In its sixth annual Symantec Disaster Recovery Study, Symantec found that organizations are struggling to manage disparate virtual, physical and cloud resources due to added complexity in protecting and recovering mission critical applications and data within those environments. Not only are virtual and cloud systems often not properly protected, but the study reveals a gap in downtime expectations and reality.
Symantec 2010 Critical Information Infrastructure Protection (CIP) Survey found, among other things, that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks. Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses.
SolarWinds Application Performance End User Survey (Australia)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity.
Visit http://www.solarwinds.com/federal to learn more.
Netadmin and Sysadmin Survey Results - AUSSolarWinds
A wide-ranging survey of Australian network and systems administrators that captures the rapidly evolving nature of these IT Pros’ roles and their thoughts on life inside and outside of the workplace
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
WINNER: Overall Best In Show at 2014 AFCEA® Cyber Conference Solutions Trail
In a 2014 survey by SolarWinds and Market Connections, federal government and military IT professionals stated that their biggest cybersecurity threats are people both malicious external attackers and clueless insiders. So how do Federal IT Pros prevent activity that can put their agencies security at risk and address these living cybersecurity threats when human behavior is out of their
control? Implementing continuous monitoring solutions can help federal agencies safeguard against human error and quickly identify vulnerabilities, compliance issues and other threats by automatically collecting data and reporting on the performance, availability and security posture of an IT infrastructure. While continuous monitoring of the performance of networks, applications, servers, and
more will not stop hackers from attempting to infiltrate a network or stop careless employees from accidental blunders, it can provide a first line of defense and critical insight into how the IT infrastructure is impacted. In this session you will learn: " The top cybersecurity threats plaguing agencies today and their sources " The types of continuous monitoring tools and technologies that can be leveraged by both IT operations and information security simultaneously to quickly detect and mitigate threats " How to overcome common obstacles and frustrations agencies face when implementing continuous monitoring solutions and what benefits they see upon implementation.
Systems Administrators UK Survey ResultsSolarWinds
A wide-ranging survey of UK systems administrators that captures the rapidly evolving nature of the sysadmin role and their thoughts on life inside and outside of the workplace in October 2013
Cybersecurity breaches in the government seem to be all over the news. The sheer number and wild variety of sources for these breaches led us to wonder what federal agencies are really dealing with. SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies.
The results of our survey include:
Detailed insight into the threats, challenges, and sources of cybersecurity breaches the government faces in its IT infrastructure
Top hindrances in the implementation of appropriate IT security tools
Strategies and courses of action being deployed by federal IT professionals to remediate cybersecurity threats
These results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies. Federal IT pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures.
Visit http://www.solarwinds.com/federal to learn more.
Symantec 2010 Critical Information Infrastructure Protection (CIP) Survey found, among other things, that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks. Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses.
SolarWinds Application Performance End User Survey (Australia)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity.
Visit http://www.solarwinds.com/federal to learn more.
Netadmin and Sysadmin Survey Results - AUSSolarWinds
A wide-ranging survey of Australian network and systems administrators that captures the rapidly evolving nature of these IT Pros’ roles and their thoughts on life inside and outside of the workplace
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
WINNER: Overall Best In Show at 2014 AFCEA® Cyber Conference Solutions Trail
In a 2014 survey by SolarWinds and Market Connections, federal government and military IT professionals stated that their biggest cybersecurity threats are people both malicious external attackers and clueless insiders. So how do Federal IT Pros prevent activity that can put their agencies security at risk and address these living cybersecurity threats when human behavior is out of their
control? Implementing continuous monitoring solutions can help federal agencies safeguard against human error and quickly identify vulnerabilities, compliance issues and other threats by automatically collecting data and reporting on the performance, availability and security posture of an IT infrastructure. While continuous monitoring of the performance of networks, applications, servers, and
more will not stop hackers from attempting to infiltrate a network or stop careless employees from accidental blunders, it can provide a first line of defense and critical insight into how the IT infrastructure is impacted. In this session you will learn: " The top cybersecurity threats plaguing agencies today and their sources " The types of continuous monitoring tools and technologies that can be leveraged by both IT operations and information security simultaneously to quickly detect and mitigate threats " How to overcome common obstacles and frustrations agencies face when implementing continuous monitoring solutions and what benefits they see upon implementation.
Systems Administrators UK Survey ResultsSolarWinds
A wide-ranging survey of UK systems administrators that captures the rapidly evolving nature of the sysadmin role and their thoughts on life inside and outside of the workplace in October 2013
Cybersecurity breaches in the government seem to be all over the news. The sheer number and wild variety of sources for these breaches led us to wonder what federal agencies are really dealing with. SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies.
The results of our survey include:
Detailed insight into the threats, challenges, and sources of cybersecurity breaches the government faces in its IT infrastructure
Top hindrances in the implementation of appropriate IT security tools
Strategies and courses of action being deployed by federal IT professionals to remediate cybersecurity threats
These results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies. Federal IT pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures.
Visit http://www.solarwinds.com/federal to learn more.
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
Social Networking while at Work - July 2010Symantec
Symantec surveyed 350 people about their social networking habits while at work.
Among the funnier results, we learned that 1 in 10 employees takes their cell phone with them to the bathroom to check social media. Some respondents would even forego a bathroom break, rather than give up their social media!
Fifty-two percent of respondents said that a company’s presence on social media positively impacts their opinion of the company and 32 percent of respondents would think twice about working for a company that banned them from accessing a social network at work.
Application-Driven Network Performance Strategies, Pulse Report by Gatepoint ...CA Technologies
In early 2014, CA Technologies commissioned Gatepoint Research to conduct a survey on the topic of application-driven network performance strategies. More than 200 executives participated. The survey was focused on polling respondents from large enterprises who were responsible for network administration. 78% of respondents were from organizations that had annual revenues of greater than $1.5 billion and 90% of respondents were network engineers and managers.
Learn more about Application-driven Network Performance Management from CA Technologies at http://www.ca.com/anpm
Disaster Recovery using AWS -Architecture blueprintsHarish Ganesan
This presentation explores various ways of architecting Disaster Recovery using Amazon Web services (AWS) Cloud The sample architecture element contains Managed DNS servers , Load Balancers and Data replicators , Amazon EC2 , MySQL M-M , AWS EBS ,AWS Elastic Load Balancing, AWS Auto Scaling , AWS CloudWatch and AWS S3
Companies preparing to migrate their systems over to Windows 7 – or even just considering a migration – can benefit from learning from the IT teams who have been there and done that. Symantec conducted a survey of more than 1,300 IT managers across the globe to help to determine best, and worst, practices that will help make future Windows 7 migrations successful. For example, the survey found that a sound migration plan and an integrated, automated solution are key ingredients of a successful migration to Windows 7.
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...Emulex Corporation
Join Barbara Porter from Emulex, with Bob Laliberte, senior analyst, and Tony Palmer, senior engineer/analyst, at ESG, for an in-depth analysis of 16Gb Fibre Channel (16GFC) and an overview of the results of an ESG Lab Validation of Emulex’s high performance, low latency 16GFC adapters, built for highly virtualized environments.
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
Symantec’s 2011 Information Retention and eDiscovery Survey examines how enterprises manage their ever-growing volumes of electronically stored information and prepare for the eventuality of an eDiscovery request. The survey of legal and IT personnel at 2,000 enterprises worldwide found email is not the primary source of records companies must produce, and more importantly, respondents who employ best practices for records and information management are significantly less at risk of court sanctions or fines.
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsJay McBain
The Managed Services model continues to grow and evolve. This presentation makes the case for building a cloud and mobility practice on top of the recurring revenue MSP model to drive success over the next 5 years. Supported by data from CompTIA, the cloud and mobility opportunity is very real in all customers segments and industries. The Channel is well positioned to take advantage of the consulting, policy and compliance services as well as the ongoing management and infrastructure needs of this emerging opportunity.
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex Corporation
This webcast is the second in a monthly series on why I/O is strategic for the data center. Bob Laliberte, senior analyst from ESG, will present the importance of I/O to virtualized environments. As they continue to mature and become more flexible and dynamic, I/O becomes critical to a successful deployment.
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
Social Networking while at Work - July 2010Symantec
Symantec surveyed 350 people about their social networking habits while at work.
Among the funnier results, we learned that 1 in 10 employees takes their cell phone with them to the bathroom to check social media. Some respondents would even forego a bathroom break, rather than give up their social media!
Fifty-two percent of respondents said that a company’s presence on social media positively impacts their opinion of the company and 32 percent of respondents would think twice about working for a company that banned them from accessing a social network at work.
Application-Driven Network Performance Strategies, Pulse Report by Gatepoint ...CA Technologies
In early 2014, CA Technologies commissioned Gatepoint Research to conduct a survey on the topic of application-driven network performance strategies. More than 200 executives participated. The survey was focused on polling respondents from large enterprises who were responsible for network administration. 78% of respondents were from organizations that had annual revenues of greater than $1.5 billion and 90% of respondents were network engineers and managers.
Learn more about Application-driven Network Performance Management from CA Technologies at http://www.ca.com/anpm
Disaster Recovery using AWS -Architecture blueprintsHarish Ganesan
This presentation explores various ways of architecting Disaster Recovery using Amazon Web services (AWS) Cloud The sample architecture element contains Managed DNS servers , Load Balancers and Data replicators , Amazon EC2 , MySQL M-M , AWS EBS ,AWS Elastic Load Balancing, AWS Auto Scaling , AWS CloudWatch and AWS S3
Companies preparing to migrate their systems over to Windows 7 – or even just considering a migration – can benefit from learning from the IT teams who have been there and done that. Symantec conducted a survey of more than 1,300 IT managers across the globe to help to determine best, and worst, practices that will help make future Windows 7 migrations successful. For example, the survey found that a sound migration plan and an integrated, automated solution are key ingredients of a successful migration to Windows 7.
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...Emulex Corporation
Join Barbara Porter from Emulex, with Bob Laliberte, senior analyst, and Tony Palmer, senior engineer/analyst, at ESG, for an in-depth analysis of 16Gb Fibre Channel (16GFC) and an overview of the results of an ESG Lab Validation of Emulex’s high performance, low latency 16GFC adapters, built for highly virtualized environments.
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
Symantec’s 2011 Information Retention and eDiscovery Survey examines how enterprises manage their ever-growing volumes of electronically stored information and prepare for the eventuality of an eDiscovery request. The survey of legal and IT personnel at 2,000 enterprises worldwide found email is not the primary source of records companies must produce, and more importantly, respondents who employ best practices for records and information management are significantly less at risk of court sanctions or fines.
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsJay McBain
The Managed Services model continues to grow and evolve. This presentation makes the case for building a cloud and mobility practice on top of the recurring revenue MSP model to drive success over the next 5 years. Supported by data from CompTIA, the cloud and mobility opportunity is very real in all customers segments and industries. The Channel is well positioned to take advantage of the consulting, policy and compliance services as well as the ongoing management and infrastructure needs of this emerging opportunity.
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex Corporation
This webcast is the second in a monthly series on why I/O is strategic for the data center. Bob Laliberte, senior analyst from ESG, will present the importance of I/O to virtualized environments. As they continue to mature and become more flexible and dynamic, I/O becomes critical to a successful deployment.
This presentaiton on Overall Equipment Effectiveness, Down Time Analytics and Assett Utilization was developed by me and a coleague during my tenure at ISS. Presentation was given to the Chattanooga, TN Chapter of the SME.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
Industry X.0: Unlocking the Power of Digital in Plant Operations accenture
The Accenture 2017 Digital Technology in Chemical Plant Operations Survey 2017 shows digital technology is beginning to play a pivotal role in plant operations. Digital adoption is increasing and more firms recognize the financial and operational value. The study provides a perspective on where the industry is today and where it plans to go in the future and offers insights into how chemical companies can focus efforts on their digital journey.
Do you know how the cloud is
impacting your IT group today?
Regardless of how much or how little you are using the cloud today, it's having an impact on how your users consume IT and your view your services. Emerging trends in the IT and cloud industry will have profound impacts on how you deliver IT services to your users in 2013.
This presentations covers:
- How to take advantage of shifting IT delivery models
- Detailed real-world examples of organizations like your shifting IT from a cost center to an internal service provider
- How metering IT resource consumption gives you the foundation to massively improve your IT efficiency
- How you can make better decisions about where and how IT workloads are deployed
Based on data gathered from 88 organizations worldwide, the Vulnerability Index Benchmark provides a first of its kind measurement of downtime and data loss risk for each organization, grouped by industry sector.
It takes into consideration the number of risks found per organization in each sector as well as the severity of these risks.
The statistics presented in this study are based on data gathered over 12 months (September 2010 to August 2011) from 88 organizations based in Europe and the US.
The data was collected using Continuity Software’s RecoverGuard™, an automated DR and HA testing and monitoring software that scans the entire IT infrastructure and identifies potential downtime and data loss vulnerabilities before they impact business operations.
Infrastructure Consolidation and VirtualizationBob Rhubart
As presented by Roddy Rodstein at OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
Learn how to protect your data during Symantec's National Cyber Security Awareness Month webinar with the Identity Theft Resource Center and Infolock.To watch on demand https://symc.ly/2VMMWQX.
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
Symantec, TechSoup and the Michigan Small Business Development Center share how to apply added layers of security to your devices and online accounts. Watch on-demand recording here: https://symc.ly/33ifcxo.
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
View this webinar from Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day.
Watch on demand here: https://symc.ly/2nLyXyB
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
Experts from Symantec and MITRE explore the latest research and best practices for detecting targeted ransomware in your environment.
Watch on-demand webinar here: https://symc.ly/2L7ESFI.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying CASB. Watch here: https://symc.ly/2QTyUec.
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
This webinar to shares insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment. Watch here: https://symc.ly/2W52MoA
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
2019 Symantec Internet Security Threat Report (ISTR): The New Threat Landscape presented by Kevin Haley, Director Product Management, Security Technology & Response, Symantec. Watch webinar recording here: https://symc.ly/2FJ9T18.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
Gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it. Watch the original webinar here https://www.symantec.com/about/webcasts?commid=347274.
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
First-hand insights on the newest cloud-delivered endpoint security solutions. Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research. Listen here: https://symc.ly/2UY2TlS.
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear. Watch Webinar here: https://symc.ly/2WyPD8I
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
5. Virtual Environments Protected Properly?
• 56% of data on virtual systems is regularly backed up
• Only 20% of virtual environments protected by replication or
failover technologies
5
6. Lack of Tools, Decrease of Virtual Protection
• 58% report different tools for virtual and physical environments
is a challenge
• Virtualization led 84% to reevaluate DR plans in 2010
• 60% of virtualized environments not covered in DR plans
6
7. Storage and Resource Constraints an Issue
• 59% identified resource constraints (people, budget, and space)
as the top challenge when backing up virtual machines
• 57% state that the lack of primary and 60% state that lack of
backup storage hampers protecting mission critical data
7
8. Cloud Causes Security and Control Issues
• Organizations put 50% of applications in the cloud
• 66% say security is main concern of cloud
• 55% say control is biggest challenge of cloud
8
10. Downtime Recovery Gap
• Expectation of downtime for outage = 2 hours
• Actual downtime in last 12 months = 5 hours
• Median of 4 incidents in past 12 months
10
11. Major Causes of Downtime
• 72% experience downtime from
system upgrades (50.9 hours)
• 70% experience downtime from
power outages and failures (11.3
hours)
• 26% conducted a power outage
and failure impact assessment
• 63% experience cyber attacks
(52.7 hours)
11
13. Improvement In Testing Frequency and Success
• 82% test more frequently than once a year
• Significant increase from 66% who reported same in 2009
• 40% of tests fail to meet RTO/RPOs
13
14. Reasons for not testing
• Budget (60%)
• Disruption to employees (59%)
• Disruption to customers, sales & revenue stream (24%)
• Lack of people’s time (26%)
• Cost of testing: $606,948
14
16. Recommendations
• Ensure that mission-critical data and applications are treated the
same across environments (virtual, cloud, physical) in terms of DR
assessments and planning
• Use integrated tool sets for managing physical, virtual and cloud
environments to save time, training costs and help better automate
processes.
• Embrace low-impact backup methods and deduplication to ensure
that mission-critical data in virtual environments is backed up,
efficiently replicated off campus
• Prioritize planning activities and tools that automate and perform
processes which minimize downtime during system upgrades
• Implement solutions that detect issues, reduce downtime and recover
faster to be more in line with expectations
• Don’t cut corners on basic technologies and processes that protect in
case of an outage
19. Company titles
D: What is your title?
0% 10% 20% 30% 40% 50%
Chief Information Officer (CIO) / Chief Technology Officer (CTO) 24%
VP / SVP 43%
Data Center Maanger or Data Center Director 7%
IT Manager 17%
IT Staff 7%
Other (Please specify) 2%
20. Industries
E: What is your market?
0% 5% 10% 15% 20% 25%
Financial 10%
Manufacturing 10%
Technology 10%
Telecommunications 9%
Healthcare 8%
Automotive 7%
Consumer 7%
Insurance 7%
Retail 7%
Education 4%
Energy 4%
Media 3%
Online 3%
Public sector 3%
Transportation 3%
Real estate 2%
Other (Please specify) 2%
Hospitality 1%
22. Downtime
Q1: How many of each of the following has caused your organization to
experience downtime in the past five years?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
System upgrades 72%
Power outage / failure / issues 70%
Fire 69%
Vonfiguration change management issues 64%
Cyber attacks 63%
Malicious employee behavior 63%
Data leakage or loss 63%
Flood 48%
Hurricane 47%
Earthquake 46%
Tornado 46%
Terrorism 45%
Tsunami 44%
Volcano 42%
War 42%
Other (Please specify) 1%
23. Downtime
Q2: How many hours of downtime has your organization experienced in
the past 12 months for each of the following?
(Means shown)
0.0 10.0 20.0 30.0 40.0 50.0 60.0
Cyber attacks 52.7
System upgrades 50.9
Configuration change management issues 15.1
Fire 15.0
Power outage / failure / issues 11.3
Malicious employee behavior 10.4
Terrorism 9.6
Earthquake 9.3
Data leakage or loss 9.1
Flood 8.3
Hurricane 7.8
Tornado 7.4
War 7.2
Volcano 6.9
Tsunami 6.9
Other (Please specify) 1.6
24. Downtime
Q3: As measured by hours of downtime, what is your number one cause
of downtime?
0% 10% 20% 30% 40% 50%
System upgrades 48%
Cyber attacks 13%
Power outage / failure / issues 8%
Fire 6%
Flood 4%
Configuration change management issues 4%
Data leakage or loss 4%
Earthquake 2%
Malicious employee behavior 2%
Tsunami 2%
Volcano 2%
Terrorism 2%
Hurricane 1%
Tornado 1%
War 1%
Other (Please specify) 1%
25. Threat assessments
Q4: Which of the following threats has your organization conducted an
impact assessment?
0% 20% 40% 60% 80% 100%
Cyber attacks 69%
System upgrades 67%
Earthquake 48%
Terrorism 48%
Hurricane 44%
Power outage / failure / issues 26%
Data leakage or loss 26%
Configuration change management issues 25%
Fire 24%
Malicious employee behavior 23%
Flood 16%
Tsunami 6%
Tornado 6%
Volcano 5%
War 4%
Other (Please specify) 1%
26. DR responsibility
Q5: Which person in your organization has the ultimate responsibility
for managing the disaster recovery plan?
0% 20% 40% 60% 80% 100%
Chief Information Officer (CIO) / Chief Technology Officer (CTO) 61%
IT Manager 12%
Disaster Recovery Manager (DRM) 9%
Data Center Manager or Data Center Director 6%
VP / SVP 4%
Business Continuity Manager (BCM) 3%
IT Staff 2%
External consultant / outsourcer 1%
None - we do not have a disaster recovery committee 1%
Other (Please specify) 0%
Don't know 0%
27. DR committees
Q6: Which of the following people are on your organization's disaster
recovery committee?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
Disaster Recovery Manager (DRM) 65%
Systems / infrastructure manager 56%
Chief Information Officer (CIO) / Chief Technology Officer (CTO) / IT Director 32%
Chief Executive Officer (CEO) 25%
Chief Security Officer (CSO) 25%
Divisional / Departmental IT manager 21%
Chief Financial Officer (CFO) 18%
Business Continuity Manager (BCM) 15%
Line of business executives / managers 11%
Other directors 8%
External consultant 8%
Non-IT senior managers 7%
None - we do not have a disaster recovery committee 1%
Other (Please specify) 1%
Don't know 1%
28. DR plans
Q9: What of the following are covered by your DR plan?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
HP-UX 55%
AIX 50%
Windows 40%
Solaris 23%
RedHat 18%
VMware 16%
SUSE Linux 11%
29. Replication
Q10a: Do you replicate critical applications between data centers?
No
8%
Yes
92%
30. Replication
Q10b: What replication technologies are used?
(Only asked of those who replicate critical applications between data centers)
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
Database-based replication 69%
Application-based replication 68%
Array-based replication 65%
Host-based replication 34%
Other (please specify) 0%
31. Replication challenges
Q11: What is your primary challenge with storage array-based
replication?
0% 20% 40% 60% 80% 100%
Complexity of replication solutions 55%
Cost 25%
Limited WAN bandwidth (too much data) 17%
Hardware lock-in 3%
32. Disaster impact
Q13: How would you rate the potential impact that could results from a
disaster your organization is concerned about?
1 - Absolutely no impact 2 - Low impact 3 - Neutral 4 - Somewhat high impact 5 - Extremely high impact
100%
11% 13% 11% 14% 10% 10%
14% 14% 15%
90% 19%
80%
70% 40% 37%
44% 41% 39% 42% 37% 36%
42%
60% 41%
50%
40%
31%
32% 34%
30% 33% 32% 32%
32% 32% 34%
29%
20%
10%
10% 11% 10%
10% 7% 7% 8% 9% 7%
6% 12%
4% 5% 5% 5% 5% 6% 6% 7% 6%
0%
Data loss Cost of Reduction in Reduction in Damage to Configuration Damage to Damage to Damage to Decreased
downtime profits revenue competitive drift issues brand customer supplier employee
standing in the reputation loyalty relationships productivity
marketplace
33. Downtime costs
Q14: What would you estimate is the cost of an hour of downtime for
each of the following in your organization?
(Means shown)
$0 $10,000 $20,000 $30,000 $40,000 $50,000 $60,000 $70,000
Web servers $62,063
Custom line of business applications $55,324
Databases $47,769
ERPs / CRMs $42,265
Web commerce applications $41,117
Application servers $39,590
Messaging applications $24,571
Collaboration software $21,748
Email $18,409
Other (Please specify) $10,523
34. Outages
Q15: How many outages did you have in the past 12 months?
Mean 13.8
35. Downtime
Q16: In your estimation, how long was the average time of
downtime per incident in hours?
Mean 20.4
37. Disaster recovery budget
Q18: In your opinion, which of the following best describes your
disaster recovery budget?
1 - Increasing 2 - Staying the same 3 - Decreasing
100% 3%
90%
80% 43%
70%
67%
60%
50%
26%
40%
30%
20%
31% 31%
10%
0%
Over the past 12 months In the next 12 months
38. Recession impact
Q19: How has the global recession impacted the resources available for
your disaster recovery planning?
0% 10% 20% 30% 40% 50%
Extremely negative impact 12%
Some negative impact 23%
No impact whatsoever 17%
Some positive impact 46%
Extremely positive impact 2%
39. Annual IT budget
Q20: What is your total annual IT budget?
Mean $13,573,258
40. IT budget allocation
Q21: What percentage of your IT budget is allocated towards
disaster recovery initiatives including backup, recovery,
clustering, archiving, spare servers, replication, tape, services,
DR plan development and offsite costs, etc.?
Median 26%
41. DR site status
Q23: What is the status of your disaster recovery site?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
It is hot standby 72%
It is managed by an outside vendor 63%
It is cold standby 17%
We don't have a disaster recovery site 3%
42. Failover / recoveries
Q24: What percentage of your failover / recoveries you perform is each
of the following types?
(Means shown)
0% 10% 20% 30% 40% 50%
Same-site failover / recovery 31%
Cloud failover / recovery 29%
Campus failover / recovery 22%
Global failover / recovery 18%
43. Recovery time
Q25: If a significant disaster were to occur at your organization that
destroyed the main data center, how soon would the organization be
able to do each of the following?
(In hours)
(Means shown)
2.5
2.4
2.4
2.3
2.2
2.2
2.2
2.1 2.1
2.0
1.9
1.8
Skeleton operations Mostly back up and running 100 percent up and running Operations would be able to continue
as normal despite the disaster
44. Recovery objectives
Q26: for the Tier 1 applications in your disaster recovery plan,
what are your recovery time objectives? What are your
recovery point objectives? (Medians shown)
Recovery Time Objectives 4
Recovery Point Objectives 5
45. Recovery objectives
Q27: For virtualized applications in your disaster recovery
plan, what are your recovery time objectives? What are your
recovery point objectives? (Medians shown)
Recovery Time Objectives 4.0
Recovery Point Objectives 5.0
46. Reevaluation
Q28: How often do you reevaluate your TO / RPO requirements or
change them for new applications?
0% 20% 40% 60% 80% 100%
Monthly 14%
Quarterly 16%
Every 6 months 52%
Once a year 10%
Every 1 - 2 years 4%
Every 2 - 3 years 1%
Less frequently than every 3 years 1%
On an ad-hoc basis 1%
Never 1%
47. Full scenario testing
Q29: How frequently does your organization carry out full scenario
testing of its disaster recovery plan, involving relevant people,
processes, and technologies?
0% 20% 40% 60% 80% 100%
Monthly 16%
Quarterly 15%
Every 6 months 51%
Once a year 11%
Every 1 - 2 years 3%
Every 2 - 3 years 1%
Less frequently than every 3 years 1%
On an ad-hoc basis 1%
Never 1%
48. DR testing cost
Q30: How much did you spend in the past year on DR testing?
Mean $606,948
49. DR testing cost
Q31: What was the cost of testing your disaster recovery plans
in the past year?
Mean $769,686
50. Successful tests
Q32: What percentage of disaster recovery tests successfully
recovered critical data and applications within RTOs / RPOs?
Median 70%
51. Recovery barriers
Q33: How many times did each of the following challenges prevent you
from recovery within the RPOs / RTOs?
(Medians shown)
0 1 2 3 4
Insufficient IT infrastructure at the DR site 3
Configuration issues 3
Discovery that the plan has become out of date 3
People do not do as they are supposed to 3
Processes turn out to be inappropriate 3
Technology does not do what it is supposed to 2
Other (Please specify) 0
52. Testing barriers
Q34: Which of the following do you consider to be barriers to running a
full scenario test on your disaster recovery plan?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
Resources, in terms of budget 60%
Disruption to employees 59%
Resources, in terms of people's time 26%
Disruption to customers 16%
Lack the technology to run the test 15%
Disruption to sales and the revenue stream 14%
Other IT projects taking a higher priority 13%
Not seen as a priority by top management 4%
None 3%
Other (Please specify) 0%
53. Deduplication
Q35: How far along are you in implementing deduplication?
0% 10% 20% 30% 40% 50%
Considering / planning, but have not yet purchased capabilities 20%
Purchased capabilities, but have not yet implemented 19%
Implemented, but have not been able to see ROI 10%
Implemented, able to demonstrate ROI 48%
Implemented, fell short of ROI 1%
Implemented, but too soon to demonstrate ROI 1%
54. Deduplication
Q36: How much budget would you estimate you save / would
save by implementing deduplication?
Mean $893,405
55. Deduplication
Q37: How much storage space, in terms of gigabytes, would
you estimate you save / would save by implementing
deduplication?
Mean 45,735 GB
56. Appliance form vs. Software model
Q38: Do you prefer an appliance form factor with software for
deduplication or a software delivery model built into existing backup
software that lets you use commodity hardware?
Appliance with software
44%
Software delivery model
56%
57. Reevaluating
Q39: Has implementing server virtualization caused you to reevaluate
your disaster recovery plan?
No
16%
Yes
85%
58. Virtual servers
Q40: What percentage of virtual servers is covered in your
disaster recovery plan?
Median 40%
59. Virtual applications
Q41: What percentage of the following applications are being put into
virtual environments at present?
(Medians shown)
0% 10% 20% 30% 40% 50%
Databases 26%
Application servers 25%
Web servers 25%
Messaging applications 23%
ERPs / CRMs 23%
Custom line of business applications 22%
Other (Please specify) 0%
60. Virtual applications
Q42: What percentage of each of the following applications will be put
into virtual environments 12 months from now?
(Medians shown)
0% 10% 20% 30% 40% 50%
Databases 26%
Application servers 25%
Web servers 25%
ERPs / CRMs 24%
Custom line of business applications 22%
Messaging applications 22%
Other (Please specify) 0%
61. Virtual servers
Q43: What percentage of the servers in your data centers are being
virtualized in each of the following?
(Medians shown)
0% 10% 20% 30% 40% 50%
Application test environment 30%
Patch testing environment 30%
Application development environment 30%
Production environment 30%
62. Backing up virtual environments
Q44: How do you back up virtual environments?
(Medians shown)
0% 20% 40% 60% 80% 100%
We utilize off-host technology (e.g., VMware VCB / v-Storage API) for "client-
50%
less" backups of VMs
Like a physical machine - standard Client (non deduplication) inside each
30%
virtual machine
Like a physical machine - except with deduplication client inside each virtual
30%
machine
Not backing up virtual machines 24%
63. Virtualization
Q45: What are the main reasons you have not virtualized more
applications?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
Performance 60%
Manpower / human resources 60%
Application vendor support issues 53%
Cost 29%
Skills 25%
Storage inefficiencies / storage costs too high 13%
Inability to meet service levels / availability requirements of the business 10%
Ability to recover and manage virtual environments 8%
Haven't though much about it 2%
64. Virtual server testing
Q46: How often do you test virtual servers as part of your disaster
recovery plan?
0% 20% 40% 60% 80% 100%
Daily 9%
Weekly 50%
Monthly 14%
Quarterly 13%
Semi-annually 7%
Yearly 5%
Less than once a year 2%
Never 2%
65. Challenges
Q47: What challenges have you faced in protecting mission critical data
and applications in virtual environments?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
Lack of available backup storage capacity 60%
Lack of primary storage capacity 57%
Lack of automated recovery 55%
Insufficient backup tools 39%
Lack of enterprise high availability 37%
Lack of enterprise storage management 19%
Different tools for physical and virtual environments 15%
Lack of scalability 7%
Other (Please specify) 1%
66. Challenges
Q48: How much of a challenge do each of the following present in
protecting mission critical data and applications in virtual
environments?
1 - Small Challenge 2 - Neutral 3 - Large Challenge
100%
90% 19%
30%
34% 36% 36%
80% 40% 40%
58% 54%
70%
60% 21% 44%
50% 28% 29%
30%
30% 30%
40%
30% 23% 30%
49%
20% 38% 38%
35% 35%
30% 30%
10% 20% 16%
0%
Lack of available Lack of primary Lack of Insufficient Lack of Lack of Different tools Lack of Other (Please
backup storage storage capacity automated backup tools enterprise high enterprise for physical and scalability specify)
capacity recovery availability storage virtual
management environments
67. Virtual applications
Q49: What percentage of your organization's data and mission critical
applications in virtual environments are protected by each of the
following?
(Medians shown)
0% 10% 20% 30% 40% 50%
Disk backup 25%
Continuous data protection 23%
Tape backup 22%
Online / cloud storage (ie online) 21%
Optical removable media (CDs, DVDs, Blu-ray, etc.) 20%
Data replication 20%
High availability failover 20%
Global or wide area failover 20%
68. Data backup
Q50: What percentage of the data on your virtual systems is
regularly backed up?
Median 56%
69. Virtual backup
Q51: How often do you back up the data on your virtual systems?
0% 20% 40% 60% 80% 100%
Daily 18%
Weekly 54%
Monthly 12%
Quarterly 9%
Semi-annually 4%
Yearly 2%
Less than once a year 0%
Never 1%
70. Virtual backup challenges
Q52: What is the top challenge with backing up virtual machines as
opposed to physical ones?
0% 20% 40% 60% 80% 100%
Resource constraints (people, budgets, and space) 59%
Application-consistent backups 16%
Lack of efficient technology / hardware / software 16%
Lack of efficient restore options 5%
Too much time required 4%
71. Email recovery
Q53: In terms of email or Exchange, which of the following is your
primary disaster recovery strategy?
0% 10% 20% 30% 40% 50%
Continuous data protection 34%
Email as a service 26%
Global failover 16%
Local failover 14%
Regular backup 5%
Cloud-based hosting 4%
Protecting data with snapshots 1%
72. Multi-tiered services
Q54: What challenges does your organization have with managing high
availability and disaster recovery for multi-tiered IT services?
(Mark all that apply.)
0% 20% 40% 60% 80% 100%
Failure to protect all components of the IT service 62%
Lack of coordination between application and data recovery solutions 57%
Having inconsisten levels of protection for different components of the IT
25%
service
Lack of understanding application dependencies 18%
Using manual recovery of the application, which is slow and increases the risk
14%
of error
Cross-functional teamwork and communication is lacking 9%
Other (Please specify) 2%
73. Multi-tiered services
Q55: How many hours does it take to recover your multi-
tiered services?
Mean 22.8
74. Cloud storage
Q56: How far along are you in implementing cloud storage?
0% 20% 40% 60% 80% 100%
Considering / planning, but have not yet purchased capabilities 61%
Purchased capabilities, but have not yet implemented 23%
Not considering 7%
Already implemented 8%
75. Cloud storage
Q57: Have you been able to measure an ROI for cloud storage?
0% 20% 40% 60% 80% 100%
Have not been able to see ROI 14%
Are able to demonstrate ROI 65%
Fell short of ROI 11%
Too soon to demonstrate 9%
76. Cloud computing
Q58: How are you using cloud computing initiatives to help with your
data center's disaster recovery plan?
0% 20% 40% 60% 80% 100%
Software as a service 57%
Backup to the cloud 17%
Failover to the cloud 11%
Not using cloud computing 6%
Recovery from the cloud 6%
Deploying cloud applications 4%
77. Cloud computing impact
Q59: What has been the impact of cloud computing to your disaster
recovery plan?
0% 20% 40% 60% 80% 100%
Extremely easier 16%
Easier 67%
No change 13%
More difficult 4%
Extremely difficult 0%
78. Cloud computing challenges
Q60: What are the biggest disaster recovery challenges you face when
considering implementing cloud computing / cloud storage?
0% 20% 40% 60% 80% 100%
Control failovers / make resources highly available 55%
Control of management of resources 14%
Ability to backup 14%
Security 12%
Expertise 4%
Other (Please specify) 1%
79. Cloud computing policies
Q61: Do you have written guidelines or policies in place for approving
cloud applications that use business sensitive or confidential
information?
No
15%
Yes
85%
80. Cloud computing
Q62: Who drives cloud computing initiatives?
0% 20% 40% 60% 80% 100%
CEO 55%
CIO / CTO 25%
IT managers 14%
Employee end users / business managers 5%
Employees who implement their own 1%
81. Cloud computing
Q63: What percentages of the following types of applications are you
putting into the cloud?
(Medians shown)
100%
90%
80%
70%
60%
50% 50%
50%
40%
30%
20%
10%
0%
Mission-critical applications Non-mission critical applications
82. Cloud computing concerns
Q64: What is the biggest concern with putting mission-critical
applications in the cloud?
0% 20% 40% 60% 80% 100%
Security 66%
Accessibility 14%
Control 12%
Management 6%
Backup 3%