Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/11/2010
12:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec Data Center Report: 83% Rate Data Center Security Important

Data center complexity, numerous applications, and disaster recovery plan issues are top concerns

MOUNTAIN VIEW, Calif. " Jan. 11, 2010 " Symantec Corp. (Nasdaq: SYMC) today released the findings of its 2010 State of the Data Center study. Now in its third year, the study found that mid-sized enterprises (2,000 to 9,999 employees) are more likely to adopt cutting-edge technologies such as cloud computing, deduplication, replication, storage virtualization, and continuous data protection than small or large enterprises to reduce IT costs and manage increasing complexity. Further, mid-sized enterprise data centers show more activity, with more IT managers predicting major changes to the data center and new applications in 2010. Mid-sized enterprises also place a higher importance on staffing and training than their small or large enterprise counterparts. The study is based on surveys of 1,780 data center managers in 26 countries in November 2009.

"Although mid-sized enterprises tend to evaluate and adopt new technologies at a faster rate than larger organizations, they still face similar data center complexities that are compounded by adopting new initiatives," said Deepak Mohan, senior vice president, Information Management Group at Symantec. "Standardizing on cross-platform solutions that can manage new technologies and automate processes will drive immediate cost reduction and make their jobs easier in the long run."

Study Highlights:

* Mid-sized enterprises are more aggressive and pioneering than either small or large enterprises. They are adopting new technology initiatives such as cloud computing, replication, and deduplication at 11-17 percent higher rates than small or large enterprises.

  • Top data center concerns include increased complexity and too many applications. Most enterprises have 10 or more data center initiatives rated as somewhat or absolutely important and 50 percent expect "significant" changes to their data centers in 2010. Half of all enterprises say applications are growing somewhat/quickly and half are finding it difficult and costly to meet service level agreements (SLAs). One-third of all enterprises say staff productivity is hampered by too many applications. Adding to the complexity is the continued increase in data causing 71 percent of organizations to consider data reduction technologies such as deduplication.

    * Security, backup and recovery, and continuous data protection are the most important initiatives in 2010, ahead of virtualization. Eighty-three percent of enterprises rated security somewhat or absolutely important. Seventy-nine percent said backup and recovery is somewhat/absolutely important and 76 percent rated continuous data protection as one of their top initiatives.

    * Staffing and budgets remain tight with half of all enterprises reporting they are somewhat/extremely understaffed. Finding budget and qualified applicants are the biggest recruiting issues. Seventy-six percent of enterprises have the same or more job requisitions open this year.

    * There continues to be room for improvement in disaster recovery. One-third of disaster recovery plans are undocumented or need work and important IT components, such as cloud computing, remote office and virtual servers, are often not included. Compounding the issue, almost one-third of enterprises haven't re-evaluated their disaster recovery plan in the last 12 months.

    * Virtual machine protection continues to be a focus for enterprises, with 82 percent of enterprises considering virtual-machine technologies in 2010. Respondents cited granular recovery within virtual machine images as the biggest challenge in virtual machine data protection.

    Recommendations

  • Software that supports heterogeneous environments and eliminates islands of information is particularly important for mid-sized enterprises that are aggressively adopting new technologies because they can reduce complexity in the data center.

  • Organizations should deploy deduplication closer to the information source to eliminate redundant data and reduce storage and network costs.

  • Data center administrators need to manage storage across heterogeneous server and storage environments in a way that enables them to stop buying storage by leveraging new technology adoption such as storage resource management, thin provisioning, deduplication, storage virtualization and continuous data protection and recovery. Organizations leveraging a holistic approach to storage management can control storage budget growth and often postpone storage purchases.

  • Disaster recovery testing is invaluable, but can significantly impact business. Enterprises should seek to improve the success of testing by evaluating and implementing testing methods which are non-disruptive.

  • Organizations should deploy a single, unified platform for physical and virtual machine protection to simplify information management.

    Click to Tweet: @Symantec study says mid-sized data centers, not large ones, most likely to adopt new technologies. http://bit.ly/7dPQvt

    Resources

    * Find additional materials in the 2010 Symantec State of the Data Center Online Press Kit * Watch the 2010 Symantec State of the Data Center Video on YouTube * View the 2010 Symantec State of the Data Center Study

    * Access the 2010 Symantec State of the Data Center presentation on Slideshare.net * View last year's Symantec State of the Data Center Study

    About Storage from Symantec

    Symantec helps organizations secure and manage their information-driven world with storage management, email archiving, backup and recovery solutions.

    About Symantec

    Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    News
    Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
    Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
    Edge-DRsplash-10-edge-articles
    Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
    Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
    News
    Cybercrime Groups More Prolific, Focus on Healthcare in 2020
    Robert Lemos, Contributing Writer,  2/22/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Building the SOC of the Future
    Building the SOC of the Future
    Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-27225
    PUBLISHED: 2021-03-01
    In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.
    CVE-2021-27132
    PUBLISHED: 2021-02-27
    SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
    CVE-2021-25284
    PUBLISHED: 2021-02-27
    An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
    CVE-2021-3144
    PUBLISHED: 2021-02-27
    In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
    CVE-2021-3148
    PUBLISHED: 2021-02-27
    An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.