Research: 68% report cost is biggest data storage pain point
Finding the best storage solutions for the onslaught of data is one of the key issues for IT managers. Pain points, storage options and storage budgets are part of the findings in Tech Pro Research's latest report.
Storage isn't the hottest topic in tech. But with rise of big data and the digitization of practically everything, finding a way to manage the huge influx of data should be a top priority on every IT manager's list.
To better understand which storage technologies they're investing in, the major challenges they face, and who's making the storage decisions, Tech Pro Research surveyed over 125 business professionals about their organization's approach to data storage.
The results, available in the full report, Data storage: Preferred vendors, demands, challenges, were very enlightening. Topics covered include:
- Storage allocation within IT budget
- Increases in storage budget
- Technologies used to manage storage
- Major storage challenges
- Impact of big data on storage resources
- Public and private cloud use
- Preferred vendors
- Solid state storage
- Drivers for storage resource optimization/expansion
Watch Tech Pro Research Managing Editor Bill Detwiler discuss key points of the Data storage: Preferred vendors, demands, challenges.
Direct control desired
For example, despite the proliferation of cloud-based storage solutions, the vast majority of respondents prefer to have direct control over their data and store it in-house.
Nearly seven of 10 survey respondents opt for local storage. Network attached storage is used by 61%, while storage area networks, a more centralized approach, but still an one that keeps data inside the enterprise, is used by 63%.
And despite industry prognosticators having talked about its demise for years, tape is still a part of many company's storage strategy.
Trailing these on-premise solutions (and by a wide margin) are the cloud-based options.
Concerns over governance and data management control, liability for security breaches, and concerns about transfer speeds, make many organizations reluctant to outsource their storage to a third-party cloud provider, especially if that provider then leases its data center space from a second third party.
Now over time, if cloud-based providers can address these concerns, the use of cloud as an ancillary data storage outlet for enterprises is likely to grow -- but a major shift of data storage from the data center to the cloud is not immediately likely.
Storage pain points
When asked about the storage challenges they face in the data center, an overwhelming number of respondents picked cost.
While surging capacity is the major driver of storage needs, as acknowledged by 52% of respondents, the real pain point, since storage is often viewed as a commodity, is having enough money to simply buy more storage when you need it.
Yet this way of thinking is slowing changing. And as the mixing of new storage technologies with legacy systems adds complexity to the data center, companies are looking for ways to better manage their storage needs not just throw money at them.
Authorizing the storage spend
So, who's making these decisions. Well when it comes to researching new technologies and making the technical recommendations for storage purchases, half of the work is done by an individual focused on storage.
But as one might expect, when it comes to actually authorizing storage spends, a C-level executive makes the final decision in nearly 75% of cases.
This illustrates the hands-on, tactical perception of storage professionals that dominates organizations. Companies trust storage professionals and managers to make great recommendations, but they don't see them as strategic managers, nor have they given them purchase authority.
These are just a few of the findings outlined in the full storage report, which includes information on how storage growth is being managed, drill downs on the use a public and private cloud vendors, the effect of new storage technologies on the data center, and more.
You can download the full report, Data storage: Preferred vendors, demands, challenges, to find out more.
More From Tech Pro Research
-
Tools & Templates
GDPR consent request forms: Sample text
GDPR best practices require the ability to obtain valid consent from EU customers to allow for the lawful collection and processing of personal data—as well as the ability for those customers to withd...
-
Tools & Templates
Disaster recovery and business continuity plan
Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains...
-
Tools & Templates
Software automation policy guidelines
Software automation is used for many business and IT processes, depending on industry vertical and individual company business and IT needs. Because this automation is far-reaching, policy considerati...
-
eBooks
IT leader’s guide to the rise of smart cities, volume 3
Powerful trends are pushing the global community to develop more smart cities and invest in connected technologies, as the world population increases and more people move to urban environments. This e...
-
Tools & Templates
Comparison chart: VPN service providers
Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders a...
-
Research
Cybersecurity strategy research: Common tactics, issues with implementation, and effectiveness
It’s one thing for a company to create a cybersecurity strategy, but it’s another thing entirely to put strategy into practice. In February 2018, Tech Pro Research surveyed 236 professionals, aiming t...
-
Tools & Templates
Password management policy
Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and managea...
-
Tools & Templates
Information security policy
To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a ...
-
eBooks
Microsoft SharePoint: A guide for business professionals
Employee collaboration is increasingly critical for business success, and SharePoint is one of the tools that makes it possible. This ebook offers an overview of SharePoint's features, common use case...
-
Tools & Templates
IT physical security policy
This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or da...
-
eBooks
Securing Home Networks
When you set up your own home network, you don't have the benefit of an IT staff that's dedicated to safeguarding your data and systems--it's up to you to protect against internal and external threats...
-
eBooks
Quick Guide: Securing Windows Server 2003
Although the default installation of Windows Server 2003 is more secure than with previous versions, IT pros still need to take a careful look at additional measures they should take to protect their ...
-
eBooks
Outlook Tips for Road Warriors
Working efficiently with Microsoft Outlook is a real challenge for users who are traveling or working off-site. This guide describes a dozen ways that mobile users can maximize productivity when using...
-
eBooks
Battling Spyware in the Enterprise
Letting spyware go unchecked on a computer not only negatively affects performance, it can also compromise your sensitive data. Learn how spyware looks and acts, which anti-spyware tools are effective...
-
Tools & Templates
TechRepublic's Change Order Form
You can use this document template as a standard form for requesting and tracking IT changes in your organization. With this form, you can keep IT staff informed of needed changes and ensure that a st...
-
Tools & Templates
Automated Trouble Ticket Tool
Manage help desk calls easily with this VBA-driven Excel workbook. It offers forms for opening and updating tickets, printable statements for record keeping, and a report feature. This version fixes a...
-
Tools & Templates
Vendor reference questionnaire: Supply chain management
If you are researching a Supply Chain Management (SCM) solution, you need to keep careful notes and do a thorough comparison of vendors. Use this Excel tool to help you ask the right questions and com...
-
Tools & Templates
Vendor selection checklist: Supply chain management
Use this tool to assist you in your search for the best Supply Chain Management solution. Weighting selection criteria to best fit your organization will quickly identify the vendor most likely to mee...
-
Tools & Templates
Vendor Selection Checklist: E-commerce
Trying to decide which e-commerce solution works best foryou? Try TechRepublic's Vendor Selection Checklist:E-commerce--put down which features matter most to you, and our tool can help you identify t...
-
eBooks
Administrator's Guide to Windows Server 2003 - Security Chapter
Download the entire Security chapter from Administrator's Guide to Windows Server 2003 and gain valuable insights on best practices for securing Windows Server 2003. The chapter provides proven tips f...
-
eBooks
Securing Home Networks
When you set up your own home network, you don't have the benefit of an IT staff that's dedicated to safeguarding your data and systems--it's up to you to protect against internal and external threats...
-
eBooks
Quick Guide: Securing Windows Server 2003
Although the default installation of Windows Server 2003 is more secure than with previous versions, IT pros still need to take a careful look at additional measures they should take to protect their ...
-
eBooks
Outlook Tips for Road Warriors
Working efficiently with Microsoft Outlook is a real challenge for users who are traveling or working off-site. This guide describes a dozen ways that mobile users can maximize productivity when using...
-
eBooks
Battling Spyware in the Enterprise
Letting spyware go unchecked on a computer not only negatively affects performance, it can also compromise your sensitive data. Learn how spyware looks and acts, which anti-spyware tools are effective...
-
Tools & Templates
TechRepublic's Change Order Form
You can use this document template as a standard form for requesting and tracking IT changes in your organization. With this form, you can keep IT staff informed of needed changes and ensure that a st...
-
Tools & Templates
Automated Trouble Ticket Tool
Manage help desk calls easily with this VBA-driven Excel workbook. It offers forms for opening and updating tickets, printable statements for record keeping, and a report feature. This version fixes a...
-
Tools & Templates
Vendor reference questionnaire: Supply chain management
If you are researching a Supply Chain Management (SCM) solution, you need to keep careful notes and do a thorough comparison of vendors. Use this Excel tool to help you ask the right questions and com...
-
Tools & Templates
Vendor selection checklist: Supply chain management
Use this tool to assist you in your search for the best Supply Chain Management solution. Weighting selection criteria to best fit your organization will quickly identify the vendor most likely to mee...
-
Tools & Templates
Vendor Selection Checklist: E-commerce
Trying to decide which e-commerce solution works best foryou? Try TechRepublic's Vendor Selection Checklist:E-commerce--put down which features matter most to you, and our tool can help you identify t...
-
eBooks
Administrator's Guide to Windows Server 2003 - Security Chapter
Download the entire Security chapter from Administrator's Guide to Windows Server 2003 and gain valuable insights on best practices for securing Windows Server 2003. The chapter provides proven tips f...