Global Disaster Recovery (DR) Index – Cloud Backup and Security Report

Global Disaster Recovery (DR) Index – Cloud Backup and Security Report

Being fit for business is imperative for all countries participating in a highly competitive global economy. For organizations around the world this means being able to continue to operate in the event of IT failure or major disaster, whether man-made or natural.

Regardless of their location, IT managers share a common challenge – keeping their business-critical digital assets safe and sound. Few businesses today can survive a major data loss without a comprehensive backup and disaster recovery (DR) strategy in place.

At the same time, the amount of data being created by businesses is outstripping their ability to store it. The Economist estimates that the amount of information created each year is growing at a 60% compounded rate. This view is supported by analyst firm IDC, which predicts the ‘digital universe’ will grow to 1.8 zettabytes (1.8 billion terabytes) in 2011, up 47% from 2010, and rocketing toward over 7ZB by 2015.

With the adoption of virtualization, and the ongoing shift towards the cloud, DR strategies are becoming more complex. IT managers are now expected to keep data safely backed up in a hybrid environment consisting of physical, virtual and cloud infrastructures. The shift has seen companies adopting several different backup solutions at various points in time. While it’s typical to have two or three different backup solutions, it’s not uncommon to have as many as five or six. Evidently, a hybrid world is also a very complicated world.

Despite universal complexities, there is no global standard for backup and DR. This Disaster Recovery Index study demonstrates how countries across the globe have different confidence levels towards DR based on their culture, their adoption of new technology, faith in their backup procedures and level of executive buy-in. The study has identified that businesses have widely varying views about what backup and recovery attributes are required to confidently survive a disaster.

What is the Acronis Global Disaster Recovery (DR) Index?

Sign In To Read The Index

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…