Multiple data protection vendors put business information at risk, says Dell

Organisations also lack confidence their data protection services are fit-for-purpose, research finds

A touchscreen display showing information in line graphs

Organisations that rely on multiple vendors to manage aspects of data protection, security and compliance are twice as vulnerable to a cyber incident than businesses with just one platform.

A fifth of businesses, 20%, using just one vendor for end-to-end data protection suffered a cyber incident during 2019, versus 39% of organisations which used more than one data protection vendor. 

Despite what appears to be added risk, the number of businesses using multiple data protection vendors swelled from 60% to 80% of organisations, according to research from Dell. 

The study also established the cost of data loss has exceeded $1 million per organisation over the last 12 months, to reach $1,013,075, while the cost of downtime surged from $526,845 to $810,018.

The shift among organisations to using multiple vendors is natural, the research suggests, considering emerging technologies like AI and machine learning are being more widely adopted. 

Similarly, there’s been a rise in demand for services that manage workflows grounded in data processing, although products do not yet exist in an end-to-end form. Businesses, therefore, generally need to adopt several platforms to fully protect their data. 

Broadly speaking, 71% of respondents questioned suggest emerging technologies have resulted in more data protection complexity. This is in addition to the fact that 61% of organisations feel emerging technologies pose a risk to data protection.

Meanwhile, the notion that businesses are taking on risk, as a result of adopting technology from multiple vendors is also reflected in the fact that many lack confidence in the platforms they’ve adopted. 

Alarmingly, 81% of organisations don’t believe their current data protection services will meet future business challenges. This lack of confidence is true for 69% in terms of recovering data following a cyber attack, and 64% in terms of recovering data following data loss. 

“While the study only shows the correlation here, we believe the additional risks associated with multiple vendors has to do with the fact that it is more complex to manage data protection solutions from multiple vendors as opposed to a single vendor,” Dell’s vice president for marketing, data protection Ruya Atac-Barrett told IT Pro.

Related Resource

Don’t just collect data, innovate with it.

Removing the barriers to the experience economy

Download now

“Usually there is little or no integration across disparate data protection platforms which means IT teams need to acquire technical fluency across multiple product sets and spend more time monitoring and managing these systems, in addition to the rest of their day-to-day assignments. 

“This can lead to an oversight that leads to an unprotected application, data volume, etc; not uncommon when there are dozens, if not hundreds of applications being protected across edge, core and cloud environments.”

Among other reasons is that, in an environment where data is sprawled across several environments, IT teams will need to orchestrate the recovery of applications and databases in the right sequence to bring a service back online. 

This entire process can become more difficult if business elements are protected on different data protection platforms, which can lead to increased downtime as the complexity is navigated.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Ubiquiti insider says the company downplayed the severity of a major breach
data breaches

Ubiquiti insider says the company downplayed the severity of a major breach

31 Mar 2021
Forex broker FBS leaves millions of customer records exposed
data breaches

Forex broker FBS leaves millions of customer records exposed

25 Mar 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Roadmap 2021: What’s coming from 3CX
Advertisement Feature

Roadmap 2021: What’s coming from 3CX

30 Mar 2021