Table of Contents
- Market Categories and Deployment Types
- Key Criteria Comparison
- GigaOm Radar
- Vendor Insights
- Analysts’ Take
- About Max Mortillaro
- About Arjan Timmerman
Data is still one of the most crucial assets in any enterprise today, and as such, it needs to be adequately protected. Enterprises face unprecedented complexity challenges, and the transition to the cloud is radically changing where data is created and consumed. Software as a service (SaaS) applications and replatforming and refactoring initiatives must also take into account data protection requirements.
The regulatory landscape is becoming unmanageable without software-based solutions. Existing data privacy and data sovereignty regulations (such as the EU GDPR, China PIPL, and California, US CCPA) are being extended and strengthened, while US states and other countries are working to introduce their own data privacy laws. But there is still no harmonization of such laws in sight at the US federal level.
Enhanced control and governance of data placement and data protection is needed more than ever. And if that wasn’t enough, ransomware attacks are no longer considered a distant possibility, but rather a high-probability, high-risk threat. Data protection solutions are often the last line of defense against a ransomware attack, and enterprises are looking at ransomware protection capabilities with increased scrutiny.
Finally, although the COVID-19 pandemic is no longer disrupting daily lives in 2022 as it was in 2020, it has left a durable impact on work patterns. Two years ago, most of the workforce began working from home, and organizations needed to restructure to protect data created in disparate locations. Now with a workforce that has become accustomed to flexible work arrangements (FWAs) and facing the Great Resignation, organizations are looking for ways to retain talent by offering continued remote work. This work model will drive demand for solutions that include endpoint data protection. In addition, data collected by sensors and devices at the edge also needs protection and that market continues to grow.
The enterprise market continues to trend toward additional services built on top of data protection. These services are becoming instrumental in collecting and consolidating data across the entire organization (no matter where it’s created or stored) to reuse it for other purposes. In most cases, the enhancements are still about improving and expanding data protection processes, as is the case of protection against ransomware. Still, areas like security, compliance, data governance, and management are also getting a lot of attention.
Today, the modern workplace generally involves a combination of SaaS applications and virtual desktops, whether on-premises or in the cloud, with increasing demand for network attached storage (NAS)—file—protection in both environments. Within this scenario, enterprises are building hybrid cloud infrastructures and need solutions that can adequately support their data-driven initiatives. Furthermore, a growing number of enterprises are taking advantage of Kubernetes to redo their business applications, and protecting these assets is becoming crucial.
This is why the market is so active, with both startups and incumbents looking at ways to disrupt traditional backup models, as well as increase the value of the protected data by adding data management and data reuse capabilities to their solutions.
How to Read this Report
This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:
Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.
GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.
Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.