Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

8/1/2019
10:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Zerto Research Highlights Business Need for IT Resilience Planning

Perception gap among IT and business decision makers contributing to lack of IT Resilience maturity.

Boston, Mass., August 1, 2019 - Zerto, an industry leader for IT resilience, today announced the full findings of its sponsored IDC survey, Worldwide Business Resilience Readiness Thought Leadership Survey. The subsequent report revealed that 91% of respondents have experienced a tech-related disruption in the past two years, and yet 82% of respondents said data protection and recovery are important to their digital transformation projects. 

The white paper illustrates a perception gap between IT and business decision makers regarding the importance of data availability and success of digital transformation/IT transformation initiatives. 

Key indicators of perception gap, supported by research findings:

  • More than 80% of respondents indicated senior management does not believe there is a high correlation between the quality/availability of data and organizational success
  • Only 11.4% of respondents indicated the highest level of IT resilience maturity
  • 91.2% of respondents reported experiencing some type of business disruption in the last two years (from a variety of causes)
  • 56% of respondents had an event resulting in unrecoverable data loss, and the top causes of this loss were often avoidable (i.e. the event occurred during gap between backups, backup/recovery system failures, etc.)

Optimizing resilience planning, the report says, plays an important role in minimizing the financial burden and negative impact of IT-related business disruption. These types of disruptions, the research details, are costing organizations significantly:

  • 36.6% of respondents experienced a direct loss of revenue
  • 61.4% of respondents suffered either major or minor damage to company reputation
  • 26.1% respondents indicated a permanent loss of customers

The white paper concludes that because most respondents have not optimized their IT resilience strategy, cloud and transformation initiatives are at risk of delay or failure. 

However, 90% of respondents indicated intent to increase their IT resilience investments over the next two years. 

For many organizations, efforts to improve resilience are taking place against a backdrop of changing data protection and disaster recovery needs:

  • 57.8% expect data protection requirements to become more complex
  • 93.4% of respondents are likely to pursue convergence of backup and disaster recovery tools to eliminate redundancy
  • 44.8% of respondents are experiencing an expansion in data demands

Interestingly, almost 100% of respondents anticipate cloud playing a role in their organization's future disaster recovery or data protection plans. But today, according to respondents, integrated adoption of cloud-based protection solutions remains low:

  • 45.6% currently deploy cloud backup tools
  • 39% use cloud archive solutions
  • 37% use disaster recovery-as-a-service (DRaaS) tools 

Currently only 12.4% of IT budgets (on average) are spent on IT resilience hardware/software/cloud solutions.

Phil Goodwin, Research Director, IDC, commented:

“These survey results indicate that most respondents have not optimized their IT resilience strategy, evidenced by the high levels of IT and business-related disruptions. However, the majority of organizations surveyed will undertake a transformation, cloud, or modernization project within the next two years. This illustrates the need for all organizations to begin architecting a plan for IT resilience to ensure the success of these initiatives.”

He added, “Without such a plan, the high prevalence of disruptive events, unplanned downtime, and data loss indicated by respondents will continue to put cloud and transformation initiatives at risk of delay or failure — creating a financial burden and negative impact to an organization's competitive advantage.”

Avi Raichel, CIO, Zerto, commented:

“The resilience of business IT is under constant pressure. Malicious attacks and outages are causing enormous levels of disruption, and it’s clear that for many organizations their ability to avoid and mitigate IT-related disruption is not where it needs to be, and is actually holding back their ability to focus on innovating. IT leaders and professionals clearly understand the pressing requirement for better resilience, and it’s to everyone’s benefit that the momentum behind IT resilience is really building.” 

For more insights from the Worldwide Business Resilience Readiness Thought Leadership Survey, read in full here

White Paper Research Methodology:

IDC Research surveyed 500 senior-level IT and business managers representing over 10 unique industries and companies of all sizes and geographies about the challenges to achieve IT resiliency and its importance to digital transformation.

About Zerto

Zerto helps customers accelerate IT transformation by reducing the risk and complexity of modernisation and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, data protection and cloud are managed. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 7,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, Sungard AS and more than 350 cloud services providers. Learn more at Zerto.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .