2026 State of Cyber Recovery: Closing the Gaps Between Storage, Data Protection, and Cybersecurity

1.Which of the following best describes your current environment for production data?(Required.)
2.Which statement best describes your current unstructured data volume (files, documents, media, logs)?(Required.)
3.How concerned are you about each of the following data security and recovery challenges?
Not concerned
Slightly concerned
Moderately concerned
Very concerned
Extremely concerned
Being unable to locate a safe/clean recovery point after an attack
Rapid data growth outpacing protection methods
Meeting compliance and regulatory requirements
Unpredictable restore times (RTO)
Keeping backups immutable from ransomware
4.How frequently do cyberattacks or attempted cyber incidents typically target your organization?(Required.)
5.In the past 12 months, have you experienced a successful ransomware or cyberattack that compromised or attempted to compromise your backups/snapshots?(Required.)
6.When restoring data after a potential compromise, how quickly can you identify a guaranteed “clean” snapshot or backup?(Required.)
7.Does your organization currently use snapshots or backups that are truly indelible and immutable (i.e., cannot be modified or deleted, even by an admin)?(Required.)
8.Which statement best describes your approach to detecting malware or anomalies within backup snapshots?(Required.)
9.How important is near-zero RTO (e.g., recovering hundreds of TBs in minutes) for your mission-critical applications?
Absolutely critical; we cannot tolerate major downtime
Very important; significant downtime is costly
Moderately important; we may accept some downtime
Only important for certain workloads
Not a priority; we can tolerate extended downtime
10.Realistically, how long does it take your organization to recover multiple terabytes of data if your primary storage is compromised?(Required.)
11.How do you currently identify compromised or at-risk snapshots/backups?(Required.)
12.How challenging is your current process for identifying compromised snapshots/backups?(Required.)
13.Would automatically tagging compromised snapshots across BOTH primary storage and backup repositories significantly reduce your recovery time and complexity?(Required.)
14.Which best describes your data protection workflow?(Required.)
15.Which of the following best describes your organization’s current level of confidence in restoring systems from backups without risking malware reinfection?(Required.)
16.Are you planning to upgrade or invest in new data protection or primary storage infrastructure within the next 12 months?(Required.)
17.Which would most motivate you to adopt a fully integrated cyber resilience solution combining primary storage, immutable backups, and threat detection? (Select up to two)(Required.)
Demographics
────────────────────────────────────────────────────────
Job Title/Primary Role
18.Which of the following best describes your primary role or area of responsibility?(Required.)
Organization Size (by Employees)
19.Approximately how many employees work in your organization globally?(Required.)
Industry/Sector
20.Which best describes your organization’s primary industry or sector?(Required.)
Region/Geography
21.Where is your organization primarily headquartered or where you are based?(Required.)