Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/11/2010
12:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec Data Center Report: 83% Rate Data Center Security Important

Data center complexity, numerous applications, and disaster recovery plan issues are top concerns

MOUNTAIN VIEW, Calif. " Jan. 11, 2010 " Symantec Corp. (Nasdaq: SYMC) today released the findings of its 2010 State of the Data Center study. Now in its third year, the study found that mid-sized enterprises (2,000 to 9,999 employees) are more likely to adopt cutting-edge technologies such as cloud computing, deduplication, replication, storage virtualization, and continuous data protection than small or large enterprises to reduce IT costs and manage increasing complexity. Further, mid-sized enterprise data centers show more activity, with more IT managers predicting major changes to the data center and new applications in 2010. Mid-sized enterprises also place a higher importance on staffing and training than their small or large enterprise counterparts. The study is based on surveys of 1,780 data center managers in 26 countries in November 2009.

"Although mid-sized enterprises tend to evaluate and adopt new technologies at a faster rate than larger organizations, they still face similar data center complexities that are compounded by adopting new initiatives," said Deepak Mohan, senior vice president, Information Management Group at Symantec. "Standardizing on cross-platform solutions that can manage new technologies and automate processes will drive immediate cost reduction and make their jobs easier in the long run."

Study Highlights:

* Mid-sized enterprises are more aggressive and pioneering than either small or large enterprises. They are adopting new technology initiatives such as cloud computing, replication, and deduplication at 11-17 percent higher rates than small or large enterprises.

  • Top data center concerns include increased complexity and too many applications. Most enterprises have 10 or more data center initiatives rated as somewhat or absolutely important and 50 percent expect "significant" changes to their data centers in 2010. Half of all enterprises say applications are growing somewhat/quickly and half are finding it difficult and costly to meet service level agreements (SLAs). One-third of all enterprises say staff productivity is hampered by too many applications. Adding to the complexity is the continued increase in data causing 71 percent of organizations to consider data reduction technologies such as deduplication.

    * Security, backup and recovery, and continuous data protection are the most important initiatives in 2010, ahead of virtualization. Eighty-three percent of enterprises rated security somewhat or absolutely important. Seventy-nine percent said backup and recovery is somewhat/absolutely important and 76 percent rated continuous data protection as one of their top initiatives.

    * Staffing and budgets remain tight with half of all enterprises reporting they are somewhat/extremely understaffed. Finding budget and qualified applicants are the biggest recruiting issues. Seventy-six percent of enterprises have the same or more job requisitions open this year.

    * There continues to be room for improvement in disaster recovery. One-third of disaster recovery plans are undocumented or need work and important IT components, such as cloud computing, remote office and virtual servers, are often not included. Compounding the issue, almost one-third of enterprises haven't re-evaluated their disaster recovery plan in the last 12 months.

    * Virtual machine protection continues to be a focus for enterprises, with 82 percent of enterprises considering virtual-machine technologies in 2010. Respondents cited granular recovery within virtual machine images as the biggest challenge in virtual machine data protection.

    Recommendations

  • Software that supports heterogeneous environments and eliminates islands of information is particularly important for mid-sized enterprises that are aggressively adopting new technologies because they can reduce complexity in the data center.

  • Organizations should deploy deduplication closer to the information source to eliminate redundant data and reduce storage and network costs.

  • Data center administrators need to manage storage across heterogeneous server and storage environments in a way that enables them to stop buying storage by leveraging new technology adoption such as storage resource management, thin provisioning, deduplication, storage virtualization and continuous data protection and recovery. Organizations leveraging a holistic approach to storage management can control storage budget growth and often postpone storage purchases.

  • Disaster recovery testing is invaluable, but can significantly impact business. Enterprises should seek to improve the success of testing by evaluating and implementing testing methods which are non-disruptive.

  • Organizations should deploy a single, unified platform for physical and virtual machine protection to simplify information management.

    Click to Tweet: @Symantec study says mid-sized data centers, not large ones, most likely to adopt new technologies. http://bit.ly/7dPQvt

    Resources

    * Find additional materials in the 2010 Symantec State of the Data Center Online Press Kit * Watch the 2010 Symantec State of the Data Center Video on YouTube * View the 2010 Symantec State of the Data Center Study

    * Access the 2010 Symantec State of the Data Center presentation on Slideshare.net * View last year's Symantec State of the Data Center Study

    About Storage from Symantec

    Symantec helps organizations secure and manage their information-driven world with storage management, email archiving, backup and recovery solutions.

    About Symantec

    Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Stop Defending Everything
    Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
    Small Business Security: 5 Tips on How and Where to Start
    Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
    Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
    Jai Vijayan, Contributing Writer,  2/13/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    How Enterprises Are Developing and Maintaining Secure Applications
    How Enterprises Are Developing and Maintaining Secure Applications
    The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-2228
    PUBLISHED: 2020-02-19
    The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute arbitrary code via unsafe deserialization of XML messages.
    CVE-2014-2727
    PUBLISHED: 2020-02-19
    The STARTTLS implementation in MailMarshal before 7.2 allows plaintext command injection.
    CVE-2015-2104
    PUBLISHED: 2020-02-19
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    CVE-2014-3622
    PUBLISHED: 2020-02-19
    Use-after-free vulnerability in the add_post_var function in the Posthandler component in PHP 5.6.x before 5.6.1 might allow remote attackers to execute arbitrary code by leveraging a third-party filter extension that accesses a certain ksep value.
    CVE-2016-10000
    PUBLISHED: 2020-02-19
    Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).