Research Report. Abstract: Endpoint Device Backup Trends. December By Lauren Whitehouse With Bill Lundell and John McKnight

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Research Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight"

Transcription

1 Research Report Abstract: Endpoint Device Backup Trends By Lauren Whitehouse With Bill Lundell and John McKnight December Enterprise Strategy Group, Inc. All Rights Reserved.

2 Introduction Research Objectives Research Report: Endpoint Device Backup Trends In order to assess the current state of data protection for endpoint devices including desktop PCs, laptop PCs, and mobile phones ESG identified 287 respondents familiar with their organization s endpoint device infrastructure and any associated data protection tools and processes. In addition to their endpoint device knowledge, all respondents were personally responsible for evaluating, purchasing, or managing data protection technologies such as backup and recovery software, data replication software, and disk or tape storage systems used for secondary data storage for their organization. Specifically, the survey asked the following endpoint-specific questions: How many endpoint devices providing general purpose PC functionality are currently supported by IT organizations? What types of endpoint devices are supported and what percent of the total endpoint devices does each comprise? Do organizations have formal processes in place to back up endpoint devices? To what extent is each type of endpoint device protected? Does this vary based on the size of a respondent organization? For current users of endpoint backup solutions, what were the key drivers in the organization s decision to implement data protection for endpoint devices? For planned endpoint backup adopters, what are the key drivers for the organization to consider implementing data protection for endpoint devices? For each class of endpoint device, what is the primary method of backup used to protect it? For planned adopters of endpoint data protection, what is the expected method of backup for endpoint devices? Who in the organization is responsible for endpoint device backup? Who in the organization is responsible for endpoint device and/or file recovery? Does this vary by size of company? Which functional group is primarily responsible for funding data protection technology in support of endpoint devices? Are there differences for smaller versus larger organizations? For non-adopters, why don t organizations have formal processes to protect endpoint devices? Do these attitudes vary according to organization size? Survey participants represent a wide range of industries including manufacturing, financial services, communications and media, health care, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

3 Research Methodology To gather data for this report, ESG conducted a comprehensive online survey of IT managers from private- and public-sector organizations in North America (United States and Canada) between January 8, 2010 and January 29, To qualify for this survey, respondents were required to have day-to-day responsibility for evaluating, purchasing, or managing data protection technologies such as backup and recovery software, data replication software, and/or disk or tape systems used for secondary data storage. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, ESG was left with a final total sample of 510 IT managers. Of these, 287 respondents were familiar with their organization s endpoint device infrastructure, including endpoint device type breakdown, total number of endpoint devices, and data protection processes associated with endpoint devices. Please see the Respondent Demographics section of this report for more information on these respondents. Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding.

4 Respondent Demographics The data presented in this report is based on a survey of 510 qualified respondents, 287 of which were familiar with their organization s endpoint device infrastructure (including data protection tools and processes). The figures below detail the demographics of the entire respondent base unless otherwise noted. Respondents by Role The breakdown of current roles within an organization among survey respondents is shown in Figure 1. Figure 1. Survey Respondents, by Role Which of the following best describes your current role within your organization? (Percent of respondents, N=510) Other, 5% IT Staff (e.g., Storage Administrator, Systems Administrator, etc.), 49% IT Management (e.g., CIO, VP of IT, Director of IT, etc.), 4 Respondents by Technology Responsibility Survey respondents primary area of technology responsibility is shown in Figure 2. Figure 2. Survey Respondents, by Primary Area of Technology Responsibility Which of the following would you consider to be your primary area of technology responsibility? (Percent of respondents, N=510) IT Architecture/Planning, 7% Storage / SAN, 5% Other, 1% General IT, 32% Applications/ Database, 9% Servers, 14% IT Operations, 15% Data Protection (e.g., backup/recovery, replication, etc.), 17%

5 Respondents by Number of Employees The number of employees in respondents organizations is shown in Figure 3. Figure 3. Survey Respondents, by Number of Employees How many total employees does your organization have worldwide? (Percent of respondents, N=510) 20,000 or more, 12% 100 to 249, 250 to 499, 14% 5,000 to 19,999, 20% 500 to 999, 1 2,500 to 4,999, 12% 1,000 to 2,499, 15% Respondents by Industry Respondents were asked to identify their organization s primary industry. In total, ESG received completed, qualified responses from individuals in 18 distinct vertical industries, plus an Other category. Respondents were then grouped into the broader categories shown in Figure 4. Figure 4. Survey Respondents, by Industry What is your organization s primary industry? (Percent of respondents, N=510) Other, 18% Manufacturing, 23% Retail/Wholesale, 5% Professional Services, Communications & Media, 8% Health Care, 12% Government (Federal, National, State, Local), 1 Financial (banking, securities, insurance), 13%

6 Respondents by Annual Revenue The annual revenue of survey respondents organizations is shown in Figure 5. Figure 5. Survey Respondents, by Annual Revenue What is your organization s total annual revenue ($US)? (Percent of respondents, N=510) 14% 12% 11% 12% 12% 12% 13% 8% 8% 7% 7% 5% 5% 4% 2% 0% Less than $25 million $50 million $25 million to $49 million to $99 million $100 million to $249 million $250 million to $499 million $500 million to $999 million $1 billion to $5 billion to $10 billion $4.999 billion $9.999 billion to $ billion $20 billion or more Not applicable (e.g., public sector, non-profit) Respondents by Physical Locations Worldwide The number of worldwide physical locations of survey respondents organizations is shown in Figure 6. Figure 6. Survey Respondents, by Physical Locations Worldwide To the best of your knowledge, how many physical locations (offices, plants, branches, etc.) does your organization operate worldwide? (Percent of respondents, N=510) 500 or more, 8% Don t know, 2% 1, 4% 250 to 499, 2 to 5, 21% 100 to 249, 9% 50 to 99, 9% 6 to 10, 15% 26 to 49, 11 to 25, 17%

7 Respondents by Data Centers Operated Worldwide The number of data centers operated worldwide by survey respondents organizations is shown in Figure 7. Figure 7. Survey Respondents, by Data Centers Worldwide How many data centers does your organization operate worldwide? (Percent of respondents, N=510) Rely solely on thirdparty outsourced data center facilities, 1% More than 20, 12% Don t know, 1% 1, 15% 11 to 20, 9% 2, 17% 6 to 10, 15% 3 to 5, 30% Respondents by Number of Production Servers The number of production servers in respondents immediate organization is shown in Figure 8. Figure 8. Survey Respondents, by Number of Production Servers Approximately how many production servers (whether physical or virtual) are supported worldwide by your IT organization? (Percent of respondents, N=510) More than 5,000, 5% 2,501 to 5,000, 2% Don t know, 2% Less than 25, 17% 1,001 to 2,500, 7% 501 to 1,000, 11% 25 to 49, to 500, 11% 50 to 100, to 250, 13%

8 Respondents by Total Amount of Data The total amount of data in respondents immediate organization is shown in Figure 9. Figure 9. Survey Respondents, by Total Amount of Data What is your immediate organization s approximate total volume of data stored on corporate servers and storage systems? (Percent of respondents, N=510) 14% 12% 8% 11% 12% 13% 9% 8% 5% 4% 2% 0% Less than 1 TB (terabyte) 1 TB 5 TB 6 TB 10 TB 11 TB TB 50 TB TB 51 TB 100 TB 101 TB 250 TB 251 TB 500 TB 500 TB 1 More than PB 1 PB (petabyte) Don t know Respondents by Total Number of Endpoint Devices The number of endpoint devices in respondents immediate organization is shown in Figure 10. Figure 10. Survey Respondents, by Total Number of Endpoint Devices 30% For your immediate organization, approximately how many total desktop PCs, laptop PCs, or other endpoint devices providing general-purpose PC functionality does your IT organization currently support? (Percent of respondents, N=287) 28% 25% 20% 15% 1 17% 14% 5% 8% 4% 5% 2% 1% 0% Less than ,000-2,499 2,500-4,999 5,000-9,999 10,000-19,999 20,000-49,999 50,000-99, ,000 or more

9 Breakdown of Various Endpoint Device Types The average percentage breakdown of endpoint device types is shown in Figure 11. Figure 11. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Types Of your organization s total number of PCs and other endpoint devices providing general-purpose PC functionality, approximately what percentage is made up by each device type listed below? (Mean, N=287) 100% 90% 80% 70% 60% 50% 40% 30% 20% 0% Thin clients / terminals with PC connectivity, 8% Laptop PCs, 27% Desktop PCs, 54% Other, 1% Smart phones/pdas with PC functionality, Breakdown of Endpoint Device Operating Systems The average percentage breakdown of endpoint device operating systems is shown in Figure 12. Figure 12. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Operating Systems 100% 90% 80% 70% 60% 50% Based on your organization s overall PC environment, approximately what percentage of endpoint devices run the following operating systems? (Mean, N=287) Mac OS X, 3% Windows 7, 8% Microsoft Windows Vista, Other, 1% Linux, 2% 40% Microsoft Windows XP, 68% 30% 20% 0% Microsoft Windows 2000, 7%

10 Contents List of Figures... 3 List of Tables... 3 Executive Summary... 4 Report Conclusions... 4 Introduction... 5 Research Objectives... 5 Research Findings... 6 Endpoint Device Usage... 6 The State of Endpoint Data Protection... 7 Organizations Currently Backing Up Endpoint Devices Organizations Planning to Back Up Endpoint Devices Organizations with No Plans to Back Up Endpoint Devices Conclusion Research Methodology Respondent Demographics Respondents by Role Respondents by Technology Responsibility Respondents by Number of Employees Respondents by Industry Respondents by Annual Revenue Respondents by Physical Locations Worldwide Respondents by Data Centers Operated Worldwide Respondents by Number of Production Servers Respondents by Total Amount of Data Respondents by Total Number of Endpoint Devices Breakdown of Various Endpoint Device Types Breakdown of Endpoint Device Operating Systems... 29

11 List of Figures Figure 1. Total Number of Endpoint Devices, by Company Size... 6 Figure 2. Current Data Protection Process and Technology Challenges... 7 Figure 3. Top Areas of Data Protection Investment for Figure 4. Organizations Identifying Endpoint Backup as a Top Data Protection Challenge More Likely to Invest in Endpoint Device Backup and Recovery Solutions... 8 Figure 5. Formal Processes to Back Up Endpoint Devices... 9 Figure 6. Drivers for Current Users of Endpoint Device Backup Solutions Figure 7. Extent to Which Organizations are Backing Up Different Endpoint Device Types Figure 8. Primary Method of Backup Used to Protect Various Endpoint Devices Figure 9. Groups Responsible for Endpoint Device and/or File Backup and Recovery Figure 10. Funding for Endpoint Device Data Protection Purchases Figure 11. Funding for Endpoint Device Data Protection Purchases, by Number of Endpoint Devices Figure 12. Drivers for Planned Adopters of Endpoint Device Backup Solutions Figure 13. Drivers for Planned Adopters of Endpoint Device Backup Solutions, by Number of Endpoint Devices. 16 Figure 14. Primary Method of Backup Expected to be Used to Protect Various Endpoint Devices Figure 15. Primary Method of Backup Expected to be Used to Protect Various Endpoint Devices, by Company Size Figure 16. Primary Method of Backup Expected to be Used to Protect Various Endpoint Devices, by Number of Endpoint Devices Figure 17. Why Organizations Have No Formal Processes to Back Up Endpoint Devices Figure 18. Why Organizations Have No Formal Processes to Back Up Endpoint Devices, by Number of Endpoint Devices Figure 19. Survey Respondents, by Role Figure 20. Survey Respondents, by Primary Area of Technology Responsibility Figure 21. Survey Respondents, by Number of Employees Figure 22. Survey Respondents, by Industry Figure 23. Survey Respondents, by Annual Revenue Figure 24. Survey Respondents, by Physical Locations Worldwide Figure 25. Survey Respondents, by Data Centers Worldwide Figure 26. Survey Respondents, by Number of Production Servers Figure 27. Survey Respondents, by Total Amount of Data Figure 28. Survey Respondents, by Total Number of Endpoint Devices Figure 29. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Types Figure 30. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Operating Systems List of Tables Table 1. Average Breakdown of Device Types in Use, by Company Size and Number of Endpoint Devices... 6 Table 2. Current and Planned Use of Endpoint Backup, by Company Size and Number of Endpoint Devices... 9 Table 3. Drivers for Current Users of Endpoint Device Backup Solutions, by Number of Endpoint Devices Table 4. Drivers for Endpoint Device Backup Adoption, Current Users vs. Planned Adopters All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. Copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508)

12 20 Asylum Street Milford, MA Tel: Fax:

Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010

Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010 Research Report Abstract: The Impact of Server Virtualization on Data Protection By Lauren Whitehouse and Bill Lundell With Jennifer Gahm September 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: Trends in Data Protection Modernization. August 2012

Research Report. Abstract: Trends in Data Protection Modernization. August 2012 Research Report Abstract: Trends in Data Protection Modernization By Jason Buffington, Senior Analyst, and Bill Lundell, Senior Research Analyst August 2012 Introduction Research Objectives Research Report:

More information

Research Report. Remote Office/Branch Office Technology Trends. July 2011

Research Report. Remote Office/Branch Office Technology Trends. July 2011 Research Report Remote Office/Branch Office Technology Trends By Bill Lundell, Jon Oltsik, and Lauren Whitehouse With John McKnight and Jenn Gahm July 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight

Research Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight Research Report Abstract: Solid-state Storage Market Trends By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight November 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved.

More information

The Shift Toward Data Protection Appliances

The Shift Toward Data Protection Appliances Research Report Abstract: The Shift Toward Data Protection Appliances By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager March 2015

More information

2015 Data Storage Market Trends

2015 Data Storage Market Trends Research Report Abstract: 2015 Data Storage Market Trends By Mark Peters, Senior Analyst and Bill Lundell, Senior Research Analyst With Scott Sinclair, Analyst and Jenn Gahm, Senior Project Manager October

More information

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011 Research Report Abstract: The Impact of Big Data on Data Analytics By Julie Lockner and Bill Lundell With Jennifer Gahm and John McKnight September 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Corporate Online File Sharing and Collaboration Market Trends

Corporate Online File Sharing and Collaboration Market Trends Research Report Abstract: Corporate Online File Sharing and Collaboration Market Trends By Kristine Kao, Market Research Analyst, Terri McClure, Senior Analyst, and Jane Wright, Senior Production Analyst

More information

Data Protection-as-a-service (DPaaS) Trends

Data Protection-as-a-service (DPaaS) Trends Research Report Abstract: Data Protection-as-a-service (DPaaS) Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager and Adam DeMattia,

More information

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012 Research Report Abstract: Social Enterprise Adoption Trends By Tom Petrocelli, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jenn Gahm, Senior Project Manager June 2012 2012 Enterprise

More information

Online File Sharing and Collaboration: Deployment Model Trends

Online File Sharing and Collaboration: Deployment Model Trends Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager

More information

Enterprise Database Trends in a Big Data World

Enterprise Database Trends in a Big Data World Research Report Abstract: Enterprise Database Trends in a Big Data World By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager July 2014 Introduction

More information

The Convergence of Big Data Processing and Integrated Infrastructure

The Convergence of Big Data Processing and Integrated Infrastructure Research Report Abstract: The Convergence of Big Data Processing and Integrated Infrastructure By Evan Quinn, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Brian Babineau, Vice

More information

Backup and Archiving Convergence Trends

Backup and Archiving Convergence Trends Research Report Abstract: Backup and Archiving Convergence Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Cloud Computing Adoption Trends:

Cloud Computing Adoption Trends: Research Report Abstract: Cloud Computing Adoption Trends: Software- and Infrastructure-as-a-Service Usage Among Enterprise and Midmarket Organizations By Bill Lundell With John McKnight and Jennifer Gahm

More information

The State of Mobile Computing Security

The State of Mobile Computing Security Research Report Abstract: The State of Mobile Computing Security By Jon Oltsik, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager February 2014

More information

Research Report. Abstract: The Evolution of Server Virtualization. November 2010

Research Report. Abstract: The Evolution of Server Virtualization. November 2010 Research Report Abstract: The Evolution of Server Virtualization By Mark Bowker and Jon Oltsik With Bill Lundell, John McKnight, and Jenn Gahm November 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight

Research Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight Research Report Abstract: E-Mail Archiving Market Trends By Brian Babineau With Bill Lundell and John McKnight May 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction: Research

More information

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013 Research Report Abstract: 2013 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2013 Introduction Research

More information

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013 Research Report Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst June 2013 Introduction Research

More information

Enterprise Big Data, Business Intelligence, and Analytics Trends

Enterprise Big Data, Business Intelligence, and Analytics Trends Research Report Abstract: Enterprise Big Data, Business Intelligence, and Analytics Trends By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jennifer Gahm, Senior Project Manager

More information

Trends in Private Cloud Infrastructure

Trends in Private Cloud Infrastructure Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Research Report. Abstract. Trends in Data Center Networking. February 2016

Research Report. Abstract. Trends in Data Center Networking. February 2016 Research Report Abstract Trends in Data Center Networking By Dan Conde, Senior Analyst and Bill Lundell, Director of Research With Jennifer Gahm, Senior Project Manager February 2016 Introduction Research

More information

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,

More information

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011 Research Report Abstract: e-discovery Market Trends A View from the Legal Department By Katey Wood and Brian Babineau With Bill Lundell and Jennifer Gahm October 2011 2011 Enterprise Strategy Group, Inc.

More information

Platform-as-a-service Usage and Satisfaction Study

Platform-as-a-service Usage and Satisfaction Study Research Report Abstract: Platform-as-a-service Usage and Satisfaction Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager

More information

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm RESEARCH REPORT Abstract Storage Resource Management Market on the Launch Pad By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm October 2007 Introduction Research Objectives The term

More information

Platform-as-a-service Language Use Study

Platform-as-a-service Language Use Study Research Report Abstract: Platform-as-a-service Language Use Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst & Jennifer Gahm, Senior Project Manager February

More information

Web Application Security Testing Tools and Services

Web Application Security Testing Tools and Services Research Report Abstract: Web Application Security Testing Tools and Services By Jon Oltsik, Senior Principal Analyst, and Jane Wright, Senior Research Analyst With Jennifer Gahm April 2013 Introduction

More information

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014 Research Report Abstract: 2014 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2014 Introduction Research

More information

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell Research Report Abstract: The Impact of Cloud Computing on the Channel By Jeff Hine and Bill Lundell September 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research Objectives

More information

ESG Research Final Sponsor Report

ESG Research Final Sponsor Report ESG Research Final Sponsor Report The Modernization of Data Protection By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager April 2012 2012

More information

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...

More information

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All

More information

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015 4 Cloud Computing: Not a Question of If, but Rather

More information

The Data Center of the Future

The Data Center of the Future 2010, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Data Center of the Future By Mark Bowker and Lauren Whitehouse March, 2010 This ESG White Paper was commissioned by Veeam and is

More information

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010 White Paper Improving Backup Effectiveness and Cost-Efficiency with Deduplication By Lauren Whitehouse October, 2010 This ESG White Paper was commissioned by Fujitsu and is distributed under license from

More information

White. Paper. Desktop Virtualization Efficiencies with Citrix and NetApp. October, 2009. By Mark Bowker

White. Paper. Desktop Virtualization Efficiencies with Citrix and NetApp. October, 2009. By Mark Bowker White Paper Desktop Virtualization Efficiencies with Citrix and NetApp By Mark Bowker October, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved White Paper: Desktop Virtualization Efficiencies

More information

Research Report. Abstract: Scale-out Storage Market Forecast 2010-2015. February 2011. By Terri McClure

Research Report. Abstract: Scale-out Storage Market Forecast 2010-2015. February 2011. By Terri McClure Research Report Abstract: Scale-out Storage Market Forecast 2010-2015 By Terri McClure February 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Market Forecast Overview Forecast Scope Designed

More information

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst White Paper How to Accelerate IT Resiliency Through Virtualization By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst August 2015 This ESG White Paper was commissioned by Axcient and

More information

White. Paper. Storage-efficient Data Protection and Retention. April, 2011

White. Paper. Storage-efficient Data Protection and Retention. April, 2011 White Paper Storage-efficient Data Protection and Retention By Lauren Whitehouse April, 2011 This ESG White Paper was commissioned by IBM and is distributed under license from ESG. 2011, Enterprise Strategy

More information

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data

More information

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology White Paper A Comparative TCO Study: VTLs and Physical Tape With a Focus on Deduplication and LTO-5 Technology By Mark Peters February, 2011 This ESG White Paper is distributed under license from ESG.

More information

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst ESG Lab Review Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on

More information

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast White Paper SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast By Bill Lundell, Senior Research Analyst January 2013 This ESG White Paper was commissioned by Mimecast

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

White Paper. Recovery-focused Data Protection: Research Shows Your Future Depends On It

White Paper. Recovery-focused Data Protection: Research Shows Your Future Depends On It White Paper : Research Shows Your Future Depends On It By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group January, 2007 Copyright 2007. The Enterprise Strategy Group, Inc. All Rights

More information

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010 White Paper Benefiting from Server Virtualization Beyond Initial Workload Consolidation By Mark Bowker June, 2010 This ESG White Paper was commissioned by VMware and is distributed under license from ESG.

More information

Effective storage management and data protection for cloud computing

Effective storage management and data protection for cloud computing IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage

More information

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well

More information

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011 White Paper The SMB Market is Ready for Data Encryption By Mark Peters January, 2011 This ESG White Paper was commissioned by Tandberg Data and is distributed under license from ESG. 2011, Enterprise Strategy

More information

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011 Solution Impact Analysis NEC Powers ServIT's Custom Hosting Solutions By Mark Bowker September, 2011 This ESG publication was commissioned by NEC and is distributed under license from ESG. 2011, Enterprise

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst ESG Lab Review Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst Abstract: This ESG Lab review documents hands-on testing of

More information

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80% Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According

More information

White. Paper. Big Data Advisory Service. September, 2011

White. Paper. Big Data Advisory Service. September, 2011 White Paper Big Data Advisory Service By Julie Lockner& Tom Kornegay September, 2011 This ESG White Paper was commissioned by EMC Corporation and is distributed under license from ESG. 2011, Enterprise

More information

LAB VALIDATION REPORT

LAB VALIDATION REPORT LAB VALIDATION REPORT File Sharing Made Simple By Claude Bouffard With Brian Garrett August, 2008 Table of Contents ESG LAB VALIDATION Table of Contents... i Introduction... 1 ESG Lab Validation... 4 Getting

More information

White. Paper. Citrix XenDesktop Eases Windows 7/8.1 Migration. October 2013

White. Paper. Citrix XenDesktop Eases Windows 7/8.1 Migration. October 2013 White Paper Citrix XenDesktop Eases Windows 7/8.1 Migration By Mark Bowker, Senior Analyst October 2013 This ESG White Paper was commissioned by Citrix and is distributed under license from ESG. 2013 by

More information

Enterprise Backup Solution Vendor Questions

Enterprise Backup Solution Vendor Questions Enterprise Backup Solution Vendor Questions What is the size of a single full back up? If Backups comprise 28% of the 19TB, can we assume that a single full (not compressed) is approximately 6TB? The approximate

More information

MULTI VENDOR ANALYSIS

MULTI VENDOR ANALYSIS MULTI VENDOR ANALYSIS Taming the Impact of Server Virtualization on Networked Storage With Citrix, Microsoft, and NetApp By Mark Bowker June, 2009 Table of Contents ESG WHITE PAPER Table of Contents...

More information

The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst

The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst Research Brief The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst Abstract: ESG research indicates that the corporate usage

More information

Effective Storage Management for Cloud Computing

Effective Storage Management for Cloud Computing IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations

More information

August 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution

August 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution August 2009 Transforming your Information Infrastructure with IBM s Storage Cloud Solution Page 2 Table of Contents Executive summary... 3 Introduction... 4 A Story or three for inspiration... 6 Oops,

More information

Secure Your Business with EVault Cloud-Connected Solutions

Secure Your Business with EVault Cloud-Connected Solutions Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault

More information

Nexsan and FalconStor Team for High Performance, Operationally Efficient Disk-based Backup Date: August, 2009 Author:

Nexsan and FalconStor Team for High Performance, Operationally Efficient Disk-based Backup Date: August, 2009 Author: Nexsan and FalconStor Team for High Performance, Operationally Efficient Disk-based Backup Date: August, 2009 Author: Brian Babineau, Senior Consulting Analyst, and Lauren Whitehouse, Senior Analyst Abstract:

More information

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center White Paper Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center By Mark Bowker, Senior Analyst, and Perry Laberis, Senior Research Associate March 2013 This ESG White Paper

More information

DAS (Direct Attached Storage)

DAS (Direct Attached Storage) Data Storage 101 Data Storage 101 In this guide, we will explain the differences between:» DAS (Direct Attached Storage)» JBOD (Just a Bunch Of Drives)» NAS (Network Attached Storage)» SAN (Storage Area

More information

White. Paper. The Road to the Hybrid Cloud: Signposts on the Way to Success. July 2015

White. Paper. The Road to the Hybrid Cloud: Signposts on the Way to Success. July 2015 White Paper The Road to the Hybrid Cloud: Signposts on the Way to Success By Kevin Rhone, Senior Partnering Consultant July 2015 This ESG White Paper was commissioned by VMWare and is distributed under

More information

Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst

Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst Company Brief Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst Abstract: Organizations trying to modernize or fix

More information

Solution Brief. Introduction

Solution Brief. Introduction Solution Brief A Checklist when Choosing a Backup Solution for SaaS-based Applications Date: January 2015 Authors: Jason Buffington, Senior Analyst; and Monya Keane, Research Analyst Abstract: What should

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility

More information

Cybersecurity Skills Shortage: A State of Emergency

Cybersecurity Skills Shortage: A State of Emergency Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,

More information

Lab Validation Report

Lab Validation Report Lab Validation Report Content Raven Secure Content Distribution By Ginny Roth and Brian Garrett February 2012 Lab Validation: Content Raven Secure Content Distribution 2 Contents Introduction... 3 Background...

More information

Market Report. Augmenting Data Backup and Recovery with System-level Protection. March, By Lauren Whitehouse

Market Report. Augmenting Data Backup and Recovery with System-level Protection. March, By Lauren Whitehouse Market Report Augmenting Data Backup and Recovery with System-level Protection By Lauren Whitehouse March, 2011 Market Report: Augmenting Data Backup and Recovery with System-level Protection 2 Contents

More information

White. Paper. Dedupe 2.0: What HP Has In Store(Once) June 2012. This ESG White Paper was commissioned by HP and is distributed under license from ESG.

White. Paper. Dedupe 2.0: What HP Has In Store(Once) June 2012. This ESG White Paper was commissioned by HP and is distributed under license from ESG. White Paper Dedupe 2.0: What HP Has In Store(Once) By Jason Buffington, Senior Analyst June 2012 This ESG White Paper was commissioned by HP and is distributed under license from ESG. White Paper: Dedupe

More information

Research Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell

Research Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell Research Reprt Abstract: Data Center Netwrking Trends By Jn Oltsik With Bb Laliberte and Bill Lundell January 2012 2012 Enterprise Strategy Grup, Inc. All Rights Reserved. Intrductin Research Objective

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

To the best of your knowledge, does your organization currently utilize video surveillance at any of its locations? (Percent of respondents, N=302)

To the best of your knowledge, does your organization currently utilize video surveillance at any of its locations? (Percent of respondents, N=302) Research Brief Video Surveillance: Now on IT s Watch Date: December 2013 Author: Jon Oltsik, Senior Principal Analyst, Bill Lundell, Senior Research Analyst, and John McKnight, VP Research This ESG Research

More information

The Challenge. ESG Case Study

The Challenge. ESG Case Study ESG Case Study Primatics Financial Delivers SaaS-based Solution Excellence Using EMC s XtremIO Date: March 2015 Authors: Mark Peters, Senior Analyst; Adam DeMattia, Market Research Analyst; and Monya Keane,

More information

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned

More information

Lab Validation Report

Lab Validation Report Lab Validation Report Catalogic DPX Copy Data Services Designed for Intelligent Data Protection and Access By Vinny Choinski, Senior Lab Analyst ant Tony Palmer, Senior Lab Analyst September 2014 Lab Validation:

More information

Managing BitLocker With SafeGuard Enterprise

Managing BitLocker With SafeGuard Enterprise Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption

More information

White. Paper. The Modern Network Monitoring Mandate. April 2014

White. Paper. The Modern Network Monitoring Mandate. April 2014 White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009 ESG REPORT : Evaluating Software- vs. Hardware-Based Approaches By Lauren Whitehouse April, 2009 Table of Contents ESG REPORT Table of Contents... i Introduction... 1 External Forces Contribute to IT Challenges...

More information

Lab Validation Report

Lab Validation Report Lab Validation Report Unified Windows Storage Consolidation NetApp Windows Consolidation in Virtual Server Environments By Brian Garrett August 2010 Lab Validation: Unified Windows Storage Consolidation

More information

Moving The Desktop Into The Data Centre

Moving The Desktop Into The Data Centre Moving The Desktop Into The Data Centre Examining Business Deployments Of Virtual Desktop Infrastructure IDC Enterprise Data Centre Conference 2009 London, UK Copyright 2009 IDC. Reproduction is forbidden

More information

Altiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit

Altiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit Altiris Business Unit Review Greg Butterfield Group President, Altiris Business Unit Agenda 1 Altiris 2 Symantec and Altiris 3 Growth Drivers 4 Summary Financial Analyst Day 2007 2 FY08 Objectives Business

More information

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM ESG Solution Showcase SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract:

More information

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention White Paper Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention By Brian Babineau and David A. Chapa January, 2011 This ESG White Paper was commissioned by

More information

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group April, 2007 Copyright 2007. The Enterprise Strategy Group, Inc. All Rights Reserved. Table of Contents ESG Report Table of Contents...

More information

Compensating Security Controls for Windows Server 2003 Security

Compensating Security Controls for Windows Server 2003 Security ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft

More information

PowerPoint Presentation to Accompany. Chapter 5. System Software. Copyright 2014 Pearson Educa=on, Inc. Publishing as Pren=ce Hall

PowerPoint Presentation to Accompany. Chapter 5. System Software. Copyright 2014 Pearson Educa=on, Inc. Publishing as Pren=ce Hall PowerPoint Presentation to Accompany Chapter 5 System Software Objectives 1. Explain what an operating system does. 2. Compare the most common stand-alone operating systems. 3. Compare specialized operating

More information

HGST Object Storage for a New Generation of IT

HGST Object Storage for a New Generation of IT Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE HGST Object Storage for a New Generation of IT Date: October 2015 Author: Scott Sinclair, Storage Analyst Abstract: Under increased

More information

EMC Isilon: Data Lake 2.0

EMC Isilon: Data Lake 2.0 ` ESG Solution Showcase EMC Isilon: Data Lake 2.0 Date: November 2015 Author: Scott Sinclair, Analyst Abstract: With the rise of new workloads such as big data analytics and the Internet of Things, data

More information

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG. White Paper Application Virtualization: An Opportunity for IT to do More with Much Less By Mark Bowker, Senior Analyst November 2012 This ESG White Paper was commissioned by DH2i and is distributed under

More information

Hosted Desktops Rightsized for Desktop Transformation

Hosted Desktops Rightsized for Desktop Transformation White Paper Hosted Desktops Rightsized for Desktop Transformation By Mark Bowker, Senior Analyst December 2013 This ESG White Paper was commissioned by Citrix and HP and is distributed under license from

More information

Data Loss in a Virtual Environment An Emerging Problem

Data Loss in a Virtual Environment An Emerging Problem Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios

More information

ICT priorities in Canada

ICT priorities in Canada ICT priorities in Canada Enterprise ICT investment plans to 2013 November 2012 TABLE OF CONTENTS 1 Enterprise ICT investment trends... Error! 1.1 Introduction... Error! 1.2 Survey demographics... Error!

More information