  • 24. Question used to score Advanced security IT only Within each pillar section, respondents were asked questions that determine their technological maturity, the one used in Advanced Security was (max score = 18): Which technologies/strategies do you have in place to help you trust your infrastructure and data is secure?  Strong authentication - 1pt.  Video surveillance – 0pts.  Governance, risk & compliance software – 2pt.  Anti-virus/anti-malware - 2pts.  Network firewalls/application firewalls/intrusion detection - 1pt.  Log/security monitoring - 1pt.  Identity & access management -1pt.  Encryption/tokenization - 1pt.  Digital forensics – 3pt.  Predictive analytics – 3pt.  Security operations center - 3pts. © Copyright 2013 EMC Corporation. All rights reserved. 24
  • 25. Questions used to score Integrated Backup and Recovery (i) IT only Within each pillar section, respondents were asked questions that determine their technological maturity, the two used in Integrated Backup and Recovery were (max score = 18): Select which of the following best characterizes your current IT infrastructure’s information protection capabilities to prevent/minimize data loss due to site disasters or technical failures:  Backup is performed departmentally, as opposed to a centralized service, with independent backup tools requiring application downtime - (2pt.)  Multiple, separate application-specific backup tools are deployed across the organization regularly requiring application downtime during the backup process – (3pt.)  Backup is coordinated with storage features to minimize application downtime for the backup process and disk-based backup has been deployed – (5pts.)  Centralized disk-based backup systems exploit de-duplication efficiencies while providing comprehensive reporting of backup actives and protection status – (7pts.)  Comprehensive backup solutions include replication of backup images to secondary sites, enable archival storage, and ensure we meet our data retention and retrieval goals – (9pts.) © Copyright 2013 EMC Corporation. All rights reserved. 25
  • 26. Questions used to score Integrated Backup and Recovery (ii) IT only Within each pillar section, respondents were asked questions that determine their technological maturity, the two used in Integrated Backup and Recovery were (max score = 18): Which technologies/strategies are you currently using to prevent data loss?  Tape-based backup and archive – (2pt.) (or highest scoring selection)  Disk-based backup and archive – (3pt.) (or highest scoring selection)  WAN-based replication of backups – (4pts.) (or highest scoring selection)  Software to assist in eDiscovery projects – (5pts.) (or highest scoring selection)  De-duplication of backup and archive data – (6pts.) (or highest scoring selection)  Consolidated backup and archive infrastructure – (7pts.) (or highest scoring selection)  Integrated backup and archive to meet data retention requirements – (9pts.) (or highest scoring selection) © Copyright 2013 EMC Corporation. All rights reserved. 26