Veeam Software, a company in modern data protection, has released its fourth annual Data Protection Trends Report to gain insight into how data protection is changing in the digital age.
According to the survey, businesses are rising resources to combat cyberattacks, keep up with the diversification of production environments across different clouds, and manage more complicated hybrid IT infrastructures. IT executives believe they are not appropriately protected as a result. Improving backup success and reliability is a top priority for enterprises this year, followed by making sure that the protection provided by Infrastructure as a Service (IaaS) and Software as a Service (SaaS) is comparable to the protection they rely on for workloads focused on datacenters.
Highlights of the Veeam Data Protection Trends Report 2023:
allocated towards Digital Transformation initiatives to pivot to cyber prevention.
Danny Allan, CTO and Senior Vice President of Product Strategy at Veeam said “IT leaders are facing a dual challenge. They are building and supporting increasingly complex hybrid environments, while the volume and sophistication of cyberattacks is increasing.”
Allan added “This is a major concern as leaders think through how they mitigate and recover business operations from any type of disruption. Legacy backup approaches won’t address modern workloads – from IaaS and SaaS to containers – and result in an unreliable and slow recovery for the business when it’s needed most. This is what’s focusing the minds of IT leaders as they consider their cyber resiliency plan. They need Modern Data Protection.”
The Middle East & African market throw up some interesting findings:
Hybrid IT continues to be the norm, with a relatively even balance between servers within the data centre and those that are cloud hosted
Mohamad Rizk, Regional Director, Middle East & CIS at Veeam said “Following the adage of, ‘When you modernize production, you must modernize protection’, data protection strategies must be equally inclusive of physical, virtual, and cloud-hosted workloads. In addition, one should plan for workloads moving across clouds and even back on premises; and again, the data protection strategy should accommodate that fluidity.”
Rizk added “The MEA findings of the Veeam Data Protection Trends Report 2023 largely mimics the global results, which find that there is a big chasm between business expectations and IT delivery when it comes to data protection. In an era of hybrid cloud, it is important to recognize that some cloud-hosted offerings are natively durable; implying that in certain circumstances, the availability gap might be closing. Meanwhile, the protection gap still exists as much, if not more in cloud services as it does within the data centre because most cloud providers do not back up their ‘subscribers’ data.”
He continued “To be fully transformative, enterprises in Middle East & Africa need to optimize every dollar of their IT budgets and make sure the right workloads and applications are prioritized and protected, and a simple, flexible, reliable and powerful modern data protection solution is in place – one that protects all environments – Cloud, Virtual, Physical, SaaS and Kubernetes. Only then can enterprises ensure they’re sufficiently protected and ready for turbulent times ahead.”
Ransomware attacks continue to be more frequent
Finally, Rizk concluded “Ransomware is indiscriminatory – every business is a target. Rather than be gripped with fear at the prospect of being attacked, organizations must focus on what they can control – their defence. The fundamental principles of how to prepare defences against even the most sophisticated and powerful ransomware stay relatively the same. The first is the practice of impeccable digital hygiene. All employees must be trained to identify suspicious content and be warned of the impact that malpractice using work devices can lead to. Secondly, all businesses must prepare for their defences to fail. Concepts such as zero trust and deploying techniques such as two-factor authentication can be useful for restricting the access an attacker has to data. The best way to protect data is to ensure that it has been securely backed up and is fully recoverable before an incident takes place with the 3-2-1-1-0 backup rule – there should always be at least three copies of data, on at least two different types of media, at least one off-site and one immutable or offline, with zero unverified backups or errors.”