SlideShare a Scribd company logo
1 of 16
Download to read offline
2011 Virtualization and Evolution to the
Cloud Survey

Key Findings
Methodology
• Survey Performed by Applied Research
• 3,700 enterprises worldwide
• Tactical IT, Strategic IT and C-level professionals
• Cross-industry




                                                        2
Key Findings
• Gaps between expectations and reality
• Increasing focus on business-critical applications
• Quality of service challenges
• IT and business executives out of synch
• Most organizations rely heavily on outside service providers
Market Adoption
• Most (76-83%) are at least discussing cloud adoption
• Server virtualization is most mature (45% implementing)
• Private Storage-as-a-Service is least mature (36% implementing)
• Greater adoption in large enterprises
• U.S. ahead of the rest of the world
Q12: At what stage is your organization in each of the following areas?
              1 - Not considering   2 - In discussion/planning phase      3 - In trials   4 - Implementing      5 - Have implemented

100%

                                                                                                      15%                          15%
90%            20%                         20%
                                                                          24%

80%
                                                                                                      20%                          21%
70%                                        21%
               23%
                                                                          21%

60%
                                                                                                      20%                          19%
50%
               19%                         21%                            16%

40%

                                                                                                      22%                          21%
30%                                                                       20%
               21%                         19%

20%


                                                                                                      24%                          24%
10%                                        19%                            20%
               17%


 0%
       Storage virtualization       Desktop or endpoint           Server virtualization    Private storage-as-a-service   Private or hybrid cloud
                                       virtualization                                                                           computing
Gaps Between Expectations and Reality Reveal
Evolving Market
• We asked those who have already implemented:
  – What their original goals were (expected)
  – What they actually achieved after implementing (realized goals)
• We measured the gap between expected and realized goals
• Server virtualization tracked well (only 4% average gap)
• Private Storage-as-a-Service challenging to implement
  (37% average gap)
Server Virtualization
• Biggest gaps:
  – Scalability (down 7%)
  – Reduce CapEx (down 12%)
  – Reduce OpEx (down 10%)
Storage Virtualization
• Biggest gaps:
  – Agility (down 32%)
  – Scalability (down 35%)
  – Reduce OpEx (down 32%)
Endpoint/Desktop Virtualization
• Biggest gaps:
  – New endpoint deployment (down 27%)
  – Application delivery (down 30%)
  – Application compatibility (down 27%)
Private Storage-as-a-Service
• Biggest gaps:
  – Scalability (down 34%)
  – Reduced complexity (down 40%)
  – Efficiency (down 37%)
Hybrid/Private Cloud Computing
• Biggest gaps:
  – Time to provision new resources (down 39%)
  – Scalability (down 34%)
  – Security (down 29%)
Increasing Focus on Business-Critical Applications
• Organizations leveraging virtualization for business-critical
  applications
  – Top apps include database, web, email and calendar
• More slowly leveraging hybrid/private cloud technologies
  – Average of 33% of business-critical apps in hybrid/private cloud
    environments
  – Concerns over vulnerabilities, disaster
    recovery and encryption
Quality of Service Challenges Emerge as Top Priorities
• Storage cost and performance is top of mind
• Security concerns
• Performance issues
• Availability
IT and Business Executives Out of Synch
• Why?
  – Reliability
  – Security
  – Performance
• IT very open
• App owners also open
• U.S. less cautious than
  the rest of the world
Most Organizations Lean Heavily on Third-party
Service Providers
Symantec Recommendations
• Ensure alignment between IT and executives in virtualization
  and cloud initiatives
• Don’t operate in a silo when it comes to cloud computing
• Leverage and modernize your existing infrastructure
• Set realistic expectations and track your results

More Related Content

Similar to Symantec 2011 Virtualization and Evolution to Cloud

Managed mobility - SSDesign
Managed mobility  - SSDesignManaged mobility  - SSDesign
Managed mobility - SSDesignSS Design
 
UK enterprises' 2012 IT investment priorities
UK enterprises' 2012  IT investment prioritiesUK enterprises' 2012  IT investment priorities
UK enterprises' 2012 IT investment prioritiesVanson Bourne
 
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey2010 SMB Information Protection Survey
2010 SMB Information Protection SurveySymantec
 
Small Business Pulse Report
Small Business Pulse Report Small Business Pulse Report
Small Business Pulse Report Constant Contact
 
Making the longtail wag - Owen Hewitson
Making the longtail wag - Owen HewitsonMaking the longtail wag - Owen Hewitson
Making the longtail wag - Owen Hewitsonauexpo Conference
 
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...Dave Parker
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationBob Rhubart
 
Ad Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAd Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAnna
 
Distributing Video To The Masses
Distributing Video To The MassesDistributing Video To The Masses
Distributing Video To The MassesRichard Harrington
 
The History of App Store
The History of App StoreThe History of App Store
The History of App StoreSeungyul Kim
 
D2 Capital Partners: Opportunity For Access
D2 Capital Partners: Opportunity For AccessD2 Capital Partners: Opportunity For Access
D2 Capital Partners: Opportunity For AccessIan Nguyen
 
The Missing Piece in Clean Local Energy
The Missing Piece in Clean Local EnergyThe Missing Piece in Clean Local Energy
The Missing Piece in Clean Local EnergyJohn Farrell
 
Amex Customer Service Baromoeter 2012
Amex Customer Service Baromoeter 2012Amex Customer Service Baromoeter 2012
Amex Customer Service Baromoeter 2012Paul Scott
 
Wateen Wimax Marketing Research
Wateen Wimax  Marketing ResearchWateen Wimax  Marketing Research
Wateen Wimax Marketing ResearchM. Aaqib Vatao
 
Bullhorn Live Benchmarking Session
Bullhorn Live Benchmarking SessionBullhorn Live Benchmarking Session
Bullhorn Live Benchmarking Sessionbullhornlive
 

Similar to Symantec 2011 Virtualization and Evolution to Cloud (20)

Managed mobility - SSDesign
Managed mobility  - SSDesignManaged mobility  - SSDesign
Managed mobility - SSDesign
 
UK enterprises' 2012 IT investment priorities
UK enterprises' 2012  IT investment prioritiesUK enterprises' 2012  IT investment priorities
UK enterprises' 2012 IT investment priorities
 
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
 
Small Business Pulse Report
Small Business Pulse Report Small Business Pulse Report
Small Business Pulse Report
 
Making the longtail wag - Owen Hewitson
Making the longtail wag - Owen HewitsonMaking the longtail wag - Owen Hewitson
Making the longtail wag - Owen Hewitson
 
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and Virtualization
 
What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
Ad Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAd Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher Survey
 
Shared Use Project Presentation
Shared Use Project PresentationShared Use Project Presentation
Shared Use Project Presentation
 
Distributing Video To The Masses
Distributing Video To The MassesDistributing Video To The Masses
Distributing Video To The Masses
 
Hypersyndication
HypersyndicationHypersyndication
Hypersyndication
 
The History of App Store
The History of App StoreThe History of App Store
The History of App Store
 
Webbdagarna malmö
Webbdagarna malmöWebbdagarna malmö
Webbdagarna malmö
 
D2 Capital Partners: Opportunity For Access
D2 Capital Partners: Opportunity For AccessD2 Capital Partners: Opportunity For Access
D2 Capital Partners: Opportunity For Access
 
The Missing Piece in Clean Local Energy
The Missing Piece in Clean Local EnergyThe Missing Piece in Clean Local Energy
The Missing Piece in Clean Local Energy
 
Amex Customer Service Baromoeter 2012
Amex Customer Service Baromoeter 2012Amex Customer Service Baromoeter 2012
Amex Customer Service Baromoeter 2012
 
Wateen Wimax Marketing Research
Wateen Wimax  Marketing ResearchWateen Wimax  Marketing Research
Wateen Wimax Marketing Research
 
Bullhorn Live Benchmarking Session
Bullhorn Live Benchmarking SessionBullhorn Live Benchmarking Session
Bullhorn Live Benchmarking Session
 
Axp 2011 csbar_market
Axp 2011 csbar_marketAxp 2011 csbar_market
Axp 2011 csbar_market
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Symantec 2011 Virtualization and Evolution to Cloud

  • 1. 2011 Virtualization and Evolution to the Cloud Survey Key Findings
  • 2. Methodology • Survey Performed by Applied Research • 3,700 enterprises worldwide • Tactical IT, Strategic IT and C-level professionals • Cross-industry 2
  • 3. Key Findings • Gaps between expectations and reality • Increasing focus on business-critical applications • Quality of service challenges • IT and business executives out of synch • Most organizations rely heavily on outside service providers
  • 4. Market Adoption • Most (76-83%) are at least discussing cloud adoption • Server virtualization is most mature (45% implementing) • Private Storage-as-a-Service is least mature (36% implementing) • Greater adoption in large enterprises • U.S. ahead of the rest of the world
  • 5. Q12: At what stage is your organization in each of the following areas? 1 - Not considering 2 - In discussion/planning phase 3 - In trials 4 - Implementing 5 - Have implemented 100% 15% 15% 90% 20% 20% 24% 80% 20% 21% 70% 21% 23% 21% 60% 20% 19% 50% 19% 21% 16% 40% 22% 21% 30% 20% 21% 19% 20% 24% 24% 10% 19% 20% 17% 0% Storage virtualization Desktop or endpoint Server virtualization Private storage-as-a-service Private or hybrid cloud virtualization computing
  • 6. Gaps Between Expectations and Reality Reveal Evolving Market • We asked those who have already implemented: – What their original goals were (expected) – What they actually achieved after implementing (realized goals) • We measured the gap between expected and realized goals • Server virtualization tracked well (only 4% average gap) • Private Storage-as-a-Service challenging to implement (37% average gap)
  • 7. Server Virtualization • Biggest gaps: – Scalability (down 7%) – Reduce CapEx (down 12%) – Reduce OpEx (down 10%)
  • 8. Storage Virtualization • Biggest gaps: – Agility (down 32%) – Scalability (down 35%) – Reduce OpEx (down 32%)
  • 9. Endpoint/Desktop Virtualization • Biggest gaps: – New endpoint deployment (down 27%) – Application delivery (down 30%) – Application compatibility (down 27%)
  • 10. Private Storage-as-a-Service • Biggest gaps: – Scalability (down 34%) – Reduced complexity (down 40%) – Efficiency (down 37%)
  • 11. Hybrid/Private Cloud Computing • Biggest gaps: – Time to provision new resources (down 39%) – Scalability (down 34%) – Security (down 29%)
  • 12. Increasing Focus on Business-Critical Applications • Organizations leveraging virtualization for business-critical applications – Top apps include database, web, email and calendar • More slowly leveraging hybrid/private cloud technologies – Average of 33% of business-critical apps in hybrid/private cloud environments – Concerns over vulnerabilities, disaster recovery and encryption
  • 13. Quality of Service Challenges Emerge as Top Priorities • Storage cost and performance is top of mind • Security concerns • Performance issues • Availability
  • 14. IT and Business Executives Out of Synch • Why? – Reliability – Security – Performance • IT very open • App owners also open • U.S. less cautious than the rest of the world
  • 15. Most Organizations Lean Heavily on Third-party Service Providers
  • 16. Symantec Recommendations • Ensure alignment between IT and executives in virtualization and cloud initiatives • Don’t operate in a silo when it comes to cloud computing • Leverage and modernize your existing infrastructure • Set realistic expectations and track your results