Data protection more challenging

July 2019 Editor's Choice, Infrastructure

Dell EMC announced the results of the third Global Data Protection Index revealing an explosive growth rate of data of 569% and an impressive jump in data protection ‘adopters’ of nearly 50 percentage points since 2016.

The research, which surveyed 2 200 IT decision makers from both public and private organisations with 250+ employees across 18 countries and 11 industries, provides a comprehensive understanding of the state of data protection and the maturity of data protection strategies. Specifically, the Index uncovered an increase in the average amount of data managed – from 1.45 petabytes (PB) in 2016 to 9.70 PB in 2018 – and a high awareness of the value of data. In fact, 92 percent of respondents see the potential value of data and 36 percent are already monetising their data. While this acknowledgement is positive, most respondents are struggling to properly protect their data. The combination of these factors is driving many of the survey’s findings.

Disruption incidents are costly

The sheer volume of data and its importance to business operations make data protection that much more challenging. Disruption incidents are occurring frequently, but more alarming is the increasing amount of irreversible data loss. More than three-quarters (76%) of respondents globally experienced some type of disruption within a 12-month period, and 27 percent were unable to recover data using their existing data protection solution – nearly double the amount (14%) in 2016.

Coincidently, 76% of respondents worldwide are also using at least two data protection vendors, which makes them 35% more likely to experience some type of disruption during the same 12-month period, compared to those with a single vendor. Unplanned systems downtime was the most common type of disruption (43%) for those using two or more vendors, followed by ransomware attack that prevented access to data (32%) and data loss (29%).

Although unplanned systems downtime is more prevalent, data loss is far more expensive. For example, those who encountered downtime experienced 20 hours of downtime on average in the last 12 months, costing $526 845, while those who lost data, lost 2.13 terabytes on average with a price tag of nearly $1 million. Additionally, many of those who experienced a disruption also indicated it had far-reaching business impacts from customer trust to brand equity to employee productivity, to name a few.

Not only does the amount of data lost increase the price, but so does the value of data itself. It’s clear that organisations recognise this as 81% said they take data protection more seriously for categories of data that have the greatest monetary value.

Challenges surrounding data protection

While those classified as data protection ‘adopters’ sprang forward by nearly 50 percentage points (from 9% in 2016 to 57% in 2018) and ‘leaders’ increased 10 percentage points (from 2% in 2016 to 12% in 2018), most businesses are struggling to implement a solution that adequately suits their needs. The majority (95%) of respondents face at least one challenge in relation to data protection. The top three challenges globally include:

1. The complexity of configuring and operating data protection software/hardware, and the ballooning costs of storing and managing backup copies due to rapid data growth tied for first at 46%.

2. The lack of data protection solutions for emerging technologies ranked second at 45%.

3. Ensuring compliancy with regulations like GDPR ranked third at 41%.

For those who are struggling to find adequate data protection solutions for newer technologies, more than half (51%) said they could not find suitable data protection solutions for artificial intelligence and machine learning data, followed by cloud-native applications (47%) and IoT (40%).

The challenges presented by emerging technologies and the rapid growth of data are just beginning to take shape. As such, only 16% believe their current data protection solutions will be able to meet all future business challenges.

Cloud is changing the data protection landscape

According to the Global Data Protection Index, public cloud use has increased from 28% of the total IT environment in respondents’ organisations in 2016 to 40% in 2018, on average. Nearly all (98%) organisations using public cloud are also leveraging it as part of their data protection infrastructure. The top use cases for data protection within public cloud include:

1. Backup/snapshot services to protect workloads developed in public cloud using new application architectures (41%).

2. Backup of on-premises workloads/data (41%).

3. Protecting specific SaaS apps (40%).

4. Cloud-enabled versions of on-premises data protection software to protect public cloud workloads (40%).

5. Backup/snapshot services to protect workloads developed in public cloud using legacy application architectures (38%).

When considering data protection solutions in a public cloud environment, the growing data universe plays an especially critical role as indicated by 64% of respondents who named scalability options as important. Specifically, 41% cited the impact of data protection infrastructure or services required to protect at scale, while 40% cited the ability to scale services as public cloud workloads increase.

Regulation is an impending catalyst for evolution

Data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) are relatively new, and the true impact on the data industry has yet to be realised. However, it has quickly become a focal point as regulation compliance was ranked in the top three data protection challenges by 41% of respondents.

Moreover, only 35% felt very confident that their organisation’s current data protection infrastructure and processes are compliant with regional regulations. That sentiment is beginning to translate into reality as 12% of respondents whose organisation experienced data loss or unplanned downtime in the past 12 months reported paying punitive fines as a result.

For a detailed view of the Global Data Protection Index, including global and regional infographics, visit www.dellemc.com/gdpi





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.