Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

Jon Seals

Call centers equip agents with multiple high-performance desktops powered from one PC

Calgary, AB – High-performance workstations are essential to the success of most call centers, but as call centers around the world face continual pressure to reduce costs and improve performance and control costs, traditional computing approaches place are too costly. AMJ Technologies, an IT support company based in Las Vegas, NV, has adopted Userful virtualization software to reduce the cost of its computing infrastructure and improve performance and quality control.

The simplest and most flexible virtual desktop solution, the all-in-one Userful VDI software appliance leverages zero client devices to replace physical PCs, saving an average of 60% of hardware and 90% of electricity costs. From a single Core i7 PC, Userful offers concurrent use of different operating systems including full Microsoft™ Windows desktops and free, integrated desktops such as Chrome-based cloud-client, Linux, signage solutions and desktops delivered through Remote Desktop Protocol (RDP). The browser-managed Userful solution takes virtualization beyond the desktop, and can also be used to power interactive touch displays, digital signage and video walls.

AMJ Technologies has been installing Userful Multiplatform in call centers to set up fleets of workstations, and is now able to offer multiple desktop environments for each agent, but at a fraction of prior costs. Andrew Johnson, owner of AMJ Technologies, has been extremely pleased with choosing Userful Multiplatform because of it's of simple set up, affordability and high performance.

"Userful is the only software that does what it can do with very simple installation. The first station I configured was up and running within a half an hour," Johnson said. "Once it's configured you don't have to worry about it -- it just works."

Call centers of any size can take advantage of the Userful Multiplatform solution and its flexibility in order to better equip agents, improve customer service, and reduce overall costs. With Userful Multiplatform, a standard PC server can power multiple desktops along with additional digital displays, such as touch screens and digital signs. All displays can be customized with a choice of operating systems, all managed from a central application.

StorTrends 3500i, Hybrid and/or All-Flash Array, Demonstrates Top-Class Performance During Benchmark Against Well-Known Tier 1 Storage Vendors

 

NORCROSS, Ga. StorTrends® today announced that an independent lab test and benchmark conducted by StorageReview Enterprise Lab has found its StorTrends 3500i, SSD hybrid and/or full flash storage array, a powerful and easy to deploy hybrid storage platform built for high performance and maximum capacity.  During the benchmark testing, which was conducted against well-known Tier 1 storage vendors, the StorTrends 3500i demonstrated top-of-the-class performance. Listed below is an excerpt of the report for the SQL Server Output Test with 30k Virtual Users.  

 

As you can see from the charts above, under a full performance load the StorTrends 3500i outperformed the other hybrid vendors in both highest transaction per second (TPS) and lowest latency. This provides customers with the greatest TPS under strenuous load while responding to every IO in the fastest time possible.

"The real magic of the StorTrends 3500i comes from the control it offers to customers," said Brian Beeler, Founder, Publisher and Editor, StorageReview.  "The array supports both SSD caching and tiering, which is somewhat novel in the hybrid space, and a feature called Automatically Tuned Volumes (ATV).  ATV gives users a high-degree of control over what kind of performance an individual volume receives by selecting the storage it sits on, and allowing admins to prioritize (or not) the performance.  StorTrends arrays also include a robust set of enterprise-ready data services and the ability to scale up with additional disk enclosures."

Beeler continued, "While high-performance storage is certainly compelling, where many arrays fall down is on the data services side.  StorTrends has done well to mitigate that concern with the inclusion of a host of enterprise features.  These are highlighted by support for snapshots, thin provisioning, replication, WAN data services and archiving with deduplication.  The system supports RAID 5, 6, 10, 50 and 60 and is managed via an easy to use web-based GUI."

"The StorTrends 3500i was the top-performing array in the majority of the lab tests ran by StorageReview. This is a testament to the SSD caching, SSD tiering, Automated Tuned Volumes and other key technological features within the StorTrends 3500i. With more than 300 patents it's clear to see why StorTrends is a frontrunner in the Hybrid Array Lab Report," said Justin Bagby, Director of StorTrends.  "We are proud of the StorTrends 3500i benchmark results; and delighted that customers now have another undeniable proof point that the StorTrends 3500i's patented features provide the ultimate combination of extreme performance, optimal capacity and ease of use to meet their business application and budgetary requirements."

To read the complete StorageReview Enterprise Lab report on the StorTrends 3500i, please visit: http://www.storagereview.com/ami_stortrends_3500i_hybrid_array_review

Tweet this:  @storagereview benchmark demonstrates StorTrends 3500i powerful and easy-to-use hybrid or full flash storage array http://www.storagereview.com/ami_stortrends_3500i_hybrid_array_review

About StorTrends
StorTrends® from American Megatrends (AMI) isPerformance Storage with Proven Value.  StorTrends SAN and NAS storage appliances are installed worldwide and trusted by companies and institutions in a wide range of industries including education, energy, finance, state and local government, healthcare, manufacturing, marketing, retail, R&D and many more.  StorTrends meets the challenges and demands of today's business environments by offering a wide variety of solutions from all-flash storage, hybrid storage to spinning disk solutions.  StorTrends is backed by 1,100+ customer installations, 100+ storage patents and nearly 30 Years of IT leadership from a company that millions of people trust on a daily basis, American Megatrends, Inc.  For further information, please visit: http://www.stortrends.com.

Technology breakthrough is a game changer for consumers with a data loss from the latest Apple mobile devices

EPSOM – Consumers, who use Apple's newest mobile devices, including iPhones® and iPads®, can now recover data such as lost photos and videos that go missing during malfunctions that impact their operating systems.

Kroll Ontrack, the leading provider of data recovery and ediscovery products and services, today announced its engineers have developed a unique capability to recover data from the latest Apple mobile devices, which exhibit a logical failure leaving the device stuck in "Recovery" mode or "Device Firmware Upgrade (DFU)" mode. These failures can effectively trap encrypted data on the devices. However, Kroll Ontrack has devised a way to temporarily bypass the logical corruption to access the data using the consumer's login information.

This new method increases the chances of recovering encrypted data on the newest iPhones and iPads by up to 60 percent.

"Logical failures, such as OS upgrade malfunctions and corrupt software, can leave iPhone or iPad users with a device that is functional, but data that isn't accessible," said Phil Bridge, Managing Director, Kroll Ontrack. "Add to that Apple's latest generations of mobile devices with encrypted user data and data recovery success was slim because direct access to the encrypted data was not an option."

Building on its long history of delivering the most robust Mac recovery toolset in the industry, Ontrack Data Recovery engineers specifically developed the unique ability to repair the operating system to then access the data for all Apple mobile devices, including the iPhone 5S® and iPad Air®, which are hardware encrypted. This method, combined with an already extensive ability to recover from non-hardware encrypted Apple devices, significantly increases the chances of recovering photos, videos, contacts, SMS, notes, calendar and other critical mobile device content. With a diagnostic report that shows the quality of recoverable files on the Apple device, individuals benefit from knowing exactly what data will be returned to them prior to committing to the cost of the recovery. Once the recovery is complete, Kroll Ontrack provides both the raw files as well as a backup file that the individual can use to perform a full restore from iTunes to their Apple mobile device. This also provides a point in time recovery file for future use.

"Customers were coming to us for help recovering their encrypted data from their newer Apple devices because there are no commercially available solutions. We researched the issues and developed our own solution, as we often do," added Bridge. "Our solution does not defeat or bypass the device's encryption, but rather temporarily bypasses the logical corruption without "jail breaking" the device to access the data using the device and customer's user access credentials."

For more information about Kroll Ontrack's proven recovery capabilities and a full range of data recovery tools for both logical and physical failures, visit www.krollontrack.co.uk/data-recovery.

About Kroll Ontrack Inc. 
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyse, and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data destruction, electronic discovery and document review. For more information about Kroll Ontrack and its offerings please visit: www.krollontrack.co.uk, follow @KrollOntrack on Twitter or subscribe to the Kroll Ontrack Data Blog.

Testing completed with CacheAdvance Application Acceleration Software on MongoDB using Toshiba PX02SSF 12G SAS SSD


SAN CARLOS, Calif. — CacheBox, Inc. has announced the addition of Toshiba’s PX02SSF 12G SAS SSD to the company’s Hardware Compatibility List. The PX02SSF joins other enterprise SSDs that CacheBox has qualified for use with CacheAdvance™, CacheBox’s unique application acceleration software that enables significant improvements in application throughput and processing with no disruption to a company’s compute or storage infrastructure. “In a world where application performance and scale means everything, a cost effective solution that deploys and scales users in minutes instead of months is what the industry needs to achieve high return on investment,” said Lorenzo Salhi, CacheBox CEO. “We are pleased that Toshiba’s enterprise class SSDs have been added to our hardware compatibility list. According to George Bouchaya, Vice President and CTO at Toshiba America Electronic Components, Inc., “CacheBox’s innovative CacheAdvance software can help customers get the most out of their investment in storage while helping to drive the adoption of SSDs in the enterprise.” CacheBox’s internal testing of CacheAdvance shows significant performance improvements and latency reductions over hard disk storage with MongoDB, and enables customers to realize the most cost effective solution for bridging the application requirements of performance and capacity. CacheAdvance is a software-only, application centric solution that removes application input/output (IO) bottlenecks in a targeted manner. It works by monitoring application IO requests and intelligently determines which data to accelerate to provide optimal performance and user experience.
About CacheBox, Inc. CacheBox is a privately funded, early stage global company with offices in Silicon Valley and Pune, India that is focused on using its advanced application centric architecture to vastly improve application performance. The CacheBox team includes software and storage industry veterans from companies such as sTec and Symantec/Veritas. For more information, visit www.cachebox.com

WOKING, Surrey – VAD Wick Hill has become a certified training centre for the SafeNet Authentication Service (SAS). The first three-day course at Wick Hill’s Woking HQ will run on Monday, September 29th, 2014. The course is part of SafeNet’s new partner program, designed to ensure certified resellers are rewarded for their commitment to the product.

Aimed primarily at resellers, but also available for their customers, the course will cover all aspects of implementation, provisioning and troubleshooting of both the cloud-based and the on-premises version of the SAS product. There is a certification exam, with a SafeNet certification qualification.

The course will be repeated once a quarter. It’s also available on-site and can be white-labelled by VARs to sell on to their customers, with bespoke tailoring available.

Ed Kidson, product sales manager for SafeNet at Wick Hill, commented: “Thanks to Snowden, and a range of highly visible security breaches, authentication is experiencing strong growth. This provides a major opportunity for our SafeNet resellers to get accreditation and deliver a wider range of professional services with their sales.”

 

Integration with ConnectWise Management Platform Enables IT Service Providers to More Effectively Run Their Business and Focus on Better Servicing Their Customers

 

SUNNYVALE, Calif. – Zetta.net announced today it has completed integration of its enterprise-grade (DR) solution with ConnectWise, a leading business management platform for IT service providers, VARs, ISVs, and MSPs. IT service providers now have a complete view of their Zetta.net customers' data usage, alerts, billing and other activities from within the ConnectWise platform, streamlining their management and administrative tasks. As a result, IT service providers can more efficiently run their business and focus on better servicing their customers.

Tweet this: @zettanet integrates its #cloudbackup and #disasterrecovery solution with @connectwise

More than half of the world's top managed services providers (MSPs) leverage the ConnectWise platform to increase profitability, efficiency and control. Zetta.net's integration with ConnectWise builds on its effort to simplify backup administrative processes by delivering a unified backup management and automated billing platform to MSPs.

Zetta.net partners can streamline and automate their business processes with ConnectWise to:

  • Proactively manage backup and restore status of their clients' backup environments
  • Quickly extract alerts and automatically open a service ticket
  • Link customer account usage and create automated billing

Zetta.net provides file, database and server image backups for both physical and virtual environment without the need of an appliance. With built-in WAN acceleration, the solution delivers faster backup and recovery speeds with data transfer rates of up to 5TB in 24 hours. Its appliance-free approach is an advantage for MSPs because it eliminates extra resources and cost associated with deploying and maintaining hardware at each customer site. As a result, customers are up and running in minutes and backup and recovery can be managed from anywhere.

"With Zetta.net's cloud backup and DR solution, we know our clients' data is available anytime, anywhere," said Peter Cronin at Biff Duncan Associates, Inc. "Zetta's integration with ConnectWise will give us a more integrated picture of our clients' backup and recovery status and automate common tasks so we can focus on better servicing our clients."


 

"We're excited Zetta.net's MSP strategy includes integration to ConnectWise," said Jeannine Edwards, Director, ConnectWise Platform at ConnectWise. "Their SaaS-based approach to protecting mutual partners' backup and recovery needs will make for a great addition to the ConnectWise Platform community."


 

"We continue to drive simplicity and efficiency into our solution to help MSPs build a more profitable backup service," said Art Ledbetter, Director of Channels at Zetta.net. "The integration with ConnectWise enables MSPs to eliminate manual business processes and enhance visibility into their clients' backup activities to effectively manage their business."

With the ConnectWise integration, Zetta.net continues to help MSPs simplify management of their backup service and more effectively grow their business. As a result, Zetta.net experienced unprecedented partner growth with:

  • 357% new partners in the first half of 2014
  • 871% new customers from partners in 2013
  • 97% client retention
     

About Zetta.net

is an award-winning provider of for small/medium enterprises and managed service providers (MSPs). Its software-only approach with built-in WAN acceleration enables companies to simplify backups, speed data recovery and reduce overall cost.

For more information, visit: www.zetta.net or www.linkedin.com/company/zetta-inc 


 

Follow Zetta.net on Twitter at: www.twitter.com/zettanet

Tags: cloud backup, disaster recovery, offsite backup, online backup, hybrid cloud backup, remote backup, server backup, data protection, MSP backup

Today, I conclude a three-part series on risk assessments in your Foreign Corrupt Practices Act (FCPA) or UK Bribery Act anti-corruption compliance program. I previously reviewed some of the risks that you need to assess and how you might go about assessing them. Today I want to consider some thoughts on how to use your risk assessment going forward.

Mike Volkov has advised that you should prepare a risk matrix detailing the specific risks you have identified and relevant mitigating controls. From this you can create a new control or prepare an enhanced control to remediate the gap between specific risk and control. Finally, through this risk matrix you should be able to assess relative remediation requirements.

A manner in which to put into practice some of Volkov’s suggestions was explored by Tammy Whitehouse, in an article entitled “Improving Risk Assessments and Audit Operations”. Her article focused on the how Timken Company, assesses and then evaluates the risks the company has assessed. Once risks are identified, they are then rated according to their significance and likelihood of occurring, and then plotted on a heat map to determine their priority. The most significant risks with the greatest likelihood of occurring are deemed the priority risks, which become the focus of the audit/monitoring plan, she said. A variety of solutions and tools can be used to manage these risks going forward but the key step is to evaluate and rate these risks.

...

http://tfoxlaw.wordpress.com/2014/08/28/risk-assessments-the-cornerstone-of-your-compliance-program-part-iii/

There’s no doubt that virtualisation has been a boon to many enterprises. Being able to rationalise the use of servers by spreading storage and applications evenly over a total pool of hardware resources leads to higher cost-efficiency, as well as improved disaster recovery and business continuity. Yet in practical terms, businesses are often still tied to one vendor for any effective storage strategy. To break free of that constraint, software-defined storage (SDS) lets IT departments mix and match the physical storage devices as they want. And there are further benefits too.

...

http://www.opscentre.com.au/blog/software-defined-storage-and-business-continuity-one-up-on-virtualisation/

I was recently talking with a friend about—what else—Facebook and her thoughts on whether that would be too private to share.

“Oh, I don’t believe in privacy,” she said with a dismissive hand wave.

That stumped me, in large part because she’s a defense attorney.

“You don’t believe in privacy as a fact or you don’t believe in privacy as a law?” I asked.

“Oh - legal privacy is very important,” she said. “But privacy as a fact—I don’t believe in it. It doesn’t exist.”

It sounds like a distinction only a lawyer could make. Yet as Big Data becomes commonplace, CIOs must educate themselves about the legal risks and responsibilities of gathering and using data, advises Larry Cohen, global CTO of Capgemini.

"I think the CIO is already kind of taking on more of a role of a risk broker and risk orchestrator in the enterprise," Cohen told CIO.com. "I think this is a perfect example of how a role like that arises in a topic like Big Data."

...

http://www.itbusinessedge.com/blogs/integration/could-privacy-concerns-weaken-big-datas-business-case.html

A Case In Point

Not long ago I was talking with a long-term CIO of a large organization about Disaster Recovery. He proceeded to tell me they are all set, as their tapes are stored offsite. To him, that was all he needed to be concerned about as it related to DR.

When a fire broke out in the office next to their data center, I am certain that offsite tapes were the last thing on his mind. He learned a hard lesson about relying on backups though. Turns out that after the fire, they were able to physically relocate their entire office before IT was able to restore all their applications. Even more disturbing than that was the discovery that they had more than ten days’ worth of data loss due to old/bad tapes, skipped files, and incomplete backups. I would not have wanted to be him when he met with the COO in the aftermath and had to explain the situation and his lack of preparedness.

...

http://www.strategicbcp.com/blog/relying-on-backups-in-a-disaster/