Avoiding The Hidden Costs

Similar documents
Avoiding The Hidden Costs. of the Cloud

STATE OF THE DATA CENTER SURVEY GERMANY RESULTS

STATE OF THE DATA CENTER SURVEY GLOBAL RESULTS

CERTIFICATE MANAGEMENT SURVEY

Best Practices for a BYOD World

Managing SSL Certificates with Ease

Taking the Leap to Virtualization

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

How To Protect Your Endpoints From Attack

Amdocs Data Integrity Management Suite. Rediscover your network

2008 Disaster Recovery Research Overview and Key Findings Report

Career Capital 2014 Global Research Results

Global Cloud Storage Market. More Info: Contact: /500 Visit:

Performance 2015: Global Stock Markets

Performance 2013: Global Stock Markets

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Cloud Readiness Workshop

EMC GLOBAL DATA PROTECTION INDEX GLOBAL KEY RESULTS & FINDINGS

Performance 2016: Global Stock Markets

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SINGAPORE

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

How To Get A New Phone System For Your Business

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

Cloud Readiness Consulting Services

How to Unlock Agility by Backing up to, from, and in the Cloud

Leveraging a Maturity Model to Achieve Proactive Compliance

The Value of Information Security Certifications

Defining Success 2013 Global Research Results

Global Economic Briefing: Global Inflation

E-Seminar. Financial Management Internet Business Solution Seminar

Flexible Cloud Services to Compete

2012 Endpoint Security Best Practices Survey

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment

Cloud Services for Microsoft

ARCHIVING. What it is, what it isn t, and how it can improve your business operations

Viva la Cloud IAPP Privacy Academy 2013

Digital vs Traditional Media Consumption

THE CISCO CRM COMMUNICATIONS CONNECTOR GIVES EMPLOYEES SECURE, RELIABLE, AND CONVENIENT ACCESS TO CUSTOMER INFORMATION

Release Notes: PowerChute plus for Windows 95 and Windows 98

IP Trading Solutions

OCTOBER Russell-Parametric Cross-Sectional Volatility (CrossVol ) Indexes Construction and Methodology

State of Cloud Survey SOUTH AFRICA FINDINGS

Through a cyber security lens

HP OpenView Smart Plug-in for Microsoft SQL Server

Big Gets Bigger, Smaller Gets Smaller

10.0 FPSB s Country/region-specific Trademark Symbols and Legal Notices

Cisco Conference Connection

Lawson Business Intelligence. Solutions for Healthcare

EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013

How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?

"Certificate Applicant" means an individual or organization that requests the issuance of a Certificate by a Certification Authority.

USAGE OF METRICS AND ANALYTICS IN EMEA MOVING UP THE MATURITY CURVE

State of Cloud Survey GLOBAL FINDINGS

A Nielsen Report Global Trust in Advertising and Brand Messages. April 2012

best practice guide How to measure the real ROI of virtualisation

Healthcare Security and HIPAA Compliance with A10

Four steps to improving cloud security and compliance

I can finally afford UC without making a huge upfront investment. COO, market leader in the health care industry

Software-as-a-service Delivery: The Build vs. Buy Decision

Data Management Session: Privacy, the Cloud and Data Breaches

Report on Government Information Requests

Governance, Risk and Compliance Assessment

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

Symantec State of the Data Center Research Highlights. October 2007

360 o View of. Global Immigration

opinion piece Cloud Computing The journey begins

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

opinion piece Meeting the Challenges of Supplier Relations in a Multisourcing Environment

Small Business Virtualization Poll APJ RESULTS

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Reducing Cycle Times and Work in Process Management Costs: Aerospace and Defense Industry

How To Manage An Ip Telephony Service For A Business

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

3 Steps to Transform your Business with Next-Generation Networking

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Cisco IT Data Center and Operations Control Center Tour

Direct virtual machine creation from backup with BMR

E-Seminar. E-Commerce Internet Business Solution Seminar

Simplify SSL Certificate Management Across the Enterprise

The Path Forward. International Women s Day 2012 Global Research Results

FACT SHEET Global Direct Selling

Consumer Credit Worldwide at year end 2012

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

AVOIDING BUSINESS RISK: THE HIDDEN BENEFIT OF SOFTWARE AS A SERVICE

Global Talent Management and Rewards Study

Disaster Preparedness Survey GLOBAL FINDINGS

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

opinion piece IT Security and Compliance: They can Live Happily Ever After

SYMANTEC STATE OF THE DATA CENTER REPORT State of the Data Center Regional Data Asia Pacific Second Annual Report

Demystifying Virtualization for Small Businesses Executive Brief

Contact Centre Integration Assessment

Theatres/Channels All theatres. Indirect channel. Author/Owner

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise

Workplace of the Future: a global market research report

The 2010 Symantec Break in the Clouds Report Symantec Break in the Clouds Report

Dimension Data s Uptime Support Service

Transcription:

Avoiding The Hidden Costs of the Cloud Germany Enterprise Results 2013

CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND ediscovery SSL CERTIFICATE MANAGEMENT AVOIDING THE HIDDEN COSTS 2

METHODOLOGY Symantec commissioned ReRez Research to conduct the 2013 Avoiding the Hidden Costs of Cloud Survey in September and October of 2012. They contacted business and IT executives at 3,236 organizations in 29 countries. Respondents came from companies with a range of 5 to more than 5,000 employees. Of the responses, 1,358 came from SMBs and 1,878 came from Enterprises. This report specifically focuses on 100 Enterprises in Germany. Globally, the survey has a reliability of 95 percent with +/- 1.8 percent margin of error. Within German Enterprises, the margin of error is +/- 9.8%. North America (2 countries) United States 102 Canada 100 Latin America (9 countries) Mexico 110 Brazil 102 OLAM 100 EMEA (5 countries) United Kingdom 204 Germany 201 France 202 Italy 201 South Africa 101 APJ (13 countries) China 204 Japan 301 Australia/New Zealand 200 India 201 Singapore 150 South Korea 100 Hong Kong 103 Malaysia 150 Taiwan 103 Thailand 100 Philippines 101 Indonesia 100 3,236 global organizations 29 countries 3

INTRODUCTION The votes are in, and organizations of all sizes are moving ahead with cloud implementations. The promise of reduced CapEx, more predictable OpEx, easier management, enhanced scalability and better disaster preparedness have made the decision an easy one. In Symantec s 2013 Avoiding the Hidden Costs of the Cloud survey we found that 89 percent of German SMBs are at least discussing cloud. However, in a rush to implement cloud, there are a host of hidden costs unwary organizations may face. These costs are easily avoided with a little foresight and planning, but only if IT knows where to look. 89% of German Enterprises are at least discussing cloud 4

ROGUE CLOUD IMPLEMENTATIONS 80% How is the frequency of rogue cloud projects changing over time: 60% 40% 20% 4% 9% 60% 27% 0% Becoming much less frequent Becoming slightly less frequent Staying the same Becoming slightly more frequent The first hidden cost Symantec found was rogue cloud deployments. Perhaps the sales manager signs his department up for Salesforce without thinking to consult IT. Or perhaps marketing shares important launch materials with outside vendors via an unauthorized Dropbox account. In either case the organization has put sensitive information into the cloud without organizational oversight. It s a surprisingly common problem, found in more than three-quarters of Enterprises in Germany. Becoming much more frequent Among those who reported rogue cloud deployments, 30 percent experienced the exposure of confidential information and the defacement of Web properties, and even more faced account takeover issues and stolen goods or services. So why are organizations doing it? One in seven don t realize they shouldn t. However, the most commonly cited reason for these rogue cloud projects was to save time and money: Going through IT would make the process more difficult. 5

CLOUD BACKUP AND RECOVERY Today, organizations often store their information on physical, virtual and cloud storage. This can create a very complicated environment when it comes to backup and recovery. In fact, almost two-thirds of German enterprises today are using three or more solutions to back up their data. This creates problems for IT, which has to train staff on multiple products and spend extra cycles managing the process. It also means there is no single view of the network. The consequences of this complexity are starting to show. More than 30 percent have lost data in the cloud and have had to restore their information from backups. More than half of those organizations saw recovery operations fail. Furthermore, recovering data from the cloud is slow. Just one third rate cloud data recovery as fast. How slow? One in seven estimate recovering from the cloud would take three days or longer. How many businesses can afford to shut down for three days? 47% NO Have you ever had a recovery failure in the cloud? In other words, have you ever tried to restore lost data only to find your backup or archive did not work? 53% YES 6

INEFFICIENT STORAGE Cloud storage supplies important advantages: It is quick to deploy, you pay only for what you use, and you can adjust capacity quickly and easily. In theory, then, organizations should enjoy very high storage utilization rates (this is the measure of the percentage of deployed storage they actually are using). There is no point to overprovisioning since you can always get more storage as you need it with a few mouse clicks. In practice, however, global cloud storage utilization is actually extremely low at just 17 percent. There is a tremendous difference in this area between enterprises (which are utilizing 26 percent of their storage) and SMBs (which is a shockingly low 7 percent). (This data, from the Symantec 2012 State of Information Survey, is not available at the country level.) This is a costly mistake, as organizations are paying for roughly 6 times as much storage as they actually need. The problem is exacerbated because a third of Enterprises in Germany admit that little to none of their data is deduplicated. Looking deeper, we see challenges tiering data stored in the cloud. Whereas with physical and virtual storage organizations move data among tiers to balance needs in the most efficient manner, many (roughly fifth) organizations report moving files in a cloud environment is cumbersome. What is the status of the data you store in the cloud in terms of duplication: 40% 25% 10% 0% 33% 38% 23% 8% Virtually none Small amount Half Most Virtually all 7

COMPLIANCE AND ediscovery 22% have had ediscovery requests for cloud data Another hidden cost is compliance. Often, IT has their hands full with simply provisioning and maintaining cloud. A common refrain is that second order issues such as compliance can wait. This is a mistake. In fact, 19 percent of organizations have been fined for privacy violations in the cloud within the past 12 months. Smart organizations know this: Roughly two-thirds today are saying they are concerned about meeting compliance requirements in the cloud. Interestingly, simply meeting compliance requirements is not enough; an even larger percentage say they worry about being able to prove their compliance. The issue of ediscovery is similar to compliance an area often overlooked in initial cloud deployments. However, one-fifth of those surveyed have received ediscovery requests for cloud information in the past 12 months. Underscoring the importance of planning for ediscovery from day one, two-thirds of those who have received requests missed deadlines for delivering the requested information, potentially leading to fines or compromised legal positions. 100% 68% 32% 50% 0% Missed discovery deadline Unable to meet discovery requirement at all (Never found the requested information) 8

SSL CERTIFICATE MANAGEMENT Cloud often requires SSL certificates for websites, applications, and so on. The final hidden cost revealed by the survey relates to management of these certificates. Most find this area complex: In fact, just 29 percent feel managing cloud-based SSL certificates is easy. In a related finding, fewer than half feel confident that their cloud partner s certificates comply with their own organization s internal standards. Only 29% say managing SSL certificates related to cloud is easy Only 42% are sure cloud-partner s certificates comply with internal standards 9

AVOIDING THE HIDDEN COSTS Most organizations are pursuing cloud, and rightly so: Adopting cloud provides clear benefits. The Symantec 2013 Avoiding the Hidden Costs of the Cloud survey shows that as organizations proceed, they need to pay attention to hidden costs of cloud from day one, or else face costly consequences. Happily, there are simple steps IT can take to avoid these hidden costs. 1. Focus policies on information and people, not technologies or platforms 2. Educate, monitor and enforce policies 3. Embrace tools that are platform agnostic 4. Deduplicate data in the cloud 10

Copyright 2012 Symantec Corporation. All Rights Reserved. Symantec, the Symantec Logo, the Checkmark Logo, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. NO WARRANTY. Symantec makes this document available AS-IS, and makes no warranty as to its accuracy or use. The information contained in this document may include inaccuracies or typographical errors, and may not reflect the most current developments, and Symantec does not represent, warrant or guarantee that it is complete, accurate, or up-to-date, nor does Symantec offer any certification or guarantee with respect to any opinions expressed herein or any references provided. Changing circumstances may change the accuracy of the content herein. Opinions presented in this document reflect judgment at the time of publication and are subject to change. Any use of the information contained in this document is at the risk of the user. Symantec assumes no responsibility for errors, omissions, or damages resulting from the use of or reliance on the information herein. Symantec reserves the right to make changes at any time without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 350 Ellis Street., Mountain View, CA 94043. 11