SlideShare a Scribd company logo
Time
Cost
Time
CostTime
Cost
Time
Cost
DATA PROTECTION:
TRANSFORMATION AHEAD
IT is increasingly a driver of business innovation. But you can’t open
those doors to innovation without first transforming outdated data
protection models. Here’s why – and how – you need to modernize
your organization’s approach to data backup and disaster recovery.
42% of business
continuity decision
-makers believe
business complexity
is increasing risk
across their
organization1
Unplanned application
downtime costs
Fortune 1000 firms
an average of $1.25
billion to $2.5 billion
per year2
Data volumes at the
majority of organizations
are increasing between
11%-30% annually; 1 in 10
organizations see annual
data growth above 50%3
of organizations are
planning to deploy
cloud-based storage
solutions over the
coming year4
Do you want the peace of mind that you
can recover from failure quickly and
keep your business running nonstop?
Do you want to reduce complexity so
your staff can focus on innovation
instead of administration? Do you want
to capture the value of the cloud to
enhance your existing data protection?
Then now’s the time to
transform your data protection.
To learn more about solutions to
transform your data protection, visit
http://www.netapp.com/data-protection
Sources:
1. Forrester/Disaster Recovery Journal 2. IDC 3. Enterprise
Strategy Group 4. IDG 5. InformationWeek
plan to use disk-to-
disk-to-cloud in future
backup strategies5
On-premise backup &
archive: Accelerate
backup performance by
as much as 10x
Cloud-integrated backup & ar-
chive: Reduce backup costs by
up to 90% compared to tape
Asynchronous disaster
recovery: Reduce opera-
tional costs by up to 50%
Synchronous, site-to-site high
availability: Zero data loss, near-
zero downtime
Traditional data protection is
too slow, too expensive, and
too complex to meet rapidly
evolving business needs.
On-premises data
protection solutions are
still important, but the
cloud is offering
opportunities for
additional innovation and
increased efficiency
across the entire data
protection spectrum.
A successful data protection
framework will balance cost
and time requirements across
four key areas of backup and
disaster recovery.
42%
$1.25 to $2.5
BILLION
11%-30%
ANNUALLY
72% 47%
Brought to you by
CIO on behalf of

More Related Content

What's hot

A presentation on management information system
A presentation on management information systemA presentation on management information system
A presentation on management information system
abishek dahal
 
Cloud Integration in a Hyper Growth Environment
Cloud Integration in a Hyper Growth EnvironmentCloud Integration in a Hyper Growth Environment
Cloud Integration in a Hyper Growth Environment
Alex Lai
 
O'Leary_ResUniversal2016
O'Leary_ResUniversal2016O'Leary_ResUniversal2016
O'Leary_ResUniversal2016Neil O'Leary
 
Regional West Medical Center leverages IT strategically with McKesson's Appli...
Regional West Medical Center leverages IT strategically with McKesson's Appli...Regional West Medical Center leverages IT strategically with McKesson's Appli...
Regional West Medical Center leverages IT strategically with McKesson's Appli...
Mangeserve
 
Fight The Status Quo And Discover How To Do More With All Data
Fight The Status Quo And Discover How To Do More With All DataFight The Status Quo And Discover How To Do More With All Data
Fight The Status Quo And Discover How To Do More With All Data
Dell World
 
Green - The Reader Perspective
Green - The Reader PerspectiveGreen - The Reader Perspective
Green - The Reader Perspective
Freeform Dynamics
 
Overcoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databasesOvercoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databases
MSM Software
 
Sustainability Through Software Symantec At United Nations L
Sustainability Through Software   Symantec At United Nations LSustainability Through Software   Symantec At United Nations L
Sustainability Through Software Symantec At United Nations L
Symantec
 
Making advanced analytics work for you
Making advanced analytics work for youMaking advanced analytics work for you
Making advanced analytics work for you
Yogesh Kumar
 
GAN All-in-One Compliance Management
GAN All-in-One Compliance ManagementGAN All-in-One Compliance Management
GAN All-in-One Compliance ManagementReed Overfelt
 
Emr Where Start
Emr Where StartEmr Where Start
Emr Where Start
Hal Amens
 
Presentation by Owen Barder, Vice President at the Center for Global Development
Presentation by Owen Barder, Vice President at the Center for Global DevelopmentPresentation by Owen Barder, Vice President at the Center for Global Development
Presentation by Owen Barder, Vice President at the Center for Global Development
Stockholm Institute of Transition Economics
 
Erp solution
Erp solutionErp solution
Erp solution
ritikashah123
 
Erp solution
Erp solutionErp solution
Erp solution
ritikashah123
 
Technology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff AssociationsTechnology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff Associations
OSIbeyond
 
Why choose Red e App for your employees?
Why choose Red e App for your employees?Why choose Red e App for your employees?
Why choose Red e App for your employees?
Red e App
 

What's hot (20)

A presentation on management information system
A presentation on management information systemA presentation on management information system
A presentation on management information system
 
Cloud Integration in a Hyper Growth Environment
Cloud Integration in a Hyper Growth EnvironmentCloud Integration in a Hyper Growth Environment
Cloud Integration in a Hyper Growth Environment
 
Pp5
Pp5Pp5
Pp5
 
O'Leary_ResUniversal2016
O'Leary_ResUniversal2016O'Leary_ResUniversal2016
O'Leary_ResUniversal2016
 
Regional West Medical Center leverages IT strategically with McKesson's Appli...
Regional West Medical Center leverages IT strategically with McKesson's Appli...Regional West Medical Center leverages IT strategically with McKesson's Appli...
Regional West Medical Center leverages IT strategically with McKesson's Appli...
 
Ppt 01 ge
Ppt 01 gePpt 01 ge
Ppt 01 ge
 
Fight The Status Quo And Discover How To Do More With All Data
Fight The Status Quo And Discover How To Do More With All DataFight The Status Quo And Discover How To Do More With All Data
Fight The Status Quo And Discover How To Do More With All Data
 
Green - The Reader Perspective
Green - The Reader PerspectiveGreen - The Reader Perspective
Green - The Reader Perspective
 
Overcoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databasesOvercoming the difficulties of managing multiple databases
Overcoming the difficulties of managing multiple databases
 
Sustainability Through Software Symantec At United Nations L
Sustainability Through Software   Symantec At United Nations LSustainability Through Software   Symantec At United Nations L
Sustainability Through Software Symantec At United Nations L
 
Making advanced analytics work for you
Making advanced analytics work for youMaking advanced analytics work for you
Making advanced analytics work for you
 
GAN All-in-One Compliance Management
GAN All-in-One Compliance ManagementGAN All-in-One Compliance Management
GAN All-in-One Compliance Management
 
Emr Where Start
Emr Where StartEmr Where Start
Emr Where Start
 
Presentation by Owen Barder, Vice President at the Center for Global Development
Presentation by Owen Barder, Vice President at the Center for Global DevelopmentPresentation by Owen Barder, Vice President at the Center for Global Development
Presentation by Owen Barder, Vice President at the Center for Global Development
 
Erp solution
Erp solutionErp solution
Erp solution
 
Erp solution
Erp solutionErp solution
Erp solution
 
Technology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff AssociationsTechnology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff Associations
 
Dont Gamble With Your Data
Dont Gamble With Your DataDont Gamble With Your Data
Dont Gamble With Your Data
 
Hrr cfo-benefits
Hrr cfo-benefitsHrr cfo-benefits
Hrr cfo-benefits
 
Why choose Red e App for your employees?
Why choose Red e App for your employees?Why choose Red e App for your employees?
Why choose Red e App for your employees?
 

Similar to Data Protection: Transformation Ahead

V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
Identifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&AIdentifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&A
Workiva
 
Identifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&AIdentifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&A
Steve Potter
 
Modern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First WorldModern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First World
SWC Technology Partners
 
500 IT leaders weigh on on the state of DRaaS
500 IT leaders weigh on on the state of DRaaS500 IT leaders weigh on on the state of DRaaS
500 IT leaders weigh on on the state of DRaaS
ClearSky Data
 
IT Disaster Recovery.pptx
IT Disaster Recovery.pptxIT Disaster Recovery.pptx
IT Disaster Recovery.pptx
elpatronnacho
 
Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015
Rogers Communications
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
Angie Jorgensen
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Lawrence Dillon
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Maru Schietekat
 
Veritas corporate brochure emea
Veritas corporate brochure emeaVeritas corporate brochure emea
Veritas corporate brochure emea
Hayatollah Ayoubi
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosion
Vodafone Business
 
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive AdvantageVirtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Softchoice Corporation
 
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
BerryHughes
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
EstelaJeffery653
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
cravennichole326
 
Service - BP&T communication
Service - BP&T communicationService - BP&T communication
Service - BP&T communication
Premier Alliance Group
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologistDonald Tabone
 

Similar to Data Protection: Transformation Ahead (20)

V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Identifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&AIdentifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&A
 
Identifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&AIdentifying Costs of Shadow Finance in FP&A
Identifying Costs of Shadow Finance in FP&A
 
Modern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First WorldModern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First World
 
500 IT leaders weigh on on the state of DRaaS
500 IT leaders weigh on on the state of DRaaS500 IT leaders weigh on on the state of DRaaS
500 IT leaders weigh on on the state of DRaaS
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
IT Disaster Recovery.pptx
IT Disaster Recovery.pptxIT Disaster Recovery.pptx
IT Disaster Recovery.pptx
 
Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
 
Veritas corporate brochure emea
Veritas corporate brochure emeaVeritas corporate brochure emea
Veritas corporate brochure emea
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosion
 
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive AdvantageVirtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
 
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
 
Service - BP&T communication
Service - BP&T communicationService - BP&T communication
Service - BP&T communication
 
BMC eBook
BMC eBookBMC eBook
BMC eBook
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Data Protection: Transformation Ahead

  • 1. Time Cost Time CostTime Cost Time Cost DATA PROTECTION: TRANSFORMATION AHEAD IT is increasingly a driver of business innovation. But you can’t open those doors to innovation without first transforming outdated data protection models. Here’s why – and how – you need to modernize your organization’s approach to data backup and disaster recovery. 42% of business continuity decision -makers believe business complexity is increasing risk across their organization1 Unplanned application downtime costs Fortune 1000 firms an average of $1.25 billion to $2.5 billion per year2 Data volumes at the majority of organizations are increasing between 11%-30% annually; 1 in 10 organizations see annual data growth above 50%3 of organizations are planning to deploy cloud-based storage solutions over the coming year4 Do you want the peace of mind that you can recover from failure quickly and keep your business running nonstop? Do you want to reduce complexity so your staff can focus on innovation instead of administration? Do you want to capture the value of the cloud to enhance your existing data protection? Then now’s the time to transform your data protection. To learn more about solutions to transform your data protection, visit http://www.netapp.com/data-protection Sources: 1. Forrester/Disaster Recovery Journal 2. IDC 3. Enterprise Strategy Group 4. IDG 5. InformationWeek plan to use disk-to- disk-to-cloud in future backup strategies5 On-premise backup & archive: Accelerate backup performance by as much as 10x Cloud-integrated backup & ar- chive: Reduce backup costs by up to 90% compared to tape Asynchronous disaster recovery: Reduce opera- tional costs by up to 50% Synchronous, site-to-site high availability: Zero data loss, near- zero downtime Traditional data protection is too slow, too expensive, and too complex to meet rapidly evolving business needs. On-premises data protection solutions are still important, but the cloud is offering opportunities for additional innovation and increased efficiency across the entire data protection spectrum. A successful data protection framework will balance cost and time requirements across four key areas of backup and disaster recovery. 42% $1.25 to $2.5 BILLION 11%-30% ANNUALLY 72% 47% Brought to you by CIO on behalf of