SlideShare a Scribd company logo
1 of 14
Download to read offline
Research
Report
Abstract:
2010 Data Protection Trends

By Lauren Whitehouse and Bill Lundell
With John McKnight and Jennifer Gahm




April 2010




© 2010 Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends


Introduction
Research Objectives
In order to assess the current state of the data protection market, ESG recently surveyed 510 North America-based
senior IT professionals representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or
more) organizations. All respondents were personally responsible for evaluating, purchasing, or managing data
protection technologies—such as backup and recovery software, data replication software, and disk or tape storage
systems used for secondary data storage—for their organization.
The survey was designed to answer the following questions:
       What are the primary data protection challenges that organizations are currently facing?
       Which areas of data protection will merit the greatest level of investment in 2010?
       How confident are organizations that their data protection applications and processes are adequately
       protecting their data?
       Which types of data protection technologies and processes are currently in use? How will this change going
       forward?
       What impact does the business value of data have on data protection applications and processes?
       How satisfied are organizations with their current data protection technologies and strategies?
       What types of storage solutions are currently used to support data protection requirements and how will
       this change over time?
       How pervasive has data deduplication usage become over the last several years?
Survey participants represent a wide range of industries including manufacturing, financial services,
communications and media, health care, retail, government, and business services. For more details, please see
the Research Methodology and Respondent Demographics sections of this report.




                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends


Research Methodology
To gather data for this report, ESG conducted a comprehensive online survey of IT managers from private- and
public-sector organizations in North America (United States and Canada) between January 8, 2010 and January 29,
2010. To qualify for this survey, respondents were required to have day-to-day responsibility for evaluating,
purchasing, or managing data protection technologies such as backup and recovery software, data replication
software, and/or disk or tape systems used for secondary data storage. All respondents were provided an incentive
to complete the survey in the form of cash awards and/or cash equivalents.
After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed
responses (on a number of criteria) for data integrity, ESG was left with a final total sample of 510 IT managers.
Please see the Respondent Demographics section of this report for more information on these respondents.
Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding.




                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends


Respondent Demographics
The data presented in this report is based on a survey of 510 qualified respondents. The figures below detail the
demographics of the respondent base.

Respondents by Role
The breakdown of current roles within an organization among survey respondents is shown in Figure 1.
  Figure 1. Survey Respondents, by Role

                 Which of the following best describes your current role within your organization?
                                         (Percent of respondents, N=510)
                                             Other, 5%



                                                                                      IT Management
                                                                                     (e.g., CIO, VP of IT,
                                                                                     Director of IT, etc.),
                                                                                             46%
                   IT Staff (e.g., Storage
                       Administrator,
                          Systems
                   Administrator, etc.),
                             49%

                                                                                    Source: Enterprise Strategy Group, 2010.

Respondents by Technology Responsibility
Survey respondents’ primary area of technology responsibility is shown in Figure 2.
  Figure 2. Survey Respondents, by Primary Area of Technology Responsibility

                   Which of the following would you consider to be your primary area of technology
                                    responsibility? (Percent of respondents, N=510)
                             Storage / SAN, 5%             Other, 1%
                       IT
             Architecture/Planning,
                       7%                                                         General IT, 32%

                 Applications/Database,
                           9%


                        Servers, 14%

                                                                                 Data Protection (e.g.,
                                                                                   backup/recovery,
                             IT Operations, 15%                                  replication, etc.), 17%

                                                                                    Source: Enterprise Strategy Group, 2010.




                                © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

Respondents by Number of Employees
The number of employees in respondents’ organizations is shown in Figure 3.
  Figure 3. Survey Respondents, by Number of Employees

                 How many total employees does your organization have worldwide? (Percent of
                                             respondents, N=510)
                                                                 100 to 249, 10%
                           20,000 or more, 12%

                                                                                       250 to 499, 14%


                   5,000 to 19,999, 20%



                                                                                    500 to 999, 16%


                           2,500 to 4,999, 12%
                                                                   1,000 to 2,499, 15%


                                                                                   Source: Enterprise Strategy Group, 2010.

Respondents by Industry
Respondents were asked to identify their organization’s primary industry. In total, ESG received completed,
qualified respondents from individuals in 18 distinct vertical industries, plus an “Other” category. Respondents
were then grouped into the broader categories shown in Figure 4.
  Figure 4. Survey Respondents, by Industry

                 What is your organization’s primary industry? (Percent of respondents, N=510)


                                 Other, 18%
                                                                                Manufacturing, 23%


                   Retail/Wholesale, 5%


                Professional Services,
                         6%
                                                                                          Government (Federal,
                                                                                            National, State,
                        Communications &                                                      Local), 16%
                           Media, 8%

                              Health Care, 12%                    Financial (banking,
                                                                securities, insurance),
                                                                         13%
                                                                                   Source: Enterprise Strategy Group, 2010.



                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

Respondents by Annual Revenue
The annual revenue of survey respondents’ organizations is shown in Figure 5.
  Figure 5. Survey Respondents, by Annual Revenue

                                  What is your organization’s total annual revenue ($US)?
                                             (Percent of respondents, N=510)

  14%                                                                                                                              13%
                                              12%                      12%         12%
  12%                 11%
  10%
           8%
   8%                              7%                      7%
                                                                                                 6%
   6%                                                                                                       5%          5%
   4%
   2%
   0%
         Less than $25 million $50 million  $100         $250         $500 $1 billion to $5 billion to $10 billion $20 billion     Not
        $25 million to $49       to $99    million to   million to   million to $4.999     $9.999 to $19.999 or more applicable
                     million     million    $249         $499         $999      billion     billion      billion               (e.g., public
                                            million      million      million                                                  sector, non-
                                                                                                                                  profit)


                                                                                              Source: Enterprise Strategy Group, 2010.

Respondents by Physical Locations Worldwide
The number of worldwide physical locations of survey respondents’ organizations is shown in Figure 6.
  Figure 6. Survey Respondents, by Physical Locations Worldwide

                     To the best of your knowledge, how many physical locations (offices, plants,
                        branches, etc.) does your organization operate worldwide? (Percent of
                                                 respondents, N=510)

                                                                     Don’t know, 2%
                                      500 or more, 8%                                    1, 4%

                                 250 to 499, 6%                                                   2 to 5 , 21%


                          100 to 249, 9%


                                                                                                 6 to 10, 15%
                                 50 to 99 , 9%


                                   26 to 49, 10%                                   11 to 25, 17%



                                                                                              Source: Enterprise Strategy Group, 2010.



                                   © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

Respondents by Data Centers Operated Worldwide
The number of data centers operated worldwide by survey respondents’ organizations is shown in Figure 7.
  Figure 7. Survey Respondents, by Data Centers Worldwide

                How many data centers does your organization operate worldwide? (Percent of
                                           respondents, N=510)
                        Rely solely on third-
                         party outsourced
                        data center facilities,        Don’t know, 1%
                                 1%                                        1, 15%

                          More than 20, 12%


                       11 to 20, 9%                                                     2, 17%




                         6 to 10, 15%


                                                                          3 to 5, 30%


                                                                                    Source: Enterprise Strategy Group, 2010.

Respondents by Number of Production Servers
The number of production servers in respondents’ immediate organizations is shown in Figure 8.
  Figure 8. Survey Respondents, by Number of Production Servers

                 Approximately how many production servers (whether physical or virtual) are
                supported worldwide by your IT organization? (Percent of respondents, N=510)

                               More than 5,000,             Don’t know, 2%
                                      5%
                                                                            Less than 25, 17%
                         2,501 to 5,000, 2%

                  1,001 to 2,500, 7%


                    501 to 1,000, 11%                                                   25 to 49, 16%




                      251 to 500, 11%
                                                                             50 to 100, 16%

                                    101 to 250, 13%
                                                                                    Source: Enterprise Strategy Group, 2010.


                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

Respondents by Total Amount of Data
The number of production servers in respondents’ immediate organizations is shown in Figure 9.
  Figure 9. Survey Respondents, by Total Amount of Data

                 What is your immediate organization’s approximate total volume of data stored on
                     corporate servers and storage systems? (Percent of respondents, N=510)
  14%                                      13%
                                12%
  12%                 11%
                                                      10%        10%                                                  10%
  10%                                                                          9%
                                                                                       8%
   8%
           6%                                                                                     6%
   6%                                                                                                       5%

   4%

   2%

   0%

        Less than 1 TB – 5 6 TB – 10 11 TB – 25 26 TB – 50 51 TB –        101 TB – 251 TB – 500 TB – 1 More than      Don’t
           1 TB      TB       TB         TB         TB     100 TB          250 TB   500 TB      PB       1 PB         know
        (terabyte)                                                                          (petabyte)

                                                                                     Source: Enterprise Strategy Group, 2010.

On-Site vs. Off-Site Data
Respondents were asked to break down their organization’s total amount of data by the categories presented in
Figure 10.
  Figure 10. Classification of Total Amount of Data

                         To the best of your knowledge, what percentage of your immediate
                      organization’s total volume of data is associated with each of the following
                                               categories? (Mean, N=510)
             100%

                90%
                                                          Off-site secondary
                                                              data, 21%
                80%

                70%                                         On-site secondary
                60%                                            data, 26%

                50%

                40%

                30%                                          On-site primary
                20%
                                                               data, 53%

                10%

                 0%

                                                                                     Source: Enterprise Strategy Group, 2010.


                                 © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

Percent of Data by Tier
ESG asked respondents to categorize their organization’s total volume primary data into three tiers based on the
following definitions:
        Tier-1: Mission-critical data and applications with the highest requirements for both availability and
        performance.
        Tier-2: Data and applications requiring good performance and reliability, but not at the level of mission-
        critical data. This can include a mix of less-critical application data and older mission-critical data.
        Tier-3: Typically archived data; performance is less essential, but the data must be retrievable.
The results are presented in Figure 11.
  Figure 11. Classification of Primary Data, by Business Value

                        Of your immediate organization’s total amount of primary data, please
                      indicate the approximate breakout of that data as outlined below. (Mean,
                                                      N=510)
               100%
                                                          Percent of total
                90%
                                                         data that is Tier-3,
                80%                                             24%

                70%
                                                          Percent of total
                60%                                      data that is Tier-2,
                                                                28%
                50%

                40%

                30%                                       Percent of total
                                                         data that is Tier-1,
                20%
                                                                48%
                10%

                 0%


                                                                                    Source: Enterprise Strategy Group, 2010.




                                © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

Respondents by Annual Data Protection Budget
Respondents were asked to provide their organization’s annual data protection budget in Figure 12.
  Figure 12. Annual Data Protection Budget

                 In a typical year, approximately how much does your organization spend on data
                  protection technologies and processes, in terms of both capital and operational
                                    expenditures? (Percent of respondents, N=510)
      20%      18%         18%
      18%                               16%
      16%                                                     15%
      14%                                          13%
      12%
      10%
       8%                                                                                                               6%
       6%                                                                   5%         5%
       4%                                                                                         2%         2%
       2%
       0%
             Less than   $100,000     $250,000   $500,000 $1 million $5 million $10 million $25 million $50 million Don’t know
             $100,000       to           to         to    to $4.999 to $9.999 to $24.999 to $49.999 or more             / not
                         $249,999     $499,999   $999,999  million    million     million     million                 familiar
                                                                                                                        with
                                                                                                                     spending
                                                                                                                       levels


                                                                                            Source: Enterprise Strategy Group, 2010.

Respondents by Data Protection Spending Allocation
Respondents were asked to approximate their organization’s data protection spending allocation in Figure 13.
  Figure 13. Data Protection Spending Allocation

              Approximately what percentage of your organization’s typical annual data protection
                   spending is allocated to each of the following categories? (Mean, N=480)
      100%                                                        Other, 3%
                                                            Outsourcing services, 8%
       90%
                                                                  Professional
                                                            services/consulting, 9%
       80%                                                   Removable media and
                                                              media management
       70%                                                       services, 11%

       60%                                                       Software, 19%

       50%

       40%                                                      Hardware, 23%

       30%

       20%
                                                                   Staff, 28%
       10%

       0%
                                                                                            Source: Enterprise Strategy Group, 2010.



                                    © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends


Contents
 List of Figures ................................................................................................................................................ 3
 List of Tables ................................................................................................................................................. 4
 Executive Summary ...................................................................................................................................... 5
   Report Conclusions ................................................................................................................................................... 5
 Introduction .................................................................................................................................................. 7
   Research Objectives ................................................................................................................................................. 7
 Research Findings ......................................................................................................................................... 8
   Large and Growing Data Storage Environments Impact Data Protection Strategies ............................................... 8
   Organizations Still Face Many Diverse Data Protection Challenges ....................................................................... 10
   On-Site Disk and Tape Still Dominate Backup Processes at Most Organizations ................................................... 13
   Advanced Data Protection Technologies Have Gained a Foothold ........................................................................ 24
   Current Primary Backup Application Trends .......................................................................................................... 27
   Business Value Used to Guide Data Protection Strategies ..................................................................................... 32
   Capacity Reduction Technology Adoption is Extensive .......................................................................................... 38
 Conclusion................................................................................................................................................... 44
 Research Methodology ............................................................................................................................... 45
 Respondent Demographics......................................................................................................................... 46
   Respondents by Role .............................................................................................................................................. 46
   Respondents by Technology Responsibility ........................................................................................................... 46
   Respondents by Number of Employees ................................................................................................................. 47
   Respondents by Industry ........................................................................................................................................ 47
   Respondents by Annual Revenue ........................................................................................................................... 48
   Respondents by Physical Locations Worldwide ..................................................................................................... 48
   Respondents by Data Centers Operated Worldwide ............................................................................................. 49
   Respondents by Number of Production Servers .................................................................................................... 49
   Respondents by Total Amount of Data .................................................................................................................. 50
   On-Site vs. Off-Site Data ......................................................................................................................................... 50
   Percent of Data by Tier ........................................................................................................................................... 51
   Respondents by Annual Data Protection Budget ................................................................................................... 52
   Respondents by Data Protection Spending Allocation ........................................................................................... 52




                                           © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends


List of Figures
 Figure 1. Total Volume of Data Stored on Corporate Servers and Storage Systems .................................................. 8
 Figure 2. Annual Data Growth Rates ........................................................................................................................... 9
 Figure 3. Annual Data Growth Rates, by Number of Production Servers ................................................................... 9
 Figure 4. Current Data Protection Process and Technology Challenges ................................................................... 10
 Figure 5. Top Areas of Data Protection Investment for 2010 ................................................................................... 11
 Figure 6. High Priority Applications from a Data Protection Perspective ................................................................. 12
 Figure 7. Current Primary Data Backup Processes Used ........................................................................................... 13
 Figure 8. On-Site Data Backup Processes .................................................................................................................. 14
 Figure 9. On-Site Data Backup Processes, by Number of Production Servers .......................................................... 15
 Figure 10. On-Site Data Backup Processes, 2008 vs. 2010........................................................................................ 15
 Figure 11. Length of Time Backup Data is Kept on Disk Before Being Migrated to Tape for Long-Term Retention 16
 Figure 12. Length of Time Backup Data is Kept on Disk Before Being Migrated to Tape, by Company Size ............ 16
 Figure 13. Breakdown of On-Site Secondary Data Stored on Disk-Based Storage Systems Compared to Tape ...... 17
 Figure 14. Type(s) of On-Site Disk-Based Storage Systems Being Used as Backup Targets ...................................... 18
 Figure 15. Type(s) of On-Site Disk-Based Storage Systems Being Used as Backup Targets, by Company Size......... 18
 Figure 16. Plans to Deploy Backup-to-Disk Technologies among Organizations Currently Using Tape ................... 19
 Figure 17. Type(s) of On-Site Disk-Based Storage Systems Being Considered as Backup Targets............................ 19
 Figure 18. Why Organizations Have No Plans to Deploy Any Backup-to-Disk Technologies .................................... 20
 Figure 19. Reasons Organizations Do Not Use On-Site Storage Resources for Backup Data ................................... 21
 Figure 20. Primary Method for Whole-Server and/or Entire Site Recoveries .......................................................... 22
 Figure 21. Data Sources Protected by Remote Backup Solution .............................................................................. 23
 Figure 22. Usage of Data Protection Technologies ................................................................................................... 24
 Figure 23. Plans to Replace File-Level Backup .......................................................................................................... 26
 Figure 24. Length of Time Primary Backup Application Has Been Deployed ............................................................ 27
 Figure 25. Length of Time Primary Backup Application Has Been Deployed, by Company Size .............................. 27
 Figure 26. Commitment to Current Backup Process ................................................................................................. 28
 Figure 27. Reasons Organizations Wouldn’t Replace Current Backup Solution/Vendor .......................................... 29
 Figure 28. Reasons Organizations Would Replace Current Backup Solution/Vendor .............................................. 30
 Figure 29. Reasons Organizations Would Replace Current Backup Solution/Vendor with a Third Party Online
         Backup Service ............................................................................................................................................. 31
 Figure 30. Downtime Tolerance According to Business Value of Data ..................................................................... 32
 Figure 31. Types of Data Protection Solutions Used for Each Tier of Data Based on Business Value of Data ......... 33
 Figure 32. Frequency of Backup Copies for Each Tier of Data Based on Business Value of Data ............................. 34
 Figure 33. Confidence Level in Data Protection for Each Tier of Data Based on Business Value ............................. 35
 Figure 34. Organizations Confident that Data is Protected Are More Likely to Use Same Backup Solution/Vendor
         ...................................................................................................................................................................... 36
 Figure 35. Confidence Level in Data Protection for Tier-1 Data Based on Data Protection Technology Type ......... 36
 Figure 36. Typical Age of Recovered Data................................................................................................................. 37
 Figure 37. Usage of Data Deduplication Solutions, 2008 vs. 2010............................................................................ 38
 Figure 38. Usage of Data Deduplication Solutions, by Company Size....................................................................... 39
 Figure 39. Usage of Data Deduplication Solutions, by Total Amount of Data .......................................................... 39
 Figure 40. Factors Influencing Data Deduplication Technology Evaluation and Selection ....................................... 40
 Figure 41. Data Deduplication Implementation Methods, Current Users vs. Planned Adopters ............................. 41
 Figure 42. Data Deduplication Implementation Methods, by Total Amount of Data .............................................. 41
 Figure 43. Where Data Deduplication is Implemented............................................................................................. 42
 Figure 44. Degree of Capacity Reduction Attributable to Data Deduplication Technology ..................................... 43
 Figure 45. Survey Respondents, by Role ................................................................................................................... 46
 Figure 46. Survey Respondents, by Primary Area of Technology Responsibility ...................................................... 46
 Figure 47. Survey Respondents, by Number of Employees ...................................................................................... 47
 Figure 48. Survey Respondents, by Industry ............................................................................................................. 47

                                             © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
Research Report: 2010 Data Protection Trends

 Figure 49. Survey Respondents, by Annual Revenue ................................................................................................ 48
 Figure 50. Survey Respondents, by Physical Locations Worldwide .......................................................................... 48
 Figure 51. Survey Respondents, by Data Centers Worldwide .................................................................................. 49
 Figure 52. Survey Respondents, by Number of Production Servers ......................................................................... 49
 Figure 53. Survey Respondents, by Total Amount of Data ....................................................................................... 50
 Figure 54. Classification of Total Amount of Data .................................................................................................... 50
 Figure 55. Classification of Primary Data, by Business Value.................................................................................... 51
 Figure 56. Annual Data Protection Budget ............................................................................................................... 52
 Figure 57. Data Protection Spending Allocation ....................................................................................................... 52

List of Tables
 Table 1. Current and Planned Usage of CDP Technology.......................................................................................... 25
 Table 2. Current and Planned Usage of Replication Technology .............................................................................. 26
 Table 3. Good Relationship with Backup Vendor is More Likely the Longer that Vendor’s Solution Has Been
         Deployed ...................................................................................................................................................... 29




 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise
 Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from
 time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in
 part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise
 Strategy Group, Inc., is in violation of U.S. Copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should
 you have any questions, please contact ESG Client Relations at (508) 482.0188.




                                           © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
20 Asylum Street | Milford, MA 01757 | Tel:508.482.0188 Fax: 508.482.0128 | www.enterprisestrategygroup.com

More Related Content

Viewers also liked

Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009
Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009
Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009CA RMDM Latam
 
CA ERwin Data Modeler End User Presentation
CA ERwin Data Modeler End User PresentationCA ERwin Data Modeler End User Presentation
CA ERwin Data Modeler End User PresentationCA RMDM Latam
 
Machine Train Alignment
Machine Train AlignmentMachine Train Alignment
Machine Train Alignmentdjozokos
 
Shaft Alignment Tolerances
Shaft Alignment TolerancesShaft Alignment Tolerances
Shaft Alignment Tolerancesdjozokos
 

Viewers also liked (6)

Visual Resume
Visual ResumeVisual Resume
Visual Resume
 
Wireless security trends
Wireless security trendsWireless security trends
Wireless security trends
 
Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009
Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009
Modelo Licenciamiento Ca Recovery Management Evento Partners Ca 2009
 
CA ERwin Data Modeler End User Presentation
CA ERwin Data Modeler End User PresentationCA ERwin Data Modeler End User Presentation
CA ERwin Data Modeler End User Presentation
 
Machine Train Alignment
Machine Train AlignmentMachine Train Alignment
Machine Train Alignment
 
Shaft Alignment Tolerances
Shaft Alignment TolerancesShaft Alignment Tolerances
Shaft Alignment Tolerances
 

Similar to Esg research 2010 data protection trends

SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
 
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docxblondellchancy
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
 
Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...
Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...
Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...Ian McCarthy
 
Idiro Analytics - Social Network Analysis
Idiro Analytics - Social Network AnalysisIdiro Analytics - Social Network Analysis
Idiro Analytics - Social Network AnalysisIdiro Analytics
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfMichelleTartalio
 
Making Leaders Successful Every Day
Making Leaders Successful Every DayMaking Leaders Successful Every Day
Making Leaders Successful Every Daytibbr
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Momo Scott
 
Navigating IT Complexity - Research report by IDG
Navigating IT Complexity - Research report by IDGNavigating IT Complexity - Research report by IDG
Navigating IT Complexity - Research report by IDGShoreTel
 
Big Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesBig Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesGregg Barrett
 
The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011dvasilyev
 
The evolving role of IT managers and CIOs
The evolving role of IT managers and CIOsThe evolving role of IT managers and CIOs
The evolving role of IT managers and CIOsIBM Rational software
 
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...Rochelle Schear
 
The data science revolution in insurance
The data science revolution in insuranceThe data science revolution in insurance
The data science revolution in insuranceStefano Perfetti
 

Similar to Esg research 2010 data protection trends (20)

SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
 
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
 
Empowered
EmpoweredEmpowered
Empowered
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Assessing enterprise readiness for the IoT
Assessing enterprise readiness for the IoTAssessing enterprise readiness for the IoT
Assessing enterprise readiness for the IoT
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
 
Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...
Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...
Big Data for Creating and Capturing Value in the Digitalized Environment: Unp...
 
Idiro Analytics - Social Network Analysis
Idiro Analytics - Social Network AnalysisIdiro Analytics - Social Network Analysis
Idiro Analytics - Social Network Analysis
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
Making Leaders Successful Every Day
Making Leaders Successful Every DayMaking Leaders Successful Every Day
Making Leaders Successful Every Day
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry
 
NIRI White Paper: Compensation and the IRO
NIRI White Paper: Compensation and the IRONIRI White Paper: Compensation and the IRO
NIRI White Paper: Compensation and the IRO
 
Navigating IT Complexity - Research report by IDG
Navigating IT Complexity - Research report by IDGNavigating IT Complexity - Research report by IDG
Navigating IT Complexity - Research report by IDG
 
Big Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesBig Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and Challenges
 
The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011
 
The evolving role of IT managers and CIOs
The evolving role of IT managers and CIOsThe evolving role of IT managers and CIOs
The evolving role of IT managers and CIOs
 
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
 
The data science revolution in insurance
The data science revolution in insuranceThe data science revolution in insurance
The data science revolution in insurance
 

More from CA RMDM Latam

Rosario evento a clientes de RMDM Octubre 2009 - DM
Rosario evento a clientes de RMDM Octubre 2009 - DMRosario evento a clientes de RMDM Octubre 2009 - DM
Rosario evento a clientes de RMDM Octubre 2009 - DMCA RMDM Latam
 
Rosario evento a clientes de RMDM Octubre 2009 - RM
Rosario evento a clientes de RMDM Octubre 2009 - RMRosario evento a clientes de RMDM Octubre 2009 - RM
Rosario evento a clientes de RMDM Octubre 2009 - RMCA RMDM Latam
 
Uso Mrc Ca Partner Portal
Uso Mrc Ca Partner PortalUso Mrc Ca Partner Portal
Uso Mrc Ca Partner PortalCA RMDM Latam
 
Ca Erwin Data Modeling - Presentado por SAM sistemas
Ca Erwin Data Modeling - Presentado por SAM sistemasCa Erwin Data Modeling - Presentado por SAM sistemas
Ca Erwin Data Modeling - Presentado por SAM sistemasCA RMDM Latam
 
CA Erwin Introduccion
CA Erwin IntroduccionCA Erwin Introduccion
CA Erwin IntroduccionCA RMDM Latam
 
Brief Ca Security Threat Management
Brief Ca Security Threat ManagementBrief Ca Security Threat Management
Brief Ca Security Threat ManagementCA RMDM Latam
 
Por Que Ser Un Partner Ca Evento Partners Ca 2009
Por Que Ser Un Partner Ca Evento Partners Ca 2009Por Que Ser Un Partner Ca Evento Partners Ca 2009
Por Que Ser Un Partner Ca Evento Partners Ca 2009CA RMDM Latam
 

More from CA RMDM Latam (7)

Rosario evento a clientes de RMDM Octubre 2009 - DM
Rosario evento a clientes de RMDM Octubre 2009 - DMRosario evento a clientes de RMDM Octubre 2009 - DM
Rosario evento a clientes de RMDM Octubre 2009 - DM
 
Rosario evento a clientes de RMDM Octubre 2009 - RM
Rosario evento a clientes de RMDM Octubre 2009 - RMRosario evento a clientes de RMDM Octubre 2009 - RM
Rosario evento a clientes de RMDM Octubre 2009 - RM
 
Uso Mrc Ca Partner Portal
Uso Mrc Ca Partner PortalUso Mrc Ca Partner Portal
Uso Mrc Ca Partner Portal
 
Ca Erwin Data Modeling - Presentado por SAM sistemas
Ca Erwin Data Modeling - Presentado por SAM sistemasCa Erwin Data Modeling - Presentado por SAM sistemas
Ca Erwin Data Modeling - Presentado por SAM sistemas
 
CA Erwin Introduccion
CA Erwin IntroduccionCA Erwin Introduccion
CA Erwin Introduccion
 
Brief Ca Security Threat Management
Brief Ca Security Threat ManagementBrief Ca Security Threat Management
Brief Ca Security Threat Management
 
Por Que Ser Un Partner Ca Evento Partners Ca 2009
Por Que Ser Un Partner Ca Evento Partners Ca 2009Por Que Ser Un Partner Ca Evento Partners Ca 2009
Por Que Ser Un Partner Ca Evento Partners Ca 2009
 

Esg research 2010 data protection trends

  • 1. Research Report Abstract: 2010 Data Protection Trends By Lauren Whitehouse and Bill Lundell With John McKnight and Jennifer Gahm April 2010 © 2010 Enterprise Strategy Group, Inc. All Rights Reserved.
  • 2. Research Report: 2010 Data Protection Trends Introduction Research Objectives In order to assess the current state of the data protection market, ESG recently surveyed 510 North America-based senior IT professionals representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations. All respondents were personally responsible for evaluating, purchasing, or managing data protection technologies—such as backup and recovery software, data replication software, and disk or tape storage systems used for secondary data storage—for their organization. The survey was designed to answer the following questions: What are the primary data protection challenges that organizations are currently facing? Which areas of data protection will merit the greatest level of investment in 2010? How confident are organizations that their data protection applications and processes are adequately protecting their data? Which types of data protection technologies and processes are currently in use? How will this change going forward? What impact does the business value of data have on data protection applications and processes? How satisfied are organizations with their current data protection technologies and strategies? What types of storage solutions are currently used to support data protection requirements and how will this change over time? How pervasive has data deduplication usage become over the last several years? Survey participants represent a wide range of industries including manufacturing, financial services, communications and media, health care, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 3. Research Report: 2010 Data Protection Trends Research Methodology To gather data for this report, ESG conducted a comprehensive online survey of IT managers from private- and public-sector organizations in North America (United States and Canada) between January 8, 2010 and January 29, 2010. To qualify for this survey, respondents were required to have day-to-day responsibility for evaluating, purchasing, or managing data protection technologies such as backup and recovery software, data replication software, and/or disk or tape systems used for secondary data storage. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, ESG was left with a final total sample of 510 IT managers. Please see the Respondent Demographics section of this report for more information on these respondents. Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 4. Research Report: 2010 Data Protection Trends Respondent Demographics The data presented in this report is based on a survey of 510 qualified respondents. The figures below detail the demographics of the respondent base. Respondents by Role The breakdown of current roles within an organization among survey respondents is shown in Figure 1. Figure 1. Survey Respondents, by Role Which of the following best describes your current role within your organization? (Percent of respondents, N=510) Other, 5% IT Management (e.g., CIO, VP of IT, Director of IT, etc.), 46% IT Staff (e.g., Storage Administrator, Systems Administrator, etc.), 49% Source: Enterprise Strategy Group, 2010. Respondents by Technology Responsibility Survey respondents’ primary area of technology responsibility is shown in Figure 2. Figure 2. Survey Respondents, by Primary Area of Technology Responsibility Which of the following would you consider to be your primary area of technology responsibility? (Percent of respondents, N=510) Storage / SAN, 5% Other, 1% IT Architecture/Planning, 7% General IT, 32% Applications/Database, 9% Servers, 14% Data Protection (e.g., backup/recovery, IT Operations, 15% replication, etc.), 17% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 5. Research Report: 2010 Data Protection Trends Respondents by Number of Employees The number of employees in respondents’ organizations is shown in Figure 3. Figure 3. Survey Respondents, by Number of Employees How many total employees does your organization have worldwide? (Percent of respondents, N=510) 100 to 249, 10% 20,000 or more, 12% 250 to 499, 14% 5,000 to 19,999, 20% 500 to 999, 16% 2,500 to 4,999, 12% 1,000 to 2,499, 15% Source: Enterprise Strategy Group, 2010. Respondents by Industry Respondents were asked to identify their organization’s primary industry. In total, ESG received completed, qualified respondents from individuals in 18 distinct vertical industries, plus an “Other” category. Respondents were then grouped into the broader categories shown in Figure 4. Figure 4. Survey Respondents, by Industry What is your organization’s primary industry? (Percent of respondents, N=510) Other, 18% Manufacturing, 23% Retail/Wholesale, 5% Professional Services, 6% Government (Federal, National, State, Communications & Local), 16% Media, 8% Health Care, 12% Financial (banking, securities, insurance), 13% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 6. Research Report: 2010 Data Protection Trends Respondents by Annual Revenue The annual revenue of survey respondents’ organizations is shown in Figure 5. Figure 5. Survey Respondents, by Annual Revenue What is your organization’s total annual revenue ($US)? (Percent of respondents, N=510) 14% 13% 12% 12% 12% 12% 11% 10% 8% 8% 7% 7% 6% 6% 5% 5% 4% 2% 0% Less than $25 million $50 million $100 $250 $500 $1 billion to $5 billion to $10 billion $20 billion Not $25 million to $49 to $99 million to million to million to $4.999 $9.999 to $19.999 or more applicable million million $249 $499 $999 billion billion billion (e.g., public million million million sector, non- profit) Source: Enterprise Strategy Group, 2010. Respondents by Physical Locations Worldwide The number of worldwide physical locations of survey respondents’ organizations is shown in Figure 6. Figure 6. Survey Respondents, by Physical Locations Worldwide To the best of your knowledge, how many physical locations (offices, plants, branches, etc.) does your organization operate worldwide? (Percent of respondents, N=510) Don’t know, 2% 500 or more, 8% 1, 4% 250 to 499, 6% 2 to 5 , 21% 100 to 249, 9% 6 to 10, 15% 50 to 99 , 9% 26 to 49, 10% 11 to 25, 17% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 7. Research Report: 2010 Data Protection Trends Respondents by Data Centers Operated Worldwide The number of data centers operated worldwide by survey respondents’ organizations is shown in Figure 7. Figure 7. Survey Respondents, by Data Centers Worldwide How many data centers does your organization operate worldwide? (Percent of respondents, N=510) Rely solely on third- party outsourced data center facilities, Don’t know, 1% 1% 1, 15% More than 20, 12% 11 to 20, 9% 2, 17% 6 to 10, 15% 3 to 5, 30% Source: Enterprise Strategy Group, 2010. Respondents by Number of Production Servers The number of production servers in respondents’ immediate organizations is shown in Figure 8. Figure 8. Survey Respondents, by Number of Production Servers Approximately how many production servers (whether physical or virtual) are supported worldwide by your IT organization? (Percent of respondents, N=510) More than 5,000, Don’t know, 2% 5% Less than 25, 17% 2,501 to 5,000, 2% 1,001 to 2,500, 7% 501 to 1,000, 11% 25 to 49, 16% 251 to 500, 11% 50 to 100, 16% 101 to 250, 13% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 8. Research Report: 2010 Data Protection Trends Respondents by Total Amount of Data The number of production servers in respondents’ immediate organizations is shown in Figure 9. Figure 9. Survey Respondents, by Total Amount of Data What is your immediate organization’s approximate total volume of data stored on corporate servers and storage systems? (Percent of respondents, N=510) 14% 13% 12% 12% 11% 10% 10% 10% 10% 9% 8% 8% 6% 6% 6% 5% 4% 2% 0% Less than 1 TB – 5 6 TB – 10 11 TB – 25 26 TB – 50 51 TB – 101 TB – 251 TB – 500 TB – 1 More than Don’t 1 TB TB TB TB TB 100 TB 250 TB 500 TB PB 1 PB know (terabyte) (petabyte) Source: Enterprise Strategy Group, 2010. On-Site vs. Off-Site Data Respondents were asked to break down their organization’s total amount of data by the categories presented in Figure 10. Figure 10. Classification of Total Amount of Data To the best of your knowledge, what percentage of your immediate organization’s total volume of data is associated with each of the following categories? (Mean, N=510) 100% 90% Off-site secondary data, 21% 80% 70% On-site secondary 60% data, 26% 50% 40% 30% On-site primary 20% data, 53% 10% 0% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 9. Research Report: 2010 Data Protection Trends Percent of Data by Tier ESG asked respondents to categorize their organization’s total volume primary data into three tiers based on the following definitions: Tier-1: Mission-critical data and applications with the highest requirements for both availability and performance. Tier-2: Data and applications requiring good performance and reliability, but not at the level of mission- critical data. This can include a mix of less-critical application data and older mission-critical data. Tier-3: Typically archived data; performance is less essential, but the data must be retrievable. The results are presented in Figure 11. Figure 11. Classification of Primary Data, by Business Value Of your immediate organization’s total amount of primary data, please indicate the approximate breakout of that data as outlined below. (Mean, N=510) 100% Percent of total 90% data that is Tier-3, 80% 24% 70% Percent of total 60% data that is Tier-2, 28% 50% 40% 30% Percent of total data that is Tier-1, 20% 48% 10% 0% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 10. Research Report: 2010 Data Protection Trends Respondents by Annual Data Protection Budget Respondents were asked to provide their organization’s annual data protection budget in Figure 12. Figure 12. Annual Data Protection Budget In a typical year, approximately how much does your organization spend on data protection technologies and processes, in terms of both capital and operational expenditures? (Percent of respondents, N=510) 20% 18% 18% 18% 16% 16% 15% 14% 13% 12% 10% 8% 6% 6% 5% 5% 4% 2% 2% 2% 0% Less than $100,000 $250,000 $500,000 $1 million $5 million $10 million $25 million $50 million Don’t know $100,000 to to to to $4.999 to $9.999 to $24.999 to $49.999 or more / not $249,999 $499,999 $999,999 million million million million familiar with spending levels Source: Enterprise Strategy Group, 2010. Respondents by Data Protection Spending Allocation Respondents were asked to approximate their organization’s data protection spending allocation in Figure 13. Figure 13. Data Protection Spending Allocation Approximately what percentage of your organization’s typical annual data protection spending is allocated to each of the following categories? (Mean, N=480) 100% Other, 3% Outsourcing services, 8% 90% Professional services/consulting, 9% 80% Removable media and media management 70% services, 11% 60% Software, 19% 50% 40% Hardware, 23% 30% 20% Staff, 28% 10% 0% Source: Enterprise Strategy Group, 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 11. Research Report: 2010 Data Protection Trends Contents List of Figures ................................................................................................................................................ 3 List of Tables ................................................................................................................................................. 4 Executive Summary ...................................................................................................................................... 5 Report Conclusions ................................................................................................................................................... 5 Introduction .................................................................................................................................................. 7 Research Objectives ................................................................................................................................................. 7 Research Findings ......................................................................................................................................... 8 Large and Growing Data Storage Environments Impact Data Protection Strategies ............................................... 8 Organizations Still Face Many Diverse Data Protection Challenges ....................................................................... 10 On-Site Disk and Tape Still Dominate Backup Processes at Most Organizations ................................................... 13 Advanced Data Protection Technologies Have Gained a Foothold ........................................................................ 24 Current Primary Backup Application Trends .......................................................................................................... 27 Business Value Used to Guide Data Protection Strategies ..................................................................................... 32 Capacity Reduction Technology Adoption is Extensive .......................................................................................... 38 Conclusion................................................................................................................................................... 44 Research Methodology ............................................................................................................................... 45 Respondent Demographics......................................................................................................................... 46 Respondents by Role .............................................................................................................................................. 46 Respondents by Technology Responsibility ........................................................................................................... 46 Respondents by Number of Employees ................................................................................................................. 47 Respondents by Industry ........................................................................................................................................ 47 Respondents by Annual Revenue ........................................................................................................................... 48 Respondents by Physical Locations Worldwide ..................................................................................................... 48 Respondents by Data Centers Operated Worldwide ............................................................................................. 49 Respondents by Number of Production Servers .................................................................................................... 49 Respondents by Total Amount of Data .................................................................................................................. 50 On-Site vs. Off-Site Data ......................................................................................................................................... 50 Percent of Data by Tier ........................................................................................................................................... 51 Respondents by Annual Data Protection Budget ................................................................................................... 52 Respondents by Data Protection Spending Allocation ........................................................................................... 52 © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 12. Research Report: 2010 Data Protection Trends List of Figures Figure 1. Total Volume of Data Stored on Corporate Servers and Storage Systems .................................................. 8 Figure 2. Annual Data Growth Rates ........................................................................................................................... 9 Figure 3. Annual Data Growth Rates, by Number of Production Servers ................................................................... 9 Figure 4. Current Data Protection Process and Technology Challenges ................................................................... 10 Figure 5. Top Areas of Data Protection Investment for 2010 ................................................................................... 11 Figure 6. High Priority Applications from a Data Protection Perspective ................................................................. 12 Figure 7. Current Primary Data Backup Processes Used ........................................................................................... 13 Figure 8. On-Site Data Backup Processes .................................................................................................................. 14 Figure 9. On-Site Data Backup Processes, by Number of Production Servers .......................................................... 15 Figure 10. On-Site Data Backup Processes, 2008 vs. 2010........................................................................................ 15 Figure 11. Length of Time Backup Data is Kept on Disk Before Being Migrated to Tape for Long-Term Retention 16 Figure 12. Length of Time Backup Data is Kept on Disk Before Being Migrated to Tape, by Company Size ............ 16 Figure 13. Breakdown of On-Site Secondary Data Stored on Disk-Based Storage Systems Compared to Tape ...... 17 Figure 14. Type(s) of On-Site Disk-Based Storage Systems Being Used as Backup Targets ...................................... 18 Figure 15. Type(s) of On-Site Disk-Based Storage Systems Being Used as Backup Targets, by Company Size......... 18 Figure 16. Plans to Deploy Backup-to-Disk Technologies among Organizations Currently Using Tape ................... 19 Figure 17. Type(s) of On-Site Disk-Based Storage Systems Being Considered as Backup Targets............................ 19 Figure 18. Why Organizations Have No Plans to Deploy Any Backup-to-Disk Technologies .................................... 20 Figure 19. Reasons Organizations Do Not Use On-Site Storage Resources for Backup Data ................................... 21 Figure 20. Primary Method for Whole-Server and/or Entire Site Recoveries .......................................................... 22 Figure 21. Data Sources Protected by Remote Backup Solution .............................................................................. 23 Figure 22. Usage of Data Protection Technologies ................................................................................................... 24 Figure 23. Plans to Replace File-Level Backup .......................................................................................................... 26 Figure 24. Length of Time Primary Backup Application Has Been Deployed ............................................................ 27 Figure 25. Length of Time Primary Backup Application Has Been Deployed, by Company Size .............................. 27 Figure 26. Commitment to Current Backup Process ................................................................................................. 28 Figure 27. Reasons Organizations Wouldn’t Replace Current Backup Solution/Vendor .......................................... 29 Figure 28. Reasons Organizations Would Replace Current Backup Solution/Vendor .............................................. 30 Figure 29. Reasons Organizations Would Replace Current Backup Solution/Vendor with a Third Party Online Backup Service ............................................................................................................................................. 31 Figure 30. Downtime Tolerance According to Business Value of Data ..................................................................... 32 Figure 31. Types of Data Protection Solutions Used for Each Tier of Data Based on Business Value of Data ......... 33 Figure 32. Frequency of Backup Copies for Each Tier of Data Based on Business Value of Data ............................. 34 Figure 33. Confidence Level in Data Protection for Each Tier of Data Based on Business Value ............................. 35 Figure 34. Organizations Confident that Data is Protected Are More Likely to Use Same Backup Solution/Vendor ...................................................................................................................................................................... 36 Figure 35. Confidence Level in Data Protection for Tier-1 Data Based on Data Protection Technology Type ......... 36 Figure 36. Typical Age of Recovered Data................................................................................................................. 37 Figure 37. Usage of Data Deduplication Solutions, 2008 vs. 2010............................................................................ 38 Figure 38. Usage of Data Deduplication Solutions, by Company Size....................................................................... 39 Figure 39. Usage of Data Deduplication Solutions, by Total Amount of Data .......................................................... 39 Figure 40. Factors Influencing Data Deduplication Technology Evaluation and Selection ....................................... 40 Figure 41. Data Deduplication Implementation Methods, Current Users vs. Planned Adopters ............................. 41 Figure 42. Data Deduplication Implementation Methods, by Total Amount of Data .............................................. 41 Figure 43. Where Data Deduplication is Implemented............................................................................................. 42 Figure 44. Degree of Capacity Reduction Attributable to Data Deduplication Technology ..................................... 43 Figure 45. Survey Respondents, by Role ................................................................................................................... 46 Figure 46. Survey Respondents, by Primary Area of Technology Responsibility ...................................................... 46 Figure 47. Survey Respondents, by Number of Employees ...................................................................................... 47 Figure 48. Survey Respondents, by Industry ............................................................................................................. 47 © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 13. Research Report: 2010 Data Protection Trends Figure 49. Survey Respondents, by Annual Revenue ................................................................................................ 48 Figure 50. Survey Respondents, by Physical Locations Worldwide .......................................................................... 48 Figure 51. Survey Respondents, by Data Centers Worldwide .................................................................................. 49 Figure 52. Survey Respondents, by Number of Production Servers ......................................................................... 49 Figure 53. Survey Respondents, by Total Amount of Data ....................................................................................... 50 Figure 54. Classification of Total Amount of Data .................................................................................................... 50 Figure 55. Classification of Primary Data, by Business Value.................................................................................... 51 Figure 56. Annual Data Protection Budget ............................................................................................................... 52 Figure 57. Data Protection Spending Allocation ....................................................................................................... 52 List of Tables Table 1. Current and Planned Usage of CDP Technology.......................................................................................... 25 Table 2. Current and Planned Usage of Replication Technology .............................................................................. 26 Table 3. Good Relationship with Backup Vendor is More Likely the Longer that Vendor’s Solution Has Been Deployed ...................................................................................................................................................... 29 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. Copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508) 482.0188. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 14. 20 Asylum Street | Milford, MA 01757 | Tel:508.482.0188 Fax: 508.482.0128 | www.enterprisestrategygroup.com