• WHAT IF YOU COULD HAVE A CONTINUITY, COMPLIANCE AND RISK CLOUD SOLUTION THAT... INTRODUCING FRONTLINE LIVE 5 WHERE CONTINUITY AND COMPLIANCE CONVERGE

    Continuity Logic’s Frontline Live 5™ is the first leader in Gartner’s Magic Quadrant Business Continuity (BCMP) software category that has effectively converged continuity, risk and compliance in a one easy to use cloud-based solution.

Fall World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Jon Seals

OMAHA, Neb. Cosentry, the leading Midwest IT Solutions Provider, today announced the expansion of its Disaster Recovery-as-a-Service (DRaaS) offering to meet the full range of Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO). The enhanced offering also combines Cosentry’s expert managed services, cloud solutions and multiple data centers to assume a customer’s IT burden and dramatically shorten data recovery times. The net result is an affordable, compliant and secure virtual or physical machine data recovery service -- tailored for any size organization. 

 

The DRaaS was developed for not only Cosentry’s cloud and colocation customers, but also organizations seeking to leverage a service provider as part of their disaster recovery, hybrid-cloud initiatives. In addition, Cosentry’s Midwest locations offer a significant advantage for any company that requires data backup to be located in areas outside natural disaster zones.

 

According to Gartner, “For some organizations, the intelligent data center of the future may be managed by a combination of in-house IT and ESP (external service provider) technical staff. The deployment of hybrid clouds is gaining increased interest, because it has the potential to improve both production operations availability and make recovery data center location less of an issue. As hybrid data implementation increases, one critical success factor will be the effectiveness of IT-SCM (service continuity management) that is jointly sustained by in-house IT operations and the external service provider(s).”[1]

 

Cosentry’s DRaaS has been enhanced to meet varying RPOs and RTOs, with targets ranging from less than 15 minutes to several days based on application importance and budget. The tiered service maps the most efficient recovery solution to each application (such as SQL, financial applications, email, CRM, etc.), based on its mission-critical nature. The approach also ensures that the most urgent workloads are restored first with other less critical applications to follow.  

 

Cosentry differentiates its DRaaS from other offerings by leveraging connectivity between the company’s nine Midwest data centers -- to create a scalable, non-stop IT environment. In addition, each failover environment can be deployed based on cold, warm or hot compute requirements. DRaaS examples include:

       Array Based Replication

       Software Based Replication with Auto-Failover

       Software Based Replication with Manual Failover

 

“Due to its complex nature, disaster recovery services have primarily been embraced by corporations with large IT support staff,” said Brad Hokamp, CEO, Cosentry. “Cosentry is making disaster recovery available to a wider market by leveraging our world-class managed services team to create a ‘white glove approach’ for service and support.”

 

DRaaS pricing and availability: Cosentry has created easy-to-understand and simple pricing based on price-per-protected-server plus the cost of cloud resources. For more information, please contact us at (866) 500-7661.

 

About Cosentry

Cosentry is a trusted Midwest IT Solutions Provider, offering solutions that allow our clients to focus on their core business. Our customers can feel confident, knowing their IT Infrastructure is operating at the highest level of reliability, performance, and security. Cosentry has over a decade of experience providing data center services including Colocation, Cloud, Managed Hosting, and Managed Services. We operate as our client's local business partner, taking the time to truly understand their business while tailoring our solutions to meet each client's unique business and technical requirements. Whether virtualizing, consolidating, optimizing, or fully outsourcing data center and IT infrastructure, businesses can rely on Cosentry for help with resilient and versatile solutions- for more information, contact us at (866) 500-7661 or visit us athttp://www.cosentry.com.

IP firm upgrades defences against rising volume of sophisticated phishing attacks

 

 

LONDON, UK – Global IP firm Rouse has reinforced the security of its workforce by expanding its partnership with cloud services provider Mimecast to help protect against advanced phishing attacks.

 

Rouse provides the full range of intellectual property (IP) services and solutions from strategic consultancy through to IP management, enforcement and commercialisation from start-ups to some of the world's largest companies. Headquartered in the UK, the firm has 16 offices around the world including Asia, Europe and the Middle East.

 

All employees around the world are now protected with Mimecast’s Targeted Threat Protection. The service scans all URLs contained within emails even if they come from trusted sources before automatically preventing users clicking at risk links.

 

Matthew Blewett, group IT infrastructure manager at Rouse commented, “Within the last six months we’ve certainly seen an increase in the volume and sophistication of phishing attempts and there’s an on-going need to educate users about email security. Upgrading to Mimecast’s Targeted Threat Protection allows us to better protect our environment against these threats.”

 

Since 2008, Rouse employees have also benefitted from Mimecast Unified Email Management for email security, continuity and archiving services.

 

“Email is one of our most critical business applications and we also rely on Mimecast for high-availability services to mitigate the risk of potential downtime. We are able to keep inbox sizes low yet allow our lawyers to quickly search their archives for important information,” added Blewett.

 

Orlando Scott-Cowley, director of technology marketing at Mimecast, added: “Keeping mobile devices and laptops up-to-date with the latest security updates can be extremely challenging in a highly-dispersed global workforce. By focusing on the hyperlink instead of the email message, we’re able to protect employees from directly accessing potentially malicious webpages in real-time, regardless of the device or operating system that they’re using.”

 

About Targeted Threat Protection

Security scanning or gateway services have made it harder for traditional spam or phishing attacks to penetrate enterprise email systems. Determined attackers are increasingly using a combination of sophisticated social-engineering and targeted or spear-phishing emails to breach their targets.

Standard email security gateways are not designed to detect these new attacks or protect their users from this very dynamic threat vector. Highly targeted attacks are designed to foil even the most sophisticated defences.

 

Mimecast Targeted Threat Protection is an advanced email security technology that protects users against spear-phishing and targeted attacks in email, extending Mimecast’s existing Secure Email Gateway anti-spam and anti-virus services.

 

Learn more by watching the Targeted Threat Protection video.

 

About Mimecast

Mimecast is a leader in enterprise cloud services for the protection and management of email and corporate data. The company's cloud email security, continuity and archiving services are built on Mimecast's world-leading secure cloud platform and optimized for Microsoft Exchange and Office 365.

  • Mimecast Email Security protects against inbound and outbound email-borne threats like spear-phishing, advanced persistent threats and infrastructure attacks, deliberate and accidental data leaks
  • Mimecast’s Email Continuity service ensures employees can continue using their email during planned or unplanned email outages
  • Mimecast Cloud Archive unifies email, file and Instant Messaging data to give end-users fast access to their personal archive via PC, Mac and mobile apps

Founded in 2003, the company has over 10,000 customers, and over 3 million users worldwide. Mimecast has offices in Europe, North America, Africa and Australia.

Mimecast social media resources

·         Blog: Challenging Complexity

By Leveraging Peak’s Cloud, Genpro Inc. Eliminates Costly CAPEX Model and Ensures Maximum Uptime

 

DENVER, Colo.  – Colorado-based Peak®, an enterprise-class IaaS cloud provider for channel partners, announces that Genpro, Inc leverages its enterprise-class cloud to ensure high IT performance, eliminate costly CAPEX models and deliver maximum uptime. True to Peak’s 100% channel centric model, Genpro was first introduced to Peak by channel partner, Telx. All teams work closely together to design the most optimal cloud solution and ensure smooth migrations to the cloud. With a cloud solution powered by Peak, Genpro is able to migrate its entire data infrastructure to the cloud along with full implementation of a Virtual Desktop Solution. By utilizing Peak’s cloud and not managing their infrastructure in-house, Genpro eliminates all hardware, and will enjoy a 20% cost reduction over a five-year period.

 

As a national logistics management company, Genpro’s expertise lies in the safe, reliable transport of freight, which requires the highest reliability and 24x7 support. The company specializes in transportation management solutions for perishable and non-perishable freight throughout North America, and must adhere to strict requirements to ensure 100% contact with its drivers, optimal freight temperatures and compliance with many state regulations.

 

“IT managers and directors today are tasked with future-proofing IT environments, using the most efficient, flexible and reliable platform as possible,” comments Luke Norris, CEO and Founder of Peak. “By leveraging Peak’s secure cloud platform, companies like Genpro do not have to build out their own cloud environment or manage the physical aspects of their data networks, which frees them up to focus on core initiatives. Peak’s cloud solution eliminates costly tasks like maintenance contracts, buying new equipment, outfitting a data center with reliable systems and purchasing licenses.”

 

“Peak‘s guidance and expertise was crucial in our decision to outsource to the cloud versus running our own datacenter,” states Ari Weinstock, Information Technology Manager for Genpro. “Peak works closely with us to help determine how much CPU capacity, IOPs and hard drive space we need. When looking at a five-year plan, we will have savings each year along with other benefits. Had we decided to run our own IT environment, our hardware would be in need of a complete refresh in years four and five. Also, we would have had to make sure we had the right kind of in-house support to keep up with older systems and we would still have needed to purchase new equipment.  By outsourcing, Peak will refresh our hardware in year three and we will always have the best in breed configuration and equipment. Peak made the decision to move away from our expensive CAPEX model quite easy.”

 

Distributing cloud services exclusively through channel partners, Peak helps resellers, distributors, agents and service providers leverage the cloud powered by Peak.  In turn, end-user clients are able to increase control of their environments and manage resources on demand - all with a 100% SLA guarantee.

 

Peak has experienced tremendous growth and recently announced it secured a new round funding to support the expansion of its cloud node capacities in existing locations and meet increasing demand for cloud computing services. Peak’s cloud nodes are located in eight geographies across the United States and Europe including Silicon Valley, Seattle, Denver, Chicago, New Jersey, New York, Atlanta, and the United Kingdom.

 

For more information about Peak’s infrastructure-as-a-service cloud solutions, please contact sales@poweredbypeak.com or visit http://www.poweredbypeak.com.

HOESBACH, Germany – ASC, a worldwide leading software company with innovative solutions to record, analyze and evaluate communications, has changed its company name from ASC telecom to ASC Technologies.

 

Marco Mueller, Chief Operating Officer of ASC, notes, “We are very excited about our new brand and what it represents. The development of new industry-changing technologies has always been a core driver of ASC, and we have already made the transition from a hardware-focused manufacturer of voice recording products to a software-centric company offering a broad portfolio of innovative technologies.”

 

With this transition, ASC continues to focus on the value that their customers gain from ASC’s solutions and services. Today, ASC’s customers can purchase its innovative software solutions “Out of the Cloud.” Cloud Computing offers usage and payment only as required, without any investment costs, capital formation, maintenance or backups.

 

ASC Technologies AG will continue to focus on state-of-the-art solutions, partly through an ongoing commitment to invest up to 20 percent of its revenues in research and development. No one can know exactly what the future will bring, but ASC’s new company name will provide the flexibility needed to mirror the transformational effects of the online revolution and the latest technological developments. And it will reflect ASC’s customer-centric approach beyond the framework of traditional telephony.

 

About ASC

ASC is a worldwide leading software company with innovative solutions to record, analyze and evaluate communications. All multimedia interactions in contact centers, financial institutions and public safety organizations are documented and analyzed. The content of communications becomes transparent, critical information is generated and market trends are revealed, providing real-time business intelligence for immediate management action.

ASC solutions make customer experience measurable. Specific actions can be taken to significantly improve customer retention, increasing corporate revenue and creating sustained loyal customers. Thus, ASC’s clients are always one step ahead of the competition.

ASC also offers its entire suite as a Cloud solution. Therefore, customers have the choice to retrieve Software as a Service, on demand and always up-to-date, without any risk or pre-investment, and in the most flexible manner.

With subsidiaries in the United Kingdom, France, Switzerland, the United States, Brazil, Japan, Singapore and Dubai, as well as certified and vastly experienced distribution partners, ASC’s ambitious projects span more than 60 countries. Headquartered in Germany, ASC is a powerful global player with an export quota of almost 70 percent and a worldwide service network.

LONDON, UK – Esna, a leading provider of real-time collaboration software solutions, announced today that Jabil Circuit, Inc. (NYSE: JBL), a global leader in product design, manufacturing and supply chain services, has selected Esna iLink for WebEx™ software to make it easier for Jabil's thousands of WebEx users to schedule and manage online meetings. With iLink for WebEx, the company empowers its employees to collaborate better, strengthen relationships with customers and partners and reduce costs.

"Jabil is a global leader working with many of the world's top brands. Their ability to quickly and easily collaborate-among employees and with their customers and partners-is essential to their rapidly growing business." Mehdi Nezarati, Esna's EVP and President of EMEA.

 

Giles Houston, Esna Sales Director EMEA states: "With over 1000 employees across EMEA using Esna iLink for WebEx, Esna plays an important role in connecting people, processes and information for Jabil in the most effective and efficient ways, saving cost and increasing productivity across the organization. As we do with all of our clients, we look forward to forming a collaborative partnership with Jabil to fully leverage iLink's capabilities."

 

The iLink for WebEx browser extension seamlessly integrates WebEx functionality with Jabil's Cisco telephony and Google Apps for Work software, enabling users to:

  • Schedule WebEx meetings just like any other calendar event
  • Eliminate the need to book meetings on the main WebEx site
  • Update WebEx automatically any time there's a change to the meeting in Google or from a smartphone calendar
  • Start an instant WebEx meeting right from any web page or application
  • Schedule WebEx meetings that use only audio conferencing

 

"With Esna iLink for WebEx, our employees no longer have to move from application-to-application to book a meeting. That means time saved out of each day and a better user experience for everyone," said Vincent McGuire, Director of IT / Network Operations for Jabil. "iLink's ease-of-use resulted in good adoption rates and very few requests for IT support during the rollout."

 

About Esna
Esna is a leading provider of real-time, collaboration software solutions. Esna empowers people to get more done, more quickly, by embedding real-time collaboration tools inside the cloud-based productivity, CRM, ERP, and social applications they work in every day. For more than 25 years Esna has pioneered innovative solutions that connect people, processes and information. www.esna.com.

 

About Jabil 
Jabil is an electronic product solutions company providing comprehensive electronics design and manufacturing product management services to global electronics and technology companies. Offering complete intelligent digital supply chain management from facilities in 24, Jabil provides comprehensive, individualized-focused solutions to customers in a broad range of industries. Jabil common stock is traded on the New York Stock Exchange under the symbol, "JBL". Further information is available on Jabil's website: www.jabil.com.   

Education & Certification Program for those who work in
Mission-Critical Environments

Aligning Mission-Critical Environments Education & Certification Programs to the Workplace
CETa CETCEM CEE CEA
Based on a complete job analysis, ICOR's new Critical Environments Education and Certification Program aligns to specific jobs or job areas in the critical environment workplace.

Course Audience
For those new or who currently work in critical environments such as data centers, call centers, research & development, university research, hospitals, clean rooms, banking trading floors/environments, broadcasting sites, and manufacturing facilities.

Recognized globally for its vendor-neutral, standards-based education programs, ICOR University's Resiliency Framework provides education and credentialing in the disciplines that support a resilient organization.  Several of ICOR's Certificate Programs are also ANSI (American National Standards Institute) Accredited.

No Cost Placement Exam (coming 2015)
Begin with a 'no cost' placement exam to determine which course or certification program best meets your needs.

Practical Case Study Certification Exams - Online!
The ICOR Certification exams can be taken independently from the ICOR Education Programs. The Certification Exams are included in the course fee for instructor led courses.

ICOR's certification exams are practical case study questions involving problem solving. No multiple choice exams! Available using ICOR's online exam center within 24 hours of registering.

Elearning & Instructor Led Learning
Currently hold a certification and just need to earn CEU's or brush up on specific topic? ICOR's elearning series of course offerings meets your needs. Successful completion of the online exam results in an ICOR Certificate. Certificates can be earned in many areas. 

Looking for an instructor-led in-depth class in a particular area? ICOR's instructor-led classes are offered globally and several in both English and Spanish.

ICOR is the solution to Critical Environment Education. 

 

*Have you taken one or more of ICOR's courses?  Contact us for a discounted rate for returning customers!  Education@theicor.org. 

Interested in one or two modules from any course as a private workshop for your staff?  Custom courses available.

And if you have questions, don't hesitate to call or send an email.
Sincerely,
Lynnda Nelson, President
The International Consortium for Organizational Resilience
Education@theicor.org
866.765.8321 US/Canada  +1630.705.0910 International Calls
Critical Environments Education and Certification Program
TIFM 1000: Essential Knowledge for Critical Environments - Critical Environments Technician Associate (CETa)
TIFM 2000: Critical Environments Technician Series (elearining)
TIFM 3000: Critical Environments Technician (CET)
TIFM 4000: Critical Environments Manager Series (elearning)
TIFM 5000: Critical Environments Manager (CEM)
TIFM 6000: Critical Environments Engineer (CEE)
TIFMARM 7000: Critical Environments Auditor (CEA)
TIFM 1000: Essential Knowledge for Critical Environments - Critical Environments Technician Associate (CETa)
CETa 2 day course covering content necessary to manage and operate a critical environment to avoid unplanned outages caused by equipment failure and human error.
For those new or those who currently work in critical environments such as data centers, call centers, research & development, university research, hospitals, clean rooms, banking trading floors / environments, broadcasting sites, and manufacturing facilities.  Download the Brochure.
TIFM 1000 focuses on creating a base set of knowledge for critical environments and includes a full range of topics:

1000.1 The Evolution of Critical Environments - Philosophy & Lessons Learned

1000.2 Building a Critical Environment - Starting Logic

1000.3 Infrastructure - Uptime Tiering

1000.4 Measuring & Reporting for Successful Capacity Planning

1000.5 Procedures - What Should You Have?

1000.6 Maintenance of Critical Infrastructure

1000.7 Individual Components of a Critical Environment

1000.8 Critical Environments Aesthetics: What a Critical Environment Should Look Like

Participants who successfully complete the practical exam are awarded the Critical Environments Technician Associate (CETa) Certification. 

Schedule:                         Register Here

February 9, 2015 Dallas, TX
February 23, 2015 Atlanta, GA
February 26, 2015 São Paulo, Brazil
March 25, 2015 Orlando, FL
March 28, 2015 São Paulo, Brazil
April 18, 2015 Las Vegas, NV
April 23, 2015 Mexico City
May 11, 2015 Nairobi, Kenya
June 8, 2015 Toronto, ON
June 11, 2015 Orlando, FL
July 6, 2015 Perú
July 13, 2015 Denver, CO
July 14, 2015 Nairobi, Kenya
July 23, 2015 Mexico City
August 24, 2015 Chicago, IL
August 27, 2015 São Paulo, Brazil
September 28, 2015 Nairobi, Kenya
October 19, 2015 Boston, MA
November 26, 2015 São Paulo, Brazil
December 7, 2015 Tampa, FL

TIFM 2000: Critical Environments Technician Series (elearning)
The purpose of the Technician Series is to provide specific information on a single topic. There are no prerequisites and classes are on-demand as part of ICOR's elearning education system. 
Download the Brochure.  Register for one or the entire series! Certification exam fee is included when taking the entire elearning series.
Certificates are awarded upon successful completion of each online course & accompanying online exam. The certificate awarded designates Critical Environments Technician Associate in Documentation, HVAC, Power Generation, etc.

The Critical Environments Technician (CET) Certification Exam may be challenged after completing one or more of the courses in the series.

Course audience is those responsible for day-to-day operation and maintenance of the critical environment's physical infrastructure (Electrical/Mechanical/Fire) systems. Detailed knowledge with advanced practical application for critical environment centric topics including:

2000.1 Documentation, Drawings and Compliance / CMMS
2000.2 HVAC and Chiller Plants - CRAC, Chiller, Cooling Towers,Chemistry, Piping Systems
2000.3 Power Generation, PLC and Backup Methodology - DC Power Sources
2000.4 Power Distribution, Metering, and Infrastructure / Tier Logic
2000.5 UPS, ATS and ASTS - Transferring Critical Power Sources
2000.6 Security, Fire and Life Safety includes Emergency Power Off Button (EPO)
2000.7 Server Components, Networking and Design Methods/Cabling
2000.8 Capacity Planning and Reporting / Budget Planning 

TIFM 3000: Critical Environments Technician
(instructor led)
CET For those interested in taking the full series of courses offered in TIFM 2000 in an instructor-led "live" classroom environment, TIFM 3000 is a 3 day class that includes the CET Certification Exam. Exam can be taken as part of the class or outside of the classroom environment.

To earn the CET certification, a minimum score of 75% in each of the course content areas (2000.1-2000.8) is required. Exam is practicum or practical problem solving question based.Download the brochure.

Course audience includes those responsible for day-to-day operation and maintenance of the critical environment's physical infrastructure (Electrical/Mechanical/Fire) systems.
Register Here
Schedule    
February 11, 2015 Dallas, TX
March 10, 2015 Nairobi, Kenya
March 18, 2015 São Paulo, Brazil
June 10, 2015 Toronto, ON
August 26, 2015 Chicago, IL
September 16, 2015 São Paulo, Brazil
September 23, 2015 Dulles, VA
December 9, 2015 Tampa, FL

TIFM 4000: Critical Environments Manager Series
(elearning) 
The purpose of the Manager Series is to provide specific information on a single topic. There
are no pre-requisites and classes are on-demand as part of ICOR's elearning education system.

Certificates are awarded upon successful completion of each online course and accompanying online exam. The certificate awarded designates Critical Environments Manager Associate in Documentation, HVAC, Power Generation, etc.

CEM
The Critical Environments Manager (CEM) Certification Exam may be challenged after completing one or more of the courses in the series.Download the brochure.


Course audience includes those who seek to be or are currently responsible for the strategic oversight of the critical environments operations and maintenance activities with full accountability for ensuring that the critical facilities environments are reliably available 24X7X365.
TIFM 4000 consists of online classes specific to each of the following subject areas:
4000.1 Documentation and Operating Procedures:Inventory control and critical spares
4000.2 Best Practices for Critical Environments: Design, construction standards & code compliance
4000.3 Evaluating Drawings - What to demand from your project
4000.4 Long term budgeting of critical infrastructure
4000.5 Energy Efficient Operations - Critical Thinking about Efficiency
4000.6 Retaining Redundancy, Capacity Planning, Detailed Reporting,and Analyzing Trends
4000.7 Preparing to be audited
4000.8 Expectations of a Computerized Maintenance Management System: Preventative, Predictive, and Corrective Maintenance
Coming March 2015

TIFM 5000: Critical Environments Manager
(instructor led)
CEM
For those interested in taking the full series of modules offered in TIFM 4000 in an instructor-led "live" classroom environment, TIFM is a 3 day class that includes the CEM Certification Exam. Exam can be taken as part of the class or outside of the classroom environment.Download the brochure.

To earn the CEM certification, a minimum score of 75% in each of the course content areas (4000.1-4000.8) is required. Exam is practicum or practical problem solving question based.

Course audience includes those who seek to be or are currently responsible for the strategic oversight of the critical environments operations and maintenance activities with full accountability for ensuring that the critical facilities environments are reliably available 24X7X365.

TIFM 5000 course content includes detailed knowledge with advanced practical application for critical environment centric topics listed in TIFM 4000 (above).  Register Here 

 

Schedule                    

April 15, 2015 Las Vegas, NV
May 13, 2015 São Paulo, Brazil
July 15, 2015 Denver, CO
October 21, 2015 Boston, MA
November 11, 2015 São Paulo, Brazil

TIFM 6000: Critical Environments Engineer
(instructor led)
CEETIFM 6000 is a 3 day class that includes the CEE Certification Exam. To earn the CEM certification, a minimum score of 75% in each of the
course content areas (6000.1-6000.8) is required. Exam is practicum or
practical problem solving question based. Exam can be taken as part of
the class or outside of the classroom environment.  Download the Brochure.

Course audience includes those who seek to be or are currently responsible for the operation, and maintenance of all electrical, mechanical, and HVAC equipment within the critical environment with responsibilities for vendor selection and contract negotiations.

TIFM 6000 course content includes detailed knowledge with advanced practical application for critical environment centric topics including the following modules:

6000.1 Managing Critical Environments Projects

6000.2 System Design Integrations and Concerns

6000.3 Outage Window Concerns

6000.4 Vetting your Engineering Program

6000.5 Training Programs - setting up an internal process

6000.6 Vendor Requirements and Contractual Obligations

6000.7 Mechanical and Electrical Engineering

6000.8 Top Level Expert Engineering for Critical Environments

 

Register Here  

Schedule
   
May 4, 2015 Chicago, IL
September 23, 2015 Dulles, VA
October 21, 2015 São Paulo, Brazil
November 9, 2015 San Ramon, CA

                   

TIFMARM 7000: Critical Environments Auditor
(instructor led)
CEA TIFMARM 7000 is a 5 day class with a focus on developing a standards-based critical environment, preparing to be audited in different environmental areas, and learning how to conduct environmental audits and manage risk.  Download the Brochure.

To earn the CEA certification, a minimum score of 75% in each of the course content areas (7000.1-7000.8) is required. Exam is practicum or practical problem solving question based. Exam can be taken as part of the class or outside of the classroom environment.

Course audience includes those with a great deal of experience working with all areas of the data center at the technical, managerial, and engineering levels. TIFMARM 7000 content includes the following:

7000.1 Audit materials - What tools are required?

7000.2 Setting up and preparing for the audit 

7000.3 Essential data required for assessing critical systems

7000.4 Identification and documentation of gaps

7000.5 Reviewing documentation

7000.6 Evaluating reliability

7000.7 Advanced single point of failure discovery methods

7000.8 Practical: Conducting an audit 

There are two full audits represented as part of the auditor training.  One full audit under the guidance and direction of the instructor and one full audit that is conducted by the students and evaluated by the instructor.  The completion of this practical audit is 50% of the final scoring for this program.

Register Today!

Schedule
April 27, 2015 Phoenix, AZ
June 15, 2015 São Paulo, Brazil
July 27, 2015 Seattle, WA
November 2, 2015 San Ramon, CA
 
Save 10%
Did you know that you can save 10% on all ICOR courses if you are a member of one of the following organizations?  Contact them to find out how or email info@theicor.org.
  • ICOR
  • ACP
  • AFCOM
  • ASIS
  • BRPA
  • BRPA SW
  • IAEM
  • IFMA
  • NEDRIX 
Become an ICOR Member Today!
Tuesday, 20 January 2015 00:00

Who’s Stealing Your Bandwidth?

Leader in Unified Communications Educates Businesses on the Importance of Proper Internet Utilization and Best Practices
HOUSTON, TX — Abletek, a leading provider in unified communications, announced today that the company is educating its customers on the recent expansion of bandwidth monitoring and management solutions. Essentially, bandwidth monitoring is the practice and policy of tracking the utilization of company bandwidth between all employees, software applications and desktops. The growth of bandwidth management solutions in recent years is due primarily to growth of company provided and personal devices (smart phones, tablets, etc.) connected to an organization’s network.
According to Robert Valentine, Vice President of Abletek, “Any company that provides cloud-devices, software or applications that run over a data network, need to ensure that bandwidth is being consumed properly.” This notion reflects the current state of most solutions, which are simply being strained to the point where many business owners notice that the devices, applications and software underperform. In essence, it’s like siphoning out all of the gas from a car, and then blaming the car for running on fumes. The problem lies with poor policy making and a lack of guidelines for employees on how to properly utilize the Internet at a place of business.
“On many occasions, we’ve found that up to 40% of a company’s employees are choking bandwidth and making it harder for other people to do their work,” Valentine added. “We conduct quarterly reviews with our customers where we assess the performance of all of the technology that we provide. It gives our clients a global perspective on their network and what its performance is and how it can be better. Our overarching goal is to make sure that our customers’ businesses are performing at more productive levels and this is how we quantify productivity. This is why we lead these meetings with device performance audits. With bandwidth being the central resource upon which nearly every technology relies, we have to make sure that this is being consumed in accordance with best practices before any other steps are taken.”
In addition, to the underperformance of the network and the drain on productivity this can cause, many business owners appreciate technology audits, like the one provided by Abletek, because they uncover how much time employees are spending on various sites that have nothing to do with their job. This gives tremendous insight on the productivity, or lack thereof, with certain employees. One of the quickest ways to immediately boost customer profitability is to restrict the bandwidth of employees to sites to those that are exclusively productive in nature, as opposed to entertainment-based sites.
“In some cases, employees simply don’t know that their bandwidth consumption is slowing the rest of the team down. New parents can put their children in day care and want to stream the video from time to time to see how their child is doing throughout the day. Inherently there’s nothing wrong with this, if done on occasion. However, when a parent leaves one of these streaming videos up while they begin working on other things, the rest of the team will notice the lag time that slows down their own desktop. The network is simply a shared resource that needs some guidelines in place, especially in the new employee handbook. With a comprehensive bandwidth consumption policy in place, business owners can rest assured that their software, hardware and online tools will all function at optimal levels.”
ABOUT ABLETEK Abletek is not your typical IT & communications company. We are a TECHNOLOGY SOLUTION PROVIDER and we care deeply about helping you maximize your productivity through effective Managed Services (MSP), IT, communications and related business technology solutions, and while a lot of companies may talk about increasing your productivity, Abletek actually delivers. ABLETEK will remove the burden of managing your network and communications infrastructures by providing everything needed to maintain your servers, workstations, laptops, Pocket PCs/PDA/Treo, Switches, Routers, Email, Printers, VoIP, SIP, Digital & Analog Communications systems and more. Leverage our team of dedicated professionals and proven technology management resources to: CONTROL & REDUCE YOUR COSTS. For more information on Abletek, call (713) 455.1888 or visit www.abletek.com.

COLUMBUS, Ohio – Sage Sustainable Electronics, a new IT asset disposition company led by veterans with over 30 years of experience in the industry, today announced the opening of its Electronics Repurposing Center in Columbus, Ohio.

 

Sage’s mission is to make the world more sustainable by creating longer life for used electronics, said company President Jill Vaské. “We work with businesses of every size to find new life and greater value for their old IT equipment,” said Vaské. “And we guarantee their confidential information is safe in the process.”

 

Sage founders Vaské and Robert Houghton have assembled a team of technology asset management veterans to reinvent the process of secure collection and refurbishment of used electronic devices. “The typical electronics disposition (ITAD) company recycles a large percentage of everything they receive,” Houghton stated. “We have created innovative systems that eliminate much of that waste with the financial and sustainability gains going right back to our customer.”

 

Sage raised eyebrows in 2014 with its blog “We don’t like to recycle.” The company does offer recycling services, but considers recycling a last resort after all avenues for reuse are exhausted, and will be certified to the e-Stewards Standard of certification for electronics recyclers.

 

“It’s much more sustainable to extend electronics lifecycles and defer recycling as long as possible,” said Vaské. “Almost every business has a closet or storeroom full of idle IT equipment that can be put to good use.” Sage accepts all types of technology for repurposing, including computers, phones and tablets, and data center equipment – in short, everything managed by a typical corporate IT department.

 

Sage works directly with corporate clients, and also provides its services in partnership with IT contractors, systems integrators and resellers, Vaské noted.

 

The Columbus facility will be followed closely by the opening of Repurposing Centers in Reno, Nevada and Baltimore, Maryland. The company plans additional centers during the second half of 2015.

 

About Sage Sustainable Electronics

Sage works with companies nationwide to conveniently and professionally transition their used electronics for further use by themselves or others, and as a last and final resort, recycling.

Tuesday, 20 January 2015 00:00

Defining the Five Lines of Defense

As the Board of Directors focuses its attention on risk oversight, there are many questions to consider. One topic the Board should consider is how the organization safeguards itself against breakdowns in risk management (e.g., when a unit leader runs his or her unit as an opaque fiefdom with little regard for the enterprise’s risk management policies, a chief executive ignores the warning signs posted by the risk management function or management does not involve the Board with strategic issues and important policy matters in a timely manner). As illustrated during the financial crisis, the result of these breakdowns can be the rapid loss of enterprise value that took decades to build.

An effectively designed and implemented lines-of-defense framework can provide strong safeguards against such breakdowns. From the vantage point of shareholders and other external constituencies (an external stakeholders’ view), we see five lines of defense supporting the execution of the organization’s risk management capabilities.1 They are outlined below.

...

http://www.corporatecomplianceinsights.com/defining-five-lines-defense/

(TNS) — "A rising tide lifts all boats," John F. Kennedy said, in defense of the government taking on big public works projects for the greater good.

About 10 of Iowa's river towns will share a $600 million pot of state money based on the belief sales tax revenue will rise higher and commercial and residential development will flourish along riverfronts, if protected from flood with sophisticated green and hard infrastructure.

Flooding in Iowa is occurring more often, making the nomenclature 100-year or 500-year flood levels meaningless. The city of Burlington had 500-year floods in 1993 and 2008, a 15-year interval.

Cedar Rapids, which sustained $6 billion of the state's $10 billion flood damage in 2008, led the way in convincing the Legislature to establish a flood mitigation fund.

...

http://www.emergencymgmt.com/disaster/Belief-Reality-Must-Converge-Fund-Iowa-Flood-Mitigation.html