Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

8/1/2019
10:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Zerto Research Highlights Business Need for IT Resilience Planning

Perception gap among IT and business decision makers contributing to lack of IT Resilience maturity.

Boston, Mass., August 1, 2019 - Zerto, an industry leader for IT resilience, today announced the full findings of its sponsored IDC survey, Worldwide Business Resilience Readiness Thought Leadership Survey. The subsequent report revealed that 91% of respondents have experienced a tech-related disruption in the past two years, and yet 82% of respondents said data protection and recovery are important to their digital transformation projects. 

The white paper illustrates a perception gap between IT and business decision makers regarding the importance of data availability and success of digital transformation/IT transformation initiatives. 

Key indicators of perception gap, supported by research findings:

  • More than 80% of respondents indicated senior management does not believe there is a high correlation between the quality/availability of data and organizational success
  • Only 11.4% of respondents indicated the highest level of IT resilience maturity
  • 91.2% of respondents reported experiencing some type of business disruption in the last two years (from a variety of causes)
  • 56% of respondents had an event resulting in unrecoverable data loss, and the top causes of this loss were often avoidable (i.e. the event occurred during gap between backups, backup/recovery system failures, etc.)

Optimizing resilience planning, the report says, plays an important role in minimizing the financial burden and negative impact of IT-related business disruption. These types of disruptions, the research details, are costing organizations significantly:

  • 36.6% of respondents experienced a direct loss of revenue
  • 61.4% of respondents suffered either major or minor damage to company reputation
  • 26.1% respondents indicated a permanent loss of customers

The white paper concludes that because most respondents have not optimized their IT resilience strategy, cloud and transformation initiatives are at risk of delay or failure. 

However, 90% of respondents indicated intent to increase their IT resilience investments over the next two years. 

For many organizations, efforts to improve resilience are taking place against a backdrop of changing data protection and disaster recovery needs:

  • 57.8% expect data protection requirements to become more complex
  • 93.4% of respondents are likely to pursue convergence of backup and disaster recovery tools to eliminate redundancy
  • 44.8% of respondents are experiencing an expansion in data demands

Interestingly, almost 100% of respondents anticipate cloud playing a role in their organization's future disaster recovery or data protection plans. But today, according to respondents, integrated adoption of cloud-based protection solutions remains low:

  • 45.6% currently deploy cloud backup tools
  • 39% use cloud archive solutions
  • 37% use disaster recovery-as-a-service (DRaaS) tools 

Currently only 12.4% of IT budgets (on average) are spent on IT resilience hardware/software/cloud solutions.

Phil Goodwin, Research Director, IDC, commented:

“These survey results indicate that most respondents have not optimized their IT resilience strategy, evidenced by the high levels of IT and business-related disruptions. However, the majority of organizations surveyed will undertake a transformation, cloud, or modernization project within the next two years. This illustrates the need for all organizations to begin architecting a plan for IT resilience to ensure the success of these initiatives.”

He added, “Without such a plan, the high prevalence of disruptive events, unplanned downtime, and data loss indicated by respondents will continue to put cloud and transformation initiatives at risk of delay or failure — creating a financial burden and negative impact to an organization's competitive advantage.”

Avi Raichel, CIO, Zerto, commented:

“The resilience of business IT is under constant pressure. Malicious attacks and outages are causing enormous levels of disruption, and it’s clear that for many organizations their ability to avoid and mitigate IT-related disruption is not where it needs to be, and is actually holding back their ability to focus on innovating. IT leaders and professionals clearly understand the pressing requirement for better resilience, and it’s to everyone’s benefit that the momentum behind IT resilience is really building.” 

For more insights from the Worldwide Business Resilience Readiness Thought Leadership Survey, read in full here

White Paper Research Methodology:

IDC Research surveyed 500 senior-level IT and business managers representing over 10 unique industries and companies of all sizes and geographies about the challenges to achieve IT resiliency and its importance to digital transformation.

About Zerto

Zerto helps customers accelerate IT transformation by reducing the risk and complexity of modernisation and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, data protection and cloud are managed. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 7,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, Sungard AS and more than 350 cloud services providers. Learn more at Zerto.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.