Data protection investments grow

September 2024 Infrastructure, Security Services & Risk Management


Byron Horn-Botha.

Arcserve Southern Africa has revealed that the Arcserve State of Data Resilience in the Enterprise survey, which involved senior IT professionals in small to large-sized businesses, indicates that these businesses are allocating a significant portion of their IT budget to data protection and recovery.

“The high standard deviation (21%) in responses indicates there is a lot of variance in the observed data around the mean, further pointing to the fact that the data observed is quite spread out. The finding that a substantial number of companies arguably vastly underinvest in this area is supported by this variance. Presumably, smaller overall IT budgets impose difficult trade-offs upon IT leaders,” says Byron Horn-Botha, Business Unit Lead of Arcserve Southern Africa.

The following data point offers some reassurance; IT leaders overwhelmingly aim to grow their data protection budget, with 89% of survey respondents’ organisations expecting to increase their data protection budget in the future.

They may find the 2023 Security Budget Benchmark Report helpful, as it showed that the average IT security budget increased by 6%. Overall, that is a growth pace that is 65% slower than previously. “In many cases, though, growth must accelerate in the data protection bucket. Even as an increased budget gets allocated to data protection, how can an organisation make the most of it?” asks Horn-Botha.

He says considering the trade-offs between having a disparate patchwork of individually configured fine-tuned components and an integrated, unified solution that reliably gets the job done is important. “The former may provide unique customisation opportunities, while the latter should be easier to deploy and faster to deliver value.”

Time is money when it comes to business continuity and disaster recovery

Horn-Botha says business leaders should be asking themselves what the cost would be —in money and reputational damage—if they could not access their data. The survey revealed that only 31% of respondents were confident in their ability to recover lost data in 24 hours. “The bottom line on this is that time is of the essence; the longer the business is down, the greater the operational cost and reputational impact.”

The survey asked, “Is taking more than 24 or 48 hours to recover acceptable for companies?” The answer was a resounding no for two out of every three companies. The survey revealed only 34% of respondents said their organisation could take more than 48 hours and still avoid significant business disruption.

Practice makes perfect.

While 70% of organisations reported they perform weekly or monthly data recovery drills to ensure business continuity, over one in five businesses were shown not to test their systems often enough. Horn-Botha confirms that regular data recovery drills are essential because they help ensure that the organisation’s Recovery Time Objective (RTO) and Recovery Point Objective (RPO) can be met when disaster strikes.

Click here to see Arcserve’s State of Data Resilience in the Enterprise Report, which includes tips for IT leaders on effectively communicating with internal stakeholders about mitigating the risks of data loss and downtime.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...