Fall World 2014

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

Jon Seals

New research from Corero Network Security has found that many businesses are failing to take adequate measures to protect themselves against the threat of a DDoS attack. A survey of 100 companies revealed that in spite of the reports about the cost of downtime and the potential for DDoS attacks to mask greater threats, businesses are failing to put in place effective defenses/defences or plans to mitigate the impact of a DDoS attack against their organization. More than half of companies lack adequate DDoS defense technology, and 44 percent of respondents have no formal DDoS attack response plan.

The survey asked respondents about the effectiveness of their plans to prevent, detect and mitigate the damage of a cyber attack including examining their incident response plans from the standpoint of infrastructure, roles and responsibilities, technology, maintenance, and testing. The findings revealed a lack of planning on multiple levels: whilst nearly half of businesses lacked a formal DDoS response plan, the problem was compounded by out of date network visibility as more than 54 percent of respondents have outdated or non-existent network maps. Furthermore, approximately one in three businesses lacked any clear idea of their normal network traffic volume, making it more difficult to discern between routine traffic peaks or high traffic volumes that could signal a DDoS attack.

...

http://www.continuitycentral.com/news07055.html

While the web has opened wide the doors of opportunity for entrepreneurs around the world, others have shown evidence of creativity as well. Ingenious use of technologies has led to hacktivism, identity theft, distributed denial of service (DDoS) and swatting, to name but a few. Perpetrators use both the latest cyber-techniques and also old-fashioned approaches such as social engineering (a new term for the classic tactics of confidence tricksters). Business continuity and personal security both need to be safeguarded against threats like these. But what is driving the proliferation of such Internet incidents?

...

http://www.opscentre.com.au/blog/business-continuity-and-creative-cyber-criminals/

Risk certainly marked the year of 2013, with knock-on effects on business continuity thinking. However, in a year picking up the pieces after different disasters, the real message was a reminder that while we collectively now know a great deal about risk, we don’t always prepare or take action appropriately. The devastation caused by rainfall in the Uttarakhand state of India was one example. Environmentalists blamed what they considered to be haphazard preceding development projects of roads, resorts and hydroelectric stations for the subsequent high level of damage and deaths. Meanwhile in the US and for much of 2013, New York was applying lessons learned the hard way following Hurricane Sandy back in 2012 to produce an improved city resilience plan.

...

http://www.opscentre.com.au/blog/risk-business-continuity-and-it-dr-the-year-of-2013-in-review/

December 17, 2013

BYOD Has Not Won

Bring your own device (BYOD) has a lot going for it. The simplicity of the approach of letting Jane and Joe use their own devices at work and compensating them in some manner is so simple and so rooted in common sense that the case against it is lost in the shuffle.

Or was lost in the shuffle. The reality is that significant downsides and obstacles to BYOD do exist. That reality may finally be dawning on corporate managers. Strategy Analytics released interesting worldwide research that revealed that everything is growing: the number of BYOD devices, the number of company-owned devices issued to employees, and the total number of devices shipped.

The percentage that deserves the most attention is the portion of corporate-liable devices:

...

http://www.itbusinessedge.com/blogs/data-and-telecom/byod-has-not-won.html

A new study finds that in Seattle more than 10,000 buildings — many of them homes — are at high risk from earthquake-triggered landslides.

 

By Sandi Doughton

Seattle Times science reporter

With its coastal bluffs, roller-coaster hills and soggy weather, Seattle is primed for landslides even when the ground isn’t shaking. Jolt the city with a major earthquake, and a new study from the University of Washington suggests many more slopes could collapse than previously estimated.

A powerful earthquake on the fault that slices under the city’s heart could trigger more than 30,000 landslides if it strikes when the ground is saturated, the analysis finds. More than 10,000 buildings, many of them upscale homes with water views, sit in areas at high risk of landslide damage in such a worst-case scenario.

“Our results indicate that landsliding triggered by a large Seattle fault earthquake will be extensive and potentially devastating,” says the report published this month in the Bulletin of the Seismological Society of America.

...

http://seattletimes.com/html/localnews/2022463967_quakeslidexml.html

NORWALK, CT – In the midst of recent industry changes, Datto, Inc., a global provider of hybrid cloud-based backup, disaster recovery (BDR) and intelligent business continuity solutions, is addressing Partners’ needs with a Customizable Playbook to use in marketing to their clients. The materials are available through Datto’s Partner Portal and help convey the value of a hybrid cloud-based solution and the ease of transitioning from one platform to another. Utilizing the service, MSPs and VARs can shift their clients to hybrid cloud-based backup, disaster recovery and business continuity solutions that deliver uptime insurance and superior Recovery Time Objective (RTO).

“It’s been a challenging time for the industry and the customer base,” says Datto Founder and CEO Austin McChord. “To see a supposedly ever present cloud solution vanish causes uncertainty, but be assured, the Datto cloud has never been stronger. We are proud to have built our own cloud based on top of industry security and compliance standards, and currently have more than 50 Petabytes of data in our cloud.”

The layoffs at some prominent cloud providers are the most recent news adding uncertainty to the industry. Back in September, cloud storage provider Nirvanix shut down abruptly, Symantec announced the closing of its Backup Exec.Cloud last month, and there are renewed rumors regarding Zenith Infotech.

These events sent customers seeking immediate alternatives and vendors jumped on the opportunity of gaining new customer acquisitions. But unlike fellow BDR vendors, Datto’s primary concern is in supporting its Partners and how they effectively inform their clients of changes and options that best fit their needs. Datto provides innovative technology and unparalleled customer service to ensure that Partners and their end users know what to expect when making the transition into cloud backup.

“What’s most important to us is in helping our Partners effectively communicate and service their clients during this transitional time,” stated McChord. “Special offers or discounts are great, but what companies really need is effective guidance and trust in their vendor. And that’s what we do and pride ourselves on.”

Eric Torres, an Elite Datto Partner with River Run Computers in Milwaukee, WI puts it best, “It’s about having a vendor that you trust.” Eric recently participated in a Webinar with Datto entitled, “Creating Value to Close the Deal: Backup vs. Business Continuity” where he shares valuable insights to the Channel community. To view the Webinar, click here.

 

About Datto Inc.

Datto Inc. is an award-winning vendor of backup, disaster recovery (BDR) and intelligent business continuity (IBC) solutions, providing best-in-class technology and support to its 5,000+ channel Partners throughout North America and Europe. Datto is the only hybrid-cloud BDR/IBC vendor that provides instant on- and off-site virtualization and screenshot backup verification, achieved through its Inverse Chain Technology™. The Datto product line addresses the specific needs of small to medium-sized businesses (SMBs) and serves a wide range of vertical markets including: healthcare, financial, education, banking, legal, manufacturing, retail, and municipal.

Datto is a channel only provider. Solutions are resold through Managed Service Providers (MSPs), Value Added Resellers (VARs) and IT Service Providers to end-user businesses. To learn more about Datto, visit http://www.dattobackup.com and follow us on Facebook, Twitter and our Blog. For media inquiries, contact Camille L. Currie via email ccurrie(at)dattobackup(dot)com or phone (203.529.4949 x579).

How can you be sure the information you store on the cloud is safe? The short answer is you can't. However, you can take some protective measures. Here five data privacy protection tips to help you tackle the issue of cloud privacy.

 

CIO — The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening.

Today, we rarely choose to send a bunch of photos by email, we no longer use USB flash drives to carry docs. The cloud has become a place where everyone meets and exchanges information. Moreover, it has become a place where data is being kept permanently.

...

http://www.cio.com/article/744688/5_Tips_to_Keep_Your_Data_Secure_on_the_Cloud

After years of false starts, virtual desktop infrastructure (VDI) products are here. They work, and if implemented correctly they can deliver substantial cost savings to enterprise IT shops. What are the risks and rewards involved in embarking on a VDI implementation for your organization?

By Ed Tittel and Kim Lindros

CIO — Virtual desktop infrastructure (VDI) is designed to deliver virtual desktops to client computers over a network from a centralized source. With traditional VDI, you create a master image (reference computer, or core) to use for all clients, then personalize images as needed.

The process of distributing patches and updates is simplified because you only have to update images, not every physical desktop. Plus, you can push desktops across a variety of platforms and devices, from desktop PCs to thin clients and mobile devices.

...

http://www.cio.com/article/744687/Virtual_Desktop_Infrastructure_Offers_Risks_and_Rewards

About this time every year, journalists covering the InfoSec beat start seeing prediction lists being pitched. Sadly, we will see the same pitch, from the same vendor, several times, often because we're on multiple blast lists. Thus, our inbox is clogged with pitches and follow-up emails asking if we've seen the pitches, plus the follow-ups to the follow-ups.

Not everyone is a fan of prediction lists. (Other than the vendors who make them.) For example, Martin McKeay, who works at Akamai as a Security Evangelist, holds an opinion shared by many security professionals when it comes to the vendor-driven prediction lists:

- See more at: http://blogs.csoonline.com/pandemic-preparedness/2869/magical-list-security-predictions-2014#sthash.zMOGpHaa.dpuf

About this time every year, journalists covering the InfoSec beat start seeing prediction lists being pitched. Sadly, we will see the same pitch, from the same vendor, several times, often because we're on multiple blast lists. Thus, our inbox is clogged with pitches and follow-up emails asking if we've seen the pitches, plus the follow-ups to the follow-ups.

Not everyone is a fan of prediction lists. (Other than the vendors who make them.) For example, Martin McKeay, who works at Akamai as a Security Evangelist, holds an opinion shared by many security professionals when it comes to the vendor-driven prediction lists:

"Really, the amazingly stupid part of these annual lists is that they’re not predictive in the least. With rare exceptions, the authors are looking at what they’ve seen happening in the last three months of the year and try to draw some sort of causal line to what will happen next year. The exceptions are either simply repeating the same drivel they reported the year before or writing wildly outrageous fantasies just to see if anyone is actually reading..."

Dave Lewis, fellow CSO blogger and Security Advocate for Akamai, pointed out that many of the prediction lists from years gone by could just as easily apply to the here and now. In fact, in his blog post on the topic, he proved it. His list comes form the year 2000.

- See more at: http://blogs.csoonline.com/pandemic-preparedness/2869/magical-list-security-predictions-2014#sthash.zMOGpHaa.dpuf

The data integration market is growing faster than security and virtualization, according to Margaret Breya, executive vice president and CMO, Informatica Business Solutions.

Why?

Not surprisingly, Breya credits Big Data, machine data and the Internet of Things.

But it’s not just because organizations need to integrate these new forms of data into enterprise systems: A large market for embeddable data management engines is available, both for applications and devices, she said.

“The addressable market is huge, comprising 52 thousand large enterprises and 60 million medium and small enterprises,” Breya told CIOL, an India-based IT publication. “The opportunity is quite huge in the devices space, if you take into account the prediction of 50 billion connected devices by the year 2020.”

...

http://www.itbusinessedge.com/blogs/integration/are-embeddable-data-management-engines-the-next-big-thing-for-integration.html

Now that a good number of enterprises have gained a modicum of experience with public cloud architectures, attention is turning in earnest toward replicating those environments on internal infrastructure.

The private cloud, in fact, is expected to be one of the chief growth areas for both enterprise-class hardware and software as organizations seek to first build the broad scalability needed to support a functioning cloud, and then the virtual and software layers to make it happen.

Indeed, the private cloud has emerged as a top priority within the enterprise vendor community as it provides a unique opportunity to remake the entire data infrastructure stack from the ground up. Dell, for example, has zeroed in on the private cloud now that its lengthy privatization process is complete, teaming up with Red Hat to integrate the OpenStack-friendly RHEL 6.5 across Dell’s data center portfolio. Dell will also take on RHEL service and support functions, even if the system is deployed on non-Dell hardware, a testament to the company’s desire to function within what is likely to be a broad, multi-vendor environment.

...

http://www.itbusinessedge.com/blogs/infrastructure/public-and-private-clouds-similar-but-not-the-same.html