The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.


Spring World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Jon Seals

Workspace Management 2015 with enterprise mobility and license management for Oracle


LONDON – Matrix42 (www.matrix42.com), a top provider of software for workspace management, has released the latest version of its Workspace Management Suite offering numerous improvements. These include the integration of enterprise mobility management features from Silverback by Matrix42 and a powerful tool for determining of inventory for Oracle database license management.


Enterprise Mobility Management

Matrix42 Workspace Management 2015 offers many improvements, including the integration of Silverback by Matrix42. Matrix42 acquired Silverback, the leading Australian enterprise mobility management provider, in November 2014 and added important features such as data protection and control mechanisms to its mobility solution. With the integration of Silverback by Matrix42, mobile devices and workspaces can now be integrated cost-efficiently into IT service management processes and provided, managed, and controlled via the Matrix42 Workspace Management Suite.


Oracle Database Compliance

Matrix42 Workspace Management 2015 integrates nova ratio AG’s market-leading solution into the determining of inventory of Oracle databases. The two companies have established a strategic partnership in order to provide companies with a powerful solution. nova ratio AG is a German provider that has been verified by Oracle. The special feature of the solution is that Oracle automatically accepts the determined data when checking a data license. In addition, a one-time analysis delivers clear information on what needs to be licensed and why. This allows Matrix42 customers to monitor their Oracle license costs at all times.


Milestones in Strategic Development

‘The version released today is the result of our efforts to develop Matrix42 solutions into a workspace aggregator. Improvements made to strategically important mobility and license management solutions represent a valuable milestone in the implementation of our product strategy,’ says Oliver Bendig, CTO of Matrix42. ‘With this major release, we are pleased to be able to help our customers take control of extremely complex challenges by applying simple solutions.’


More information will be available on the Matrix42 Stand 218 at the ITSM show.


About Matrix42

Matrix42 is a top provider of workspace management software. The company offers forward-thinking solutions for modern work environments under its ‘Smarter workspace’ motto. More than 3,000 customers around the world, including BMW, Infineon, and Carl Zeiss, currently manage approximately three million workstations using workspace management solutions from Matrix42.


Matrix42 operates successfully in six countries – Germany, Austria, Switzerland, the Netherlands, Great Britain, and Sweden. The company’s headquarters are in Frankfurt am Main in Germany. Founded in 1992, the company has been part of the Asseco Group since 2008, one of Europe's largest software providers.

Matrix42’s products and solutions are designed to simply and efficiently manage modern work environments – whether physical, virtual, or at mobile workspaces.


Matrix42 focuses on user orientation, automation, and process optimization. The company’s solutions meet not only the requirements of modern employees who want to work from any location and with a great variety of devices, but also those of IT departments and businesses themselves.


Matrix42 offers its solutions to organizations across different sectors who value forward-looking and efficient workspace management. The company also successfully collaborates with partners who provide on-site consultation to Matrix42 customers. Some of these leading partners include TAP Desktop Solutions GmbH,

Consulting4IT GmbH, and DSP IT Service GmbH. Further information available at




LONDON – Skyscape Cloud Services Limited, the easy to adopt, easy to use and easy to leave cloud services company, has today announced its strategic partnership with DeepSecure, the software provider specialising in enabling the secure sharing of information.


Originally focused on developing products for SECRET and TOP SECRET security requirements, DeepSecure now helps public sector organisations meet compliance requirements, and protect data when moving to the cloud and when sharing sensitive information.


Skyscape’s customers will now benefit from DeepSecure’s ‘Guards’, an assured family of cross-domain products offering advanced, self-defending and scalable solutions for information sharing across common business applications and protocols. This added capability will form an integral part of many solutions developed and delivered on Skyscape’s Assured Cloud Platform, demonstrating Skyscape’s ongoing commitment to delivering secure cloud services to UK public sector organisations, which have significant data protection requirements.


“We’re delighted to announce our partnership with DeepSecure, a likeminded company with a significant track record when it comes to helping organisations share data securely,” said Simon Hansford, CEO of Skyscape Cloud Services. “DeepSecure is certainly a good cultural fit for us as a fellow UK sovereign SME that specialises in delivering secure digital services to the UK public sector. The firm also shares our commitment to offering a consumption-based pricing model for its security services, which aligns with our own pay-as-you-go model for our full catalogue of assured cloud services.”


Skyscape’s Head of Compliance and Information Assurance, John Godwin, and DeepSecure’s CEO, Robin King, will present a joint session, ‘Hey you, want to come onto my cloud?’ at Infosecurity Europe in London on Wednesday 3rd June at 4pm. This will explore how cloud migration for sensitive systems can be achieved whilst meeting the requirements of compliance, risk management and accreditation.


About Skyscape Cloud Services

Skyscape’s assured cloud solutions have been specifically designed to meet the needs of the UK public sector, delivering UK sovereign services that are easy to adopt, easy to use and easy to leave, with genuine pay-by-the-hour consumption models. As a UK SME, Skyscape has won a number of high-profile contracts via the G-Cloud Framework and through its large number of channel partners that embed Skyscape’s cloud platform in their solutions.

Skyscape’s full range of services are Pan Government Accredited (PGA) up to IL3, hence suitable for all data at OFFICIAL (including OFFICIAL-SENSITIVE) and connected to government networks including the Public Services Network (PSN), the N3 health network and others. Its services are delivered with leading technologies from the Skyscape Cloud Alliance Partners: QinetiQ, VMware, Cisco, EMC and Ark Data Centres.

Skyscape has been named a “Cool Vendor” by analyst firm, Gartner. To learn more about Skyscape, visit www.skyscapecloud.com or follow on twitter @skyscapecloud

What does the phrase “needle in a haystack” mean to you? For many, it implies the impossible or something that can’t be done. As an MSP, don’t you strive to do the seemingly impossible for your customers? It sure will endear them to you.

One feature that can help you triumph over “needle in a haystack” scenarios is granular recovery. Think back to a customer that got hit with CyrptoLocker or perhaps had a rogue employee who deleted important files. No doubt your customers had that empty feeling that their valuable data was unrecoverable. With granular recovery, it’s not only possible, but also easy. You can easily search documents, emails and attachments by keyword and restore exactly what you need. Now, won’t that impress your customers?



Downtime to the broadband connection is now one of the major threats facing today’s organizations, so why are many businesses not considering resilience when purchasing broadband or looking at how broadband failure fits into the disaster recovery plan? Mike van Bunnens, managing director, Comms365, explores the issue.

What is the most important consideration for a business buying a new broadband connection? From the way many businesses are making the investment decision, the answer appears to be cost: with most expecting to achieve the same rock bottom prices on offer in the domestic market. But with more and more businesses running VoIP and cloud based applications, their choice of broadband connection is essential. Any glitch in service will have a massive knock on effect on productivity and customer relationships. So why are businesses not considering resilience or how broadband failure fits into the disaster recovery plan? Why are many not even ascertaining the speed and quality of the broadband options before moving to a new office premises?

A high quality, resilient broadband connection is now one of the most critical aspects of any business’ set up. So why are business owners still applying domestic thinking to business critical communications?



BSI is seeking feedback on the draft BS 12999 standard. ‘BS 12999 Damage Management - Stabilization, mitigation, and restoration of properties, contents, facilities and assets following incident damage’ is intended to provide recommendations to individuals and organizations involved in carrying out damage management. It will be applicable to domestic, commercial and public buildings and includes the following main contents:

  • Introduction
  • Scope
  • Terms, definitions and abbreviations
  • Damage incident instructions, intake and response planning4 On‑site damage assessment
  • Stabilization
  • Damage scoping
  • Damage recovery and restoration
  • Completion sign-off and handover.

The deadline for comments is June 30th 2015.

Click here to read the draft standard and take part in the consultation.

‘Agile’ is still a buzzword. That’s quite a feat in today’s high-speed business and technological environments, where concepts date so rapidly. The original ‘Manifesto for Agile Software Development’ appeared in 2001, some 14 years ago. Since then, the word and the concept it labels have been applied to different business areas, including marketing and supply chain operations. Recently, it has also cropped up in the phrase ‘agile recovery’. But is this taking the ‘agile concept’ too far?



Last week, we learned that cybercriminals undermined the identity verification of the IRS’ Get Transcript app and gained access to the tax returns on 104,000 US citizens, so it’s only fitting in this analyst spotlight, we interview one of the team’s leading analysts for identity and access management (IAM), VP and Principal Analyst, Andras Cser. Andras consistently produces some of the most widely read research not just for our team but across all of Forrester. And clients seek his insight across a number of coverage areas beyond IAM, including cloud security, enterprise fraud management, and secure payments. As the tallest member of our S&R team at 6’5”, Andras also provides guidance to clients on the emerging fields of height intel and altitude management.


Andras Cser Image


Before joining Forrester, Andras worked as a security architect at Netegrity and then CA Technical Services. He also worked in a number of technical and sales capacities at Sun Microsystems prior to joining Netegrity. In his roles on the vendor-side, he architected and implemented IAM and provisioning solutions at Fortune 500 companies.


Listen to this month’s podcast below to hear Andras talk about his most common client questions, counterintuitive insights, and vendors to watch. And as you can tell from our analyst interview, Andras prides himself on being clear and concise.



WASHINGTON – Today, the Federal Emergency Management Agency (FEMA) urges residents across the nation to prepare for the 2015 Atlantic Hurricane season, which begins today and runs through November 30. 

Hurricanes and tropical systems can cause serious damage on both coastal and inland areas. Their hazards can come in many forms including: storm surge, heavy rainfall, inland flooding, high winds, and tornadoes. To prepare for these powerful storms, FEMA is encouraging families, businesses, and individuals to be aware of their risks; know your sources of reliable information; prepare your home and workplace; and be familiar with evacuation routes.

“One hurricane hitting where you live is enough to significantly disrupt your life and make for a very bad hurricane season,” said FEMA Administrator Craig Fugate. “Every person has a role to play in being prepared – you should know if you live or work in an evacuation zone and take time now to learn that route so you’re prepared to protect yourself and your family from disaster.”

This year, FEMA is placing an emphasis on preparing communities to understand the importance of evacuations, which are more common than many people realize. When community evacuations become necessary, local officials provide information to the public through the media. In some circumstances, other warning methods, such as, text alerts, emails, or telephone calls are used. Information on evacuation routes and places to stay is available at www.ready.gov/evacuating-yourself-and-your-family.

Additionally, knowing and practicing what to do in an emergency, in advance of the event, can make a difference in the ability to take immediate and informed action, and enable you to recover more quickly. To help communities prepare and enhance preparedness efforts nationwide, FEMA is offering two new products.

  • FEMA launched a new feature to its App, available for free in the App Store for Apple devices and Google Play for Android devices. The new feature enables users to receive weather alerts from the National Weather Service for up to five locations anywhere in the United States, including U.S. territories, even if the mobile device is not located in the weather alert area. The app also provides information on what to do before, during, and after a disaster in both English and Spanish.
  • The Ready campaign and America’s PrepareAthon! developed a social media toolkit that you can download and share with others at www.ready.gov/ready2015. The kit contains information on actions communities can take to practice getting ready for disasters.

While much attention is often given to the Atlantic Hurricane Season, there are tropical systems that can affect other U.S. interests as well. The Eastern Pacific Hurricane Season runs from May 15 through November 30. The Central Pacific Hurricane Season runs from May 15 to November 30. To learn more about each hurricane season and the geographical areas they may affect, visit www.noaa.gov.

Additional tips and resources:

  • Learn how to prepare for hurricane season at www.ready.gov/hurricanes
  • Talk with your family today about how you will communicate with each other during a significant weather event when you may not be together or during an evacuation order. Download the family communications at www.ready.gov/family-communications.
  • For information on how to create an emergency supply kit, visit www.ready.gov/build-a-kit
  • Consider how you will care for pets during an evacuation by visiting www.ready.gov/caring-animals
  • Use the Emergency Financial First Aid Kit (EFFAK) to identify your important documents, medical records, and household contracts. When completing the kit, be sure to include pictures or a video of your home and your belongings and keep all of your documents in a safe space. The EFFAK is a joint publication from Operation Hope and FEMA. Download a copy at www.ready.gov/financial-preparedness.
  • If you own or manage a business, visit www.ready.gov/business for specific resources on response and continuity planning.
  • The National Weather Service proactively sends free Wireless Emergency Alerts, or WEAs, to most cell phones for hurricanes, tornadoes, flash flooding and other weather-related warnings. State and local public safety officials may also send WEAs for severe or extreme emergency conditions. If you receive a Wireless Emergency Alert on your cell phone, follow the instructions, take protective action and seek additional information from local media. To determine if your wireless device can receive WEA alerts contact your wireless carrier for more information or visit www.ctia.org/WEA.


FEMA's mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain and improve our capability to prepare for, protect against, respond to, recover from and mitigate all hazards.

Follow FEMA online at www.fema.gov/blog, www.twitter.com/fema, www.facebook.com/fema and www.youtube.com/fema.  Also, follow Administrator Craig Fugate's activities at www.twitter.com/craigatfema.

The social media links provided are for reference only. FEMA does not endorse any non-government websites, companies or applications.

(TNS) — While the global fracking boom has stabilized North America’s energy prices, Chicago — America’s third largest city and the busiest crossroads of the nation’s railroad network — has become ground zero for the debate over heavy crude moved by oil trains.

With the Windy City experiencing a 4,000 percent increase in oil-train traffic since 2008, Chicago and its many densely populated suburbs have become a focal point as Congress considers a number of safety reforms this year.

Many oil trains are 100 or more cars long, carrying hydraulically fracked crude and its highly explosive, associated vapors from the Bakken region of Montana, North Dakota, Saskatchewan, and Manitoba.



Hackers illegally accessed the personal information of 104,000 taxpayers this spring, according to the U.S. Internal Revenue Service (IRS).

And as a result, the IRS tops this week's list of IT security newsmakers to watch, followed by Woolworths, Google (GOOG) and Kaspersky Lab.

What can managed service providers (MSPs) and their customers learn from these IT security newsmakers? Check out this week's list of IT security stories to watch to find out: