• PROTECT AND ENHANCE THE VALUE OF YOUR ENTERPRISE

    FREE CUSTOMIZED DEMO

    The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.

    LEARN MORE ABOUT FRONTLINE LIVE 5

Fall World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Jon Seals

Cisco's Channel Partner Program Recognizes Partners With Highest Level of Expertise in Cisco Network Security Solutions, as Well as Collaboration, and Cisco Cloud and Managed Services

 

HOUSTON, Texas – Computex Technology Solutions, a Cisco Gold Certification partner, today announced it has achieved the Master Collaboration Specialization, Master Security Specialization and Master Cloud and Managed Services Specialization from Cisco. These specializations recognize Computex as having the ability to represent Master-level business expertise as well as technical efficiency, having fulfilled the training requirements and program prerequisites to sell, deploy and support the Cisco solutions in these three areas.

"Cloud, collaboration and IT security are strategic solutions that businesses and channel partners need to embrace to succeed now and in the future," said Sam Haffar, CEO, Computex. "Being recognized as a 'Cisco Gold Certified Partner with a Triple Master' shows the ongoing investments and dedication Computex is making to ensure our sales expertise, advanced technical capabilities, and managed services are easily differentiated, exceptional by every measure, and engineered to deliver superior business value to our customers."

To achieve the Master Cloud and Managed Services, Collaboration and Security Specializations, Computex first attained Cisco Advanced Specialization in each category. Partners must then meet stringent requirements that demonstrate their Master-level sales, technical, and services capabilities. Furthermore, Master specialized partners must possess a number of Cisco and industry-standard technical certification requirements, provide customer references that document Cisco-prescribed design and deployment capabilities and show evidence that they have the infrastructure to support a full menu of Lifecycle Services offerings and capabilities.

"These partners have invested resources to gain deep expertise in design and implementation of complex, cross-architectural security solutions, plus built competencies around security services, such as managed threat defense and vulnerability assessments, that open up new business opportunities, and earn customer confidence in partners as trusted technology advisors," said Al Jacobellis, director, security solutions strategy for the worldwide partner organization at Cisco. "Computex has made an outstanding achievement in obtaining the Cisco Master Security Specialization."

The Cisco Channel Partner Program provides partners with the training required to build sales, technical and Cisco Lifecycle Services skills, and then validates their skills through a third-party audit. Cisco Channel partner certifications -- Select, Premier, and Gold -- represent an increasing breadth of skills across key technologies and a partner's ability to deliver integrated networking solutions. Cisco Channel partner specializations -- SMB, Express, Advanced and Master -- reflect an increasing depth of sales, technical and service expertise in particular technologies. Cisco Master specializations provide Computex with access to comprehensive sales, technical, and lifecycle services training and support available from Cisco.

Computex Invests in the Data Center of the Future
Further demonstrating its commitment to technical excellence and customer service, Computex maintains Cisco Certified Internetwork Experts (CCIEs) across the entire Cisco networking portfolio and owns and operates a private, elevated Data Center, cutting-edge demonstration lab, along with three large on-site integration centers, warehouses and staging facilities. The company also offers clients temporary workspaces to accommodate unforeseen challenges and business needs.

"Computex's engineering team maintains the industry's highest-possible technical certifications and specializations and understands how to use technology to build business advantage and solve complex challenges with ease," explains Worth Davis, CTO, Computex. "As a Cisco Gold Certified Partner with a Triple Master, we have the expertise, track record and secure facilities that Fortune 500 companies seek in a technology business partner." 

In addition, Computex offers two 24/7/365 Network Operations Center (NOC) with trained and certified engineers who use advanced monitoring software and proven procedures to ensure the highest standards of security, reliability, performance and systems availability. This service allows customers to stay focused on their core business while delegating the day-to-day management of their back-office IT operations or entirely outsourcing their IT strategy and execution to Computex.

"Achieving a single Cisco Master Specialization is a major accomplishment, and to attain three simultaneously is simply outstanding," said Susan O'Sullivan, executive director, Advanced Solutions, Ingram Micro Inc., the world's largest technology distributor. "We're honored to play an incremental role in Computex's continued success, and take great pride in helping them to build and expand their Cisco business and attain distinguished levels of technical excellence."

"Mastering these three Cisco Master specializations lends instant credibility to Computex in the eyes of our customers and vendors," concluded Faisal Bhutto, VP of Corporate Strategy, Computex. "It also strengthens our value as one of the nation's leading business solution provider experts and channel partners."

For more information about Computex Technology Solutions visit www.computex-inc.com. To learn more about Computex's three Cisco Master Specializations visit http://www.computex-inc.com/cisco-gold-triple-master/.

About Computex Technology Solutions
Computex Technology Solutions is an industry-leading national IT solution provider focused on helping customers transform their businesses through technology. The company employs a talented and diverse team of trained and specialized solution architects to create high-performance IT infrastructure solutions from assessment, design, implementation, security and management. The company's core expertise are broken into ten practices: Data Center, Business Resiliency, Storage & Backup, Mobility & Application Delivery, Advanced Networking, Directory Services & Messaging, Virtualization & Converged Infrastructure, Unified Communications, Managed Services and Security, Assessment & Compliance.

In 2015, Computex earned a trifecta of accolades including being named to the CRN Solution Provider 500, Tech Elite 250 and MSP 500. Additionally, CRN recognized Computex's CEO Sam Haffar as one of the IT channel's Top 100 Influencers. With offices in Florida, Georgia, Michigan, Minnesota and Texas, Computex Technology Solutions is an award-winning IT service organization recognized on a national level for its success and service excellence. www.computex-inc.com

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.

According to a recent survey of C-level executives by Accenture Strategy, 63 percent of respondents said their companies experience cyberattacks at least once a week. The kicker is that the majority of these executives are just talking about it, without taking the full corrective measures they need to take to give them the best shot at preventing those attacks.

In an email interview, Brian Walker, managing director of Accenture Technology Strategy, said it’s more likely a matter of when, not if, your company will experience a cyberattack. “And, while 88 percent of these executives believe their cyber defense strategy is robust, understood and fully functional, their answers to other questions we asked tell us that, by and large, there is much more they can do to better position themselves to withstand an attack or catastrophic failure,” Walker said.

Being resilient is about acknowledging the reality that they’re almost certainly not doing everything they can, he said. “It also is about taking the steps that enable a company to quickly respond when the inevitable occurs,” he added. Walker highlighted four steps that warrant particular attention:

...

http://www.itbusinessedge.com/blogs/from-under-the-rug/c-level-execs-arent-stepping-up-to-prevent-cyberattacks-survey-finds.html

I’m very excited about a new tool we’ve launched at Citrix called Workspace Cloud Labs. This is a new section in Workspace Cloud where you can try new and upcoming features and technologies from Citrix. The goal of the Workspace Cloud Labs is to drive innovation at a faster pace by providing you easy access to early technologies, and to give you the opportunity to respond and give us feedback.


What’s unique about Workspace Cloud Labs?

Let’s first consider how traditional enterprise software tech preview works. For instance, consider what Citrix has to do when releasing a new tech preview for a new XenApp feature. Anyone who has tried a XenApp tech preview knows the up-front time you need to commit to do the evaluation. You have to deploy a full XenApp environment before evaluating the new features and give us feedback. This means that the level of participation is limited to only those who can commit to the time required to evaluate the technology.

From the engineering side, we have to do a lot of prep work to turn a new feature still in development into something you can easily access and consume. As an example, for any new technology where we want your feedback, we incur in considerable delays due to the time it takes both to provide early access and collect input.  This means that those evaluating a tech preview may ultimately have very little influence in the final result.

...

http://blogs.citrix.com/2015/08/27/workspace-cloud-labs-citrix-new-platform-for-innovation/

Thursday, 27 August 2015 00:00

Katrina and the Next Crisis

(TNS) -- On Aug. 29, 2005, Hurricane Katrina made landfall over southern Louisiana, causing unprecedented destruction along the Gulf Coast and in New Orleans. Ten years later, what can we say we learned?

The Gulf Coast survived. New Orleans survived. Yet the scars run deep — not only for the million people who were displaced by the storm or the families of the 1,833 people who died, but also for a nation still struggling with what Katrina says about all of us. About poverty. About our sense of place. About our relationship with nature. About so much more.

As a nation we have become good at marking anniversaries as part of our collective healing process. At each arbitrary moment — one year, five years, 10 years — we gather for memorial ceremonies and publicly remember what we lost, expecting it to give us new perspective so we can push forward.

But what have we really learned about coping with massive emergencies?

...

http://www.emergencymgmt.com/disaster/Katrina-and-the-Next-Crisis.html

In general, Apple is given credit for an overall approach that is more secure than Android’s. That common wisdom has slowed Android in the enterprise.

It is important to note, however, that Apple is not perfect in its approach to keeping devices and data safe. In some cases, the problem isn’t Apple itself – it’s the tendency of employees to disregard security.

This week, Centrify released a study it commissioned Dimensional Research to conduct. The firm found that only 28 percent of 2,249 U.S. workers queried who use Apple products have mobile device management (MDM) software installed and only 35 percent of those devices encrypt corporate data.

...

http://www.itbusinessedge.com/blogs/data-and-telecom/apple-security-in-the-enterprise-safer-not-perfect.html

Thursday, 27 August 2015 00:00

Navigating Technology Risks

One of the key questions being asked by audit committees and boards of directors of organizations around the globe is whether their emerging technology risks are being properly identified and managed. To that end, the Global Internal Audit Common Body of Knowledge (CBOK) released “Navigating Technology’s Top 10 Risks,” which identifies the top technology risks and ways that organizations can learn about and address these risks.

Here are the top five out of 10 risks ranked by the study:

...

http://www.riskmanagementmonitor.com/navigating-technology-risks/

Thursday, 27 August 2015 00:00

The Data Center in the New Digital Economy

The cloud is a powerful new weapon in the IT arsenal, but it is pretty clear at this point that most enterprises will continue to invest in local data infrastructure for the foreseeable future.

This is in fact the more difficult strategy because it forces the enterprise into a series of tough decisions regarding infrastructure, architecture and technology at a time when the use case for the data center itself is undergoing such dramatic change (more on that toward the end of the post).

To date, only a handful of organizations have opted for a fully cloud-based data environment, the largest and most well-known being Netflix. The company is prepared to power down the last of its data centers any day now, according to the Wall Street Journal, placing its entire footprint – from video streaming and customer service to back-end office support – on the public cloud. The company actually began migrating key systems to Amazon back in 2008 following a serious hardware failure within its internal infrastructure, although the actual content delivery network (CDN), which competes with a similar service from Amazon, is ported out to various smaller providers.

...

http://www.itbusinessedge.com/blogs/infrastructure/the-data-center-in-the-new-digital-economy.html

Thursday, 27 August 2015 00:00

Storm Surge Risk Rising Along U.S. Coast

While there’s much focus on storm surge risk in New Orleans as we mark the 10th anniversary of Hurricane Katrina, two new reports highlight the vulnerability of other U.S. coastal cities to storm surge flooding.

An analysis by Karen Clark & Co ranks the U.S. cities most vulnerable to storm surge flooding based on losses to residential, commercial and industrial properties from the 100 year hurricane.

The findings may surprise you.

KCC reveals that some of the cities most vulnerable to storm surge flooding have not been impacted for decades. A few have not experienced a direct hit from a major hurricane in the historical record.

...

http://www.iii.org/insuranceindustryblog/?p=4154

A new survey has shown that in the eyes of end users, IT departments are regularly guilty of lagging behind current working trends by as much as two years, if not longer.

The average organisation’s IT team is 21 months behind the curve when it comes to supporting modern workplace technologies and practices like the cloud and bring-your-own-device, the research revealed.

Moreover, a third of IT departments are only now adapting to changes that were at the cutting edge over two years ago, it found.

One expert at Intercity Technology – the unified communications provider that carried out the survey – claimed the findings show how IT commonly serves “as a barrier rather than an enabler” for most organisations, harming employee productivity as a result.

“Our research has shown that there is a clear disconnect between what IT is provided to employees and what employees need in order to be productive,” said Product Director Maria Grant.

“This is potentially why our research has found that IT departments fall behind by nearly two years when it comes to supporting current working trends.”

According to the survey, almost three-quarters (72 per cent) of end users believe they should be given greater influence over the IT solutions they use to do their jobs – an opinion with which few IT managers were found to agree.

In fact, fewer than a than a third of IT departments ask for feedback from employees before procuring and deploying new technologies, the research revealed.

Asked why having this responsibility would be beneficial to the business, just under four-fifths (79 per cent) of end users said using the right technology would “make them more productive in the workplace”.

According to Intercity, the reluctance of the average IT department to work with non-IT decision makers could be down to concerns over security and data loss when introducing new technologies.

When looking for data recovery services, look for one with a track record of success. Ontrack Data Recovery services has 40,000 data recovery stories to tell every year.

From:: http://www.krollontrack.co.uk/company/press-room/data-recovery-news/it-departments-lag-2-years-behind-working-trends,-say-users485.aspx

Solution Delivers Fast and Accurate Troubleshooting and Assurance in Next Generation Network Architecture

 

MILPITAS, Calif. –  Viavi Solutions Inc. (NASDAQ: VIAV) ("Viavi") today announced it is expanding its portfolio of software-defined network test and monitoring solutions with the new GigaStor Software Edition to manage performance and user experience in virtual and cloud environments. The new software configurations, which Viavi is demonstrating at VMworld, allow network and server teams to capture and save 250 GB or 1 TB of continuous traffic to disk for in-depth performance and forensic analysis.

"IT teams are wasting a lot of time by only tracking virtual server and resource health," said Charles Thompson, senior director of product management, Viavi Solutions. "These teams can often miss problems associated with applications within the hypervisor with such narrow vision. With GigaStor Software engineers now have the ability to see in real time and historically how users are experiencing applications and services within the virtual environment, saving time and end-user heartache."

Without GigaStor's insight, engineers could spend hours replicating a network error before they can diagnose its cause. GigaStor Software captures packet-data from within the virtual switching infrastructure without needing to push data into the physical environment. It can be deployed in any virtual host for the long-term collection and saving of packet-level data, which it can decode, analyze, and display. Additionally, it provides IT teams with greater accuracy and speed in troubleshooting by having all packets available for immediate analysis.

Utilizing the GigaStor Software and appliances, network teams can monitor and analyze all virtual datacenter traffic whether within a VMware ESX host or on 10 and 40 Gigabit Ethernet links. GigaStor Software is available today for purchase, and is being demonstrated during VMworld in San Francisco at Viavi Solutions booth #2235.

About Viavi Solutions
Viavi (NASDAQ: VIAV) software and hardware platforms and instruments deliver end-to-end visibility across physical, virtual and hybrid networks. Precise intelligence and actionable insight from across the network ecosystem optimizes the service experience for increased customer loyalty, greater profitability and quicker transitions to next-generation technologies. Viavi is also a leader in anti-counterfeiting solutions for currency authentication and high-value optical components and instruments for diverse government and commercial applications. Learn more at www.viavisolutions.com and follow us on Viavi Perspectives, LinkedIn, Twitter, YouTube and Facebook