Research Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight



Similar documents
Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010

Research Report. Abstract: Trends in Data Protection Modernization. August 2012

Research Report. Remote Office/Branch Office Technology Trends. July 2011

Research Report. Abstract: Solid-state Storage Market Trends. November By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight

The Shift Toward Data Protection Appliances

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011

2015 Data Storage Market Trends

Corporate Online File Sharing and Collaboration Market Trends

Data Protection-as-a-service (DPaaS) Trends

Online File Sharing and Collaboration: Deployment Model Trends

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012

Enterprise Database Trends in a Big Data World

Backup and Archiving Convergence Trends

The Convergence of Big Data Processing and Integrated Infrastructure

Cloud Computing Adoption Trends:

The State of Mobile Computing Security

Research Report. Abstract: Archiving Market Trends. May By Brian Babineau With Bill Lundell and John McKnight

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013

Research Report. Abstract: The Evolution of Server Virtualization. November 2010

Enterprise Big Data, Business Intelligence, and Analytics Trends

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Trends in Private Cloud Infrastructure

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011

Platform-as-a-service Usage and Satisfaction Study

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm

Platform-as-a-service Language Use Study

Web Application Security Testing Tools and Services

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September By Jeff Hine and Bill Lundell

ESG Research Final Sponsor Report

Market Research. Study. Database Security and Compliance Risks. December, By Jon Oltsik

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, By Brian Garrett with Tony Palmer

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts

White. Paper. Desktop Virtualization Efficiencies with Citrix and NetApp. October, By Mark Bowker

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

The Data Center of the Future

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology

Research Report. Abstract: Scale-out Storage Market Forecast February By Terri McClure

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast

The Challenge of Securing and Managing Data While Meeting Compliance

How To Improve Storage Efficiency With Ibm Data Protection And Retention

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Effective storage management and data protection for cloud computing

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series

White. Paper. Big Data Advisory Service. September, 2011

White Paper. Recovery-focused Data Protection: Research Shows Your Future Depends On It

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Total year-over-year spending change in networking, (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

LAB VALIDATION REPORT

White. Paper. Citrix XenDesktop Eases Windows 7/8.1 Migration. October 2013

August Transforming your Information Infrastructure with IBM s Storage Cloud Solution

MULTI VENDOR ANALYSIS

The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst

Effective Storage Management for Cloud Computing

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center

Nexsan and FalconStor Team for High Performance, Operationally Efficient Disk-based Backup Date: August, 2009 Author:

Cybersecurity Skills Shortage: A State of Emergency

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

Solution Brief. Introduction

Secure Your Business with EVault Cloud-Connected Solutions

Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst

DAS (Direct Attached Storage)

Lab Validation Report

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Enterprise Backup Solution Vendor Questions

Lab Validation Report

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

Lab Validation Report

Lab Validation Report

White. Paper. Dedupe 2.0: What HP Has In Store(Once) June This ESG White Paper was commissioned by HP and is distributed under license from ESG.

The Challenge. ESG Case Study

White. Paper. How Archiving Reduces the Cost and Complexity of Reactive ediscovery. April 2010

Security Industry Market Share Analysis

Lab Validation Report

Determining Your Computer Resources

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

Managing BitLocker With SafeGuard Enterprise

White. Paper. The Road to the Hybrid Cloud: Signposts on the Way to Success. July 2015

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

How To Understand The Needs Of The Network

How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

Shadow IT in the Enterprise

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Web-Based Data Backup Solutions

EMC Isilon: Data Lake 2.0

HGST Object Storage for a New Generation of IT

Research Report. Abstract: Data Center Networking Trends. January By Jon Oltsik With Bob Laliberte and Bill Lundell

Disk-to-Disk Backup & Restore Application Note

PowerPoint Presentation to Accompany. Chapter 5. System Software. Copyright 2014 Pearson Educa=on, Inc. Publishing as Pren=ce Hall

Data Loss in a Virtual Environment An Emerging Problem

Transcription:

Research Report Abstract: Endpoint Device Backup Trends By Lauren Whitehouse With Bill Lundell and John McKnight December 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved.

Introduction Research Objectives Research Report: Endpoint Device Backup Trends In order to assess the current state of data protection for endpoint devices including desktop PCs, laptop PCs, and mobile phones ESG identified 287 respondents familiar with their organization s endpoint device infrastructure and any associated data protection tools and processes. In addition to their endpoint device knowledge, all respondents were personally responsible for evaluating, purchasing, or managing data protection technologies such as backup and recovery software, data replication software, and disk or tape storage systems used for secondary data storage for their organization. Specifically, the survey asked the following endpoint-specific questions: How many endpoint devices providing general purpose PC functionality are currently supported by IT organizations? What types of endpoint devices are supported and what percent of the total endpoint devices does each comprise? Do organizations have formal processes in place to back up endpoint devices? To what extent is each type of endpoint device protected? Does this vary based on the size of a respondent organization? For current users of endpoint backup solutions, what were the key drivers in the organization s decision to implement data protection for endpoint devices? For planned endpoint backup adopters, what are the key drivers for the organization to consider implementing data protection for endpoint devices? For each class of endpoint device, what is the primary method of backup used to protect it? For planned adopters of endpoint data protection, what is the expected method of backup for endpoint devices? Who in the organization is responsible for endpoint device backup? Who in the organization is responsible for endpoint device and/or file recovery? Does this vary by size of company? Which functional group is primarily responsible for funding data protection technology in support of endpoint devices? Are there differences for smaller versus larger organizations? For non-adopters, why don t organizations have formal processes to protect endpoint devices? Do these attitudes vary according to organization size? Survey participants represent a wide range of industries including manufacturing, financial services, communications and media, health care, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

Research Methodology To gather data for this report, ESG conducted a comprehensive online survey of IT managers from private- and public-sector organizations in North America (United States and Canada) between January 8, 2010 and January 29, 2010. To qualify for this survey, respondents were required to have day-to-day responsibility for evaluating, purchasing, or managing data protection technologies such as backup and recovery software, data replication software, and/or disk or tape systems used for secondary data storage. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, ESG was left with a final total sample of 510 IT managers. Of these, 287 respondents were familiar with their organization s endpoint device infrastructure, including endpoint device type breakdown, total number of endpoint devices, and data protection processes associated with endpoint devices. Please see the Respondent Demographics section of this report for more information on these respondents. Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding.

Respondent Demographics The data presented in this report is based on a survey of 510 qualified respondents, 287 of which were familiar with their organization s endpoint device infrastructure (including data protection tools and processes). The figures below detail the demographics of the entire respondent base unless otherwise noted. Respondents by Role The breakdown of current roles within an organization among survey respondents is shown in Figure 1. Figure 1. Survey Respondents, by Role Which of the following best describes your current role within your organization? (Percent of respondents, N=510) Other, 5% IT Staff (e.g., Storage Administrator, Systems Administrator, etc.), 49% IT Management (e.g., CIO, VP of IT, Director of IT, etc.), 4 Respondents by Technology Responsibility Survey respondents primary area of technology responsibility is shown in Figure 2. Figure 2. Survey Respondents, by Primary Area of Technology Responsibility Which of the following would you consider to be your primary area of technology responsibility? (Percent of respondents, N=510) IT Architecture/Planning, 7% Storage / SAN, 5% Other, 1% General IT, 32% Applications/ Database, 9% Servers, 14% IT Operations, 15% Data Protection (e.g., backup/recovery, replication, etc.), 17%

Respondents by Number of Employees The number of employees in respondents organizations is shown in Figure 3. Figure 3. Survey Respondents, by Number of Employees How many total employees does your organization have worldwide? (Percent of respondents, N=510) 20,000 or more, 12% 100 to 249, 250 to 499, 14% 5,000 to 19,999, 20% 500 to 999, 1 2,500 to 4,999, 12% 1,000 to 2,499, 15% Respondents by Industry Respondents were asked to identify their organization s primary industry. In total, ESG received completed, qualified responses from individuals in 18 distinct vertical industries, plus an Other category. Respondents were then grouped into the broader categories shown in Figure 4. Figure 4. Survey Respondents, by Industry What is your organization s primary industry? (Percent of respondents, N=510) Other, 18% Manufacturing, 23% Retail/Wholesale, 5% Professional Services, Communications & Media, 8% Health Care, 12% Government (Federal, National, State, Local), 1 Financial (banking, securities, insurance), 13%

Respondents by Annual Revenue The annual revenue of survey respondents organizations is shown in Figure 5. Figure 5. Survey Respondents, by Annual Revenue What is your organization s total annual revenue ($US)? (Percent of respondents, N=510) 14% 12% 11% 12% 12% 12% 13% 8% 8% 7% 7% 5% 5% 4% 2% 0% Less than $25 million $50 million $25 million to $49 million to $99 million $100 million to $249 million $250 million to $499 million $500 million to $999 million $1 billion to $5 billion to $10 billion $4.999 billion $9.999 billion to $19.999 billion $20 billion or more Not applicable (e.g., public sector, non-profit) Respondents by Physical Locations Worldwide The number of worldwide physical locations of survey respondents organizations is shown in Figure 6. Figure 6. Survey Respondents, by Physical Locations Worldwide To the best of your knowledge, how many physical locations (offices, plants, branches, etc.) does your organization operate worldwide? (Percent of respondents, N=510) 500 or more, 8% Don t know, 2% 1, 4% 250 to 499, 2 to 5, 21% 100 to 249, 9% 50 to 99, 9% 6 to 10, 15% 26 to 49, 11 to 25, 17%

Respondents by Data Centers Operated Worldwide The number of data centers operated worldwide by survey respondents organizations is shown in Figure 7. Figure 7. Survey Respondents, by Data Centers Worldwide How many data centers does your organization operate worldwide? (Percent of respondents, N=510) Rely solely on thirdparty outsourced data center facilities, 1% More than 20, 12% Don t know, 1% 1, 15% 11 to 20, 9% 2, 17% 6 to 10, 15% 3 to 5, 30% Respondents by Number of Production Servers The number of production servers in respondents immediate organization is shown in Figure 8. Figure 8. Survey Respondents, by Number of Production Servers Approximately how many production servers (whether physical or virtual) are supported worldwide by your IT organization? (Percent of respondents, N=510) More than 5,000, 5% 2,501 to 5,000, 2% Don t know, 2% Less than 25, 17% 1,001 to 2,500, 7% 501 to 1,000, 11% 25 to 49, 1 251 to 500, 11% 50 to 100, 1 101 to 250, 13%

Respondents by Total Amount of Data The total amount of data in respondents immediate organization is shown in Figure 9. Figure 9. Survey Respondents, by Total Amount of Data What is your immediate organization s approximate total volume of data stored on corporate servers and storage systems? (Percent of respondents, N=510) 14% 12% 8% 11% 12% 13% 9% 8% 5% 4% 2% 0% Less than 1 TB (terabyte) 1 TB 5 TB 6 TB 10 TB 11 TB 25 26 TB 50 TB TB 51 TB 100 TB 101 TB 250 TB 251 TB 500 TB 500 TB 1 More than PB 1 PB (petabyte) Don t know Respondents by Total Number of Endpoint Devices The number of endpoint devices in respondents immediate organization is shown in Figure 10. Figure 10. Survey Respondents, by Total Number of Endpoint Devices 30% For your immediate organization, approximately how many total desktop PCs, laptop PCs, or other endpoint devices providing general-purpose PC functionality does your IT organization currently support? (Percent of respondents, N=287) 28% 25% 20% 15% 1 17% 14% 5% 8% 4% 5% 2% 1% 0% Less than 100 100-499 500-999 1,000-2,499 2,500-4,999 5,000-9,999 10,000-19,999 20,000-49,999 50,000-99,999 100,000 or more

Breakdown of Various Endpoint Device Types The average percentage breakdown of endpoint device types is shown in Figure 11. Figure 11. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Types Of your organization s total number of PCs and other endpoint devices providing general-purpose PC functionality, approximately what percentage is made up by each device type listed below? (Mean, N=287) 100% 90% 80% 70% 60% 50% 40% 30% 20% 0% Thin clients / terminals with PC connectivity, 8% Laptop PCs, 27% Desktop PCs, 54% Other, 1% Smart phones/pdas with PC functionality, Breakdown of Endpoint Device Operating Systems The average percentage breakdown of endpoint device operating systems is shown in Figure 12. Figure 12. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Operating Systems 100% 90% 80% 70% 60% 50% Based on your organization s overall PC environment, approximately what percentage of endpoint devices run the following operating systems? (Mean, N=287) Mac OS X, 3% Windows 7, 8% Microsoft Windows Vista, Other, 1% Linux, 2% 40% Microsoft Windows XP, 68% 30% 20% 0% Microsoft Windows 2000, 7%

Contents List of Figures... 3 List of Tables... 3 Executive Summary... 4 Report Conclusions... 4 Introduction... 5 Research Objectives... 5 Research Findings... 6 Endpoint Device Usage... 6 The State of Endpoint Data Protection... 7 Organizations Currently Backing Up Endpoint Devices... 10 Organizations Planning to Back Up Endpoint Devices... 15 Organizations with No Plans to Back Up Endpoint Devices... 20 Conclusion... 22 Research Methodology... 23 Respondent Demographics... 24 Respondents by Role... 24 Respondents by Technology Responsibility... 24 Respondents by Number of Employees... 25 Respondents by Industry... 25 Respondents by Annual Revenue... 26 Respondents by Physical Locations Worldwide... 26 Respondents by Data Centers Operated Worldwide... 27 Respondents by Number of Production Servers... 27 Respondents by Total Amount of Data... 28 Respondents by Total Number of Endpoint Devices... 28 Breakdown of Various Endpoint Device Types... 29 Breakdown of Endpoint Device Operating Systems... 29

List of Figures Figure 1. Total Number of Endpoint Devices, by Company Size... 6 Figure 2. Current Data Protection Process and Technology Challenges... 7 Figure 3. Top Areas of Data Protection Investment for 2010... 8 Figure 4. Organizations Identifying Endpoint Backup as a Top Data Protection Challenge More Likely to Invest in Endpoint Device Backup and Recovery Solutions... 8 Figure 5. Formal Processes to Back Up Endpoint Devices... 9 Figure 6. Drivers for Current Users of Endpoint Device Backup Solutions... 10 Figure 7. Extent to Which Organizations are Backing Up Different Endpoint Device Types... 11 Figure 8. Primary Method of Backup Used to Protect Various Endpoint Devices... 12 Figure 9. Groups Responsible for Endpoint Device and/or File Backup and Recovery... 13 Figure 10. Funding for Endpoint Device Data Protection Purchases... 14 Figure 11. Funding for Endpoint Device Data Protection Purchases, by Number of Endpoint Devices... 14 Figure 12. Drivers for Planned Adopters of Endpoint Device Backup Solutions... 15 Figure 13. Drivers for Planned Adopters of Endpoint Device Backup Solutions, by Number of Endpoint Devices. 16 Figure 14. Primary Method of Backup Expected to be Used to Protect Various Endpoint Devices... 17 Figure 15. Primary Method of Backup Expected to be Used to Protect Various Endpoint Devices, by Company Size... 18 Figure 16. Primary Method of Backup Expected to be Used to Protect Various Endpoint Devices, by Number of Endpoint Devices... 19 Figure 17. Why Organizations Have No Formal Processes to Back Up Endpoint Devices... 20 Figure 18. Why Organizations Have No Formal Processes to Back Up Endpoint Devices, by Number of Endpoint Devices... 21 Figure 19. Survey Respondents, by Role... 24 Figure 20. Survey Respondents, by Primary Area of Technology Responsibility... 24 Figure 21. Survey Respondents, by Number of Employees... 25 Figure 22. Survey Respondents, by Industry... 25 Figure 23. Survey Respondents, by Annual Revenue... 26 Figure 24. Survey Respondents, by Physical Locations Worldwide... 26 Figure 25. Survey Respondents, by Data Centers Worldwide... 27 Figure 26. Survey Respondents, by Number of Production Servers... 27 Figure 27. Survey Respondents, by Total Amount of Data... 28 Figure 28. Survey Respondents, by Total Number of Endpoint Devices... 28 Figure 29. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Types... 29 Figure 30. Survey Respondents, by Average Percentage Breakdown of Endpoint Device Operating Systems... 29 List of Tables Table 1. Average Breakdown of Device Types in Use, by Company Size and Number of Endpoint Devices... 6 Table 2. Current and Planned Use of Endpoint Backup, by Company Size and Number of Endpoint Devices... 9 Table 3. Drivers for Current Users of Endpoint Device Backup Solutions, by Number of Endpoint Devices... 10 Table 4. Drivers for Endpoint Device Backup Adoption, Current Users vs. Planned Adopters... 15 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. Copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508) 482.0188.

20 Asylum Street Milford, MA 01757 Tel:508.482.0188 Fax: 508.482.0128 www.enterprisestrategygroup.com