SlideShare a Scribd company logo
1 of 11
Download to read offline
Small Business Virtualization Poll
APJ Key Findings
Methodology
• Survey Performed by Applied Research
• 658 organizations worldwide;
  306 organizations from APJ
• Small businesses (5 – 249 employees)
• Person in charge of computing resources
• Cross-industry




                                            2
Key Findings
• Small businesses have a strong interest
  in virtualization
• Small businesses are still grappling with
  how to adopt virtualization
• Due to the immaturity of this
  market, small businesses are neglecting
  to protect their data and systems in
  virtual environments.




                                              3
Strong Interest in Virtualization
• 72% considering server virtualization
• Top reasons:
  – Reduce CapEx (68%)
  – Reduce OpEx (67%)
  – Improve disaster-recovery readiness (67%)




                                                4
Still Early Days…
• Only 8% have completed
  implementation to date
• Only 36% of productivity
  apps are being virtualized
• Only 27% of business-critical
  apps are being virtualized




                                  5
Therefore, Still Learning How to Adopt
Top three challenges
• Performance
• Backup
• Workload capacity/planning issues




                                         6
Neglecting Protection of Data and Systems
Infrequent backups
• Only 13% always back up
• 24% never or have spotty backup


Why?
• Staffing issues (30%)
• Budget issues (54%)



                                            7
Neglecting Protection of Data and Systems
Incomplete security practices
• On average, only 40% are
        completely secured
• 30% are completely or somewhat unsecured


Why?
• Staffing issues (37%)
• Budget issues (50%)


                                             8
Neglecting Protection of Data and Systems
• Even for those somewhat or completely secured, safeguards are uneven
• 76% forego endpoint protection
• 51% don’t have a firewall
• 73% don’t use antivirus




                                                                         9
Symantec Recommendations
• Define a virtualization strategy
• Secure your virtual environments
• Protect your data




                                     10
Thank you!


Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

More Related Content

What's hot

2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report
Symantec APJ
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
Rishu Mehra
 
2011 smb dp survey ppt apac slideshare
2011 smb dp survey ppt apac   slideshare2011 smb dp survey ppt apac   slideshare
2011 smb dp survey ppt apac slideshare
wuiwuiyu
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overview
davidwells
 

What's hot (14)

Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
2011 smb dp survey ppt apac slideshare
2011 smb dp survey ppt apac   slideshare2011 smb dp survey ppt apac   slideshare
2011 smb dp survey ppt apac slideshare
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Universal Health Sensor Platform Use Cases
Universal Health Sensor Platform Use CasesUniversal Health Sensor Platform Use Cases
Universal Health Sensor Platform Use Cases
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overview
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy Industry
 
Many products-no-security
Many products-no-securityMany products-no-security
Many products-no-security
 
Data drift and machine learning
Data drift and machine learningData drift and machine learning
Data drift and machine learning
 
Leading Hyper-V Backup Solution
Leading Hyper-V Backup SolutionLeading Hyper-V Backup Solution
Leading Hyper-V Backup Solution
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
 
Veritas Managed Enterprise Vault Presentation
Veritas Managed Enterprise Vault Presentation Veritas Managed Enterprise Vault Presentation
Veritas Managed Enterprise Vault Presentation
 
System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey Infographic
 

Viewers also liked

long presentation 15 slide
long presentation 15 slidelong presentation 15 slide
long presentation 15 slide
lsantucci87
 
Short Powerpoint 5 slide presentation
Short Powerpoint 5 slide presentationShort Powerpoint 5 slide presentation
Short Powerpoint 5 slide presentation
lsantucci87
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
Crispy Presentations
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
Rand Fishkin
 

Viewers also liked (20)

Small Makerparty Introduction Slide
Small Makerparty Introduction SlideSmall Makerparty Introduction Slide
Small Makerparty Introduction Slide
 
long presentation 15 slide
long presentation 15 slidelong presentation 15 slide
long presentation 15 slide
 
Short Powerpoint 5 slide presentation
Short Powerpoint 5 slide presentationShort Powerpoint 5 slide presentation
Short Powerpoint 5 slide presentation
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate Design
 
Displaying Data
Displaying DataDisplaying Data
Displaying Data
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation
 
Crap. The Content Marketing Deluge.
Crap. The Content Marketing Deluge.Crap. The Content Marketing Deluge.
Crap. The Content Marketing Deluge.
 
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersWhat Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101
 

Similar to Slide share apj symantec 2011 small business virtualization poll

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
Priyank Hada
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 

Similar to Slide share apj symantec 2011 small business virtualization poll (20)

Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
 
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and DiagnosticStephan Voigt - Innovation in Transformer Monitoring and Diagnostic
Stephan Voigt - Innovation in Transformer Monitoring and Diagnostic
 
Maximize your Lean ROI
Maximize your Lean ROIMaximize your Lean ROI
Maximize your Lean ROI
 
Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss?
 
2010 State Of Enterprise Security
2010 State Of Enterprise Security2010 State Of Enterprise Security
2010 State Of Enterprise Security
 
Get ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_ext
 
Healthcare IT
Healthcare ITHealthcare IT
Healthcare IT
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
VMworld 2012 Survey
VMworld 2012 Survey VMworld 2012 Survey
VMworld 2012 Survey
 
Step FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckStep FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeck
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
iPad Deployment, Best Practices, and Industry Trends for Remote Users
iPad Deployment, Best Practices, and Industry Trends for Remote UsersiPad Deployment, Best Practices, and Industry Trends for Remote Users
iPad Deployment, Best Practices, and Industry Trends for Remote Users
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 

Recently uploaded

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Slide share apj symantec 2011 small business virtualization poll

  • 1. Small Business Virtualization Poll APJ Key Findings
  • 2. Methodology • Survey Performed by Applied Research • 658 organizations worldwide; 306 organizations from APJ • Small businesses (5 – 249 employees) • Person in charge of computing resources • Cross-industry 2
  • 3. Key Findings • Small businesses have a strong interest in virtualization • Small businesses are still grappling with how to adopt virtualization • Due to the immaturity of this market, small businesses are neglecting to protect their data and systems in virtual environments. 3
  • 4. Strong Interest in Virtualization • 72% considering server virtualization • Top reasons: – Reduce CapEx (68%) – Reduce OpEx (67%) – Improve disaster-recovery readiness (67%) 4
  • 5. Still Early Days… • Only 8% have completed implementation to date • Only 36% of productivity apps are being virtualized • Only 27% of business-critical apps are being virtualized 5
  • 6. Therefore, Still Learning How to Adopt Top three challenges • Performance • Backup • Workload capacity/planning issues 6
  • 7. Neglecting Protection of Data and Systems Infrequent backups • Only 13% always back up • 24% never or have spotty backup Why? • Staffing issues (30%) • Budget issues (54%) 7
  • 8. Neglecting Protection of Data and Systems Incomplete security practices • On average, only 40% are completely secured • 30% are completely or somewhat unsecured Why? • Staffing issues (37%) • Budget issues (50%) 8
  • 9. Neglecting Protection of Data and Systems • Even for those somewhat or completely secured, safeguards are uneven • 76% forego endpoint protection • 51% don’t have a firewall • 73% don’t use antivirus 9
  • 10. Symantec Recommendations • Define a virtualization strategy • Secure your virtual environments • Protect your data 10
  • 11. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.