More organizations should consider true immutability as part of their cybersecurity strategy.
Scality, a global leader in reliable, secure and sustainable data storage software, announced the results of a survey of 500 IT decision-makers across France, Germany, the U.K. and the U.S. to gain insight into the role immutable data storage plays in an organization’s overall cybersecurity strategy.
Key findings reveal:
- 94% either already rely on immutable data storage or plan to implement it within the next 12 months, and an additional 2% plan to deploy it within the next three years.
- 69% consider immutable data storage essential to their corporate cybersecurity.
- Only 12% of those who deployed immutable data storage say it is not essential to cybersecurity.
Results from the independent survey by Vanson Bourne demonstrate that IT leaders consider immutable storage as a must-have in the fight against cyberattacks. Ransomware threats are now understood by organizations to be inevitable. Reports show 1 in 4 organizations that pay a ransom never get their data back, and just 16% are able to recover without paying a ransom[1].
Read More About Hrtech Interview : HRTech Interview with Shawn Herring, CMO at airSlate
This reinforces the role immutable data storage plays as an essential last line of defense within a cybersecurity toolkit. With immutable storage, data cannot be deleted or modified once written, increasing data safety and ensuring organizations have the power to restore data with 100% accuracy in the event of a breach.
Survey insights: Vertical market and regional nuances
Comparisons among IT leaders surveyed across vertical industries and specific countries reveal a number of notable differences:
Vertical market:
- Manufacturing organizations (95%) are most likely to deploy immutable storage. 84% consider it essential to their corporate cybersecurity.
- Financial services firms (74%) report the lowest reliance on immutable storage. 60% say it’s essential to their corporate cybersecurity.
Regional:
- A majority of IT leaders across all regions currently use or plan to use immutable data storage: The U.S. has the highest level of current or planned immutable data storage deployments, with 98% of respondents either having implemented it or planning to do so within the next year. This is followed by France at 96%, Germany at 94% and the U.K. at 85%.
- While a relatively low number (12%) of IT leaders worldwide who currently use immutable data storage do not regard it as “essential” to their cybersecurity strategy, a larger percentage resides in the U.K.: 24% of U.K. respondents have deployed it but say it is not essential to their cybersecurity, compared to 11% in France, 9% in the U.S. and 6% in Germany.
Dave Russell, VP of enterprise strategy at Veeam Software: “Widespread deployment of immutable storage reinforces an increased awareness of the critical role secure backup plays as an active defense against cyberattacks, specifically coupled with immutable backup data. Veeam believes that achieving Zero Trust Data Resilience with immutable storage implementations — that are indeed truly immutable — is a great opportunity for IT leaders to reduce the risk of growing data security threats and improve their overall cyber resilience.”
Does traditional immutable storage still leave a window of exposure? The survey reveals the criticality of immutable storage at a time of evolving industry dialogue about data cybersecurity best practices and technologies. But it’s important to note that not all immutability is created equal — some forms still leave a window of exposure.
Unlike forms of immutability enabled by traditional solutions (such as NAS/file system snapshots, dedupe appliances, Linux-hardened repositories or tape), true object storage solutions are inherently immutable at the core architecture level.
The system implements proper protocols and true object storage semantics to preserve data in its original form the very moment it is written — which is not the case for other immutable solutions that can introduce time delays before data is immutable. Each object, even those written nanoseconds apart, can never be overwritten, deleted, or modified. This architectural reinforcement provides a crucial last line of defense against ransomware attackers’ attempts to encrypt data and extort victims.
Browse The Complete Interview About Hrtech : HRTech Interview with Tommy Barav, Founder and CEO at timeOS
[To share your insights with us, please write to pghosh@itechseries.com ]