There’s no turning back, January 2015 has come and almost gone! I have been reading other blogs with New Year’s resolutions and reflections from 2014 and I felt inclined to look back at some of the customers we highlighted in 2014. Continue reading
A Network Attached Storage (NAS) server is a storage system connected to a network providing access to a variety of clients, and optimized for file-level access. It doesn’t seem that long ago when NAS systems were just a few Terabytes, and a traditional full backup could complete in a weekend. Well those days are long gone, as data growth continues exponentially and we now move into the Petabyte range. I could write an entire blog on why this continues to happen, but let’s just say that larger NAS systems with higher performance continue to be more affordable, and it just seems so easy to keep all that data … forever and ever. Only when budgets, floor space, power and cooling, and recovery issues are brought into question, does the IT team take an in-depth look at solving the challenges, especially related to meeting backup and recovery SLAs and archiving. Continue reading
Data Protection Provisioning 2.0
Third platform applications are changing the way organizations manage, consume, deliver and protect storage. They are increasingly cloud-enabled, use sophisticated development frameworks, and are instantly available from any device. However, many existing applications are still in traditional and dedicated storage silos with restricted protection policies and provisioning has one basic purpose – connect well-known users to on-premise enterprise applications. Provisioning 1.0 operates with only an IT focus, with no business context and is in the dark ages. Provisioning 2.0 has emerged as a modern and agile way to fill the provisioning gap and is guided by a few key characteristics: business-driven, simple user experience, intuitive process, easy to deploy and maintain, and meets cloud and mobile demands. Continue reading
The impact that exponential data growth is having on the eDiscovery process has been dramatic in recent years. This increase in data has cancelled out the amount of time and money companies once could save by utilizing just standard archiving technologies. This calls for an archiving technology that can provide a scalable and sustainable solution with optimized searchability. Continue reading
In my last post of 2014, I shared some findings from the EMC Global Data Protection Index survey, including some new stats on data protection maturity.
I also included a link to the full report, which provides more detailed information about data protection practices on a global level as well as on a country-by-country basis. Very interesting stuff even to the non-data-protection-minded reader.
Not surprisingly, organizations worldwide aren’t as mature, or ahead of the curve, as one might expect given the world in which we live. It always amazes me how forward-minded we can be in some areas (think self-driving automobiles) and not so much in others (think data protection). Perhaps it’s just a “cool factor”? Continue reading
Are You on Solid Ground?
According to a recent survey by Vanson Bourne to over 3300 IT decision makers globally, 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data and applications. Collectively, these enterprises are losing $1.7 trillion through data loss and unplanned downtime. The more data protection vendors they throw at their problems, the more data loss they experienced and the cost of downtime exploded to 5X the level of using just one vendor. Sounds like the ground is swampy to me. Continue reading
It’s human nature to look at the New Year as a new opportunity.
It’s a new start. A time to look at what we accomplished last year and what we aspire to accomplish this year. Resolutions often fall into categories to improve our well being – to lose that 10 pounds, exercise more, drink less…
But do you create resolutions that focus on the health of your business? Continue reading
Not surprisingly, in 2014 we had many discussions with our customers about Information Governance issues such as data retention and remediation, privacy and eDiscovery. Very surprisingly, at many of these meetings, we introduced the IT and Legal departments to one another for the first time. Continue reading
As I prepared to write this post, my last one for 2014, I reflected on the collection of posts (see complete list at end) I put together this year and wondered: How are you doing?
Did you make a resolution to find your center of gravity? And, if so, were you successful in keeping it? Has your strategy shifted downstream to customers? Or, like many of your peers or competitors, are you still laboring upstream with product-focused business plans and technology-led IT strategies?
If the findings from the recent EMC Global Data Protection Index survey are any indication – and I think they are – you’re probably heading in the right direction but have a lot of work still to do. As a barometer of sorts, 87% of the companies surveyed for the Index were behind the curve in terms of data protection maturity. Only 2.4% were considered “leaders” and just 11.3% “adopters.”
If you haven’t taken a look at the full survey results, I encourage you to do so. As the center of business activity moves downstream, capturing, analyzing and protecting customer data becomes critical, as does moving along the maturity curve. Evolution is essential.
While many of my colleagues on The Protection Continuum spent the year sharing detailed information about the important technology advances shaping the future of data protection, my focus was on the bigger business picture.
My collection of posts took a look at where we’re going, how we’ll get there and why it’s important for your business, and IT organizations, to tilt.
Here’s a recap. Enjoy – and happy holidays!
At the New Year, some people struggle to identify a bad habit that they want to end. Their co-workers, of course, instantly produce a long list of irritating behaviors. Similarly, every IT team’s business partners have a 2015 New Year’s Resolution for them – “Stop Being Dr. No.”
Lines of business complain that when they ask their IT for anything new, the answer is always “No.” Sometimes the rejection is instantaneous, with laments about reduced budgets, complex regulations, and distributed operations. Other times the refusal takes the form of “we’ll look at it,” and nothing ever happens. Lines of business don’t aspire to set up rogue IT environments; they feel like they have no alternatives. Continue reading
According to the EMC Global Data Protection Index, which surveyed 3,300 IT decision makers from mid-size to enterprise-class businesses across 24 countries, common data protection practices have left global businesses exposed to data loss and downtime to the tune of $1.7 trillion annually. For the sake of comparison, that’s about the same as the world’s total military spend in a single year. A startling statistic by any account! And this is only a glimpse of what’s to come if attitudes and practices toward data protection are left unchanged. Continue reading
Does your organization keep old, stale and useless data? Most do. In our practice we find that about two-thirds of data on file shares has not been accessed in at least six months. While the lack of access does not necessarily identify data that has no business value, it’s a pretty good indicator. Continue reading
I feel like I was born with a computer in my hand; I embrace them both from a business and personal perspective.
But I am a Gen-Xer, so certain realities are true. I was not born with a computer in my hand, but rather a typewriter, record player, and an Atari game console. According to the folks who define the characteristics of each generation, I have different priorities, perspectives, and drivers than Millennials (a.k.a. Gen-Yers). But how different? Continue reading
It’s been 13 years since the world changed.
While there have been no shortage of tragedies since 9/11, including other acts of terrorism home and abroad, war, hurricanes, tsunamis, and massive tornados, no single event has matched the impact of that day thirteen years ago. The transformation of the world after that event has touched all our lives in ways big and small, the technology industry included.
No, people really don’t care more about data protection now than they did then. Nor did the event set disk-based backup or VPLEX in motion. But 9/11 did help redefine the role and expectation of data protection. That day began the journey to converge data protection and security. Continue reading