Published/updated: February 2007
With organisations being so dependent on the electronic capture, storage and retrieval of increasing amounts of information, how well are they coping with modern-day requirements?
Loss of critical information is the most prominent risk in today’s business environment
When asked to what degree different categories of risk are considered during the business planning process, 715 senior IT managers from across Europe and the Middle East put a loss of business critical information at the top of the list. Whilst regulatory/legal compliance is also important, the key risk item cited acknowledges a broader set of responsibilities pivotal to a company’s ability to meet these critical requirements.
The IT department is stepping up to the mark and taking responsibility
Two thirds of organisations have at least one service level agreement (SLA) in place in relation to data and information protection and availability. However, there is a marked difference between the number of organisations stating they are sensitive to loss or unavailability of data / information somewhere in their organisation (86%), and those which have established any kind of strategy based on SLAs (68%).
Advanced technologies are seen as important to protect centrally held data and information
While traditional approaches like storage device mirroring, high-speed tape backup and disk to disk backup remain important, the view is that advanced technologies such as continuous data protection solutions and smart distributed data replication have a key role to play, as they reflect the emerging data management requirements for systems residing both in the data centre and further afield.
Yet significant risks exist with distributed information that is sometimes beyond IT control
Over 60% say that proliferation of data across different locations, machines and devices makes managing backup and recovery a challenge. The average level of confidence in the safety of critical data distributed in this way is under 70%. Incomplete audit trails, the accidental discarding of critical data, and the release of information without the necessary authority are cited as fragmentation related issues, which have clear compliance and business management implications. Technology can help with some of these challenges, but only if deployed as part of a broader strategic imperative which combines business leadership, personnel training and flexible processes and policies.
Opportunities exist to boost ROI through a smarter and more coordinated approach
While many organisations have been investing in solutions such as email archiving, workflow, records management and search technologies, the evidence suggests that most deployments have only solved compliance "check box" requirements, and have generally failed to deliver value beyond this. Such results are symptomatic of information management investments being defined too narrowly in the past, suggesting the need for a broader-based approach looking forward.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Dale Vile and Tony Lock
It’s easy to be caught out by a cyber attack or internal mistake that leads to your customers’ data or important intellectual property ending up on the black market. Making sure your business is adequately protected and is able to respond effectively to a security incident ...more
By Dale Vile Tony Lock & Jack Vile
Application programming interfaces (APIs) have been around for decades. In the early days of IT they were primarily used to give programmers convenient access to libraries of prebuilt functions. As systems became more distributed, APIs found their place ...more
By Dale Vile & Jack Vile
The world we live in is increasingly digital. As the smart use of technology leads to markets speeding up and becoming ever more unpredictable, a strong set of established offerings and execution capabilities only gets you so far. Feedback from 1,442 IT ...more
By Dale Vile
Advances in digital technology create significant opportunities to transform both customer engagement and business operations. As the trends in these areas continue, feedback from 1,442 respondents in a recent survey highlight 10 key traits of the highest achievers. ...more
By Dale Vile
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals are aware that new and changing needs will lead to future capability gaps. They also know that more of the same is not the answer ...more
By Dale Vile
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever. Relying on manual processes and scripts, or ad hoc piecemeal automation, is not sustainable ...more
By Dale Vile
A perennial problem with storage is how to deal with escalating requirements in a smooth, manageable and non-disruptive manner. By removing many of the traditional limits on system expansion, Ceph based configurations ...more
By Dale Vile
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define the future of end user computing. Most organisations today, however, see a role for both company and employee owned equipment to meet the wide and varied range of needs ...more