1
Data is at the heart of everything we do. Every malicious threat aims to exploit this data and regulations govern how this data should be stored, managed and protected. Dealing with these challenges is incredibly difficult to do in an increasingly fragmented, siloed and highly complex IT environment. Starting over is a non-option. So, so how do you get it done? That’s where Veritas comes in. INTRODUCING: THREE IMPACTING TRENDS FOUR DATA MANAGEMENT CHALLENGES FACT: It would take over 2.6 trillion smartphones to store 175ZB of data. 175 zettabytes by 2025 FACT: A new organization will fall victim to ransomware every 14 seconds in 2019. 1 300 % YOY increase in ransomware attacks. 2 52 % of data is still dark 3 FACT: It’s impossible to prove regulatory compliance when half of your data is dark. MORE DATA/SOURCES TO MANAGE: PHYSICAL, VIRTUAL, HYPERCONVERGED, CLOUD, MOBILE, MACHINES, OPEN SOURCE, CONTAINERS MORE THREATS TO PROTECT AGAINST: RANSOMWARE, CRYPTO-ATTACKS, HUMAN ERROR, MALICIOUS INTENT, NATURAL DISASTERS, INFRASTRUCTURE, SPRAWL MORE REGULATIONS TO COMPLY WITH: GDPR, HIPAA, PCI DSS, CCPA, FACTA, FTCA, APP, LGPD MORE NEED TO OPTIMIZE FOR: COST, AGILITY, AVAILABILITY AND EFFICIENCY ! ONE SOLUTION—A STANDARDIZED PLATFORM Ensure applications are always available and deliver on even the most strict of SLAs that your 24/7 business demands virtual, on-premise or in the cloud. Learn more at veritas.com/availability Keep data protected at scale and always recoverable no matter where it lives with simplified, yet robust, data protection solutions. Learn more at veritas.com/protection 1. Source: Cyber Security Ventures. 2. Source: dimensiondata.com. 3. Source: Veritas Value of Data Report 2019. Gain key insights into data that allow you to take action to increase operational efficiency, optimize costs, and enable regulatory readiness. Learn more at veritas.com/insights Copyright © 29 Veritas Technologies.

V0913 infographic Enterprise Data Servicescioacademyasia.org/wp-content/uploads/2019/06/Veritas-2...That’s where Veritas comes in. INTRODUCING: THREE IMPACTING TRENDS FOUR DATA MANAGEMENT

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: V0913 infographic Enterprise Data Servicescioacademyasia.org/wp-content/uploads/2019/06/Veritas-2...That’s where Veritas comes in. INTRODUCING: THREE IMPACTING TRENDS FOUR DATA MANAGEMENT

Data is at the heart of everything we do. Every malicious threat aims to exploit this data and regulations govern how this data should be stored, managed and protected. Dealing with these challenges is incredibly difficult to do in an increasingly fragmented, siloed and highly complex IT environment. Starting over is a non-option. So, so how do you get it done?

That’s where Veritas comes in.

I N T R O D U C I N G :

T H R E E I M P A C T I N G T R E N D S

F O U R D A T A M A N A G E M E N T C H A L L E N G E S

FACT:It would take over 2.6 trillionsmartphones to store175ZB of data.175

zettabytes by 2025

FACT: A new organization will fall victim to ransomware every 14 seconds in 2019.1

300 %YOY increase in ransomware attacks.2

52% of data is still dark3

FACT:It’s impossible to proveregulatory compliance whenhalf of your data is dark.

M O R ED AT A / S O U R C E S

T O M A N A G E :

P H Y S I C A L , V I R T U A L ,

H Y P E R C O N V E R G E D ,C L O U D ,

M O B I L E , M A C H I N E S ,

O P E N S O U R C E , C O N TA I N E R S

M O R ET H R E AT S T O

P R O T E C T A G A I N S T :

R A N S O M W A R E ,C R Y P T O - AT TA C K S ,

H U M A N E R R O R ,M A L I C I O U S I N T E N T,

N AT U R A L D I S A S T E R S ,I N F R A S T R U C T U R E ,

S P R A W L

M O R E R E G U L AT I O N S

T O C O M P LY W I T H :

G D P R ,H I P A A ,

P C I D S S ,C C P A , F A C TA ,F T C A ,

A P P,L G P D

M O R E N E E D T O

O P T I M I Z E F O R :

C O S T, A G I L I T Y,

AV A I L A B I L I T Y A N D

E F F I C I E N C Y

!

O N E S O L U T I O N — A S T A N D A R D I Z E D P L A T F O R M

Ensure applications are

always available and deliver

on even the most strict of

SLAs that your 24/7

business demands� virtual,

on-premise or in the cloud.

Learn more at

veritas.com/availability

Keep data protected at

scale and always

recoverable no matter

where it lives with

simplified, yet robust,

data protection solutions.

Learn more at

veritas.com/protection

1. Source: Cyber Security Ventures.2. Source: dimensiondata.com.3. Source: Veritas Value of Data Report 2019.

Gain key insights into data

that allow you to take

action to increase

operational efficiency,

optimize costs, and enable

regulatory readiness.

Learn more at

veritas.com/insights

Copyright © 29 Veritas Technologies.