Multiple data protection vendors put business information at risk, says Dell

Organisations also lack confidence their data protection services are fit-for-purpose, research finds

A touchscreen display showing information in line graphs

Organisations that rely on multiple vendors to manage aspects of data protection, security and compliance are twice as vulnerable to a cyber incident than businesses with just one platform.

A fifth of businesses, 20%, using just one vendor for end-to-end data protection suffered a cyber incident during 2019, versus 39% of organisations which used more than one data protection vendor. 

Despite what appears to be added risk, the number of businesses using multiple data protection vendors swelled from 60% to 80% of organisations, according to research from Dell. 

The study also established the cost of data loss has exceeded $1 million per organisation over the last 12 months, to reach $1,013,075, while the cost of downtime surged from $526,845 to $810,018.

The shift among organisations to using multiple vendors is natural, the research suggests, considering emerging technologies like AI and machine learning are being more widely adopted. 

Similarly, there’s been a rise in demand for services that manage workflows grounded in data processing, although products do not yet exist in an end-to-end form. Businesses, therefore, generally need to adopt several platforms to fully protect their data. 

Broadly speaking, 71% of respondents questioned suggest emerging technologies have resulted in more data protection complexity. This is in addition to the fact that 61% of organisations feel emerging technologies pose a risk to data protection.

Meanwhile, the notion that businesses are taking on risk, as a result of adopting technology from multiple vendors is also reflected in the fact that many lack confidence in the platforms they’ve adopted. 

Alarmingly, 81% of organisations don’t believe their current data protection services will meet future business challenges. This lack of confidence is true for 69% in terms of recovering data following a cyber attack, and 64% in terms of recovering data following data loss. 

“While the study only shows the correlation here, we believe the additional risks associated with multiple vendors has to do with the fact that it is more complex to manage data protection solutions from multiple vendors as opposed to a single vendor,” Dell’s vice president for marketing, data protection Ruya Atac-Barrett told IT Pro.

Related Resource

Don’t just collect data, innovate with it.

Removing the barriers to the experience economy

Download now

“Usually there is little or no integration across disparate data protection platforms which means IT teams need to acquire technical fluency across multiple product sets and spend more time monitoring and managing these systems, in addition to the rest of their day-to-day assignments. 

“This can lead to an oversight that leads to an unprotected application, data volume, etc; not uncommon when there are dozens, if not hundreds of applications being protected across edge, core and cloud environments.”

Among other reasons is that, in an environment where data is sprawled across several environments, IT teams will need to orchestrate the recovery of applications and databases in the right sequence to bring a service back online. 

This entire process can become more difficult if business elements are protected on different data protection platforms, which can lead to increased downtime as the complexity is navigated.

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

Misconfigured Git servers lead to Nissan data leak
hacking

Misconfigured Git servers lead to Nissan data leak

7 Jan 2021
BackupAssist teams with Wasabi to offer cheaper backup for businesses
backup

BackupAssist teams with Wasabi to offer cheaper backup for businesses

6 Jan 2021
Data: A resource much too valuable to leave unprotected
Whitepaper

Data: A resource much too valuable to leave unprotected

2 Dec 2020
Webhose and Signal Corp boost data breach detection
Security

Webhose and Signal Corp boost data breach detection

7 Oct 2020

Most Popular

WhatsApp could face €50 million GDPR fine
General Data Protection Regulation (GDPR)

WhatsApp could face €50 million GDPR fine

25 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021